how application aware networks make the impossible possible

21

Upload: rehmansaqib

Post on 03-Jun-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 1/21

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 2/21

 

The Cascade solution delivered a 519% ROI, an

average $5.1 million in savings per year, and

paid for itself in less than six months through the

following financial benefits:

  Reduced network and application downtime

by 67%, restoring 73 hours of productive

time to each user and saving $26,057

annually per 100 users

  Enhanced network visibility so organizationscould optimize their infrastructure through

server consolidation/virtualization and

bandwidth management, saving $12,047

per 100 users

  Automated network management operations,

which reduced management operations time

by 12,000 hours or $5,497 per 100 users

Business Value Highlights

W H I T E P A P E R

R e a l i z i n g B u s i n e s s V a l u e a n d R O I w i t h A p p l i c a t i o n - A w a r eN e t w o r k P e r f o r m a n c e M a n a g e m e n t

Sponsored by: Riverbed Technology

Lucinda Borovick Randy Perry

Nancy Selig

July 2012

E X E C U T I V E S U M M A R Y

Network traffic patterns have dramatically changed in the past decade from

predictable and point-to-point transaction-oriented activities to bandwidth-hungry,

always-on, many-to-many interactions.

Virtualization, cloud services, new Web-

centric application architectures, video and

unstructured data, and big data are the

newest entrants to the corporate network.

For many organizations, the only way to

ensure the stability of the network is to

overprovision network infrastructure,

standardize equipment, and attempt to

cobble together metrics from discrete

systems to plan for any upcoming changes.

Not only are these practices outdated and

insufficient to handle the next generation of

network workloads but such "stovepipe"

approaches are beginning to drive up costs,

threaten reliability, and reduce IT

responsiveness to business demands.

Unfortunately, very few organizations have

taken the holistic systems-based approach

to network management that is required to

deliver a reliable, secure, and cost-efficient

network experience that also delivers true

business benefits, such as risk management, competitive differentiation, and better

utilization of costly resources.

 A coordinated approach across multiple datacenters and remote locations with

actionable metrics is the only way to ensure that the network team will be a trusted

partner in enabling an organization to achieve success in the new intelligent

economy.   G   l  o   b  a   l   H  e  a   d

  q  u  a  r   t  e  r  s  :   5   S  p  e  e  n   S   t  r  e  e   t   F  r  a  m   i  n  g   h  a  m ,

   M   A

   0   1   7   0   1   U   S   A

   P .   5

   0   8 .   8

   7   2 .   8

   2   0   0

   F .   5

   0   8 .   9   3

   5 .   4

   0   1   5

  w  w  w .   i   d  c .  c  o  m 

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 3/21

2 #235789 ©2012 IDC

M E E T I N G B U S I N E S S R E Q U I R E M E N T S W I T H

T H E N E T W O R K

 A d d r e s s i n g R e a l - T i m e A p p l i c a t i o n P e r f o r m a n c e

a n d A v a i l a b i l i t y o v e r t h e N e t w o r k

The intelligent economy is here, and it is transforming IT's mandate to deliver

business value to the enterprise. Businesses recognize that to remain competitive,

they need to embrace a broader array of collaborative applications and create

ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is

the "must have" resource in new revenue-generating opportunities is top of mind for

all IT professionals. Simultaneously, enterprise IT professionals face the never-ending

challenge of incorporating new technologies and cloud service delivery models into

their organizations' IT infrastructures. They face the challenge of ensuring application

performance for all users while mitigating increasing application business criticality

and growing application delivery complexity.

Knowledge of All Moving Parts

Underlying the changes that are happening in the intelligent economy is the

proliferation of a complex network of interactive systems, devices, and end points.

IDC predicts that the total number of mobile device connections worldwide will nearly

double from 2.5 billion in 2011 to 4.5 billion in 2015. Further complicating matters,

companies are increasingly implementing "bring your own device" policies, thus

introducing additional endpoints (e.g., smartphones, tablets, and laptops) into the

network environment.

In 2011, organizations around the world deployed 15,900PB of new disk storage

capacity for the storage of file-based data. By 2015, new storage capacity deployed

annually in datacenters is expected to reach 86,300PB.

Server virtualization technology has reached a pivotal milestone within datacenters

around the world. IDC believes that 2011 was the first year in which more application

instances (new and old) were deployed as virtual machines on a virtualized server

rather than on a dedicated physical server. The use of virtualization for application

servers will only accelerate after 2011, surpassing 75% of deployed applications

within a few years.

The complexities that these new opportunities place on the network are profound.

