Access your Pro+ Content below.
Network application performance monitoring: Storage to the user
This article is part of the Network Evolution issue of October 2011 Vol. 2, No. 5
The bitter truth of application performance management is that mitigating performance problems can be easier than identifying them. Many organizations deploy application delivery optimization (ADO) tools and compression or application acceleration to improve application performance based on user complaints (read: “Help! Our file shares don’t work!”). But WAN-level performance problems can mask the underlying difficulty of proactively identifying such problems. And, of course, if the performance problem is rooted deeper in the data center, WAN-level fixes will not help. The answer to being proactive lies in a patchwork of application performance monitoring tools that will start at storage I/O and provide visibility at every step on the network to the remote end user. Application performance monitoring in the SAN: What you need to watch In the SAN, systems both read and write blocks of data from and to bulk storage. IT professionals should be watching a few basic metrics related to application performance, chiefly I/O operations ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Today's enterprise application-aware firewall technology offers a host of features to manage application and Web 2.0 traffic. Expert Michael Cobb takes a look at the features and how to make the most of them.
Linking building and power management systems to converged Ethernet networks brings new security concerns.
Application-aware traffic management technology that exists today just doesn't cut it. This Fast Packet blogger would like to see session-based application-aware routing that provides visibility of session state, application behavior and bandwidth use.
Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.