Wan optimization
Download
1 / 26

WAN Optimization - PowerPoint PPT Presentation


  • 340 Views
  • Updated On :

WAN Optimization Visibility… Control… Acceleration… Reporting Global Presence Proven effectiveness with hundreds of mission-critical applications around the world Over 5,000 customers in over 50 countries

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'WAN Optimization' - albert


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Wan optimization l.jpg

WAN Optimization

Visibility… Control… Acceleration… Reporting


Global presence l.jpg
Global Presence

  • Proven effectiveness with hundreds of mission-critical applications around the world

  • Over 5,000 customers in over 50 countries

  • Over 50,000 units shipped

  • Offices in 14 countries

  • Over 100 sales partners

  • Global partnerships

    • IBM Global Services, HP Services, AT&T, Equant (France Telecom), NTT, Telecom New Zealand, Samsung, Citrix, and Polycom

  • Dozens of product awards worldwide


Application traffic management system l.jpg

PolicyCenter

PacketSeeker

PacketShaper

Central Element and Policy Management

Visibility

Control

ReportCenter

Central Performance and Service-Level Reporting

plus

Application Traffic Management System

PacketShaperXpress

plus

Compression and

Acceleration

1200 Series

1550 Series

2500 Series

6500 Series

9500Series

10000Series

Small Site

Large Site


Congestion at the lan wan transition wan internet links are bottlenecks l.jpg
Congestion at the LAN-WAN Transition WAN & Internet Links Are Bottlenecks

Bandwidth-Intensive Apps

E-Mail, Image & File Transfers,Database Synch, Backups, Distributed Storage

WAN Access Bottleneck

Unsanctioned & Recreational Apps

Internet Surfing, Shopping, Internet Radio, P2P, Streaming Multimedia, Virus & Worm Propagation

Demand Exceeds WAN Bandwidth

Latency Sensitive Business Apps

SAP, Oracle, SiebelPeopleSoft, VoIP, IP Video, Mainframe, Custom, etc…


Visibility application intelligence industry leading classification l.jpg

Packeteer

Typical Network Device: Router, Probe, etc.

Stateful Inspection

“Layer 7”

Complete

Application

Classification

Visibility: Application IntelligenceIndustry-Leading Classification

Oracle, SAP,

KaZaA over

HTTP

Application sub-classifications, validation, behavioral characteristics, multi-packet flow analysis and profiling intelligence for encrypted, tunneled and evasive applications.

Oracle,

SAP,

KaZaA

Applications

HTTP/SSL,

SMTP/POP3,

FTP

Dynamic Port

80722

Static Port

80

06/11

TCP/UDP

IP

192.168.1.1

00D059B71F3E

Link Layer


Bandwidth utilization how much is going to your mission critical apps l.jpg
Bandwidth UtilizationHow much is going to your mission critical Apps?

Telecom/Data Circuit Budget Utilization

Bandwidth Utilization

  • Are you getting an acceptable ROI for your network?


Application traffic management visibility l.jpg

“After the Packeteer deployment, we saw it all. NetBIOS, FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Matt Matin, Systems Engineer, LandAmerica

Application Traffic Management: Visibility

Visibility

  • Knowledge is power

    • Determine what applications are running on the network.

    • Track how much bandwidth are they using.

    • Measure delay, application response times & Slaps.

    • Track, troubleshoot, manage


Visibility advanced application intelligence classification l.jpg
Visibility FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” Advanced Application-intelligence (Classification)

  • Automatic Traffic Classification

    • AutoDiscovery automatically classifies & measures traffic

    • Simple configuration: Basic IP Settings

    • Application classifications

    • ATM, Frame Relay, IP, MPLS, Ethernet link classification intelligence

  • Application-intelligent

    • Advanced application intelligence - Layer 7 across multiple packets with behavioral intelligence

    • Shifty peer-to-peer applications, which port hop and masquerade

    • Stateful applications which dynamically negotiate ports

    • Custom definitions extend Layer 7 classification to thousands of applications.


Slide9 l.jpg

Top Talkers Screen Shot FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Table


Slide10 l.jpg

Monitoring Traffic Window FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”


Slide11 l.jpg

  • Network Performance Monitoring FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

    • Analyzing efficiency on the XXX network

  • Efficiency

    • Identified recurring drops in overall efficiency

    • Took a closer look at DCOM (MS Mail) efficiency

Inbound Efficiency (Remote to Core)

Inbound DCOM Efficiency (Remote to Core)

MS MAIL Efficiency “drops” are synchronized with overall Network Efficiency “drops”


Malicious and recreational traffic l.jpg

Web FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Email

Voice and Video over IP

Malicious and Recreational Traffic

Oracle

PeopleSoft

SAP

Siebel

Malicious and Recreational Traffic

  • Even well designed networks are subject to attacks and congestion

  • Worms and viruses

  • Major software updates

  • Web traffic from major news events

  • Rich/streaming media and P2P

  • Internet radio

  • Large file transfers and email attachments


Slide13 l.jpg

  • Network Performance Monitoring FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

    • Identifying a virus or Denial of Service type attack on XXX network

Inbound Top 10 (From Remote to Core)

  • Top Talker

    • XXX.X.48.53 (smalltic1) = 99%

99% of the ICMP traffic is a single Client!