Some of the issues include losing control of end-user devices as well as virtual

servers "hidden" from network administrators. As a result, the enterprise network has

never had so many "blind spots." Further, traffic patterns are evolving over an ever-

expanding list of branches and datacenters — both public and private. These

complexities usher a whole host of "unknowns" into the corporate network, creating

risk to network uptime, information security, and/or regulatory compliance. IDC finds it

very common for an organization to simply not know the types of applications,

number of devices, or traffic sources on its enterprise network.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 4/21

©2012 IDC #235789 3

IT Transformation

In recent years, IT transformations such as virtualization, datacenter consolidation,

and disaster recovery initiatives have been front and center for every CIO and IT

department. IT must be positioned as the enabler of organizational transformation to

support process improvements, new revenue-generating opportunities, and new ways

of doing business or risk being left behind. Underlying the plan for growth is themandate to achieve operational cost efficiencies involving virtualization and both

datacenter and application consolidation.

The use of virtualization technologies has decreased the number of servers to

manage while at the same time increased the utilization of the remaining physical

server and storage devices. Desktop virtualization is emerging as a way to achieve

savings by centralizing IT administration and management of distributed systems.

Enterprises are consolidating the number of datacenters they have to reduce the cost

of managing the complexity of IT devices spread across a global organization.

In addition to physical server consolidation, IT is on a quest for "one version of the

truth" for all enterprise information. Application consolidation enables a global

business to make coordinated intelligent decisions based on accurate real-time

business analytics from a centralized location.

Unfortunately, these transformation projects place a constant strain on the network

manager. The only way to achieve long-term success of these projects is to have the

appropriate tools to discover and map the interdependencies of the existing

environment. Lack of full understanding of the interdependency of just one server or

application can put an entire project at risk. IDC has spoken with a number of

companies that have had to redo server virtualization deployments because they had

not appropriately thought about the network implications of a virtualization project.

The need for visibility into IT change management projects is clear.

This lack of visibility and usable metrics carries over to the network's inability to adjust

on demand to changes in bandwidth needs. Organizations are caught between two

unacceptable choices. One option is to overprovision bandwidth to protect the

network from known or unexpected spikes in network traffic. Unfortunately, with this

option, the organization is paying for overprovisioning to keep network bandwidth

available but idle. The other option is to provision and pay for network services based

on the average workload and risk performance issues or, worse, network failure.

To keep pace with the demands of the intelligent economy, IT needs an intelligent

network. An organization that does not collect and utilize appropriate metrics to plan

capacity management will create a network that is outdated and unreliable.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 5/21

4 #235789 ©2012 IDC

 V i s i b i l i t y C r e a t e s t h e F o u n d a t i o n f o r a S e c u r e

R e l i a b l e N e t w o r k

One starting point is to extend visibility to the network by capturing packets in real time

on the network and implementing analytics capabilities that can identify issues on the

network before they become a greater problem. IDC believes visibility needs to extendto all the devices on the network. If an end user brings a laptop onto the corporate

network, IT needs to identify quickly whether that device poses a security risk.

Visibility in and of itself doesn't prevent the intrusion, but it does help IT identify the

problem quickly and hopefully contain the problem.

Furthermore, this visibility limits downtime and strengthens the reliability of the business-

critical network. It only takes one badly infected computer or one database error to create

performance problems for an entire organization. The ability to zero in on the problem is

the only way an organization can consistently deliver reliable network performance.

 A Holistic Systems-Based Approach to Network Monitoring

Major IT developments such as virtualization, cloud initiatives, and the explosion of

content and big data each pose significant challenges from the perspective of WAN and

LAN performance, reliability, and flexibility. The real problem for most IT organizations is

that while all these developments are occurring concurrently, strategies for addressing

each typically occur in isolation. IDC is already hearing from a number of IT leaders that

such stovepiped approaches are beginning to drive up costs, threaten reliability, and

reduce IT responsiveness to business demands. A holistic systems-based approach is

the only way to appropriately understand all the ramifications on the network.

To illustrate, consider telecom costs, which are on average 15% of an IT budget.

These are ongoing monthly costs, and IDC has found that unlike in most other areas,

IT managers know exactly how much they pay a month in ongoing telecom costs.

However, they don't always know if they are using those scarce dollars as efficiently

as possible. As a result, the WAN is an investment that needs to be closely monitored

and managed. IT managers will get the most from this precious investment if they

have the ability to do the following:

  Understand of traffic patterns; for example, the ability to understand "top talkers"

and "top listeners" gives IT more detailed information regarding the actual TCP

exchange going on in the network.

  Understand all the components necessary to deliver an application — where are

they, how do they communicate with each other, where are their users located,

and how do they interact?

  Benchmark performance to understand what is typical network traffic and what

are anomalous activities.

  Enable efficient problem resolution by triggering alarms to act upon meaningful

changes in the network that could degrade or disrupt the business-critical network.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 6/21

©2012 IDC #235789 5

  Manage risk to stay ahead of possible compliance or regulatory requirements.

Customers report that with visibility they are confident they have not violated

regulations and will not incur fines. 

  Correlate poor WAN performance with application behavior.

  Determine if service-level agreements are being met.

