Access "Where is the real session-based application-aware routing?"
This article is part of the October 2011 Vol. 2, No. 5 issue of Adopting an application-centric architecture
By Michael J. Martin Today, application-aware traffic management technology falls far short of what it must really offer. What we need is session-based application-aware routing – or the ability to granularly control multiple applications on multiple paths simultaneously. But that is only partially available from vendors today. Now more than ever it is time for real application-aware networking to emerge. What is session-based application-aware routing? Session-based application-aware routing would enable you to maintain symmetric application session flows operating within a bandwidth or service-level contract in a multi-path network with the ability to move application traffic between paths when necessary. That way, you could have multiple network links, each with its own operating heuristics, but you could manage application traffic so that overflow from one link could be moved to another link without affecting sessions or users on the first link. Are your vendors dodging your questions? Fast Packet blogger Jennifer Huber thinks so. So what's missing from ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Understanding the value of an enterprise application-aware firewall
by Michael Cobb, Application Security
Today's enterprise application-aware firewall technology offers a host of features to manage application and Web 2.0 traffic. Expert Michael Cobb takes a look at the features and how to make the most of them.
-
Where is the real session-based application-aware routing?
Application-aware traffic management technology that exists today just doesn't cut it. This Fast Packet blogger would like to see session-based application-aware routing that provides visibility of session state, application behavior and bandwidth use.
-
Understanding the value of an enterprise application-aware firewall
by Michael Cobb, Application Security
-
-
Can your security strategy handle networked facilities management?
by Andreas Antonopoulos, Contributor
Linking building and power management systems to converged Ethernet networks brings new security concerns.
-
Network application performance monitoring: Storage to the user
by John Burke, Contributor
Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.
-
Can your security strategy handle networked facilities management?
by Andreas Antonopoulos, Contributor
More Premium Content Accessible For Free
Harvesting business intelligence with network monitoring tools
E-Zine
Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...
WAN optimization policy goes deep
E-Zine
The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such ...
Hybrid Cloud networking falls short, but not for long
E-Zine
As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...
Network Management Strategies for the CIO