What is Network Visibility for APM and NPM?
October 26, 2017

Keith Bromley
Ixia

Share this

Most everyone in IT has heard about network performance monitoring (NPM) and application performance monitoring (APM) tools. But what are the real benefits? For instance, what kind of information do I really get and is it worth the investment? Also, what about the complexity involved with these types of solutions?

The answer boils down to implementation. Essentially, did you install a visibility architecture first (so that you can optimize the flow of information to APM and NPM tools), or did you just add point solutions for APM and NPM? This answer will determine the effectiveness of your application monitoring solutions.

Any performance monitoring solution is only as good as the quality of data feeding the tools

The visibility architecture concept is extremely important because it organizes the flow of information to security and monitoring tools. Without it, you don’t know what the quality and integrity of the input data to the tools is. A visibility architecture delivers an end-to-end infrastructure which enables physical and virtual network, application, and security visibility. Specifically, network packet brokers can be included in the architecture to parse the requisite data needed and distribute that data to one or more application monitoring tools.

Once the network packet brokers are installed, it makes it much easier for the APM and NPM solutions to optimize your performance. In addition to these tools, other capabilities, like application intelligence and proactive network monitoring, can be installed as part of the visibility architecture to further increase the range of capabilities.

Here are some example use cases of what you can accomplish when a visibility architecture is combined with performance monitoring tools:

■ NPM solutions can be used to improve the quality of service (QoS) on the network and optimize the network service level agreement (SLA) performance.

■ APM solutions can be used to improve quality of experience (QoE) and optimize SLA performance for network applications, i.e. capture data that can be used by an APM tool to observe and diagnose application slowness.

■ APM tools can be used to analyze user behaviors.

■ Application intelligence can be used to identify slow or underperforming applications and network bottlenecks.

■ Proactive monitoring can be used to provide better and faster network rollouts by pre-testing the network with synthetic traffic to understand how it performs against either specific application traffic or a combination of traffic types.

■ Proactive troubleshooting can be combined with application intelligence to help you more quickly anticipate where network and application problems may be coming from.

■ It is also possible to prevent applications from overloading the network bandwidth by using application intelligence to “see” application growth on the bandwidth in real-time and prevent catastrophic events.

■ You can also conduct inline network performance monitoring to optimize A/B traffic route flows (i.e. investigate path latency and performance problems)

In the end, any performance monitoring solution is only as good as the quality of data feeding the tools. Extraneous and duplicate data will affect the ability and speed of monitoring tools to come to an accurate analysis. A few minutes of time to understand your network visibility and the types of blind you have might be well worth it.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

April 19, 2018

In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I've found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM's most critical value points, and in a basic sense fails to recognize what UEM is truly about ...

April 18, 2018

We now live in the kind of connected world where established businesses that are not evolving digitally are in jeopardy of becoming extinct. New research shows companies are preparing to make digital transformation a priority in the near future. However most of them have a long way to go before achieving any kind of mastery over the multiple disciples required to effectively innovate ...

April 17, 2018

IT Transformation can result in bottom-line benefits that drive business differentiation, innovation and growth, according to new research conducted by Enterprise Strategy Group (ESG) ...

April 16, 2018

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions ...

April 12, 2018

This is the third in a series of three blogs directed at recent EMA research on the digital war room. In this blog, we'll look at three areas that have emerged in a spotlight in and of themselves — as signs of changing times — let alone as they may impact digital war room decision making. They are the growing focus on development and agile/DevOps; the impacts of cloud; and the growing need for security and operations (SecOps) to team more effectively ...

April 11, 2018

As we've seen, hardware is at the root of a large proportion of data center outages, and the costs and consequences are often exacerbated when VMs are affected. The best answer, therefore, is for IT pros to get back to basics ...

April 10, 2018

Risk is relative. The Peltzman Effect describes how humans change behavior when risk factors are reduced. They often act more recklessly and drive risk right back up. The phenomenon is recognized by many economists, its effects have been studied in the field of medicine, and I'd argue it is at the root of an interesting trend in IT — namely the increasing cost of downtime despite our more reliable virtualized environments ...

April 09, 2018

How do enterprises prepare for the future that our Cloud Vision 2020 survey forecasts? I see three immediate takeaways to focus on ...

April 06, 2018

When will we be at a point where virtually all enterprise workloads are run in the cloud and how will that change things for IT? To find out, we commissioned a survey, Cloud Vision 2020: The Future of the Cloud. The results were fascinating. I'll share three fundamental lessons we learned in the survey ...

April 05, 2018

The digital war room — physical, virtual or hybrid — is not in retreat but in fact is growing in scope to include greater participation from development and security. It's also becoming more proactive, with on average more than 30% of "major incidents" before they impacted business service performance. In this blog I'm providing a few additional highlights from the insights we got on digital war room organization and processes ...