1 / 26

WAN Optimization

WAN Optimization Visibility… Control… Acceleration… Reporting Global Presence Proven effectiveness with hundreds of mission-critical applications around the world Over 5,000 customers in over 50 countries

albert
Download Presentation

WAN Optimization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WAN Optimization Visibility… Control… Acceleration… Reporting

  2. Global Presence • Proven effectiveness with hundreds of mission-critical applications around the world • Over 5,000 customers in over 50 countries • Over 50,000 units shipped • Offices in 14 countries • Over 100 sales partners • Global partnerships • IBM Global Services, HP Services, AT&T, Equant (France Telecom), NTT, Telecom New Zealand, Samsung, Citrix, and Polycom • Dozens of product awards worldwide

  3. PolicyCenter PacketSeeker PacketShaper Central Element and Policy Management Visibility Control ReportCenter Central Performance and Service-Level Reporting plus Application Traffic Management System PacketShaperXpress plus Compression and Acceleration 1200 Series 1550 Series 2500 Series 6500 Series 9500Series 10000Series Small Site Large Site

  4. Congestion at the LAN-WAN Transition WAN & Internet Links Are Bottlenecks Bandwidth-Intensive Apps E-Mail, Image & File Transfers,Database Synch, Backups, Distributed Storage WAN Access Bottleneck Unsanctioned & Recreational Apps Internet Surfing, Shopping, Internet Radio, P2P, Streaming Multimedia, Virus & Worm Propagation Demand Exceeds WAN Bandwidth Latency Sensitive Business Apps SAP, Oracle, SiebelPeopleSoft, VoIP, IP Video, Mainframe, Custom, etc…

  5. Packeteer Typical Network Device: Router, Probe, etc. Stateful Inspection “Layer 7” Complete Application Classification Visibility: Application IntelligenceIndustry-Leading Classification Oracle, SAP, KaZaA over HTTP Application sub-classifications, validation, behavioral characteristics, multi-packet flow analysis and profiling intelligence for encrypted, tunneled and evasive applications. Oracle, SAP, KaZaA Applications HTTP/SSL, SMTP/POP3, FTP Dynamic Port 80722 Static Port 80 06/11 TCP/UDP IP 192.168.1.1 00D059B71F3E Link Layer

  6. Bandwidth UtilizationHow much is going to your mission critical Apps? Telecom/Data Circuit Budget Utilization Bandwidth Utilization • Are you getting an acceptable ROI for your network?

  7. “After the Packeteer deployment, we saw it all. NetBIOS, FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” Matt Matin, Systems Engineer, LandAmerica Application Traffic Management: Visibility Visibility • Knowledge is power • Determine what applications are running on the network. • Track how much bandwidth are they using. • Measure delay, application response times & Slaps. • Track, troubleshoot, manage

  8. VisibilityAdvanced Application-intelligence (Classification) • Automatic Traffic Classification • AutoDiscovery automatically classifies & measures traffic • Simple configuration: Basic IP Settings • Application classifications • ATM, Frame Relay, IP, MPLS, Ethernet link classification intelligence • Application-intelligent • Advanced application intelligence - Layer 7 across multiple packets with behavioral intelligence • Shifty peer-to-peer applications, which port hop and masquerade • Stateful applications which dynamically negotiate ports • Custom definitions extend Layer 7 classification to thousands of applications.

  9. Top Talkers Screen Shot Table

  10. Monitoring Traffic Window

  11. Network Performance Monitoring • Analyzing efficiency on the XXX network • Efficiency • Identified recurring drops in overall efficiency • Took a closer look at DCOM (MS Mail) efficiency Inbound Efficiency (Remote to Core) Inbound DCOM Efficiency (Remote to Core) MS MAIL Efficiency “drops” are synchronized with overall Network Efficiency “drops”

  12. Web Email Voice and Video over IP Malicious and Recreational Traffic Oracle PeopleSoft SAP Siebel Malicious and Recreational Traffic • Even well designed networks are subject to attacks and congestion • Worms and viruses • Major software updates • Web traffic from major news events • Rich/streaming media and P2P • Internet radio • Large file transfers and email attachments

  13. Network Performance Monitoring • Identifying a virus or Denial of Service type attack on XXX network Inbound Top 10 (From Remote to Core) • Top Talker • XXX.X.48.53 (smalltic1) = 99% 99% of the ICMP traffic is a single Client! ICMP Utilization