Context Is Critical to Improving Staff Productivity

The amount of change and complexity happening in IT can outpace the processes

and tools available to handle that change. In an ideal world, network managers are in

communication with business and application managers and understand upcoming

network requirements for a specific time of year or new business application hitting

the network. In these situations, the network administrator can take the time to make

sure that the appropriate network bandwidth and service levels are available. The

ability for a network administrator to plan and implement the appropriate service

levels needed in a given time frame is ideal and increases overall end-user and IT

productivity. Unfortunately, organizational and technical factors and the pace ofchange can inhibit a network manager's ability to get ahead of the problem. To have

minimal disruption during network moves, adds, or changes, network managers must

have the visibility to understand how specific users and events behave.

Finding the source of the problem quickly enables an organization to contain the

problem so that it doesn't disrupt the other applications or users. Easy-to-use

dashboards that clearly identify the source of the problem are a must-have. When an

end user calls the help desk and reports that the network is slow, any number of

factors can be contributing to network performance, including device failure, Internet

service problems, or new unexpected applications joining the network. Network

visibility and contextual tools usually reduce the number of calls and always reduce

the amount of time to address the situation.

Few would argue that the network is a shared resource that should be consistent

across all departments. And while all parts of an organization use the network, not

every department uses the network in the same way. Visibility into the network

enables the network manager to set fair-use network policies and to demonstrate and

track any deviation from policy. For example, if one department is running backup

procedures on the network causing end-user performance problems, network

managers should have the ability to identify and rectify this situation.

Most network managers will describe a reluctance to make any changes to network

settings or policies for fear of creating unknown problems. Network visibility not only

saves time but also provides the confidence needed to make critical changes to thenetwork.

IT organizations realize that to reduce costs and respond to business demands,

individual departments within the IT organization need to communicate and

coordinate projects. With network visibility, easy-to-read dashboards, automation, and

reporting tools, network managers can help application developers understand the

impact a particular project is having on the network. The network is constantly

changing, and no two networks are the same. As a result, very often an application

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 7/21

6 #235789 ©2012 IDC

can perform well on a local area network, but when it is moved into production in

support of remote and mobile users, the performance suffers. With network

performance monitoring and reporting, ideally, the network manager can help

the application developer architect the application for appropriate application

response time.

 A holistic, context-based approach is the only way to avoid duplication of effort in the

IT department. In large global organizations, problems typically cut across multiple

teams. A centralized system eliminates the wasteful effort of each different team

working in its own silo to troubleshoot problems. Many customers report that hours,

days, and sometimes weeks of work can be avoided with a centralized, automated

network performance management solution.

A P P L I C A T I O N - A W AR E N E T W O R K

P E R F O R M A N C E M A N A G E M E N TW I T H C A S C A D E

To address the network manager's challenges outlined previously, RiverbedTechnology offers Cascade application-aware network performance management

that enables end-to-end visibility into the performance of critical business

applications. The Cascade product family is unique in its ability to combine flow data

and packet data into a single logical data store to give network managers a single,

holistic, integrated view of all network traffic data. Through the use of network

behavioral analysis, Cascade solutions can trend typical behavior and proactively

alert IT to issues in the environment, accelerate triage activity, and even spot

suspicious behavior worthy of security investigation.

The Cascade portfolio consists of the following:

  Cascade Profiler. The centralized analysis and reporting console for the Cascadefamily, Cascade Profiler software correlates application-enriched network

information collected by Cascade Shark products, Cascade

 Gateway appliances,

Cascade Sensor products, and Riverbed Steelhead products to provide centralized

monitoring, analysis, and reporting on network and application performance. The

Cascade Profiler console enables enterprises to proactively monitor and

troubleshoot applications and the network, automate discovery and dependency

mapping, and ensure a consistent and reliable end-user experience.

  Cascade Gateway. This appliance collects flow data (NetFlow, sFlow, J-Flow,

IPFIX, and other popular flow statistics) from network devices, deduplicates

common information, and then forwards the data to the Cascade Profiler console

for analysis. Deploying Cascade Gateway appliances in conjunction with

Cascade Profiler software provides an easy and cost-effective way to gain end-

to-end visibility into the types and usage of traffic on the network.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 8/21

©2012 IDC #235789 7

  Cascade Shark. This solution delivers continuous packet capture and long-term

storage, enabling real-time and back-in-time forensic analysis and reporting of

network and security events. Cascade Shark solutions are deployed in locations

that require detailed and historical back-in-time analysis (i.e., datacenter,

headquarters, or important branch locations). Cascade Shark can be part of a

Cascade Profiler deployment or used as a standalone troubleshooting appliance.

  Virtual Cascade Shark.  This software version of Cascade Shark extends

Cascade functionality into the virtual environment by monitoring the performance

of inter-VM traffic on a VMware ESXi hypervisor.

  Cascade Sensor.  This product provides deep packet inspection to supplement

Flow-based data with Layer 7 application classification, end-user experience, and

performance metrics. A virtualized version, Cascade Sensor VE, is also available.

  Cascade Pilot. This packet and transaction analysis console enables users to

quickly analyze multiterabyte packet recordings on remote Cascade Shark

appliances and Steelhead products without having to transfer large packet

captures files across the network.

