SlideShare a Scribd company logo
1 of 29
Download to read offline
ca Opscenter
Improve Network Latency and
Hold Service Providers to SLAs
Ahmed Kira
OCX64S #CAWorld
CA Technologies
Service Assurance Sales Engineering
2 © 2014 CA. ALL RIGHTS RESERVED.
Abstract
A leading pharmaceutical company leverages CA
Network Flow Analysis, CA Application Delivery
Analysis and CA eHealth to improve network
latency by up to 39% and hold their service
providers to their Service Level Agreements.
Ahmed Kira
CA Technologies
Advisor,
Service Assurance
Sales Engineering
3 © 2014 CA. ALL RIGHTS RESERVED.
Agenda
BACKGROUND
BEST PRACTICES & SOLUTION ARCHITECTURE
Q&A
USE CASE 1: REDUCING NETWORK LATENCY BY 39%
USE CASE 2: PROACTIVELY HOLDING SERVICE PROVIDER ACCOUNTABLE
USE CASE 3: FAULT ISOLATION
1
2
3
4
5
6
Background
5 © 2014 CA. ALL RIGHTS RESERVED.
Background
20,000 Employees
Leading Pharmaceutical Company
60+ Global Sites
Pioneer in treating
bone and kidney cancers
Innovative research with
‘biology first’
12,000 devices
6+ million
netflow records/minute
11 Global Data Centers
Almost $20 billion
Annual Revenue
Best Practices
7 © 2014 CA. ALL RIGHTS RESERVED.
 IPSLA/Response monitoring across links
– Edge router to router
– Eliminates LAN, which Service Provider is not responsible for
– Can emulate different Quality of Services
 Network Connection Time
– Based on packet analysis
– Calculated from real transactions, not synthetic; no period missed
– Not subject to ‘Delayed Acks’, which impact ‘Network Round Trip Time’
– Averaged across many transactions
What metrics needs to be tracked?
BEST PRACTICES
8 © 2014 CA. ALL RIGHTS RESERVED.
User Server
Application
Transaction
ADA Collector
No
Response
Data Response B2
Server Connection
Setup Time
Network Connection
Setup Time
ACK Response B2
ACK Response B1
Data Response B1
No
Response
Data Response B1
Data Response B1
HTTP GET index.html (Data Request B)
ACK Response A2
ACK Response A1
Data Response A1
HTTP GET index.html (Data Request A)
Data Response A2
TCP(80) SYN
TCP(80) SYN ACK
TCP(80) ACK
Service
Provider
Network
9 © 2014 CA. ALL RIGHTS RESERVED.
Network Round Trip Time & Network Connect Time
Serialization
Delay
Queue
Delay
Forwarding
Delay
Distance
Delay
Protocol
DelayNRTT
Fiber:
5.5us/km
Satellite:
3.3us/km
Media
Access
Delayed
ACKsPer Hop Behaviors
NCT
Smaller frame
size means lower
serialization
delay
No
Delayed
ACKs
10 © 2014 CA. ALL RIGHTS RESERVED.
Network Round Trip Time & Network Connect Time
NCT
NRTT
Consistent
More suited for
when analyzing
specific
application traffic;
Tuning to exclude
keep-alive
processing
11 © 2014 CA. ALL RIGHTS RESERVED.
CA Solution Architecture in production
CA Spectrum
CA Network
Flow Analysis (NFA)
Network Traffic Flow
Analysis
CA Performance Center
CA Application Delivery Analysis
(ADA)
Integrated
Workflow
Centralized Fault ManagementCentralized Performance Management
Exceptions
3rd Party
Alarms
- L2-L3 Auto-Discovery
- Topology Visualization
- Network Configuration Management
- Root Cause Analysis
- Asset, Alarm, and Availability Reporting
CA eHealth
Abnormal Application
Performance Detection
Proactive Investigation
Device
management IPSLA
Use Case 1:
Decreasing network response by 39%
13 © 2014 CA. ALL RIGHTS RESERVED.
Background
 Relatively high costs was original motivator
 Need for additional capacity to accommodate growth
 Lack of responsiveness and accountability from prior service
provider
 Unacceptable SLA performance for errors and out of order
packets
 New vendor selected to address business needs
14 © 2014 CA. ALL RIGHTS RESERVED.
Prior to circuit cutover
Network Connection Time Retransmission Delay
 Network Connection Time average of
22 ms, while acceptable, not prime
 Retransmission delay considered
unacceptable
15 © 2014 CA. ALL RIGHTS RESERVED.
During Circuit Cutover
No more Netflow from old interface as it decommissioned around 13:25
39% drop in
network
connect time!
Network Connection Time Retransmission Delay
Promising
retransmission
delay
16 © 2014 CA. ALL RIGHTS RESERVED.
After Circuit Cutover
Network Connection Time Retransmission Delay
Stable NCT at under
14 ms. Notice old
baseline! A 39%
reduction!
Continued
positive trend!
Negligible
retransmission
delay!
17 © 2014 CA. ALL RIGHTS RESERVED.
Results
 Changing service resulted in
– reduced costs
– improved quality of service
 Problems primarily documented through use of
– CA Application Delivery Analysis (leveraging Network Connect Time
and Retransmission Delay for specific network location filters)
