First Generation Of Wan Optimization Information Technology Essay

Published: November 30, 2015 Words: 3320

WAN acceleration reduces the amount of traffic sent across the Wide Area Network and delivers information locally whenever possible. This improves the costs associated with application delivery - from staffing, infrastructure and facility costs to expenditures in application software and WAN bandwidth. In addition, WAN acceleration protects investments in business critical applications by ensuring that they meet end user performance objectives, and it minimizes risk of exposure by improving the performance and reliability of data backup, replication and recovery. As a result, WAN acceleration provides an extremely rapid return on investment, plus the intangible benefit of increased end user productivity and unsurpassed IT satisfaction.

First Generation of WAN optimization

Most often deployed as bandwidth band-aids, that providing short-term benefits on congested WAN links where it is too expensive to buy additional bandwidth. WAN optimizations rely on 2 underlying technologies which is compression and Quality of Service. (QoS)

Compression is used to reduce the bandwidth consumed by traffic traversing the WAN. This techniques is depends on the mix of traffic traversing the WAN. On average, most enterprises deploying compression technology will get around 50% improvements in WAN utilization which equal to doubling the effective WAN bandwidth.

Quality of Service

In an effort of maximize WAN utilization, most enterprises will oversubscribe their network. When demand exceeds the capacity of WAN link and traffic is competing for the same resource, the less important traffic may be used the bandwidth away from business-critical applications. To prevent such behavior, most 1st generation WAN optimization will implement QoS technique to classify prioritize traffic based on applications, user and other criteria.

Second Generation of WAN optimization

Application acceleration is a second generation of product that addresses the WAN optimization solutions. These application solutions can provide significant improvements by optimizing performance of specific application. Proxy and caching are used to simulate application server, enabling specific content to be delivered locally wit LAN-like performance. This technique provides a reasonable boost for static content but not work well for dynamic content. If performance gains are to be achieved, web caches have to be implemented in conjunction with other acceleration tools.

Third Generation of WAN Optimization

In addition to accelerating application performance, Local Instance Networking (LIN) addresses server by providing a mechanism for centralizing branch office infrastructure while localizing information delivery. It inspects all WAN traffic and stores a local instance of information in an application independent data store at each enterprise location. Each piece of information is not stored only once per location, enabling an appropriate sized of data to be hold.

LIN appliances deliver the performance of distributed servers, without complexity. It operates at network layer and completely transparent to all transport protocol. It also provides significant benefits to all enterprise applications. Local Instance Networking also puts an end to server sprawl, security, cost and compliance headaches that accompany it.

WAN Optimization techniques

WAN Optimization products accelerate a broad range of applications accessed by distributed enterprise users by eliminating redundant transmissions, staging data in local caches, compressing and prioritizing data, and streamlining chatty protocols. It also helps avoid packet delivery issues in shared WAN environments. The techniques used by WAN optimization product are;

Deduplication

This technique eliminates the transfer of redundant data across the WAN by sending references instead of the actual data. By working at the byte level, benefits are archived across IP applications.

Compression

This technique relies on data patterns that can be represented more efficiently and best suited for point to point leased lines.

Caching/Proxy

This technique relies on human behavior, accessing same data over and over again. It best suited for point to point leased lines, but also viable for internet connections and VPN tunnels. The effective use of web caching typically sees a bandwidth reduction of 15 - 30 percent on WAN links.

Protocol Spoofing

Bundles multiple requests from chatty applications into one and suitable for point to point WAN links.

Traffic shaping

Control data usages based in spotting specific patterns in the data and allowing or disallow specific traffic. It is suitable for both point to point leased lines and Internet connections and might be hard to keep current with ever expanding types of application.

Equalizing

This technique make assumptions on what needs immediate priority based on the data usage. It is an excellent choice for wide open unregulated internet connections and clogged VPN tunnels.

Connection Limits

This technique can prevents access gridlock in routers and access points due to denial of service or peer to peer connection. Best suited for wide open internet access links and also can be used in WAN links.

Simple Rate Limits

This technique can prevent user from getting more than fixed amount of data. It is best suited for remedying a congested internet connection or WAN links.

Advantages of using WAN acceleration

Improve performance and reliability of disaster recovery

Disaster recovery across wide area network (WAN) is difficult to achieve because the backup, replication and recovery involve the transfer of entire volume data which require significant amount of bandwidth. This will lead to high latency and subsequent database synchronization problems. WAN acceleration overcomes these problems by reducing the amount of data sent across the WAN during backup and restore processes and deliver information locally when possible to accelerate application response time.

