260 likes | 663 Views
WAN Optimization Visibility… Control… Acceleration… Reporting Global Presence Proven effectiveness with hundreds of mission-critical applications around the world Over 5,000 customers in over 50 countries
E N D
WAN Optimization Visibility… Control… Acceleration… Reporting
Global Presence • Proven effectiveness with hundreds of mission-critical applications around the world • Over 5,000 customers in over 50 countries • Over 50,000 units shipped • Offices in 14 countries • Over 100 sales partners • Global partnerships • IBM Global Services, HP Services, AT&T, Equant (France Telecom), NTT, Telecom New Zealand, Samsung, Citrix, and Polycom • Dozens of product awards worldwide
PolicyCenter PacketSeeker PacketShaper Central Element and Policy Management Visibility Control ReportCenter Central Performance and Service-Level Reporting plus Application Traffic Management System PacketShaperXpress plus Compression and Acceleration 1200 Series 1550 Series 2500 Series 6500 Series 9500Series 10000Series Small Site Large Site
Congestion at the LAN-WAN Transition WAN & Internet Links Are Bottlenecks Bandwidth-Intensive Apps E-Mail, Image & File Transfers,Database Synch, Backups, Distributed Storage WAN Access Bottleneck Unsanctioned & Recreational Apps Internet Surfing, Shopping, Internet Radio, P2P, Streaming Multimedia, Virus & Worm Propagation Demand Exceeds WAN Bandwidth Latency Sensitive Business Apps SAP, Oracle, SiebelPeopleSoft, VoIP, IP Video, Mainframe, Custom, etc…
Packeteer Typical Network Device: Router, Probe, etc. Stateful Inspection “Layer 7” Complete Application Classification Visibility: Application IntelligenceIndustry-Leading Classification Oracle, SAP, KaZaA over HTTP Application sub-classifications, validation, behavioral characteristics, multi-packet flow analysis and profiling intelligence for encrypted, tunneled and evasive applications. Oracle, SAP, KaZaA Applications HTTP/SSL, SMTP/POP3, FTP Dynamic Port 80722 Static Port 80 06/11 TCP/UDP IP 192.168.1.1 00D059B71F3E Link Layer
Bandwidth UtilizationHow much is going to your mission critical Apps? Telecom/Data Circuit Budget Utilization Bandwidth Utilization • Are you getting an acceptable ROI for your network?
“After the Packeteer deployment, we saw it all. NetBIOS, FTP, and other important, but not time-sensitive, applications were running rampant over the financial transaction applications delivered over Citrix, crushing the sessions and delaying transactions.” Matt Matin, Systems Engineer, LandAmerica Application Traffic Management: Visibility Visibility • Knowledge is power • Determine what applications are running on the network. • Track how much bandwidth are they using. • Measure delay, application response times & Slaps. • Track, troubleshoot, manage
VisibilityAdvanced Application-intelligence (Classification) • Automatic Traffic Classification • AutoDiscovery automatically classifies & measures traffic • Simple configuration: Basic IP Settings • Application classifications • ATM, Frame Relay, IP, MPLS, Ethernet link classification intelligence • Application-intelligent • Advanced application intelligence - Layer 7 across multiple packets with behavioral intelligence • Shifty peer-to-peer applications, which port hop and masquerade • Stateful applications which dynamically negotiate ports • Custom definitions extend Layer 7 classification to thousands of applications.
