Network Monitoring: Have You Ever Monitored “What If”?

How will your network perform if you recruit 100 more employees? What will happen if all your users start using a new, bandwidth-intensive app on their mobiles? What if your website starts delivering new types of content, such as audio or video?

Even if you have network monitoring down to an art, it cannot fully answer any of these questions. Monitoring tools, like Nagios, Zabbix, and Paessler Router Traffic Grapher (PRTG) can help you catch network problems as they happen and identify issues likely to cause problems down the line. However, they are limited in their ability to foresee the future—where your network will go when it grows, and when current uses change.

For that, you need a new type of monitoring—proactive monitoring.

Traditional network monitoring is reactive. It listens in on the network and reports what is going on. It can spot problems like bottlenecks, offline devices, and high latency. It can also help you visualize the network, but it can only provide a “snapshot” of what is happening right now.

Proactive monitoring can actually simulate different “what if” scenarios and monitor what happens on the network when these scenarios occur. A proactive monitoring tool can simulate a high load to see if the network stands up to it; it can stream new types of traffic into the network, and see the effect on switches, routers, servers and apps; and it can recreate many other combinations of traffic and user behavior that may be important for your network, now or in the future.

Network Monitoring

We will cover the following aspects of network monitoring and show how monitoring is done in the reactive monitoring model, and what more can be achieved with a proactive monitoring model:

Uptime Monitoring

Uptime Monitoring Table

Performance Monitoring

Performance Monitoring Table

Monitoring Virtualized and Cloud Environments

Monitoring Virtualized and Cloud Environments Table

Network Visibility

Network Visibility Table

Auditing and Troubleshooting

Auditing and Trouble Shooting Table

Visualizing WLAN

Visualizing WLAN Table

Proactive Monitoring with Hawkeye™

Ixia is a leader in network monitoring. Our monitoring and testing equipment is deployed at 77 of the Fortune 100, 47 of the world’s top 50 telecom carriers, and all 15 of the top 15 network equipment manufacturers. We help some of the world’s largest organizations proactively monitor and test their networks to prepare for changes and resolve issues.

Ixia offers Hawkeye, a software- and hardware-based proactive monitoring solution that performs predictable traffic injection based on active traffic endpoints you can deploy in your network.

Key use cases of Hawkeye

  • Service verification—verify new network links, or links in maintenance, before you go live in production.
  • End-to-end network readiness assessment—simulate hundreds of users for new applications deployed in wide area network (WAN), cloud, or data center environments. You can simulate and monitor voice traffic, unified communications, video services, and more to validate Quality of Service.
  • Network and services troubleshooting—reproduce user traffic patterns on-demand to isolate network issues and verify fixes.
  •  Continuous monitoring of network and application servers in distributed architectures—continuously monitor the network end-to-end by generating traffic or application pings and measuring user experience metrics, which allows you to immediately spot service degradation.

The diagram below illustrates how active monitoring with Hawkeye fits into the monitoring landscape, including both reactive and proactive monitoring tools.

Network Monitoring Diagram

Ixia’s suite of network visibility solutions help to bring the right data to reactive monitoring tools. Ixia Hawkeye complements these solutions by proactively generating traffic in the network, exactly when you need it and matching the exact scenario you wish to monitor, to understand how the network responds and performs.

Hawkeye’s software, virtual, or hardware agents can be deployed in hundreds of locations, including remote sites (branch offices, residential customer locations, network delivery points, or different network locations), local exchanges, attached to aggregation or core routers, as a virtual element in an network functions virtualization (NFV) infrastructure, or adjacent to application servers. This provides a solid infrastructure for in-depth proactive monitoring across the enterprise network.

Want to experience the power of the Ixia Hawkeye?

Schedule a demo