& cplSiteName &

Network Visibility Architectures: One Size Does Not Fit All

Jeff Harris
5/15/2017
50%
50%

The term "network visibility" has been in the networking space for ages, but has never been as important or relevant as it is today. New and exciting methods of automation -- whether virtualization, the cloud, IoT or even best practices like network segmentation -- tend to emphasize innovation over visibility. As such, networks develop blind spots that mask network problems and even faulty devices.

In this environment, understanding what visibility truly means is just as important as having it. Visibility is what allows IT to control and optimize the network, along with applications and IT services. Without it, organizational speed decreases, network problems take longer to resolve and security threats increase. Knowing how to measure what "good" looks like is critical in modern, complex networking environments. Determining the best strategy to accomplish this requires serious consideration.

Here are a few tips for making your decision.

End-to-end visibility architecture
An end-to-end visibility architecture lets you see across physical and virtual network elements, into cloud environments, and of course, into your network traffic. Achieving it requires a plan. Many organizations grow into their networks, adding on components, analytics, compliance and security, one appliance at a time. While it is possible to piecemeal visibility components along the way, the method can create its own blind spots while leading to unnecessary complexity and higher costs. Instead of waiting until a problem arises, it is important to annually reevaluate network visibility infrastructure and plan accordingly. Assess network segments to make sure they are being monitored -- look into virtual cloud monitoring for your public cloud resources and test your existing infrastructure with realistic high-volume traffic.

If done well, a strong visibility architecture will dramatically increase your visibility depth and breadth, whether it is physical, virtual, out-of-band or inline security. And depending on the solution, scaling doesn’t have to be a problem. VaaS can scale up or down, with cost based on consumption.

Setting up for immediate return
Visibility architectures typically yield immediate benefits that improve security, from reduced troubleshooting times to decreased network downtime. Realizing a return on investment (ROI) typically takes less than a year and can happen in as little as six months when visibility is applied effectively.

To start, there needs to be access to the proper data. This usually involves physical or virtual taps capable of being implemented at any switch point to access data from relevant segments of your network. When implemented correctly, it removes the bottleneck caused by limited access points (e.g., SPAN ports). And if you have planned well and overprovisioned your SPAN ports, it is recommended to intelligently aggregate them before getting them to your performance monitoring and compliance tools.

Next comes the filtering component to optimize the flow of relevant data to the right monitoring tools. Intelligent network packet brokers (NPBs) aggregate data, as well as filter, de-duplicate, time-stamp and even load balance the data sources to ensure monitoring tools are not overwhelmed. NPBs provide greater control while extending the life of existing network, application and security tools housed in the network -- especially for higher speed networks. When selecting a network packet broker, be sure it is the right size for your network.

Most NPBs have some level of context-aware data handling capabilities, though some perform at high speeds better than others. Having security intelligence awareness is very rare. By authenticating applications at high speeds, it is possible to send good traffic, like Netflix or Amazon Prime streams, for lower levels of security analysis. This is not possible if you cannot identify those applications at full network speed. Security intelligence can also identify what applications are running, the bandwidth used by each, the geolocation of application use, device types, routing of information and perform SSL decryption -- all within the visibility infrastructure layer.

Why it matters
Complex networks need good visibility to keep them safe. Besides the obvious, there are four typical and important use cases for a strong visibility architecture.

  1. Strengthening security defenses. If your network infrastructure is dropping packets at high network speeds, it is only a matter of time before an attacker will sneak in and exploit this weakness. Network and troubleshooting visibility needs to keep up with these high speeds and easily digestible insight into traffic sources and destinations.

  2. Network failure prevention. Prevention (not remediation) should be the goal on any network. The right visibility approach will have bypasses for inline devices, high availability failover paths that revert immediately, and can tell you which applications or network segments are underperforming.

  3. Faster time to repair. The two biggest fears of every IT manager is (1) being breached and (2) network downtime. Remediation of either of these is all about troubleshooting time, which is driven by your visibility layer. Having a properly sized, intelligent visibility layer can reduce mean time to repair by up to 80%.

  4. Test your network periodically. A good practice is periodic network testing, which requires capturing data for analysis. It makes isolating issues and resolving anomalies much easier and faster. To do this, you need to capture the data and have the ability to play it back within your network staging area. This kind of "traffic rewind" capability is simple to implement but can only be done with proper planning.

Ultimately, one-size does not fit all in terms of visibility architectures. You need one that is sized to your network’s specific configuration and needs. When done effectively, though, it can prevent and solve a lot of the daily problems faced by your network operations and security teams. Not all visibility architectures perform equally.

— Jeff Harris, Vice President, Solutions Marketing, Ixia


CALLING ALL TEST, ASSURANCE AND MONITORING COMPANIES:
Make sure your company and services are listed free of charge at Testapedia, the comprehensive set of searchable databases covering the companies, products, industry organizations and people that are directly involved in defining and shaping the telecom test and measurement industry.



