Showing posts with label NetFlow. Show all posts
Showing posts with label NetFlow. Show all posts

Tuesday, March 3, 2015

ManageEngine Enhances NetFlow Analyzer w/Traffic Shaping


ManageEngine announced the "latest versions of NetFlow Analyzer, its real-time bandwidth and security analysis software, and Network Configuration Manager, its network change and configuration management (NCCM) solution. Available immediately, NetFlow Analyzer pricing starts at $3,750 USD for 50 interfaces. Network Configuration Manager version 11 starts at $1,195 USD for 25 devices":
  • NetFlow Analyzer gains traffic shaping to ensure critical apps are served on priority, device discovery and one-click flow export to add devices from the web GUI itself, and email and SMS notifications for DoS attacks .. it shapes network traffic by reconfiguring the bandwidth allocated to various apps via CBQoS and access control list (ACL). Now, admins can not only monitor the traffic trends but also configure a guaranteed percentage of bandwidth to critical apps and serve them on a priority basis
  • DeviceExpert has been renamed as Network Configuration Manager and adds reports that help service providers who deal with customer card data comply with PCI DSS 3.0 requirements. It also includes a configuration review feature.
See "ManageEngine Adds Traffic Shaping, PCI DSS 3.0 Compliance to Network Management Solutions" - here.

Saturday, May 17, 2014

Ixia Launches Application Intelligence Capabilities


Ixia  introduced its ".. new ATI Processor for the NTO 7300 brings a new level of intelligence to the network packet broker. Distinct Application Fingerprints and a patent pending dynamic identification capability for unknown applications give network managers a complete view of their networks, including application success and failure tracking. By combining rich contextual information such as geo-location of application usage, handset or device type, operating system and browser type, the ATI Processor helps to identify suspicious activity such as unauthorized BYOD usage or business connections from untrusted locations.

ATI Processor features include:
  • Dynamic application intelligence capabilities to identify known, proprietary, and even unknown network applications.
  • Enhanced insight including geo-location, handset type, operating system, browser and other key user data.
  • Empirical data generation to identify bandwidth usage, trends and growth needs delivered via API or Ixia’s IxFlow extensions to NetFlow.
Application intelligence delivers real-time application data to monitoring tools so that users have more accurate application data in order to make better decisions. It does this by providing rich data on behavior and location of users and applications, in any format needed – raw packets, filtered packets, or metadata. This allows IT teams to identify hidden network applications, mitigate network security threats from rogue applications and user types, and reduce network outages and/or improve network performance due to application data information.

Source: A Paradigm Shift for Network Visibility, Ixia, May 2014

See "Ixia Advances Network Visibility with Real-Time Network and Application Intelligence" - here.

Sunday, March 24, 2013

ACSI Connect to Launch "Monitoring as a Service"

   
ACSI Connect will announce tomorrow the "..availability of Network Monitoring Centre [NMC] – A cloud-based network monitoring and reporting service that delivers comprehensive visibility into network traffic, delivered through the cloud to a single pane of glass. It does so across both single- and multi-vendor networks, ensuring high-quality experiences for users and all but eliminating help desk calls".



"..  Using NetFlow v9, IPFIX and JFlow traffic data, ACSI Connect NMC provides comprehensive traffic visibility without the cost and complexity associated with deploying and managing multiple network appliances. NMC goes well beyond other NetFlow-based reporting systems that see all port 80 traffic as HTTP, individually classifying a wide variety of applications, including video and voice streaming, instant messaging, file sharing and email.

See "ACSI Connect Launches Network Monitoring Centre (NMC) -- Cloud-hosted Network Visibility and Reporting in a Single Pane of Glass" - here.

Monday, January 7, 2013

[Guest Post]:Usage-Based Service Management for Fixed-Line Broadband

By Stephen Collins*, VP of Product Marketing and Business Development, Active Broadband Networks


Fixed-line broadband providers need to constantly invest in increased network capacity in order to keep pace with unrelenting growth in subscriber Internet usage, driven largely by bandwidth-intensive consumption of rich media content such as OTT video. Trouble is, while per-subscriber usage continues to increase, ARPU has remained flat, resulting in margins getting squeezed because there’s no incremental revenue growth to offset the capital expenditures in expanded capacity required to ensure satisfactory quality of experience for subscribers.
  
Network operators have two ways to overcome this challenge. They can adopt a usage-based pricing model that generates additional revenue, especially from the subscribers who consistently consume the most bandwidth. While this is certainly an important aspect of addressing the problem, it’s even more critical that operators have the ability to manage subscriber demand in order to alleviate congestion during periods of peak traffic load – typically the evening hours. Without this ability, the network has to be engineered for peak demand – a costly proposition that results in operators over-investing in network capacity. 
   