In developing its solutions, Riverbed seeks to deliver the following customer benefits:

  Ensure networks and applications run at peak performance — at all times.

  Streamline troubleshooting to reduce the impact of service outages and slowdowns.

  Reduce the risks and costs associated with high-profile initiatives such as

datacenter consolidation, disaster recovery, and cloud computing initiatives.

  Identify bottlenecks where optimization would best accelerate the business.

  Deliver network visibility and real-time metrics to proactively match network

services and bandwidth to application workloads.

  Achieve cost-effective compliance by leveraging existing data sources and

minimizing the need for expensive hardware deployments.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 9/21

8 #235789 ©2012 IDC

B U S I N E S S V A L U E O F C A S C A D E

S t u d y D e m o g r a p h i c s

In spring 2012, IDC interviewed eight organizations that had been using

Cascade products for 12–84 months. The organizations ranged from medium-sized

companies with as few as 500 employees to enterprises as large as 200,000

employees. The organizations interviewed are based in North America and include

representatives from the finance, consumer products, call center, energy, education,

sports, and technology market segments. The interviews were designed to elicit

quantifiable information as well as anecdotes so that IDC could interpret the full

impact of Cascade on the organization. Table 1 offers an aggregated profile of the

companies interviewed.

T A B L E 1

D e m o g r a p h i c s

Number of employees 52,000

Number of users 22,000

Industries Finance, consumer products, call center, mining,

education, sports, technology

Number of unique products used within the Cascade suite 3

Source: IDC, 2012

 All of the organizations had deployed Cascade Profiler/Cascade Gateway or CascadeProfiler Express; two-thirds had also deployed Cascade Sensor, and half had

deployed Cascade Pilot. Cascade Shark and Cascade Sensor VE were also included,

but to a lesser extent. In addition, five of the eight organizations are using Riverbed

Steelhead WAN optimization products.

S e l e c t i n g R i v e r b e d C a s c a d e

The majority of customers knew they needed greater visibility into their networks

whether in response to problems, to be proactive or, in one case, to develop a private

cloud. They selected Cascade over its competition because it was a mature solution

that was easy to deploy and easy to use. As one customer stated:

Riverbed sent a team out to do it, but it was up and running in a half-

hour. They stayed for about an hour and gave us a once-over

[training] and then a really nice set of sample reports to work through.

No consultants. The user interface … a lot of people make the

comment that this is kind of like Apple. You can actually use the thing.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 10/21

©2012 IDC #235789 9

F I N A N C I A L B E N E F I T S A N A L Y S I S

The organizations in the study selected Cascade to improve the transparency of their

networks and thus improve their ability to manage them. From the interviews, IDC

was able to measure the financial impact of implementing Cascade products. IDC

found that customers in this study achieved benefits in three areas: IT infrastructure

cost reduction, IT staff productivity improvement, and increased end-user productivity.The aggregate financial benefit in this study is $5.1 million per year or, as Figure 1

shows, $43,601 per 100 end users per year in the following areas:

  Reduced IT infrastructure costs. Organizations in the study used Cascade to

optimize their bandwidth and networking resources, consolidate their server

environments, and expand their automation without adding labor resources,

annually saving $12,047 per 100 users.

  Optimized IT staff productivity.  Organizations were able to greatly enhance

their ability to proactively manage their networks and reduce some activities such

as security management by 80%. IT staffs devoted to networking management

are now more productive, saving $5,497 per 100 users.

  Enhanced end-user productivity.  The most significant benefit comes from

delivering critical business services with high reliability. End-user productivity

benefited from reduced service disruptions and quicker response, reducing

downtime by 67% and saving $26,057 per 100 users.

F I G U R E 1

 A v e r a ge A n n u a l B e n e f i t s o f R i v e r b e d C a s c a de ( p e r 1 0 0 U se r s )

Source: IDC, 2012

Cost reduction$12,047

IT staff

productivity$5,497

Downtime/userproductivity

$26,057

Total = $43,601

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 11/21

10 #235789 ©2012 IDC

C o s t R e d u c t i o n

 As a result of deploying Cascade, customers in this study have lowered their annual

IT expenses by an average of $12,047 per 100 users (see Figure 2). These savings

stem from three key areas:

  Consolidation of servers and related storage and power/facilities

  Networking equipment and bandwidth savings

  Avoiding hiring additional IT staff

F I G U R E 2

 A v e r a ge A n n u a l Co s t R e du c t i o n S av i n g s ( p e r 1 0 0 U s e r s )

Source: IDC, 2012

$5,476

$2,609

$2,525

$964

$258$215

0

2,000

4,000

6,000

8,000

10,000

12,000

14,000

StoragePower 

Networking equipment

Bandwidth

FTE labor avoidance

Servers

Total = $12,047

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 12/21

©2012 IDC #235789 11

Optimizing Server and Datacenter Consolidation

Half of the customers in the study had implemented server consolidation and

virtualization or cloud initiatives and credited Cascade with optimizing the process. On

average, these companies had consolidated their server environments by 63% and

estimated that Cascade was responsible for 15–20% of that benefit through better

management of bandwidth and the network, which increased server utilization,resulting in further consolidation opportunities. As one customer stated:

Greater visibility into virtual environments helps us size our virtual

server farm. It helps us to buy less, reducing capex by looking at

data flows between virtual servers. … Let's put these 5 applications

over onto this physical server, and virtualize them, and move this

big app over there, and we do not have to add another 10 blades. It

helps us re-architect our compute engine, and that helps us delay

increases to the server farm.

