larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Optimizing Applications on Cisco Networks

Premium Website

  • Sorry, this book is no longer in print.
Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2005
  • Edition: 1st
  • Premium Website
  • ISBN-10: 1-58705-153-2
  • ISBN-13: 978-1-58705-153-1
  • eBook (Watermarked)
  • ISBN-10: 1-58705-441-8
  • ISBN-13: 978-1-58705-441-9

Maximize the performance and availability of network applications and the network infrastructure with application performance management

    Learn and understand the business case for application performance management
  • Understand how to identify applications critical to your business model
  • Identify basic application characteristics and how they can be optimized for transmission
  • Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications
  • Improve service delivery and outsourcing decisions by utilizing meaningful SLAs
  • Identify and solve network application performance problems, saving valuable time and money
  • Includes real-world case studies that cover design and performance issues

The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle.

Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols.

Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service.

This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Online Sample Chapter

Optimizing Applications on Cisco Networks: Beyond the Boundaries

Downloadable Sample Chapter

Download - 172 KB -- Chapter 7: Beyond the Boundaries

Table of Contents

Introduction.

I. A COMPREHENSIVE APPROACH TO MANAGING NETWORKED BUSINESS APPLICATIONS.

1. The Case for Application Performance Management.

    Why Application Performance Is Important.

      Managing an End-to-End System.

      Isolating Performance Problems.

      Sharing Information in a Common Format.

      Establishing and Monitoring Service Level Agreements.

    A Life Cycle Approach to Managing Networked Applications.

      Enterprise APM Needs.

      Establishing an APM Strategy.

      Areas of Responsibility.

      Implementation Triggers.

    The Benefits to the Enterprise.

    Summary.

    End Note.

II. ALIGNING THE NETWORK'S BUSINESS AND TECHNICAL REQUIREMENTS.

2. Understanding Your Business.

    Defining Your Business-Critical Applications.

    Determining Total Cost of Ownership.

    Defining Your Requirements.

    Prioritizing Your Applications.

    Business and Technical Alignment Methodology.

    Summary.

3. Detailing the Business Transaction.

    Understanding Profiling Terminology.

      Latency.

      Bandwidth.

      Jitter.

      Application (or TCP) Turns.

      Protocol/Network Analyzer.

      Advanced Protocol Analyzer.

      Application Analyzer.

      Conversation.

      Flow.

      Application Task or Transaction.

      Cisco Service Assurance Agent.

      Probe.

      Agent.

       Application Thread.

    Classifying Applications.

      Latency-Bounded Applications.

      Bandwidth-Bounded Applications.

    Profiling Methodology.

      Define Base Transaction.

      Determine Application Status.

      Build Baseline Environment.

      Characterize Application.

      Simulate/Model the Effects of Users Traffic.

      View the Results.

    Baseline Overview.

      The Value of a Baseline.

      Producing a Baseline.

    The New Application.

      Virtual-Environment Modeling Methods.

      Assessing New Application Impact Example.

    The Deployed Application.

      Comparing Lab Versus Production Environment for Capturing Data.

      Locating Capture Points.

    Optimizing the Application.

      Optimizing the Latency-Bounded Application.

      Optimizing the Bandwidth-Bounded Application.

    Verifying Application Delivery.

      Identifying the Metrics.

      Considering the Time Period.

      Monitoring the Metrics.

      Amalgamating the Findings.

    Summary.

    End Note.

    References Used in This Chapter.

4. Service Level Management.

    Defining SLAs.

      Constructing an SLA.

      Importance and Limitations of SLAs.

    Assessing Your Requirements.

      Business Criteria.

      Technical Criteria.

      Cisco NetFlow Example.

    Profiling Case Study.

    Defining What to Monitor.

    Summary.

5. QoS and MPLS: Tools to Manage Application Performance.

    Background.

    Allocating Network Resources.

    Traffic-Handling Mechanisms.

      Queuing Algorithms.

       Routing Protocols.

    Provisioning and Configuration Mechanisms.

    MPLS.

    Traffic Engineering.

    Queuing Mechanisms.

      FIFO.

      Work-Conserving Queuing Mechanisms.

      Non-Work-Conserving Queuing Mechanisms.

    Integrated Services.

    Resource Reservations Protocol.

    Differentiated Services.

    Summary.

    End Notes.

    References Used in This Chapter.

III. DEPLOYING AND MONITORING NETWORK APPLICATIONS.

6. Application Deployment.

    Baselining Your Infrastructure.

    Allocating Quality of Service Resources.

      Understanding Policy Management Architecture.

