Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Database
    • IT Management
    • Networking
    • Small Business
    • Storage
    • Virtualization

    How to Better Access and Monitor Converged Network Traffic

    By
    Jesse Price
    -
    February 23, 2009
    Share
    Facebook
    Twitter
    Linkedin

      As converged networks become a reality, network operators are facing complex challenges with respect to network monitoring. Because monitoring is a vital factor in the health of any network, tools that monitor specific services traveling in the same converged pipe are inundating the network. However, most of these tools only need access to a small fraction of the data in a high-speed line. The process of isolating the service of interest for each tool is exhausting the resources of the monitoring equipment, which, in turn, is increasing capital and operating expenses.

      Network operators have to make a choice: either refit the network with new monitoring equipment and distribute the traffic, or eliminate the traffic that is not of interest. This article will drill down into this problem, discuss solutions that have been implemented in the past, and present a new, innovative approach to converged network monitoring access.

      The network core is the optimal location to install network monitoring equipment because all of the traffic throughout the network will typically traverse the core. This approach to monitoring is not without its problems though. Namely, because there are increasingly faster data rates at the core, existing monitoring equipment can quickly exhaust processing resources when sifting through the massive amounts of data in an effort to find only the traffic that is relevant to its specific monitoring requirements.

      As network topology continues to grow, converge and increase in speed, existing monitoring equipment often can be rendered obsolete since it can no longer attach to the network. Compounding this problem is the reality that networks generally have not just one, but multiple best-of-class tools attached at the core-each of which needs access to only a small fraction of the traffic that is traveling through the core network on the same high-speed lines. As a result, none of the tools operate at their peak performance levels.

      SPAN Ports and TAPs

      SPAN ports and TAPs

      In the past, network operators have addressed the challenge of how to access network core traffic for monitoring purposes through the use of switch port analyzer (SPAN) ports and/or optical TAPs. Both of these data access methods have their advantages and disadvantages, but the underlying common issue for both approaches is that there remains too little access to satisfy the needs of the growing number of monitoring tools.

      Figure 1 shows a typical data access configuration employing a mix of SPAN ports and optical TAPs. In this scenario, several different flavors of monitoring equipment are receiving data from either the router or a TAP. Each tool receives most, if not all, of the traffic from the converged pipe, requiring it to process a massive amount of data in order to get to the data it is trying to monitor.

      Figure 1: Configuration employing a mix of SPAN ports and optical TAPs

      SPAN ports provide a fairly straightforward approach to providing access and can even offer some level of aggregation, assuming the router platform is lightly utilized. The problem with this method of data access is that the primary function of a router is not to provide monitoring access, so burning SPAN ports on these platforms for this purpose can quickly become cost-prohibitive. Moreover, higher level processing functions are contingent upon the amount of resources not being utilized for other router tasks.??í??í

      Optical TAPs eliminate the cost issues related to SPAN ports but have their own restrictions. TAPs are dedicated to a particular test or monitoring device which, by definition, eliminates the possibility of sharing or switching data between multiple tools. Although they provide access at a better price point, they do so while draining optical power. This, in turn, limits the distance between network devices. Further, without their own processing resources, TAPs do not alleviate the monitoring equipment’s burden of too much data.

      Monitoring Access Optimizers: A New Approach

      Monitoring access optimizers: A new approach

      An effective solution that addresses the processing resources challenge has emerged in the monitoring access market space. The solution revolves around a class of smart access products called monitoring access optimizers. These products focus on providing access to high-speed data in the network core and optimizing the traffic prior to monitoring equipment. Here, the term “optimization” is an umbrella term for aggregation, filtering, interface translations and other tactics intended to streamline the data for specific monitoring needs.

      By filtering core traffic prior to the monitoring tools, each device is only presented with the traffic relevant to that application. This method greatly reduces each tool’s bandwidth requirements which, in turn, prolongs the useful life of the existing tools and decreases tool-related capital expenditures (CAPEX). Conversely, the same traffic may be sent to more than one monitoring tool for highly-differentiated analysis of multiprotocol backbones.

      Another added benefit of this monitoring access solution is that tools do not become obsolete as core data speeds increase. This is a result of the monitoring access optimizer’s ability to translate network traffic to match the interface type and speed on the monitoring devices.

      Figure 2 shows the same data access configuration, but this time employs a monitoring access optimizer. The optimizer virtualizes the access to physical and logical layers of a wide range of WAN and LAN interfaces and protocols by converging them to IP interfaces and protocols. In this scenario, the monitoring access optimizer isolates the traffic that needs to be monitored and directs it to the appropriate equipment. The SPAN ports on the network router are thereby recovered for other uses, and the resources on the monitoring tools are freed up to function more efficiently.

      /images/stories/knowledge_center/price_graphic2of2.jpg

      Figure 2: Configuration employing a monitoring access optimizer

      Conclusion

      Monitoring access optimizers provide an efficient and cost-effective way to leverage several best-of-class monitoring tools simultaneously. In an environment where increasingly diverse traffic is being fed through the fire hose of converged networks, this solution translates directly into a decrease in tool-related CAPEX and an increase in tool performance. By introducing new access means and methods, monitoring access optimizers protect the user’s investment in existing and new network monitoring tools by reducing their obsolescence.

      /images/stories/heads/knowledge_center/price_jesse70x70.jpg Jesse Price is the Vice President of Sales and Marketing for NetQuest. Jesse is responsible for direct and channel sales, strategic partnerships and marketing initiatives for NetQuest’s entire portfolio of monitoring access solutions. In this role, Jesse is responsible for positioning the company’s monitoring access optimizers and driving new opportunities for its products in the carrier, enterprise, government and strategic partner markets. He can be reached at [email protected].

      Jesse Price
      Jesse Price is the Vice President of Sales and Marketing for NetQuest. Jesse is responsible for direct and channel sales, strategic partnerships and marketing initiatives for NetQuest's entire portfolio of monitoring access solutions. In this role, Jesse is responsible for positioning the company's monitoring access optimizers and driving new opportunities for its products in the carrier, enterprise, government and strategic partner markets.He can be reached at [email protected]

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×