Bandwidth and Networking Savings

Steelhead WAN optimization appliances deliver most of the bandwidth optimizationthese customers experience. What Cascade does is provide visibility so that

Steelhead and other WAN optimization products can be directed by the IT staff to

network locations or to traffic types that are disadvantaged. One customer likened

Cascade to providing a "target of opportunity to further reduce bandwidth." Another

customer related how Cascade revealed that 50% of its backbone was devoted to

replication. It was able to evaluate whether to reduce or move the load and "fine-tune

the QoS" to make sure that the user traffic received preferential treatment.

 Avoiding Hiring Additional IT Staff

Every organization in the study reported experiencing IT staff avoidance ranging from as

little as 1% to as much as 30%; the average was 10%. Staff avoidance was a result of

Cascade reducing the amount of overhead previously required to troubleshoot and

resolve network problems in conjunction with server consolidation or other initiatives. So

while these organizations were continuing to grow their networks in response to business

demands, they did not have to grow their IT staffs correspondingly because they were

able to create a more efficient network management operation.

O p t i m i z e d I T S t a f f P r o d u c t i v i t y

Most of the participants in the study selected Cascade because they knew they

needed greater visibility into their network operations. Since deploying Cascade, IT

staffs have been able to identify and resolve network and application problems more

efficiently because they can see across the entire network to accurately locate andisolate the root cause of problems. As one customer stated:

I'll give you an example that I told them [Riverbed] when we first put

in the demo unit that we had for 30 days. We'd had a problem in one

of our buildings, where it had dragged on two weeks with the network

guy trying to solve it, and the building was only marginally functional.

In less than about 20 minutes of pointing Riverbed [Cascade] at it,

we were able to isolate the fact that there were something like 8 or 9

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 13/21

12 #235789 ©2012 IDC

badly infected computers that were totally disrupting the operation of

the network … isolate what ports they were on, shut those network

ports down, and boom, the building came right up.

Beyond identifying problems and managing incidents, Cascade enables IT staff across

the entire operation to benefit as they integrate and automate other network

management functions: general network analysis, pushing out network changes, networkaudit/data collection/inventory management, correlation of network change to network

performance/health, maintaining consistency/standards/policies, network monitoring, and

deployment (see Figure 3). Some critical functions, like network change detection, were

not done prior to deploying Cascade because the IT staff felt the task was either too

difficult or not cost efficient. Because the network is so critical to the operations across

the organization, server, storage, and even application management are enhanced.

F I G U R E 3

I T S t a f f P r o d u c t i v i t y : A n n u a l A d m i n S a v i n g s ( I T S t a f f F T E s )

Source: IDC, 2012

1.83

1.59

0.56

0.51

0.25

0.25

0.25

0.100.10

0.00

1.00

2.00

3.00

4.00

5.00

6.00

       F       T       E     s

Correlation of networkchange to networkperformance/health

Deployment tasks

Maintainingconsistency/standards/policies

Network monitoring

Managing incidents

Network audit/datacollection/inventorymanagement

Pushing out networkchanges

General network analysis

Network change detection

Total FTEs = 5.44

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 14/21

©2012 IDC #235789 13

U s e r P r o d u c t i v i t y

 As businesses become more automated to drive efficiency and agility, CIOs are

concerned that their networks and systems cannot deliver the high reliability that

critical business applications require.

Cascade enables IT to manage the performance of applications with visibility into the

infrastructure supporting delivery. This reduces the threats of disruption from security

threats, hardware overload, and network congestion. Regarding downtime, one

customer stated:

So Riverbed helped on probably two big dimensions. We solved a

lot of the big problems with our cloud. We've gone from 160

outages to north of six-nines availability. We now have massive

data movement in the network. So we used the Riverbed's

[Steelhead] for data acceleration, and we use Cascade to see

what's happening.

Concerning security, one customer stated:

It's about being surgical. You never know the answer of how many.

We've gone from a lot to none. I only get 1–2 [events] per year now.

Before it was like 1–2 [events] a day easily. And then you get what I

call a screamer. So then bots create traffic on your network, and

they screw up your network. Depending on how big the infestation

got … in a typical day, maybe 10–15 people might be involved in

dealing with this kind of thing. You have to find the thing and then

you have to fight the bots … finding it is always the hard part, and

that is where Cascade helps.

On average, Cascade customers in the study were able to reduce their lost user

productivity by 67%, restoring 73 hours of annual productivity to each end user (see

Table 2).