– CA Network Flow Analysis
Use Case 2:
Proactively holding Service Provider accountable
19 © 2014 CA. ALL RIGHTS RESERVED.
Background
 Multiple links with same network service provider between
key data centers and locations
 SLA includes traffic load balancing.
 Benefits of load balancing:
– No one circuit has heavy utilization, thus reducing network queuing
delay and contention
– Extra bandwidth available for busy periods
Traffic Load Balancing
20 © 2014 CA. ALL RIGHTS RESERVED.
Was any traffic load balanced?
Upon setting up views shortly after circuits provisioned, administrators
noticed no load balancing was occurring
Uneven flow
of traffic
across paired
circuits
21 © 2014 CA. ALL RIGHTS RESERVED.
Results
Hold service provider accountable
Detailed Insight
By leveraging CA Network Flow
Analysis:
 Evident that uneven load
balancing was occurring
 Provide additional
analysis whether behavior
was due to a type of
service or protocol
mapping
Proactive
Detected situation before it
becomes a problem with
heavier traffic throughput.
Accountability
Escalated to service provider to
hold them accountable to their
SLA.
Use Case 3:
When the Service Provider is NOT at fault
23 © 2014 CA. ALL RIGHTS RESERVED.
Background
 Overseas location in Europe complaining of slow application
response times. Blaming the network!
24 © 2014 CA. ALL RIGHTS RESERVED.
Is it the server?
Leveraging, eHealth views
in Performance Center,
customer validates
low server load
25 © 2014 CA. ALL RIGHTS RESERVED.
Network Consistency
Distance between locations is 9,000 km (6,000 miles)
Filtered for non WAN-optimized traffic
Network Connection Time over 1 week is consistent at around
150 ms. No significant spikes in network performance.
Retransmission delay negligible with few peaks to 1 ms.
Not the
network
!
26 © 2014 CA. ALL RIGHTS RESERVED.
Results
Speedy & Effective Fault Determination
ID Fault Domain
The issue was concluded to
NOT be the network, so the
provider was not to blame.
Real Root Cause
Using CA Application Delivery
Analysis, it was determined
that the application was
making thousands of queries
per minute.
 Many TCP sessions
 1 User
Actionable
Host the application closer to
the database server
Or
Use database replication and
access local database
Or
Tune applications to make
fewer queries
27 © 2014 CA. ALL RIGHTS RESERVED.
Summary
Key topics
A leading global
pharmaceutical company with
over $100 Billion Market
Capitalization needs to reduce
cost of network services, yet
improve quality of service for
corporate and business partner
end-users
Findings
By Leveraging CA Application
Delivery Analysis (ADA), CA
Network Flow Analysis (NFA),
and CA eHealth, the
pharmaceutical company
proactively tracks service
provider latency, network
response times, and ensure
service providers are fulfilling
their SLA obligations.
Experiences
- Reduced network latency
by up to 39%
- Proactively ensure
optimum application
response times
- Assure that Service
Provider is within latency
SLA
28 © 2014 CA. ALL RIGHTS RESERVED.
For More Information
To learn more about DevOps, please visit:
http://bit.ly/1wbjjqX
Insert appropriate screenshot and text overlay
from following “More Info Graphics” slide here;
ensure it links to correct page
DevOps
29 © 2014 CA. ALL RIGHTS RESERVED.
For Informational Purposes Only
This presentation was based on current information and resource allocations as of August 2014 and is subject to change or withdrawal by CA
at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the
rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any
CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and
timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this
presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such
release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as
part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to
current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis. In the event
of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall
govern.
Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your
informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of
the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including
without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be
liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment,
business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and
proprietary. No unauthorized copying or distribution permitted.
Terms of this Presentation
Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.