  14. Network Performance Monitoring • Isolating and Eliminating a virus or DoS type attack on XXX network Never Admit Policy Applied PacketShaper# tr hist rec outbound/icmp/smalltic1 -----( /Outbound/ICMP/smalltic1 )----- 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.151 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.150 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.149 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.148 ICMP Utilization • Traffic History • Performed “Traffic History Recent” command for the created class “outbound/icmp/smalltic1” • Identified the behavior to be that of a virus or DoS type attack • Applied a never admit policy to the created class “outbound/icmp/smalltic1”

  15. Visibility Control “Packeteer has allowed our staff to react very quickly to business requests and requirements.” Gary Grieg, Network Manager, Global Operations & European Systems , Ace Insurance Application Traffic Management: Control • Control utilization, fix performance & manage costs • Ensure the performance of key business applications – per app, session, or call • Contain impact of malicious, recreational & non-business traffic • Contain costs, maximize bandwidth & application investments BeforeControl AfterControl

  16. L L L L L L L L L ControlTraffic Shaping to Fix Performance Issues • Policies/Partitions • Contain recreational traffic • Protect critical traffic • Smooth disruptive bandwidth intensive application traffic. • Strong Control • Set Per-Session Guarantees • Burstable configurations • Prioritized Access to Excess Bandwidth • Bi-directional control (inbound, too!!) IT

  17. L L L L L L SHAPING OFF SHAPING ON L L L ControlShaping Improves Efficiency and Improves Latency • Manage congestion proactively • Throttling traffic at end stations • Coordinating at flow aware control point, managing when traffic is sent • Reduce retransmissions & latency • Queues and drops add network and/or application latency • Increases during congestion • Improve throughput • Reclaim bandwidth wasted on retransmissions

  18. L L Bandwidth Allocation DiffServ, MPLS, TOS L L L 512Kbps Oracle 256Kbps Notes L L Best Effort FTP L Classesof Service L Router MPLS Backbone Remote Site Control Application-intelligent Traffic Marking Application Intelligence for MPLS Networks

  19. Visibility Control “We compressed the traffic from one application 25-30Mb down to 12Mb. The complaints stopped. We’re getting anywhere between 25 and 70 percent bandwidth savings, with an overall average of about 40 to 50 percent. It works better the more data you throw at it.” Matt Matin, Systems Engineer, LandAmerica Application Traffic Management: Acceleration • Further optimize performance • Increase WAN capacity via compression • Accelerate performance • Extend existing bandwidth expenditures Acceleration

  20. Web Application visibility provides knowledge Exchange Web Siebel Exchange Order Entry System Siebel Order Entry System Web Application control aligns network applications and resources with business needs Exchange Compression makes the network “bigger” and accelerates critical applications Siebel Order Entry System The Unique Value Of Packeteer’s System

  21. Web Application visibility provides knowledge Exchange Web Lotus Notes Exchange Transaction Processing Lotus Notes Transaction Processing Web Compression adds virtual bandwidth, but does not protect important applications Exchange Control plus compression provides the best solution Lotus Notes Transaction Processing Compression Alone Is Not Enough

  22. L L L L L L L L L AccelerationPacketShaper ® Xpress™ • Advanced Compression and Acceleration Techniques • Multiple algorithms & approaches • Reduce byes over the network • Application-intelligent • Understand nature of traffic • Optimize compression gains by applying best approach • Improve Response Times, Minimize Latency • Shaping controls latency • Compression shortens response times • Effective Control is a Prerequisite • Direct compression gains to mission critical applications IT

  23. PacketShaper ® Xpress™Typical Data Reduction Web Apps General Internet Blended Average* NetBIOS E-mail Oracle 100% 75% 50% 25% 0% 3:1 5:1 2:1 2.5:1 4:1 2:1 *Mix of traffic determines actual gains, but most companies fall between 2:1 and 3:1

  24. AccelerationSuperior to Compression-only Solutions • Compression alone does not solve application performance problems • Must assure created bandwidth is not consumed by recreational or other traffic • Bandwidth Management + Compression Optimizes Acceleration • Combination of proper allocation plus increased capacity improves transaction performance Tolly Group, Understanding Traffic Management, 2003

  25. Managing Large Deployments Central Management for Efficient Operations Central Management • ReportCenter • Centralized analysis and reporting: collection, storage, analysis, report distribution • Network & application performance, response time, and utilization data • PolicyCenter • Centralized policy management & device administration • Manage classification, partitions & policies, image distribution, configuration • Rich API’s & Alerts • Available via SNMP & XML • Leading Vendor Integration • Major frameworks like MicroMuse, InfoVista, Concord, HP, Aprisma, BMC

  26. Thank you

More Related