Improve application performance across the WAN

There are limitation in WAN that makes it difficult to deliver application to remote and branch offices. Bandwidth is limited and very costly, latency will occur when communication taking place over long geographic distance, and congested network can cause packet loss. The back-off mechanism within TCP and chatty behavior of common application protocol make the situation even worst. By overcoming this limitation in wide area network, WAN accelerator can improve employee productivity and protect critical application while save on ongoing support costs and WAN bandwidth expenditures.

Facilitate data center consolidation

By facilitating the centralization of servers and storage, WAN accelerator can save money in infrastructure costs, software investments, WAN bandwidth and day-to-day operational expenditures.

Silver Peak

There are many products that offered the WAN optimization features; one of it is Silver Peak product. This company is founded in 2004 and privately held company that develops and enterprise-class Wide Area Network (WAN) acceleration appliances to improve network performance by improving application performance across the WAN.

Silver Peak offered and provides hardware devices that are complete for WAN acceleration. These products covered all the management tools that can facilitate data replication, network backup, disaster recovery, server centralization, and application delivery. Silver Peak's WAN Optimization product line is the NX Series of appliances. According to them, the solution provides benefits to all Internet Protocol applications, including TCP and non-TCP applications, as well as bulk transfer and real-time applications.

Silver Peak solution was designed from the ground up to support the scalability needs of large enterprises, while simultaneously remaining effective for smaller deployments. Unique features that ensure enterprise-grade scalability include;

Throughput

Silver Peak offers the highest WAN capacity of any WAN acceleration solution by delivering data reduction, compression, QoS, and latency/loss mitigation at high WAN speeds.

Storage capacity

Silver Peak leverages disk based WAN deduplication for superior memory retention and performance over time. The NX series appliances offer more that 10x local data store as alternative product, supporting up to 8 TB in a single appliance.

High flow counts

The Silver Peak solution is not limited by the number of transport layer flows in a network, as is the case with alternative solutions.

Wire speed encryption

Silver Peak leverages state of the art hardware to ensure that encryption does not adversely impact scalability and performance.

Application breadth

Silver Peak is the only WAN acceleration vendor to operate at the network layer of the ISO stack, providing data reduction, compression, and other technique across all enterprise applications, including SQL, VoIP and video.

Technologies used by Silver Peak's NX appliances.

Network memory

This technique uses advance fingerprinting technology to inspect all WAN traffic and stores a local instance of information at the appropriate enterprise location. Each piece of information is stored once per location which enables the Silver Peak appliances to hold weeks or months worth of data. Network memory will examine outbound packets to see if match is existed in the local instance at the destination location. If there is a match in the local instance, then the duplicate information will not be sent across the WAN and it will be sent to deliver the data locally. Network memory reduces the amount of data that traversing across WAN by several orders of magnitude and enables information to be delivered with LAN-like performance.

Compression

Cross flow payload compression ensure that the transmission of data across WAN is as efficient as possible by eliminating redundant information. This technique reduces overhead inherent to flows of small packets, as is the case with Voice over IP (VoIP).

Quality of Service (QoS)

Silver Peak NX Series appliances supports variety of Quality of Service techniques, including advance queuing and scheduling, as well as per application policy based decision-making and application tagging. These capabilities enable enterprises to deploy and prioritize a wide variety of business critical applications.

Latency and loss mitigation

Silver Peak solution uses protocol acceleration techniques, such as window size adjustment and selective acknowledgements to compensate for poor performance on high latency links. With Forward Error Correction that will add small amount of redundant information to the payload to recover packet loss at destination.

Secure content architecture

Silver Peak appliances protect all locally-stored and transmitted information from physical and network-level security breaches using 128-bit Advance Encryption Standard and IPSec tunneling.

Silver Peak's Product

Global Management System (GMS)

This product provides all the tools that necessary to centrally monitor, configure, and manage a Silver Peak's WAN products. It is standalone network appliances and have integrated SQL database, ensuring easy setup and maintenance in any enterprise environment.

GMS ensures fast and accurate configuration of Silver Peak's products. Silver Peak also provides automated deployment wizard to assists configuration process. This product also facilitates day-to-day administrative tasks across an entire distributed network, including scheduled configuration backups, automatic software updates and other vital device management functions.

