Packet Capture and AnalysisDeep Packet Inspection (DPI) Helps Measure Application Response Time, Ensure Quality of Experience
Communication Service Providers (CSPs) and enterprises need precise information on application traffic traversing their networks for troubleshooting and resolving performance issues, measuring quality of service (QOS)/quality of experience (QoE), and fine-tuning network performance. While flow analysis can provide some level of application detail, the information available is usually limited to a TCP or UDP port number. In cases where multiple applications use the same port number or port hopping, network management professionals must be able to look beyond the IP header. To reveal specific application performance, they need deep packet inspection (DPI).
With InfoVista’s 5View Applications appliance, packet capture and analysis and end-to-end application performance measurement are available in single consolidated solution. Using DPI, CSPs and enterprises can study the packet contents to identify who is using the application, the protocol type or QoS of that application, which client and server is being used, and the most critical metric for understanding end-user experience: end-to-end application response time.
InfoVista 5View™ Applications appliance with data capture and analysis and deep packet inspection (DPI) provides:
- Deep application visibility to help network managers quickly identify which applications and users are eating up IP network bandwidth and thus negatively impacting critical but easily degraded, performance-sensitive applications such as VoIP and video
- Out-of-the-box workflows that accelerate troubleshooting and application and network performance problem resolution, leading to greater operational efficiency and improved end-user quality of experience
- The ability to determine a specific application or application type’s impact on network performance, enabling the network operations team to allocate bandwidth accordingly for not only application performance assurance, but network rightsizing and capacity management
- The ability to identify which applications should be optimized, so that the most-business-critical services can be given priority treatment
- URL discovery, so that the URLs and Web sites that users are accessing over the network can be identified
- Proactive network security by helping network operations identify abnormal behavior such as when unusual IP addresses are trying to connect to multiple servers or ports