T A B L E 2

U s e r P r o d u c t i v i t y S a v i n g s

Before (Hours) After (Hours) Improvement (%)

Security 5.77 1.90 67

Help desk 6.95 0.53 92

Downtime 96.85 34.12 65

Total 109.57 36.55 67

Source: IDC, 2012

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 15/21

14 #235789 ©2012 IDC

B u s i n e s s B e n e f i t s

 Although many of the companies in the study were dependent on the reliable

operations of their networks, they did not relate any specific value or revenue loss

associated with downtime. Only one company quoted an average revenue loss of

$30,000 per hour. Where they all did feel there was business benefit was in the wayCascade helped them plan for growth and institute rational plans for rolling out new

applications and infrastructure in support of new business activities.

T h e V a l u e o f a n I n t e g r a t e d A p p r o a c h

Five of eight organizations in the study are using Cascade to also leverage their

investment in Steelhead. Cascade senses all of the traffic on the OSI layers and

reports utilization for all of the Steelhead appliances. IT can use the Cascade data

flows to fine-tune bandwidth optimization. In addition to the benefits presented for

Cascade, those companies experienced the following additional benefits:

  Infrastructure. Much higher benefits in bandwidth and storage savings

  IT productivity.  Additional reduction in help desk operations due to high

bandwidth availability

  User productivity. Additional help desk and user downtime savings

Figure 4 presents the outcome of the ROI analysis in a graphical form.

F I G U R E 4

C a s h F l o w A n a l y s i s

Source: IDC, 2012

$(10,771)$(1,784) $(1,784) $(1,784)

$30,427

$43,599 $44,035

$17,872

$59,687

$101,939

-20,000

0

20,000

40,000

60,000

80,000

100,000

120,000

0 1 2 3

$

(Year)

Investment Benef it Cumulative cash f low

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 16/21

©2012 IDC #235789 15

The total investment included the average total costs to purchase and deploy

Cascade as well as annual fees. Annual benefits include infrastructure savings,

reduced IT labor support, added income, and productivity savings. Organizations in

this study made an initial investment of $10,771 per 100 users, including the

purchase and implementation costs, consulting services, and IT labor required to

deploy and train. As a result of the initial and subsequent investments, the

organizations realized average annual benefits of $39,354 per 100 users and a

cumulative three-year savings of $102,000 per 100 users.

R O I A N A L Y S I S

IDC uses a discounted cash flow methodology to calculate the return on investment

(ROI) and payback period. ROI is the ratio of the net present value (NPV) and

discounted investment. The payback period is the point at which cumulative benefits

equal the initial investment.

Table 3 presents IDC's ROI analysis for the deployment of Riverbed Cascade to help

manage network and application operations. This ROI analysis constitutes a three-year view of the financial impact of Riverbed Cascade on a "per 100 users" basis.

The three-year ROI analysis shows that on average, the organizations in this study

spent $15,056 per 100 users on Cascade and received $93,267 per 100 users in

benefits for an NPV of $78,212. The companies saw a payback period of six months

(after deployment) and an ROI of 519%.

T A B L E 3

T h r e e - Y e a r R O I A n a l y s i s ( p e r 1 0 0 U s e r s )

Benefit (discounted) $93,267

Investment (discounted) $15,056

Net present value (NPV) $78,212

Return on investment (ROI) 519%

Payback (months) 5.1

Discount rate 12%

Source: IDC, 2012

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 17/21

16 #235789 ©2012 IDC

C H A L L E N G E S / O P P O R T U N I T I E S

C h a l l e n g e s

Riverbed does face a couple of market challenges. First, many IT departments are

hesitant to invest in network tools because they take away money that would

otherwise be allocated to bandwidth. Riverbed needs to continue to drive home the

message that investing in tools like Cascade will improve bandwidth and create

savings elsewhere across the network and the business. Second, Riverbed needs to

demonstrate that Cascade can deliver business value not only in today's current

network environment but also as organizations migrate to converged systems in the

datacenter and cloud services.

O p p o r t u n i t i e s

Riverbed has a wealth of opportunities ahead to help network managers deliver the

network attributes that will be essential in creating an environment where the network

is not just connecting the business but a strategic resource to facilitate businessobjectives. IDC has spoken with countless customers that are stymied by network

"unknowns." The Cascade solution has the ability to uncover blind spots quickly,

paving the way for a business-ready network. It is imperative that Cascade solutions

focus on the needs of the network manager, whose objective is to reduce network

costs, improve staff effectiveness, increase network resiliency, and boost network

responsiveness. As such, IDC believes that Riverbed opportunities extend to new

emerging network traffic patterns in an era where virtualization and cloud services are

in high demand.

C O N C L U S I O N

Over the past five years, IT transformation projects such as datacenter consolidation

and virtualization have helped increase IT efficiency and agility. The complexities of

network traffic patterns and the proliferation of network endpoints mean that to meet

the continued demand of increasing efficiency, network managers need a new

approach to deliver the business-ready network.

