Cisco Blogs


Cisco Blog > Enterprise Networks

Demystifying the Catalyst: Video Application Monitoring and Troubleshooting

In my previous blog, we looked at how Catalyst switches can be used to assess video application readiness in the network before rolling out a video based collaboration application. In this blog, let us take a look at available tools on the Catalyst switches to monitor and troubleshoot video problems in the network.

As we know, fundamentally, video traffic is different from data traffic.  Video traffic is more dynamic and bandwidth intensive and even small changes in delay or loss can cause visible disruptions to user experience. Routinely, IT trouble tickets are opened by users that are faced with degraded video experience.  To add to that, interactive video is real time. Any delay in troubleshooting will make IT miss the window to rectify the problem. For a firm with many locations and buildings, finding the problem can be complex and time consuming without the right tools. 

Read More »

Tags: , , , , , , , , , , , , , ,

Demystifying the Catalyst: The Basics of Application Visibility in the Network

What is Flexible NetFlow and why should you use it? In this blog post, let’s take a look at the basics of Application Visibility in the network for capacity planning and security.

In an enterprise, hundreds of applications are accessed by users from different locations within the campus and remotely from a branch or home. The application usage is usually not known beforehand and increases non-uniformly over time. This non-uniform app usage translates to non-uniform increases in traffic across the network which complicates capacity planning. Another complexity to capacity planning is that there can be sudden spikes in the traffic due to security issues such as internal security breaches, viruses, Denial of Service attacks, or network-propagated worms. IT administrators should not wait for these incidents to happen in order to tackle them. Instead, administrators must have the ability to see the usage pattern in advance for capacity planning and security incident detection and remediation.

Read More »

Tags: , , , , , , , , , , , , ,