Improve Your Performance with Application Intelligence
June 14, 2018

Keith Bromley
Ixia

Share this

If you are like most IT professionals, which I am sure you are, you are dealing with a lot issues.

Typical issues include:

■ Constantly changing security threats to your network

■ An internal and external emphasis on your customer quality of experience

■ A greater need to troubleshoot problems faster

These three requirements are forcing IT to acquire an even better insight and understanding of their network to maximize its performance. One thing you can do to accomplish these goals is to begin using application intelligence to deliver the kind of insight you need. Application intelligence is simply detailed application level information about your network.

Acquiring this type of information can be difficult, unless you have implemented a visibility architecture with a network packet broker (NPB). A good NPB can filter network data based upon Layer 7 (application level) information which makes the process easy. Really good NPBs will provide additional meta data information like NetFlow data, geolocation information, device type, browser type, etc. With all of this information, you can really start to see what is happening on your network and where it's happening.

For instance, here are just a few cool things application intelligence can help you with:

■ Generate an application level dashboard to observe applications in use and bandwidth consumption on a per app basis

■ Troubleshoot localized and global network issues faster

■ Filter data to security and monitoring tools based upon application signatures to improve tool efficiency and speed of analysis

■ Identify bandwidth hogs and bandwidth explosions on the network, e.g., Smartphone apps

■ Use geolocation to show overloaded / underperforming network segments

■ Spot indicators of compromise on your network

■ Improve your adherence to regulatory compliance mandates

Application intelligence gives you summary information about how your network is performing. This includes a dashboard that shows you visually a list of applications in use, the percentage of network bandwidth allocation per application, a listing and breakdown of usage of device types and browser types, and the loading across your network.

The dashboard should also let you filter on one or more applications so that you can narrow the dashboard view to see only what you want and need to see. This dashboard will be a key factor in converting data into usable information because lets you intuitively visualize the information.

As an example, a visibility architecture that uses application intelligence information can be used to capture critical information needed for the whole troubleshooting process. Filtering can be created to isolate specific applications that are being reported to have problems.

Geolocation capability can also be used to help quickly locate geographic outages and potentially narrow troubleshooting efforts to specific vendors that may be causing network disruptions. This reduces troubleshooting costs and improves customer Quality of Experience.

Eliminating inspection of ... low-risk data can make your IDS solution up to 35% more efficient

Another powerful use case for application intelligence is to use application filtering to improve security and monitoring tool efficiencies. Delivering the right information is critical because garbage in results in garbage out. For instance, by using application intelligence to screen traffic before it is sent to an intrusion detection system (IDS), information that may not require screening (e.g. voice and video) can be routed downstream and bypass IDS inspection. Eliminating inspection of this low-risk data can make your IDS solution up to 35% more efficient.

Application intelligence can be used to identify slow or underperforming applications or network segments. For instance, application information, flow data, and geographic information can be combined to show what applications are running on your network, how much bandwidth each application is using, and what the geographic usage is for the application(s). This allows you to isolate and filter traffic matching specific applications, geographies, keywords, and handset types to start root analysis work flows.

Another use case allows you to access empirical data to identify bandwidth usage, trending, and growth needs. This empirical data can then be used to proactively manage network resources and new equipment installations, accurately forecast expansions, and perform better budgeting for expansions. The data can then be exported to other applications, like a Splunk application or something, for long-term data collection and performance trending.

One example is a wireless carrier with smartphone users. A new app, like a multi-user scavenger hunt app, could be relatively small one minute and then could literally exploded 1,000, 10,000 or even 100,000 times in the amount of bandwidth consumption in just a few weeks time. Unplanned bandwidth explosions like this can severely impact the quality of service and quality of experience on the network.

The bandwidth explosion issue isn't just one for service providers either. Bring Your Own Device (BYOD) and the plethora of apps on today's smartphones can easily affect network bandwidth for small to medium businesses as well as enterprises. Bandwidth explosions can happen on the wired and wireless networks in a short amount of time. This makes it critical to be able to observe the network in real-time to understand what is happening.

Keith Bromley is Senior Manager, Solutions Marketing at Ixia Solutions Group, a Keysight Technologies business
Share this

The Latest

October 20, 2020

Although cost control/expense management remains top of mind, organizations are realizing the necessity of technology solutions to enable them to steer the business during these turbulent times, according to IDG's CIO Pandemic Business Impact Study ...

October 19, 2020

The COVID-19 pandemic has compressed six years of modernization projects into 6 months. According to a recent report, IT leaders have accelerated projects aimed at increasing productivity and business agility, improving application performance and end-user experience, and driving additional revenue through existing channels ...

October 15, 2020

There is no doubt that automation has become the key aspect of modern IT management. The end-user computing market is no exception. With a large and complex technology stack and a huge number of applications, EUC specialists need to handle an ever-increasing number of changes at an ever-increasing rate. Many IT organizations are starting to realize that they can no longer control the flow of changes. It is time to think about how to facilitate change ...

October 14, 2020

Starting this September, the lifespan of an SSL/TLS certificate has been limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days. With this change, everyone needs to more carefully monitor SSL certificate expiration and server characteristics ...

October 13, 2020

Nearly 6 in 10 responding organizations have accelerated their digital transformations due to the COVID-19 pandemic, according to The IBM Institute for Business Value study COVID-19 and the Future of Business ...

October 08, 2020

Two-thirds (67%) of those surveyed expect the sheer quantity of data to grow nearly five times by 2025, according to a new report from Splunk: The Data Age Is Here. Are You Ready? ...

October 07, 2020

Gaming introduced the world to a whole new range of experiences through augmented reality (AR) and virtual reality (VR). And consumers are really catching on. To unlock the potential of these platforms, enterprises must ensure massive amounts of data can be transferred quickly and reliably to ensure an acceptable quality of experience. As such, this means that enterprises will need to turn to a 5G infrastructure powered by an adaptive network ...

October 06, 2020

A distributed, remote workforce is the new business reality. How can businesses keep operations going smoothly and quickly resolve issues when IT staff is in San Jose, employee A is working remotely in Denver at their home and employee B is a salesperson still doing some road traveling? The key is an IT architecture that promotes and supports "self-healing" at the endpoint to take care of issues before they impact employees. The essential element to achieve this is hyper-automation ...

October 05, 2020

In Episode 10, Prem Naraindas, CEO of Katonic.ai, joins the AI+ITOPS Podcast to discuss how emerging technologies can make life better for ITOps ...

October 02, 2020

Sean McDermott on the AI+ITOPS Podcast: "AIOps is really about the processing of vast amounts of data and the ability to move into a more analytical, prescriptive and automated methodology."