LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

With Paul Offord of Advance7 hosting, Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting.

According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. There is a new LMTV event happening on February 21, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting. According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. 

Network visibility solutions allow you to get a clearer picture (in a faster way) as to what is happening on your network. This allows you to reduce your mean time to repair (MTTR) performance.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are several possible ways to optimize your troubleshooting activities:
    • Insert taps between the network and monitoring tools (or network packet broker) to improve the quality of monitoring data and time to data acquisition
    • Deploy network packet brokers (NPBs) between those taps and the security and monitoring tools to optimize the data sent to the tools, like Riverbed
    • Deploy NPBs that support floating filters to further decrease the time to data acquisition
    • Use NPBs that support adaptive monitoring, which speeds up the data filter deployment process by using automation to replace manual intervention
    • Implement proactive troubleshooting with application intelligence to create a macroscopic troubleshooting approach that reduces fault localization time
  • Network analysis tools, like those from Riverbed, can provide capabilities to help you improve your network operations. Riverbed's SteelCentral application performance monitoring solution let’s you identify network problems to optimize your network.
  • A visibility architecture typically yields immediate benefits such as the following:  eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability
  • A visibility architecture typically yields immediate benefits such as the following:  eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control

Join us for the second of several discussions to learn how to unleash the power of network visibility.

If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.


Obsolete (by Paul W. Smith)

Peak-Stand Fall

I remember when I got my first pager.  Pagers were for special people who must always be available in an emergency, and so I felt important.  The feeling was short-lived. I soon realized that it could go off at any moment, compelling me to drop whatever I was doing and head for the nearest phone (smartphones had not yet obsoleted pagers).  I also learned that it is critical to dress appropriately when wearing a pager, lest one be mistaken for a drug dealer.

Our culture’s intoxicating brew of cutting-edge technologies has always put forth shiny objects which feed our egos and, in some cases, speed our workflow.  The not-so-hidden agenda of their creators is to make them obsolete before the revenue stream wanes.  The familiar adage “technology eats its young” is not without merit.

According to the definition, an obsolete thing is outdated and therefore no longer produced or used.  As a verb, the word has become a rallying cry for business leaders – our mission is to obsolete the other guy’s stuff and take his share.  Cassette tapes, pagers, rotary phones, typewriters, phonographs, floppy disks – all these and many more could still perform their intended function, but products that seem good enough are never good enough for long.

Continue reading "Obsolete (by Paul W. Smith)" »


How TCP Works - No-Operation (by Chris Greer)

Hey packet people! 

If you have ever had to analyze a TCP connection, you have definitely seen a three-way handshake. In that handshake, both TCP stacks will exchange the options they are open to use for the connection. In the options field, you may also see several instances of the No-Operation value. 

How does this value work? What does it mean (other than no-operation of course), and how should I interpret it? 

Get the answers to these questions here:

 

Continue reading "How TCP Works - No-Operation (by Chris Greer)" »


Wireshark Udemy Free Course Giveaway (by Tony Fortunato)

I have been presenting, training, creating videos, articles and sharing information for over 20 years. As technology evolves, I have tried to keep up by creating lovemytool google and linkedin groups as well as contributing to many social media technical groups/online publications.

When youtube started becoming a source of information for technicians, i created a channel. My youtube channel has over 330 videos covering various topics such as Microsoft operating system, Cisco, Wireless, Wireshark and other technical topics.

I will not be teaching or presenting this year (so far) so i thought i would take some of the suggestions sent to me last year. I had several requests to create some online material so I created a "Wireshark 2 Fundamentals" class on Udemy as my first attempt. This is introductory class for those who want to start using Wireshark or if you need a refresher.

No need to be intimidated by Wireshark! Many IT analysts avoid getting into Wireshark because it seems overwhelming.  You don't need a lot of experience to get up and running with Wireshark. In this course you will learn all the basics required to confidently capture, save and navigate around Wireshark's environment. I will spend some time explaining enough of the software to encourage you to use it more.

Here is the link to the Udemy course:

https://www.udemy.com/wireshark-2-fundementals/learn/v4/overview

The course is only about 2 hours and only $20 USD but I will be holding a draw for a free coupon. One coupon will be given away for each of the social media sites that I am involved with.

All you have to do is fill in the fields and will be draw a winner the end of Feb 2018.

Here is the link to the draw:

Continue reading "Wireshark Udemy Free Course Giveaway (by Tony Fortunato)" »


Scalability in Network Architecture (by Christian Ferenz)

Scalability in Network Architecture

There has been a huge surge in network traffic and no industry is immune from being overwhelmed by data. Network visibility is a requirement for all industries ranging from financial corporations, telecom companies, data centres to retailers, government and healthcare. All are vulnerable to becoming constrained due to scalability issues.

With non-scalable tools, companies are limited by the number of switches and the architecture does not allow them to address all their network visibility concerns. As a result, they end up investing huge sums in changing their entire network architecture.

If a company’s existing network monitoring setup consists of a limited number of network TAPs feeding a monitoring switch, the system provides limited visibility and is not scalable. Such a system is also not capable of addressing regular microbursts in network traffic. Furthermore, the architecture generates substantial duplicate packets that the switch is not equipped to eliminate, creating challenges for monitoring. In such cases, when a company needs to install new TAPs and new port SPANs to accommodate network expansion, the old switch is not able to handle the load.

A scalable solution which offers multi-stage filtering, de-duplication and other features helps a network operate more efficiently.

Customers can ease these problems by building scalable network monitoring visibility solutions.

  • Tools that can intelligently aggregate data and precisely channel it to the appropriate monitoring tools without missing or dropping data, and which provide 100-percent visibility. Instead of using several TAPs, SPANs and tools, a scalable tool can provide 100 percent visibility of all data passing through it.

 

Continue reading "Scalability in Network Architecture (by Christian Ferenz)" »


2017 Sharkfest Europe - Why do vendors go to Sharkfest? (by The Oldcommguy®)

2017 SharkFest Europe

10 years of SharkFest

Cake

Learning from the Professional Analysts that come to Sharkfest!

Why vendor’s should be at every Sharkfest!

ProfiShark and long-term capture is an example of why Vendors attend Sharkfest!

SharkFest Europe conference was a success! This year, the Wireshark conference took place in Estoril, Portugal and it didn’t disappoint, as expected. For the Profitap team, the event meant lots and lots of inspiration and interesting insights about packet analysis, network troubleshooting and network forensics.

As a Vendor they attend to learn about trends and issues from the high quality of attendees at Sharkfest.

Hey mister “want to capture a LOT of data” Like all of your data and see every frame, when you need to?

Geoff and LaurantProfiTAP Team - Geoffrey Kempenich (left) and Laurent Schirck (right)

Continue reading "2017 Sharkfest Europe - Why do vendors go to Sharkfest? (by The Oldcommguy®)" »