GMS also provides centralized monitoring point that has easy to use dashboards that provide real-time information. It also has extensive reporting capabilities that assist with capacity management, network planning, auditing, troubleshooting, and SLA enforcement. Real-time and historical reports are available including traffic statistic. All of this information can be exported from GMS for easy manipulation and long term storage.

NX Appliances products information

NX-1000

NX-2000

NX-3000

NX-5000

NX-7000

NX-8000

NX-9000

WAN capacity

4Mbps

8Mbps

20Mbps

50Mbps

155Mbps

500Mbps

1Gbps

Certified Connection

8000

64000

64000

64000

128000

256000

256000

Local Data Storage

1 x 500GB

2 x 250GB

2 x 500GB

8 x 250GB

12 x 250GB

16 x 500GB

16 x 500GB

Power Supplies

Single

Single

1 + 1 Redundant

2 + 1 Redundant

2 + 1 Redundant

2 + 1 Redundant

2 + 1 Redundant

AES Disk Encryption

Real-time

Real-time

Real-time

Real-time

Real-time

Real-time

Real-time

IPSec Traffic Encryption

Real-time

Real-time

Real-time

Real-time

Real-time

Real-time

Real-time

Redundant Deployment

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

VRRP or WCCP 1:1, N + 1

Form Factor

1 RU

1 RU

2 RU

3 RU

3 RU

3 RU

3 RU

PRICE

USD$4995

USD$9995

USD$17995

USD$44995

USD$64995

USD$129995

USD$259995

Deployment guide for Silver Peak NX Series appliances

Silver Peak NX Series appliances require a minimal amount of network configuration and absolutely no client, server, or application reconfiguration. Silver Peak appliances are deployed in each of a distributed enterprise network and typically sit "behind" WAN router. The appliances support variety of different installation modes and robust fallback mechanisms such as;

Figure 1.0 Example of Silver Peak NX series deployment

In-Line

Figure 1.1 In-Line type of deployment

Silver Peak NX Series appliances is inserted in-line between WAN router and the Ethernet switch on the LAN side of the network. This type of deployment will accelerates traffice flows that match its ACL (access control lists) and all other traffic passes through the appliances unmodified.

Out of path

This type of deployment is not in the direct path of the network traffic, so a network traffic redirection technique is used to forward traffic to the appliance.

Policy-Based-Routing (PBR) Redirection

This is a common technique to redirect flows of traffic using an ACL and a policy instead of normal routing table lookups. The appliances intercepts only those packets that have been redirected to it.

Figure 1.2 Out of Path type with Policy-Based-Rourting (PBR) Redirection deployment

Web Cache Coordination Protocol (WCCP)

This type is originally designed to support the redirection of HTTP traffic to web caches and to support the redirection of any TCP of UDP connections to appliances participating in WCCP Service Groups. Silver Peak appliances intercepts only those packets that have been redirected to it, accelerating traffic flows that match its ACL.

Figure 1.3 Out of Path type with Web Cache Coordination Protocol (WCCP) deployment

Virtual Router Redundancy Protocol (VRRP) Peering to WAN router

The easiest way to redirect traffic is to make the Silver Peak appliances the default gateway for all the clients and servers on the LAN side of the network. This can be done by configuring IP address of Silver Peak appliances the same as the existing default gateway address.

Figure 1.4 Out of Path with Virtual Router Redudndancy Protocol (VRRP) deployment

Silver Peak Products Benefits

Benefits

Explaination

Technology Features

Enterprise Scalability

Can support form remote office size to large data centers

Not limited by TCP flows

NX Series appliances renge from 250GB to 8TB of local storage

NX Series appliances support 2Mbps to 1Gbps of WAN bandwidth capacity

64-bit hardware architecture

LAN-like Performance

For optimal application delivery across a distributed enterprise

Information delivered locally when possible

Only deltas traverse the WAN when delivering similar data

Advance payload and header compression

Latency/loss mitigation, including TCP acceleration, and adaptive FEC

Quality of Service

Complete Application Tranparency

No modification required to clients, servers, or network infrastructure

Byte-level visibility works across all applications

Secure data Protection

Data is secured whether in the box or across the WAN

Real-time encryption of disk drives using 128-bit AES

IPSec tunneling between NX Series Appliances

Network Resiliency

Provide maximum application performance with maximum up-time

NX series appliances feature RAID with redundant power supplies

Fail-to-wire

Redundant deployment options.

