Computing as a Service and the Effects On Network Management

Computing as a Service Network Management

The delivery of computing as a service, or cloud computing, over a network is becoming more and more mainstream and is allowing businesses of all sizes to get their applications up and running faster, with easier manageability and less maintenance. Cloud computing allows enterprises, and enables IT, to more rapidly adjust IT resources (apps, servers, storage, and networking) to meet fluctuating and unpredictable business demand.

Cloud computing forces us to change our traditional approach to application and network management. No longer do we have a fixed number of assets that must remain running 100% of the time, and performing to the best of their abilities. Instead, we have on-demand computing where resource needs, such as servers and applications, and capacity fluctuates based on demand.

Traditional Network Management vs. Cloud Network Management

In a traditional, non-cloud based, network implementation, network and application monitoring primarily focuses on the availability and performance of the network and server infrastructure. Monitoring of network devices (routers, switches, and firewalls) is usually accomplished with a network management system (NMS) that uses traditional protocols such as SNMP, ICMP, and WMI to gather performance statistics. Advanced management systems typically include network device discovery and mapping, network device performance monitoring, real-time intelligent alerting and reporting, application monitoring and many more features that assist the IT professional in monitoring and managing the performance of their network.

Once a cloud network is introduced, additional significant dependencies are added: namely the performance of your ISP (WAN performance) and the performance of your cloud provider (and their ISP). Since your WAN link is the lifeblood between you and your cloud provider, it is paramount that you monitor its performance at a minimum. Excess latency or jitter can have significant negative impact on your service availability and performance. But, it is not enough to simply monitor WAN performance; you also need to understand your network traffic (who is using it, how much they are using, and what they are using it for) to assess the impact on the performance of business critical apps and services.

Inside or Outside

In a cloud environment, you can monitor from the “inside” by setting up an NMS in your service provider’s data center, or you can monitor from the “outside” by setting up an NMS on your own network.

Watching from the outside gives you both control over your IT management software and a “truer” measurement of end user experience. However, if your network or Internet connection were to fail, so would your monitoring solution.

Watching from the inside enables you to have a network monitoring solution independent of both your network and your cloud provider’s. But there is a catch: you are now dependent on your third party cloud provider’s network and infrastructure to monitor your primary cloud provider.  You are also at the mercy of the Internet and the latency that it injects into your monitoring process that will randomly render your reporting inaccurate randomly.

The Virtual Alternative

Another alternative is to spin up a virtual machine in the cloud alongside your cloud servers. Since your NMS is right next to the servers and apps that you are monitoring, you will eliminate the effects of WAN latency and thus receive more accurate measurements. The only downside of this approach is that when your cloud provider suffers an outage (all the major providers have at some point or the other), your monitoring solution will be rendered useless.

This approach also gives you access to your traditional and familiar IT management solutions, so there is no ramp-up phase involved in learning your cloud provider’s solution; you can simply use your own.  So, in the end, your network management solution has not changed much in what it delivers and how it is used. The only thing that changes is where it lives.

By Brad Hale

Brad Hale joined SolarWinds in 2009 and is the product marketing principal for network management products, bringing over 20 years of product management, product marketing, business development and strategy experience in the software, systems, and semiconductor industries. Brad has an MBA from Butler University and a BS in Computer Engineering from Purdue University.

Rahul Subramanyam
Fixing AWS: The CloudFix Story A conversation with Rahul Subramanyam. CEO at CloudFix, and CTO at ESW Capital AWS is huge, but it’s not perfect. Because of its size and its approach to innovation there ...
Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Kelly Dyer
Achieving Data Security Compliance As individuals, we go through life sharing information about ourselves in every aspect of our daily existence. From credit checks for securing a loan, through to entire personal and family medical ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.