The ability of Cascade to give IT and network managers the power to quickly and

holistically view the network is demonstrating a clear return on investment. In

particular, the proficiency of the Cascade solution to facilitate high-profile revenue-

generating projects and manage risk while furthering network efficiencies is of great

value. In addition, bringing strategic clarity to WAN optimization projects will continue

to drive Cascade deployments. IDC believes a holistic systems-based approach tonetwork visibility is required to deliver a reliable, secure, and cost-efficient network

experience.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 18/21

©2012 IDC #235789 17

A P P E N D I X

IDC utilized its standard ROI methodology for this project. This methodology is based

on gathering data from current users of the technology as the foundation for the

model. Based on these interviews, IDC performs a three-step process to calculate the

ROI and payback period:

1. Measure the savings from reduced IT costs (staff, hardware, software,

maintenance, and IT support), increased user productivity, and improved

revenue over the term of the deployment.

2. Ascertain the investment made in deploying the solution and the associated

training and support costs.

3. Project the costs and savings over a three-year period and calculate the ROI and

payback for the deployed solution.

IDC uses the net present value of the savings and increased revenue over three

years in calculating the ROI and payback period for the deployment. The NPV of thesavings is determined by subtracting the amount that would have been earned by

investing the original sum in an instrument yielding a 12% return (to allow for the

missed opportunity cost that could have been realized using that capital).

IDC bases the payback period and ROI calculations on a number of assumptions,

which are summarized as follows:

  Time values are multiplied by burdened salary (salary + 28% for benefits and

overhead) to quantify efficiency and manager productivity savings.

  Downtime values are a product of the number of hours of downtime multiplied by

the number of users affected.

  The impact of unplanned downtime is quantified in terms of impaired end-user

productivity and lost revenue.

  Lost productivity is a product of downtime multiplied by burdened salary.

  Lost revenue is a product of downtime multiplied by the average revenue

generated per hour.

  The net present value of the three-year savings is calculated by subtracting the

amount that would have been realized by investing the original sum in an

instrument yielding a 12% return to allow for the missed opportunity cost. This

accounts for both the assumed cost of money and the assumed rate of return.

Because every hour of downtime does not equate to a lost hour of productivity or

revenue generation, IDC attributes only a fraction of the result to savings. As part of

our assessment, we asked each company what fraction of downtime hours to use in

calculating productivity savings and the reduction in lost revenue. IDC then taxes the

revenue at that rate.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 19/21

18 #235789 ©2012 IDC

Further, because IT solutions require a deployment period, the full benefits of the

solution are not available during deployment. To capture this reality, IDC prorates the

benefits on a monthly basis and then subtracts the deployment time from the first-

year savings.

C o p y r i g h t N o t i c e

External Publication of IDC Information and Data — Any IDC information that is to be

used in advertising, press releases, or promotional materials requires prior written

approval from the appropriate IDC Vice President or Country Manager. A draft of the

proposed document should accompany any such request. IDC reserves the right to

deny approval of external usage for any reason.

Copyright 2012 IDC. Reproduction without written permission is completely forbidden.

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 20/21

CASE STUDY

Boston CollegeRiverbed Cascade Enables Boston College to Stay Ahead of

Growing Network Complexity

Founded in 1863 and located in Newton, Massachusetts, Boston College is one of the oldest Jesuit,

Catholic universities in the United States. Boston College confers more than 4,000 degrees annually

in more than 50 fields of study through nine schools and colleges, and has experienced tremendous

growth in recent years, including a 75 percent increase in undergraduate applications over the

past decade.

Boston College has implemented a three-tier Gigabit Ethernet network accommodating approxi-

mately 15,000 students, faculty, and staff across three physical campuses within a three mile radius.

Users are accustomed to a very reliable network. The Boston College data center is located in the

former St. Clement’s Chapel, featuring 16 stained-glass windows.

The Challenge: Limited Network Visibility

In recent years Boston College has experienced rapid growth in data center network complexity.

This complexity was driven by the need to provide a high level of fault tolerance to new,

multi-tiered applications that had large bandwidth requirements. The final design proved to be

robust enough to support the University’s needs, but it introduced an increased level of complexity

to troubleshooting.

One example of this type of application was a three-tiered Web-based portal consisting of front-

end Web servers, mid-tiered application servers and backend database servers. For additional fault

tolerance, this application was also deployed behind application load-balancer appliances.

As application complexity and network demand were growing, the network team felt it was impor-

tant to gain more visibility into how applications were performing in order to best serve users’

needs. “We were reaching a tipping point with the complexity of some of our applications, where

we felt we didn’t have a good handle on what was normal application performance and what was

an outlier,” says Chris O’Brien, Network Systems Engineer. “Understanding our network traffic was

what started the discussion around a network and application visibility solution.”

When the team was unable to produce sufficient performance metrics about their centralized emai

system during an outage due to their lack of tools capable of monitoring the volume of traffic, the

need for enhanced visibility became clear. It became obvious that Boston College would benefit

from a full layer 4-7 performance metrics in the data center and throughout the network, plus

dependency maps that show how multi-tiered applications are architected and how network traffic

is truly flowing. This enhanced visibility would reduce the MTTR of current network issues and help

plan for future growth.