(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
More Blogs from Column
Status and next steps on spectrum policy for Gigabit LTE and 5G in the US and beyond.
Will social media platforms be the next big disruptor of the pay-TV industry? Could be, but pay-TV providers have ways to respond to this and other threats.
Gigabit LTE is a must-have, not a gimmick, for operators around the globe.
What organizations can expect when becoming GDPR compliant and how they can effectively navigate it.
Is there an upside to Moore's Law slowing down? Actually, there are many.
From The Founder
NFV's promises of automation and virtualization are intriguing, but what really excites service providers is the massive amount of money they could save.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
Women in Comms Introduction Videos
AT&T's Tech President Preps Workforce for the Future

7|26|17   |   5:47   |   (8) comments


AT&T is focused on the software-defined network of the future and is reskilling its workforce to get ready too, according to AT&T's President of Technology Development Melissa Arnoldi.
Women in Comms Introduction Videos
Cisco: Mentoring Critical to Attract & Retain Women

7|19|17   |   6:40   |   (1) comment


Liz Centoni, senior vice president and general manager of Cisco's Computing System Product Group, shares why mentoring in all its forms is important for women and what Cisco is doing that's made a difference for women in tech.
LRTV Custom TV
Gigabit LTE With Snapdragon 835

7|12|17   |     |   (1) comment


At an event in Wembley stadium, EE used its live network to demonstrate gigabit LTE using a Sony Xperia XZ Premium smartphone with a Qualcomm Snapdragon 835 chip.
LRTV Custom TV
Implementing Machine Intelligence With Guavus

7|12|17   |     |   (0) comments


Guavus unites big data and machine intelligence, enabling many of the the largest service providers in the world to save money and drive measureable revenue. Learn how applying Machine Intelligence substantially reduces operational costs and in many cases can eliminate subscriber impact, meaning a better subscriber experience and higher NPS.
LRTV Custom TV
Unlocking Customer Experience Insights With Machine Intelligence

7|12|17   |     |   (0) comments


When used to analyze operational data and to drive operational decisions, machine intelligence reduces the number of tasks which require human intervention. Guavus invested in Machine Intelligence early. Learn about the difference between Machine Learning and Machine Intelligence.
Women in Comms Introduction Videos
Verizon VP Talks Network, Career Planning

7|12|17   |   4:49   |   (0) comments


Heidi Hemmer, vice president of Technology, Strategy & Planning at Verizon, shares how bold bets and the future of tech define her career.
Telecom Innovators Video Showcase
Masergy's NFV Journey

7|11|17   |     |   (0) comments


Ray Watson, vice president of global technology at Masergy, discusses the advantages and challenges in entering the still-maturing NFV market for the past three years.
Telecom Innovators Video Showcase
Mavenir on RCS Cloud Platform & Multi-ID

7|10|17   |     |   (0) comments


Guillaume Le Mener, head of marketing and corporate development at Mavenir, discussed RCS and the recent launch of Multi-ID, which supports T-Mobile's DIGITS, the revolutionary new technology that breaks down the limitation of one number per phone and one phone per number.
LRTV Custom TV
ADTRAN Executive Outlines Trends in Next-Generation 10-Gigabit Cable Networks

7|10|17   |     |   (0) comments


Hossam Salib, VP of Cable and Wireless Strategy at ADTRAN, outlines key trends as MSOs begin to deploy next-generation Gigabit and 10-Gigabit cable networks. In the interview, Hossam outlines the advantages of a Fiber Deep architecture, FTTH options including EPON and RFoG, and the importance of SDN and NFV in building next-generation high-bandwidth cable networks.
LRTV Interviews
Global Capacity: Bandwidth Demand Driving Ethernet Growth

7|6|17   |   6:37   |   (0) comments


At Light Reading's Big Communications Event in Austin, Texas, Global Capacity's VP of Marketing Mary Stanhope talks about how the demand for bandwidth is changing the way service providers deliver broadband services.
LRTV Interviews
Colt's Services Chief on Digital Delivery

7|5|17   |   16:12   |   (0) comments


Rogier Bronsgeest, the chief customer experience officer (chief CEO!) at Colt, discusses the way in which the service provider interacts with its customers these days and his aggressive net promoter score (NPS) targets.
Women in Comms Introduction Videos
BT VP: Women Should Fill Security Talent Gap

7|5|17   |   6:00   |   (2) comments


By 2020 there will be six security jobs for every qualified worker, and Kate Kuehn, vice president of Security for BT in the Americas, says BT wants to encourage women to fill the shortage in jobs.
Upcoming Live Events
September 28, 2017, Denver, CO
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Royal Garden Hotel
November 1, 2017, The Montcalm Marble Arch
November 2, 2017, 8 Northumberland Avenue, London, UK
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
AT&T's Tech President Preps Workforce for the Future
Kelsey Kusterer Ziser, Editor, 7/26/2017
What's a Little Throttling Between Friends?
Mari Silbey, Senior Editor, Cable/Video, 7/24/2017
The Hidden (Human) Cost of Automation
Steve Saunders, CEO and founder, Light Reading, 7/26/2017
Huawei Slowdown Casts Pall Over Network Sector
Iain Morris, News Editor, 7/27/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.