The real key to solving the problem is harnessing subscriber usage and network utilization data. First, operators need to gain visibility into subscriber behavior and network performance so they can analyze demand for network capacity management and planning. They can invest capital more efficiently by knowing exactly where capacity needs to be expanded. Second, by leveraging new streaming data collection protocols and a high-performance data mediation and storage management system architecture, operators can use this same data for near real-time service and traffic management applications. 
  
High-Performance Data Mediation
  
The network elements already deployed in the existing broadband network infrastructure are the source of a wealth of subscriber usage and network telemetry data that can be retrieved using highly efficient streaming data collection protocols such as IP Detail Record (IPDR), RADIUS and IPFIX/NetFlow. When enabled in a network element, these protocols operate by periodically taking a snapshot of a set of statistics and parameters and packaging the values into a single record that is sent to a centralized collector. If the collection interval is set short enough – 10 to 15 minutes – then it is possible to use the data collected for near real-time service and traffic management applications. 
  
However, doing this effectively in a large network with hundreds of thousands or millions of subscribers requires a service management system capable of collecting, processing and storing a large number of stream data records within each specified collection interval. This involves decoding protocol records and performing a series of checks and cross-checks to ensure the integrity of the data. It also involves generating mediated subscriber usage records that are time normalized relative to a fixed reference for the service management system. These mediated records then need to be stored in an in-memory cache for rapid access by service and traffic management applications as well as written to disk for archival storage and historical trend analysis. The massive volume of usage data collected requires Big Data storage technology in order to meet the stringent performance and scalability requirements.
  
Applying Usage Data for Policy-Based Traffic Management
  
Mediated subscriber usage data can serve as the foundation for service and traffic management applications that measure and monitor subscriber usage as well as network utilization and apply policies to network elements to actively manage subscriber traffic in near real-time. Network operators can choose to implement policy-based proactive and reactive traffic management schemes to avoid network congestion and alleviate it when it occurs, improving overall utilization while ensuring subscriber quality of experience. 
  
Proactive traffic management ensures that usage conforms to a subscriber's service tier by continuously monitoring a subscriber's usage over a sliding time window and triggering the application of policies to manage a subscriber's service when specific usage thresholds defined in the subscriber’s service profile are exceeded. This approach simplifies network capacity management by ensuring subscriber usage will conform to a set of service tiers that can be modeled with the network engineered accordingly. 
  
However, even a well-engineered network with all subscriber traffic in conformance can experience congestion during peak busy hours, resulting in the need for reactive traffic management. This approach detects congestion by continuously monitoring network utilization and automatically taking action to manage subscriber traffic when a specified utilization threshold is exceeded. A reasonable and fair way to alleviate congestion is to identify the subscribers with the most usage during the recent time window and apply policies to manage their traffic. Managing the traffic of just the top subscribers will free up bandwidth for the rest of the subscribers. 
  
The Business Value of Usage-Based Broadband Service Management
  
Broadband providers can realize significant business value by leveraging subscriber usage data for broadband service management. Usage data is critical for network capacity management, allowing operators to analyze network utilization for more efficient capital expenditures when expanding capacity. More importantly, it can serve as the foundation for policy-based service and traffic management applications that ensure more efficient network utilization while improving subscriber quality of experience, enabling network operators to better amortize investments in network capacity.

_______
*Stephen Collins is the vice president of product marketing and business development at Active Broadband Networks. Prior to joining Active Broadband, Stephen served as vice president of product marketing at Acme Packet. Earlier in his career, Stephen held executive marketing and business development positions at Tatara Systems, ThinkEngine Networks, Sonus Networks, and Spring Tide Networks (acquired by Lucent Technologies), which he co-founded. He was a founding engineer at Wellfleet Communications and began his career as a member of technical staff at AT&T Bell Labs. 

Monday, August 27, 2012

sFlow Vs. NetFlow - Which is Better?

  
A post by Adam Powers (pictured) compares the two dominant traffic monitoring protocols - NetFlow/IPFIX (based on IEFT RFCs 3954, 5101 and 5102) and sFlow.

"The only people that ever say 'sFlow is better than NetFlow' are those that haven’t used both and seen the difference for themselves".

"If all you have are sFlow-enabled devices you should still look into turning on sFlow exports. It’ll give you traffic stats and other bits of info that are better than nothing at all .. The NetFlow vs. sFlow war is over. Someone should let them know. Perhaps this will help"

See "NetFlow vs. sFlow for Network Monitoring and Security: The Final Say" - here.