The Solution: Riverbed Cascade

In the past, the network team used a combination of packet capture and older network manage-

ment tools to troubleshoot problems. However, that was a reactive approach, requiring them to

go to the building where the problem happened, set up packet capture, wait for the problem to

happen again, and then look for possible problems in the capture file. This was not only a tedious

process that required a great deal of setup to begin looking into a reported problem, but it could

also be fruitless if the problem couldn’t be regularly reproduced.

IN BRIEF

Industry»» Education

Challenges»» Rapid growth in network traffic»» Increasing application complexity»» Limited network visibility»» Time-consuming troubleshooting process

Solution

»» Riverbed Cascade appliance in the datacenter

Benefits»» Reduced MTTR for network issues and

higher network uptime»» Better network and application perfor-

mance management»» Detailed performance metrics and easy

reporting

8/12/2019 How Application Aware Networks Make the Impossible Possible

http://slidepdf.com/reader/full/how-application-aware-networks-make-the-impossible-possible 21/21

2005, 2006, 2007, 2008, 2009, 2011

About Riverbed

Riverbed Technology is the IT performance

company. The Riverbed family of wide area

network (WAN) optimization solutionsliberates businesses from common IT

constraints by increasing application

performance, enabling consolidation, and

providing enterprise-wide network and

application visibility – all while eliminating

the need to increase bandwidth, storage

or servers. Thousands of companies with

distributed operations use Riverbed to make

their IT infrastructure faster, less expensive

and more responsive. Additional information

about Riverbed (NASDAQ: RVBD) is available

at www.riverbed.com.

Riverbed Technology

199 Fremont Street

San Francisco, CA 94105Tel: +1 415 247 8800

Fax: +1 415 247 8801

www.riverbed.com

Riverbed Technology Pte. Ltd.

391A Orchard Road #22-06/10

Ngee Ann City Tower A

Singapore 238873

Tel: +65 6508-7400

Riverbed Technology Ltd.

Farley Hall, London Road

BinfieldBracknell

Berks RG42 4EU

Tel: +44 (0) 1344 401900

Riverbed Technology K.K.

Shiba-Koen Plaza Building 9

3-6-9, Shiba, Minato-ku

Tokyo, Japan 105-0014

Tel: +81 3 5419 1990

©2011 Riverbed Technology. All rights reserved.

Riverbed and any Riverbed product o r service name ologo used herein are trademarks of Riverbed

Technology. All other trademarks used herein belong

to their respective owners. The trademarks and logos

displayed herein may not be used without the prior

written consent of Riverbed Technology or theirrespective owners.

CS-BC012811

The world of network management tools was changing in favor of graphical, easy-to-use tools that

aggregate large amounts of information at a high level and understand the relationship between

network and servers. After a bakeoff of competing product solutions, and a successful proof of

concept trial, Boston College selected Riverbed Cascade as its standard network and applicationvisibility tool.

While evaluating Cascade, O’Brien found its ease of implementation to be a major differentiator.

“Cascade was easy to get up and going. It came online quickly and started collecting usable data.

Cascade is very user friendly and has an intuitive interface.” The team was impressed by other

Cascade capabilities, including the baselining of normal behavior, and the search capability, which

O’Brien describes as ‘very advanced’.

Benefits: Global Visibility and Accelerated Troubleshooting

Boston College now has Cascade appliances located in the data center collecting flow data from all

distribution routers and aggregating that with layer 7 data from data center traffic. This provides

visibility into traffic from over 100 buildings across three campuses to the data center and to the

Internet. Network health reports are automatically generated and sent daily to IT executives, and

performance alerts are sent to the network team.Cascade provides benefits across several dimensions:

• Reduced MTTR for network connectivity issues

• Increased network uptime

• Better network and application performance management

• Detailed performance metrics for the data center and throughout the network

• Less dependency on packet capture as a troubleshooting tool

• Ease of reporting and interpreting data output

• Powerful search capabilities for network information

Cascade has proven itself many times to be an excellent troubleshooting tool. For example:• During a troubleshooting session with an offsite Web application vendor, the Boston College

team was able to pinpoint the problem in minutes, rather than hours as would have been the

case with alternative approaches.

• When wireless access points were incorrectly applying EF (Expedite Forwarding) QoS tags to non-

voice traffic, potentially degrading the quality of VOIP calls, Cascade was the first product that

discovered the problem.

• When the campus police called to report that the network was down, Cascade correctly identi-

fied the problem as an application rather than a network problem.

“Cascade is the first place we go when we get a call from a user,” says Ann Murphy (Associate

Director, Network Systems) / Joe Harrington (Director, Network Services). “We now have a much

more effective network management process, and can quickly determine where a problem is in the

network and what applications or services are being impacted by it Our goal is to be in an increas-ingly proactive mode where we know about network and application problems before the user

reports them.”

CASE STUDY: Boston College