Top Talkers Screen Shot Table
Network Performance Monitoring • Analyzing efficiency on the XXX network • Efficiency • Identified recurring drops in overall efficiency • Took a closer look at DCOM (MS Mail) efficiency Inbound Efficiency (Remote to Core) Inbound DCOM Efficiency (Remote to Core) MS MAIL Efficiency “drops” are synchronized with overall Network Efficiency “drops”
Web Email Voice and Video over IP Malicious and Recreational Traffic Oracle PeopleSoft SAP Siebel Malicious and Recreational Traffic • Even well designed networks are subject to attacks and congestion • Worms and viruses • Major software updates • Web traffic from major news events • Rich/streaming media and P2P • Internet radio • Large file transfers and email attachments
Network Performance Monitoring • Identifying a virus or Denial of Service type attack on XXX network Inbound Top 10 (From Remote to Core) • Top Talker • XXX.X.48.53 (smalltic1) = 99% 99% of the ICMP traffic is a single Client! ICMP Utilization
Network Performance Monitoring • Isolating and Eliminating a virus or DoS type attack on XXX network Never Admit Policy Applied PacketShaper# tr hist rec outbound/icmp/smalltic1 -----( /Outbound/ICMP/smalltic1 )----- 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.151 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.150 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.149 18-Nov-2003 14:45:56 ICMP xxx.x.48.53 smalltic1.citnet.cit.com xxx.x.15.148 ICMP Utilization • Traffic History • Performed “Traffic History Recent” command for the created class “outbound/icmp/smalltic1” • Identified the behavior to be that of a virus or DoS type attack • Applied a never admit policy to the created class “outbound/icmp/smalltic1”
Visibility Control “Packeteer has allowed our staff to react very quickly to business requests and requirements.” Gary Grieg, Network Manager, Global Operations & European Systems , Ace Insurance Application Traffic Management: Control • Control utilization, fix performance & manage costs • Ensure the performance of key business applications – per app, session, or call • Contain impact of malicious, recreational & non-business traffic • Contain costs, maximize bandwidth & application investments BeforeControl AfterControl
L L L L L L L L L ControlTraffic Shaping to Fix Performance Issues • Policies/Partitions • Contain recreational traffic • Protect critical traffic • Smooth disruptive bandwidth intensive application traffic. • Strong Control • Set Per-Session Guarantees • Burstable configurations • Prioritized Access to Excess Bandwidth • Bi-directional control (inbound, too!!) IT
L L L L L L SHAPING OFF SHAPING ON L L L ControlShaping Improves Efficiency and Improves Latency • Manage congestion proactively • Throttling traffic at end stations • Coordinating at flow aware control point, managing when traffic is sent • Reduce retransmissions & latency • Queues and drops add network and/or application latency • Increases during congestion • Improve throughput • Reclaim bandwidth wasted on retransmissions
L L Bandwidth Allocation DiffServ, MPLS, TOS L L L 512Kbps Oracle 256Kbps Notes L L Best Effort FTP L Classesof Service L Router MPLS Backbone Remote Site Control Application-intelligent Traffic Marking Application Intelligence for MPLS Networks
Visibility Control “We compressed the traffic from one application 25-30Mb down to 12Mb. The complaints stopped. We’re getting anywhere between 25 and 70 percent bandwidth savings, with an overall average of about 40 to 50 percent. It works better the more data you throw at it.” Matt Matin, Systems Engineer, LandAmerica Application Traffic Management: Acceleration • Further optimize performance • Increase WAN capacity via compression • Accelerate performance • Extend existing bandwidth expenditures Acceleration
Web Application visibility provides knowledge Exchange Web Siebel Exchange Order Entry System Siebel Order Entry System Web Application control aligns network applications and resources with business needs Exchange Compression makes the network “bigger” and accelerates critical applications Siebel Order Entry System The Unique Value Of Packeteer’s System
Web Application visibility provides knowledge Exchange Web Lotus Notes Exchange Transaction Processing Lotus Notes Transaction Processing Web Compression adds virtual bandwidth, but does not protect important applications Exchange Control plus compression provides the best solution Lotus Notes Transaction Processing Compression Alone Is Not Enough
L L L L L L L L L AccelerationPacketShaper ® Xpress™ • Advanced Compression and Acceleration Techniques • Multiple algorithms & approaches • Reduce byes over the network • Application-intelligent • Understand nature of traffic • Optimize compression gains by applying best approach • Improve Response Times, Minimize Latency • Shaping controls latency • Compression shortens response times • Effective Control is a Prerequisite • Direct compression gains to mission critical applications IT
PacketShaper ® Xpress™Typical Data Reduction Web Apps General Internet Blended Average* NetBIOS E-mail Oracle 100% 75% 50% 25% 0% 3:1 5:1 2:1 2.5:1 4:1 2:1 *Mix of traffic determines actual gains, but most companies fall between 2:1 and 3:1
AccelerationSuperior to Compression-only Solutions • Compression alone does not solve application performance problems • Must assure created bandwidth is not consumed by recreational or other traffic • Bandwidth Management + Compression Optimizes Acceleration • Combination of proper allocation plus increased capacity improves transaction performance Tolly Group, Understanding Traffic Management, 2003
Managing Large Deployments Central Management for Efficient Operations Central Management • ReportCenter • Centralized analysis and reporting: collection, storage, analysis, report distribution • Network & application performance, response time, and utilization data • PolicyCenter • Centralized policy management & device administration • Manage classification, partitions & policies, image distribution, configuration • Rich API’s & Alerts • Available via SNMP & XML • Leading Vendor Integration • Major frameworks like MicroMuse, InfoVista, Concord, HP, Aprisma, BMC