More Related Content

What's hot

Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...CA Technologies
 
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsHands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsCA Technologies
 
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...CA Technologies
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionCA Technologies
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationCA Technologies
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Technologies
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderCA Technologies
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsCA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10CA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashCA Technologies
 

What's hot (20)

Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
 
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIsHands-On Lab: Using CA Mobile Application Analytics REST APIs
Hands-On Lab: Using CA Mobile Application Analytics REST APIs
 
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
Case Study: Appriss Supercharges ITSM Efficiency With Process Automation to...
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
 
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIs
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10Real World Problem Solving Using Application Performance Management 10
Real World Problem Solving Using Application Performance Management 10
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Understanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDashUnderstanding the Basics of CA Workload Automation iDash
Understanding the Basics of CA Workload Automation iDash
 

Similar to Improve Network Latency and Hold Service Providers to SLAs

Case Study: Verizon Wireless: Chasing the Yellow Before They Turn Red
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn RedCase Study: Verizon Wireless: Chasing the Yellow Before They Turn Red
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn RedCA Technologies
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...CA Technologies
 
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...Cisco Service Provider
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7CA Technologies
 
Case Study: How Cisco Gained Visibility into Network Utilization and Proacti...
Case Study:  How Cisco Gained Visibility into Network Utilization and Proacti...Case Study:  How Cisco Gained Visibility into Network Utilization and Proacti...
Case Study: How Cisco Gained Visibility into Network Utilization and Proacti...CA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)CA Technologies
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsCA Technologies
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesAvi Networks
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
CA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksCA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksNiamh Cahill
 
Hands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationHands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationCA Technologies
 
Dynamic Performance Acceleration - Reducing the Browser Bottleneck
Dynamic Performance Acceleration -  Reducing the Browser BottleneckDynamic Performance Acceleration -  Reducing the Browser Bottleneck
Dynamic Performance Acceleration - Reducing the Browser BottleneckXO Communications
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 
LTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionLTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionPatrick Nijsters
 

Similar to Improve Network Latency and Hold Service Providers to SLAs (20)

Case Study: Verizon Wireless: Chasing the Yellow Before They Turn Red
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn RedCase Study: Verizon Wireless: Chasing the Yellow Before They Turn Red
Case Study: Verizon Wireless: Chasing the Yellow Before They Turn Red
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
 
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...
RAN Congestion Management: Meet the Challenges of Mobile Broadband with Cisco...
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
 
Cascade
CascadeCascade
Cascade
 
Case Study: How Cisco Gained Visibility into Network Utilization and Proacti...
Case Study:  How Cisco Gained Visibility into Network Utilization and Proacti...Case Study:  How Cisco Gained Visibility into Network Utilization and Proacti...
Case Study: How Cisco Gained Visibility into Network Utilization and Proacti...
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
 