      Sharing Responsibility with Policy Domains.

    The Pilot.

    Verification Process.

    Predictive Modeling.

    Big Bang vs. Staged Rollout.

    Building a Contingency Plan.

      Acquiring the Technical Criteria.

      Deciding on the Business Criteria.

      Building a Disaster Recovery Plan.

    Reporting.

    Summary.

    End Note.

    Reference Used in This Chapter.

7. Beyond the Boundaries.

    Business Requirements Overview.

    Assessing Demarcation Points.

    Recognizing Your Limits.

    Meeting Service Needs.

    Assigning the Correct QoS System.

    Summary.

    End Note.

    References Used in This Chapter.

8. Monitoring the Delivery.

    The Pyramid Model.

    Classifying Management Systems.

      OSS.

      Clarifying Network Management Classification Terms.

      Classifying Management Systems by Function.

      Element Management.

      Operations Management.

      Service Management.

      Business Management.

    Operating Multiple Systems.

    Defining Metrics.

      Choosing the Right Number of Metrics.

      Balance Metrics Between Business and Technical Objectives.

    Collecting Metrics.

      Data-Collection Methods.

      Deciding What Data to Poll.

    Reporting Mechanism.

    The Delivery Circle.

    Summary.

    End Note.

    References Used in This Chapter.

IV. PLANNING AND TROUBLESHOOTING NETWORK APPLICATIONS.

9. Proactive Planning.

    Baselining Performance Levels.

    The Dynamic Enterprise.

    Diagnosing Problems.

    Validating Changes.

    Enabling Technologies.

    Scenario Modeling.

    Capacity Planning.

    Reviewing SLAs.

    End-to-End Delivery.

      Starting Points to Building an End-to-End View.

      Monitoring the End-to-End System.

    Summary.

    Reference Used in This Chapter.

10. When Applications Fail.

    QoS Troubleshooting Tools.

      Network Monitoring.

      Application Monitoring.

    Diagnostic Tools.

      CLI Tools.

      GUI Tools.

     Troubleshooting Methodology.

      Step 1: Define the Problem.

      Step 2: Gather the Facts.

      Step 3: Assess the Data.

      Step 4: Make a Plan.

      Step 5: Implement the Plan.

      Step 6: Observe the Results.

    Identifying Responsibility.

      Fault Processing.

      Reporting Hierarchy.

      CNS Delay Reporting.

    Resolving Performance Problems.

      Transaction- or Task-Oriented Applications.

      Interactive and Multimedia Applications.

      Application Architecture.

      Fault-Conditions Guide.

    Redefining Delivery Requirements.

    Redefining Service Level Criteria.

    Summary.

    End Note.

    References Used in This Chapter.

V. PRACTICAL IMPLEMENTATIONS.

11. Business Aligning Case Studies.

    Case Study 1: Profiling the Business Transaction.

      Defining Base Transaction.

      Capturing a Trace.

      Merging Existing Network Statistics with This Application

      Transaction.

    Case Study 2: Defining SLAs.

      Defining the Location of Metric Collection Points.

      Defining Transaction Targets.

      Collecting the Data.

    Case Study 3: Optimizing the Business Transaction.

      Checking Window Size.

      Checking for Retransmissions.

      Checking Application Architecture.

      Checking Queries.

      Verifying Performance Increase.

      Deploying Changes and Updating SLA.

    Case Study 4: Implementing QoS in a VoIP Environment.

    Summary.

    Reference Used in This Chapter.

12. Optimizing Application Delivery in Storage-Based Networking, Wireless LANs, and an End-to-End Model.

    Storage-Area Networks.

      Comparing Network-Attached Storage with Storage-Area Networks.

      Matching Application Characteristics with Relative Storage Solution.

      Identifying Flows.

      Optimizing SAN Traffic Delivery.

    Wireless LANs.

      WLAN Site Survey.

      Supporting Voice Traffic.

    Complete End-to-End Model.

      Network and Application Performance Management.

      End-to-End Optimization Process.

      Establishing a Baseline.

      Tuning.

      Application Classification.

      End-to-End QoS.

      Network Transmission Path.

      Applying QoS Policies.

    Summary.

    End Notes.

    References Used in This Chapter.

VI. APPENDIXES.

Appendix A. QoS-Related Requests For Comments.

Appendix B. Guide to QoS Standards.

    IETF QoS Standards.

    ITU QoS Standards.

    ETSI QoS Standards.

Glossary.

    Reference Used in Glossary.

Index.

Index

Download - 471 KB -- Index

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020