Skip to main content

Network Performance in IT Asset Management

$249.00
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the design and operational execution of a sustained network performance management program, comparable in scope to a multi-phase internal capability build for integrating monitoring, asset governance, and capacity planning across complex enterprise environments.

Module 1: Establishing Performance Baselines and Metrics

  • Selecting appropriate KPIs such as latency, jitter, packet loss, and throughput based on business-critical applications and service level agreements.
  • Deploying passive monitoring agents at network chokepoints to capture traffic patterns without introducing performance overhead.
  • Configuring SNMP polling intervals to balance data granularity with management plane resource consumption on core devices.
  • Defining normal versus anomalous behavior thresholds using historical data, accounting for cyclical usage such as month-end processing.
  • Integrating NetFlow and IPFIX collectors to correlate traffic volumes with specific business units or applications.
  • Documenting baseline metrics in configuration management databases (CMDB) to support future capacity planning and incident root cause analysis.

Module 2: Network Discovery and Asset Inventory Integration

  • Choosing between active scanning (e.g., ICMP, SNMP sweeps) and passive discovery (e.g., ARP monitoring) based on network segmentation and security policies.
  • Resolving discrepancies between DHCP logs, switch MAC address tables, and CMDB records to identify stale or unauthorized devices.
  • Mapping discovered devices to business owners using organizational unit (OU) tags in Active Directory or HR provisioning systems.
  • Handling embedded or IoT devices that lack standard management interfaces by creating manual asset records with lifecycle tracking.
  • Scheduling recurring discovery jobs during maintenance windows to minimize broadcast traffic and avoid performance degradation.
  • Implementing automated reconciliation workflows to flag configuration drift between inventory records and actual device presence.

Module 3: Performance Monitoring Architecture Design

  • Placing monitoring probes in DMZs, data centers, and remote offices to ensure coverage of multi-tier application transactions.
  • Deciding between centralized versus distributed data collection based on WAN bandwidth constraints and data sovereignty requirements.
  • Configuring time synchronization across monitoring nodes using NTP with traceable stratum sources to ensure event correlation accuracy.
  • Designing retention policies for performance data that align with compliance mandates and troubleshooting needs, balancing storage cost and accessibility.
  • Implementing role-based access controls on monitoring dashboards to restrict visibility of sensitive network segments.
  • Integrating monitoring tools with SIEM platforms to enable cross-domain correlation of performance anomalies and security events.

Module 4: Capacity Planning and Forecasting

  • Extracting historical bandwidth utilization data from core routers to project growth trends using linear and exponential models.
  • Factoring in upcoming business initiatives such as cloud migration or video conferencing rollout when projecting capacity needs.
  • Allocating buffer capacity on WAN links based on criticality, with premium headroom for real-time applications like VoIP.
  • Coordinating with procurement teams to align hardware refresh cycles with forecasted demand spikes.
  • Modeling the impact of network segmentation or QoS policies on effective capacity for different traffic classes.
  • Validating forecast accuracy quarterly by comparing projections with actual utilization and adjusting models accordingly.

Module 5: Change Management and Performance Impact Assessment

  • Requiring performance impact statements for all network change requests, including rollback procedures if thresholds are breached.
  • Scheduling firmware upgrades during low-usage periods and validating post-change performance against baselines.
  • Using synthetic transactions to simulate user activity before and after changes to detect degradation in application response times.
  • Coordinating change windows with application owners to avoid conflicts with batch processing or data replication jobs.
  • Logging all configuration changes in version-controlled repositories with diffs to support audit and regression analysis.
  • Enforcing peer review of complex changes such as BGP policy updates or firewall rule modifications to prevent routing instability.

Module 6: Incident Response and Performance Troubleshooting

  • Using packet capture tools like tcpdump or Wireshark to isolate retransmissions or duplicate ACKs indicating network congestion.
  • Correlating device CPU spikes with interface errors to determine whether performance issues stem from hardware limitations or misconfigurations.
  • Escalating to ISP support with time-stamped evidence of latency or packet loss beyond agreed SLAs.
  • Isolating broadcast storms by analyzing switch port statistics and disabling misconfigured endpoints or hubs.
  • Documenting root cause and resolution steps in the incident management system for future knowledge base enrichment.
  • Conducting post-incident reviews to update monitoring thresholds or detection rules and prevent recurrence.

Module 7: Governance, Compliance, and Reporting

  • Aligning network performance reporting with ITIL practices to support service level management and availability reporting.
  • Generating quarterly compliance reports demonstrating adherence to internal policies on data transmission integrity and uptime.
  • Restricting access to performance data containing personally identifiable information (PII) based on data protection regulations.
  • Archiving monitoring configurations and historical reports to meet audit requirements for change traceability.
  • Standardizing report formats across departments to enable consistent comparison of network health across business units.
  • Defining ownership of performance metrics within network operations, ensuring accountability for SLA adherence.

Module 8: Optimization and Technology Refresh Strategy

  • Evaluating SD-WAN adoption based on current MPLS costs, application performance over public internet, and branch office requirements.
  • Replacing end-of-life switches with models supporting advanced QoS and telemetry features to improve traffic prioritization and visibility.
  • Implementing DNS optimization and local caching to reduce latency for frequently accessed cloud services.
  • Upgrading link aggregation groups (LAGs) based on observed utilization trends and redundancy requirements.
  • Retiring legacy protocols such as CDP or unencrypted SNMPv1 in favor of secure, standards-compliant alternatives.
  • Conducting proof-of-concept trials for new technologies like intent-based networking, measuring performance and operational overhead before enterprise rollout.