Finding application problems before they impact users
Finding application problems before they impact usersFinding application problems before they impact users
Finding application problems before they impact users
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application Services
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
CA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex NetworksCA World 2014 - Monitoring Complex Networks
CA World 2014 - Monitoring Complex Networks
 
Hands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationHands-On Lab: Smart Instrumentation
Hands-On Lab: Smart Instrumentation
 
Dynamic Performance Acceleration - Reducing the Browser Bottleneck
Dynamic Performance Acceleration -  Reducing the Browser BottleneckDynamic Performance Acceleration -  Reducing the Browser Bottleneck
Dynamic Performance Acceleration - Reducing the Browser Bottleneck
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
LTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionLTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & Abstraction
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Improve Network Latency and Hold Service Providers to SLAs

  • 1. ca Opscenter Improve Network Latency and Hold Service Providers to SLAs Ahmed Kira OCX64S #CAWorld CA Technologies Service Assurance Sales Engineering
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract A leading pharmaceutical company leverages CA Network Flow Analysis, CA Application Delivery Analysis and CA eHealth to improve network latency by up to 39% and hold their service providers to their Service Level Agreements. Ahmed Kira CA Technologies Advisor, Service Assurance Sales Engineering
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Agenda BACKGROUND BEST PRACTICES & SOLUTION ARCHITECTURE Q&A USE CASE 1: REDUCING NETWORK LATENCY BY 39% USE CASE 2: PROACTIVELY HOLDING SERVICE PROVIDER ACCOUNTABLE USE CASE 3: FAULT ISOLATION 1 2 3 4 5 6
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Background 20,000 Employees Leading Pharmaceutical Company 60+ Global Sites Pioneer in treating bone and kidney cancers Innovative research with ‘biology first’ 12,000 devices 6+ million netflow records/minute 11 Global Data Centers Almost $20 billion Annual Revenue
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED.  IPSLA/Response monitoring across links – Edge router to router – Eliminates LAN, which Service Provider is not responsible for – Can emulate different Quality of Services  Network Connection Time – Based on packet analysis – Calculated from real transactions, not synthetic; no period missed – Not subject to ‘Delayed Acks’, which impact ‘Network Round Trip Time’ – Averaged across many transactions What metrics needs to be tracked? BEST PRACTICES
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. User Server Application Transaction ADA Collector No Response Data Response B2 Server Connection Setup Time Network Connection Setup Time ACK Response B2 ACK Response B1 Data Response B1 No Response Data Response B1 Data Response B1 HTTP GET index.html (Data Request B) ACK Response A2 ACK Response A1 Data Response A1 HTTP GET index.html (Data Request A) Data Response A2 TCP(80) SYN TCP(80) SYN ACK TCP(80) ACK Service Provider Network
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. Network Round Trip Time & Network Connect Time Serialization Delay Queue Delay Forwarding Delay Distance Delay Protocol DelayNRTT Fiber: 5.5us/km Satellite: 3.3us/km Media Access Delayed ACKsPer Hop Behaviors NCT Smaller frame size means lower serialization delay No Delayed ACKs
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Network Round Trip Time & Network Connect Time NCT NRTT Consistent More suited for when analyzing specific application traffic; Tuning to exclude keep-alive processing
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. CA Solution Architecture in production CA Spectrum CA Network Flow Analysis (NFA) Network Traffic Flow Analysis CA Performance Center CA Application Delivery Analysis (ADA) Integrated Workflow Centralized Fault ManagementCentralized Performance Management Exceptions 3rd Party Alarms - L2-L3 Auto-Discovery - Topology Visualization - Network Configuration Management - Root Cause Analysis - Asset, Alarm, and Availability Reporting CA eHealth Abnormal Application Performance Detection Proactive Investigation Device management IPSLA
  • 12. Use Case 1: Decreasing network response by 39%
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. Background  Relatively high costs was original motivator  Need for additional capacity to accommodate growth  Lack of responsiveness and accountability from prior service provider  Unacceptable SLA performance for errors and out of order packets  New vendor selected to address business needs