ICMP Utilization


Slide14 l.jpg

  • Network Performance Monitoring FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

    • Isolating and Eliminating a virus or DoS type attack on XXX network

Never Admit Policy Applied

PacketShaper# tr hist rec outbound/icmp/smalltic1

-----( /Outbound/ICMP/smalltic1 )-----

18-Nov-2003 14:45:56 ICMP

xxx.x.48.53 smalltic1.citnet.cit.com

xxx.x.15.151

18-Nov-2003 14:45:56 ICMP

xxx.x.48.53 smalltic1.citnet.cit.com

xxx.x.15.150

18-Nov-2003 14:45:56 ICMP

xxx.x.48.53 smalltic1.citnet.cit.com

xxx.x.15.149

18-Nov-2003 14:45:56 ICMP

xxx.x.48.53 smalltic1.citnet.cit.com

xxx.x.15.148

ICMP Utilization

  • Traffic History

    • Performed “Traffic History Recent” command for the created class “outbound/icmp/smalltic1”

    • Identified the behavior to be that of a virus or DoS type attack

    • Applied a never admit policy to the created class “outbound/icmp/smalltic1”


Application traffic management control l.jpg

Visibility FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Control

“Packeteer has allowed our staff to react very quickly to business requests and requirements.”

Gary Grieg, Network Manager, Global Operations & European Systems , Ace Insurance

Application Traffic Management: Control

  • Control utilization, fix performance & manage costs

    • Ensure the performance of key business applications – per app, session, or call

    • Contain impact of malicious, recreational & non-business traffic

    • Contain costs, maximize bandwidth & application investments

BeforeControl

AfterControl


Control traffic shaping to fix performance issues l.jpg

L FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

L

L

L

L

L

L

L

L

ControlTraffic Shaping to Fix Performance Issues

  • Policies/Partitions

    • Contain recreational traffic

    • Protect critical traffic

    • Smooth disruptive bandwidth intensive application traffic.

  • Strong Control

    • Set Per-Session Guarantees

    • Burstable configurations

    • Prioritized Access to Excess Bandwidth

    • Bi-directional control (inbound, too!!)

IT


Control shaping improves efficiency and improves latency l.jpg

L FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

L

L

L

L

L

SHAPING OFF

SHAPING ON

L

L

L

ControlShaping Improves Efficiency and Improves Latency

  • Manage congestion proactively

    • Throttling traffic at end stations

    • Coordinating at flow aware control point, managing when traffic is sent

  • Reduce retransmissions & latency

    • Queues and drops add network and/or application latency

    • Increases during congestion

  • Improve throughput

    • Reclaim bandwidth wasted on retransmissions


Control application intelligent traffic marking l.jpg

L FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

L

Bandwidth

Allocation

DiffServ, MPLS, TOS

L

L

L

512Kbps

Oracle

256Kbps

Notes

L

L

Best Effort

FTP

L

Classesof Service

L

Router

MPLS

Backbone

Remote Site

Control Application-intelligent Traffic Marking

Application Intelligence for MPLS Networks


Application traffic management acceleration l.jpg

Visibility FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Control

“We compressed the traffic from one application 25-30Mb down to 12Mb. The complaints stopped. We’re getting anywhere between 25 and 70 percent bandwidth savings, with an overall average of about 40 to 50 percent. It works better the more data you throw at it.”

Matt Matin, Systems Engineer, LandAmerica

Application Traffic Management: Acceleration

  • Further optimize performance

    • Increase WAN capacity via compression

    • Accelerate performance

    • Extend existing bandwidth expenditures

Acceleration


The unique value of packeteer s system l.jpg

Web FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Application visibility provides knowledge

Exchange

Web

Siebel

Exchange

Order Entry System

Siebel

Order Entry System

Web

Application control aligns network applications and resources with business needs

Exchange

Compression makes the network “bigger” and accelerates critical applications

Siebel

Order Entry System

The Unique Value Of Packeteer’s System


Compression alone is not enough l.jpg

Web FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

Application visibility provides knowledge

Exchange

Web

Lotus Notes

Exchange

Transaction Processing

Lotus Notes

Transaction Processing

Web

Compression adds virtual bandwidth, but does not protect important applications

Exchange

Control plus compression provides the best solution

Lotus Notes

Transaction Processing

Compression Alone Is Not Enough


Acceleration packetshaper xpress l.jpg

L FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”

L

L

L

L

L

L

L

L

AccelerationPacketShaper ® Xpress™

  • Advanced Compression and Acceleration Techniques

    • Multiple algorithms & approaches

    • Reduce byes over the network

  • Application-intelligent

    • Understand nature of traffic

    • Optimize compression gains by applying best approach

  • Improve Response Times, Minimize Latency

    • Shaping controls latency

    • Compression shortens response times

  • Effective Control is a Prerequisite

    • Direct compression gains to mission critical applications

IT


Packetshaper xpress typical data reduction l.jpg
PacketShaper FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” ® Xpress™Typical Data Reduction

Web Apps

General Internet

Blended Average*

NetBIOS

E-mail

Oracle

100%

75%

50%

25%

0%

3:1

5:1

2:1

2.5:1

4:1

2:1

*Mix of traffic determines actual gains, but most companies fall between 2:1 and 3:1


Acceleration superior to compression only solutions l.jpg
Acceleration FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” Superior to Compression-only Solutions

  • Compression alone does not solve application performance problems

    • Must assure created bandwidth is not consumed by recreational or other traffic

  • Bandwidth Management + Compression Optimizes Acceleration

    • Combination of proper allocation plus increased capacity improves transaction performance

Tolly Group, Understanding Traffic Management, 2003


Managing large deployments central management for efficient operations l.jpg
Managing Large Deployments FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” Central Management for Efficient Operations

Central Management

  • ReportCenter

    • Centralized analysis and reporting: collection, storage, analysis, report distribution

    • Network & application performance, response time, and utilization data

  • PolicyCenter

    • Centralized policy management & device administration

    • Manage classification, partitions & policies, image distribution, configuration

  • Rich API’s & Alerts

    • Available via SNMP & XML

  • Leading Vendor Integration

    • Major frameworks like MicroMuse, InfoVista, Concord, HP, Aprisma, BMC


Slide26 l.jpg

Thank you FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.”


ad