Manageability

Fro rapid deployment and cost effective operations

Easy-to-use setup wizard

Intuitive User Interface for configuration, monitoring, management and reporting

Silver Peak accelerate SQL

When SQL task are performed across the WAN, they are some factors that can affect perrormance, including limited bandwidth, high latency, and packet loss. Silver Peak provides a variety of optimization techniques that improve the performance and relaibility of most SQL operations, such as;

SQL queries across the WAN

Database backups and copies

SQL replication, such as Double Take, Neverfail and XOsoft

Fault tolerance, including connectivity to standby SQL servers

Database recovery

Silver Peak typically provides a 3x to 20x improvement on SQL queries, and 10x to 50x improvement on database backups and SQL replication. Given the type of data being transferred, peak improvements can exceed 100x.

Silver Peak accelerating web applications

Web application have become richer over time, including more interactive data with larger embedded images and file attachments. The performance of web applications is further debilitated by programming inefficiencies. Up to 80% web content generated by enterprise applications is treated by web servers as dynamic content. Dynamic content is not cacheable by the browser or cache proxies because it is generated by the application server and repeatedly sent across the WAN to client browsers every time it is requested. Silver Peak appliances accelerate and secure all Web-based enterprise applications and portals through several optimization tehcniques;

WAN deduplication

The first time a HTTP object is requested, the informations is compressed and sent over WAN. When a browser later requests the same object from the server that dynamically creates the content, a Silver Peak NX appliances recognizes the information stream and delivers the information locally. Network Memory remembers and recalls byte stream patterns by operating at the network layer and remaining application transparent. Every client request is passed through to the server and the data received by the client is always fresh, not a cache copy that can be out-of-date.

Improving latency

Silver Peak uses additional Network Accelearation tools to improve HTTP performance, including window scaling, selective ACK, and fast retransmit. This speeds up web portals and business critical web applications, particularly when they are accessed over higher latency links.

Packet coalescing

Silver Peak uses packet coalescing to repackage multiple smaller packets into a single larger packet. Web application will creates a stream of small packet on the WAN, each of which requires a TCP acknowledgement. By coalescing a series of short packets into a single larger packet, and compressing both the header and payload, Silver Peak reduces the impact of latency in these environments.

Header compression and Cross-flow payload compression

Silver Peak uses crossflow payload and header compression to reduce the amount of HTTP traffic traversing the WAN, improving performance even on the first transmission.

GLOSARY

Advance Encryption Standard (AES): A data encryption scheme which uses 3 different key sizes (128bit, 192bit, 256bit) to protect electronic data.

Chatty behavior: situation where servers and other network devices constantly announce their availability over the network and this can lead to network overhead.

Compression: Process of encoding information using fewer bits and specific encoding schemes

Deduplication: A method for compressing data by storing only changes to the original data

Disaster Recovery: A protocol to recover lost computing-system usage (application), data and data transactions committed up to the moment of system loss.

Fail-to-wire: A condition where the network will bypass the device if the device is happen to be powered off or fails.

Forward Error Correction (FEC): A system of error control for data transmission, whereby the sender adds redundant data to its messages.

IPSec: Internet protocol security is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream.

Latency: Any kind of delays typically incurred in processing of network data.

Loss mitigation: literally mean to reduce loss.

Protocol spoofing: A method to improve performance in situation where an existing protocol is inadequate.

Quality of Service: The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.

Redundant Array of Independent Disk (RAID): A technology that allows high levels of storage reliability from low-cost and less reliable PC-class disk drive components, via the technique of arranging the devices into arrays for redundancy.

Resilience: The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation

Server Sprawl: A situation that can occur in data center where a disproportionate amount of the physical server machines are running at very low utilization and wasting a lot of resources.

Synchronization: Multiple processes join up or handshake at a certain point, so as to reach an agreement or commit to a certain sequence of action.

Traffic shaping: A method for smoothing the bursty traffic rate that might arrive on an access virtual circuit so as to present a more uniform traffic rate on the network and comply with the traffic contract.

Tunneling: A type of technology that enable one network to send data via other network's connections.

Utilization: The capability of the software product to use appropriate amounts and types of resources

Virtual Private Network: A network that is set up for use by a limited number of individuals, such as employees of a company, operating over a large area.

Web caching: A process of caching a web documents to reduce bandwidth usage, server load, and perceived lag.