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Prior to circuit cutover Network Connection Time Retransmission Delay  Network Connection Time average of 22 ms, while acceptable, not prime  Retransmission delay considered unacceptable
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. During Circuit Cutover No more Netflow from old interface as it decommissioned around 13:25 39% drop in network connect time! Network Connection Time Retransmission Delay Promising retransmission delay
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. After Circuit Cutover Network Connection Time Retransmission Delay Stable NCT at under 14 ms. Notice old baseline! A 39% reduction! Continued positive trend! Negligible retransmission delay!
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Results  Changing service resulted in – reduced costs – improved quality of service  Problems primarily documented through use of – CA Application Delivery Analysis (leveraging Network Connect Time and Retransmission Delay for specific network location filters) – CA Network Flow Analysis
  • 18. Use Case 2: Proactively holding Service Provider accountable
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. Background  Multiple links with same network service provider between key data centers and locations  SLA includes traffic load balancing.  Benefits of load balancing: – No one circuit has heavy utilization, thus reducing network queuing delay and contention – Extra bandwidth available for busy periods Traffic Load Balancing
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. Was any traffic load balanced? Upon setting up views shortly after circuits provisioned, administrators noticed no load balancing was occurring Uneven flow of traffic across paired circuits
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. Results Hold service provider accountable Detailed Insight By leveraging CA Network Flow Analysis:  Evident that uneven load balancing was occurring  Provide additional analysis whether behavior was due to a type of service or protocol mapping Proactive Detected situation before it becomes a problem with heavier traffic throughput. Accountability Escalated to service provider to hold them accountable to their SLA.
  • 22. Use Case 3: When the Service Provider is NOT at fault
  • 23. 23 © 2014 CA. ALL RIGHTS RESERVED. Background  Overseas location in Europe complaining of slow application response times. Blaming the network!
  • 24. 24 © 2014 CA. ALL RIGHTS RESERVED. Is it the server? Leveraging, eHealth views in Performance Center, customer validates low server load
  • 25. 25 © 2014 CA. ALL RIGHTS RESERVED. Network Consistency Distance between locations is 9,000 km (6,000 miles) Filtered for non WAN-optimized traffic Network Connection Time over 1 week is consistent at around 150 ms. No significant spikes in network performance. Retransmission delay negligible with few peaks to 1 ms. Not the network !
  • 26. 26 © 2014 CA. ALL RIGHTS RESERVED. Results Speedy & Effective Fault Determination ID Fault Domain The issue was concluded to NOT be the network, so the provider was not to blame. Real Root Cause Using CA Application Delivery Analysis, it was determined that the application was making thousands of queries per minute.  Many TCP sessions  1 User Actionable Host the application closer to the database server Or Use database replication and access local database Or Tune applications to make fewer queries
  • 27. 27 © 2014 CA. ALL RIGHTS RESERVED. Summary Key topics A leading global pharmaceutical company with over $100 Billion Market Capitalization needs to reduce cost of network services, yet improve quality of service for corporate and business partner end-users Findings By Leveraging CA Application Delivery Analysis (ADA), CA Network Flow Analysis (NFA), and CA eHealth, the pharmaceutical company proactively tracks service provider latency, network response times, and ensure service providers are fulfilling their SLA obligations. Experiences - Reduced network latency by up to 39% - Proactively ensure optimum application response times - Assure that Service Provider is within latency SLA
  • 28. 28 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about DevOps, please visit: http://bit.ly/1wbjjqX Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page DevOps
  • 29. 29 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only This presentation was based on current information and resource allocations as of August 2014 and is subject to change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis. In the event of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall govern. Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No unauthorized copying or distribution permitted. Terms of this Presentation Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.