Internet Bandwidth Congestion and Optimization

Size: px
Start display at page:

Download "Internet Bandwidth Congestion and Optimization"

Transcription

1 Internet Bandwidth Congestion and Optimization A Landscape Perspective A CIRRUSWORKS WHITE PAPER

2 INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION Contents Introduction...2 The Rise of Traffic Shaping (1.0)...2 Deep Packet Inspection (Traffic Shaping 2.0)...2 WAN Optimization (Managing End-to-End IP Flows)...3 Application Bandwidth Management (Application Acceleration)...4 Dynamic Bandwidth Control...4 The CirrusWorks Governor Platform...5 Why Operate on Layer 2?...5 CirrusWorks Governor in Collaboration...6 Landscape of Equipment Options...6 Competitive Product Review...7 About CirrusWorks CirrusWorks, Inc. All rights reserved. 1

3 Introduction INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION The problem of bandwidth congestion has existed as long as there have been networks. The basic ROI premise of any telecommunications network is that the core network facilities are oversubscribed by the edge users of the network. In the days of private and for-profit backbone networks (SNA, X.25, FR, ATM, MPLS, etc.), various costs of usage were applied in terms like connection count, connection size, data volume, and time-of-day usage. These parameters controlled and constrained the usage of the network (via IT cost controls and management). When IP networks were just becoming popular, these same underlying network costs and application controls were already in place. So private IP networking was just another transport protocol. The Rise of Traffic Shaping (1.0) The advent of the public Internet and its bulk usage and billing models removed most volumetric parameters of usage and forced IT managers to manage increasing volumes of traffic beyond that which were necessary to the corporate agenda and/or exceeded dramatically the bandwidth available to the user facilities. The dedicated accounting terminals and word processing stations of the past had given way to general purpose end-station computers capable of running multiple applications that were now only discernible at the network layer by source, destination and packet content. What started as diagnostic tools to determine what was in an IP flow (logical IP session), quickly mushroomed into control mechanisms embedded by IT managers into data centers and distributed LANs to provide basic rate control during periods of link congestion; hence, traffic shaping was born. The idea behind the traffic shaper is simple; you know the devices on your LAN, how much data they are moving and the size of the WAN link. Some simple math reveals that if you rate-limit the connections of users to some high-water mark, you will avoid some of the data contention situations. At first, even the most basic packet shapers were expensive standalone boxes running inline to the WAN link. Then the basic rate limiting feature became standard on Cisco or equivalent routers at all price levels. Algorithms were advanced to provide several mechanisms of interleave (ways to make priority decisions). This is how the rules and policy-based logic we see pervasive in the industry was born. Basic rate cap traffic shaping is still effective for certain types of activities. It exists today on generic LAN switches, routers, firewalls and other specialized equipment. It is also available as a basic tool on CirrusWorks equipment. If all you need to implement is traffic shaping 1.0, you probably already have all the tools in your IT shop today. But your problem is likely more complex than control via rate capping. Deep Packet Inspection (Traffic Shaping 2.0) Obviously, static transport rules and strict rate capping do not directly address the problem of network WAN congestion. They are simply a means to mask and try to ride-out the underlying instantaneous congestion that happens on every network. The root problem lies in the behaviors and activities of network users. So Traffic shaping had to go a level deeper. This is called deep packet inspection (DPI). The idea behind deep packet inspection is also not complex: if you know the endpoints of each communication session, and you understand something about the protocol being used in each session, you have a pretty good chance at making a decision on the priority of any session versus other sessions. This is a good idea and it works as long as you have a complete view of all the traffic passing over the network and you know ALL the endpoints of every session. With that complete view, you can establish traffic shaping 2.0 rules and policies that protect your QoS for your business-critical applications CirrusWorks, Inc. All rights reserved. 2

4 INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION Users of DPI traffic shapers rely on self-described rules and policies designed around known data flows and protocols. This method works to divide traffic flows over the Internet or WAN links between corporate and non-corporate use. But it fails in most scenarios where the preponderance of the traffic is carried back over a VPN, is encrypted end-to-end, or where the other end of the communication is not in your control (web or cloud hosted applications). DPI satisfies traffic shaping requirements for discrete (known), controlled corporate network environments. But it falls woefully short in today s mixed usage, hosted and multi-destination networking scenarios. So DPI works if your flows are understood, organized and never change. But DPI fails over time in the more generic or dynamic environment of most corporate and remote office LANs. Deep packet inspection with policy enforcement can control some web traffic flows such as peer-to-peer (P2P) in certain situations. But these are a moving target. For as soon as the content and application management device manufacturers release new sniffing rules, the abuser communities modify their connections and protocols so that such traffic is again misqualified by those rules and policies. Even the mainstream of web services is trending to make DPI more difficult and eventually obsolete. Major industry players are adopting Google s HTML5 and WebRTC. This major jump forward in end-to-end device communications will encrypt ALL data for every session between the discrete endpoints of the communication, making it virtually impossible to sort voice, video, and transactions in real-time. Lastly, oversubscription and congestion will still occur, even with transport rates being capped and non-essential data flows having been down-prioritized by DPI and policies. And once you are in a congestion state, no amount of pure packet or traffic shaping or policy management via DPI is going to abate or optimize the situation. WAN Optimization (Managing End-to-End IP Flows) Now armed with traffic and packet shaping, but not getting the intended results, IT managers asked the industry to build more specialized equipment to accelerate certain IP flows. The notion of WAN optimization emerged as a way to accelerate certain TCP protocol exchanges between two know endpoints. The fact that TCP is not highly optimized for point-to-point communications is well known. So the industry responded with expensive devices that modify the actual protocol and payload exchanges between two points over a WAN to drop superfluous chatter; hence we have the acceleration concept. We really haven t made anything faster, we are simply sending fewer control and acknowledgement datagrams between specialized equipment sitting on both sides of a WAN. So it can be stated that WAN Optimization and Application Acceleration are really a specialized point-to-point modem or private network transmission box architecture. For some applications and companies, this solves the WAN constriction, oversubscription and congestion problem. A remote accounting office of 200 people all driving transactions to a corporate data center can benefit from this technology. This works especially well for bandwidth which is dedicated to this purpose. So if you are going to use WAN optimization, you should not subject the gross traffic to other packet or traffic shapers, lest you get a result for which you were not intending. Again, we have solved a very specific problem with an expensive and dedicated hardware solution. But we ignore the overall problem of managing generalized traffic interleaved for many applications and many destinations CirrusWorks, Inc. All rights reserved. 3

5 INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION Application Bandwidth Management (Application Acceleration) As you might expect, WAN optimization doesn t work well for organizations moving to the cloud or where the preponderance of traffic is not following a dedicated path for dedicated applications. The best example would be the emergence of BYOD (Bring Your Own Device) and the allowance of employees and guests to use the Internet and LAN for non-work related activities on a wide field of user and office equipment. BYOD exacerbates the contention and congestion problem since neither these devices, nor their users are playing by the rules and policies established using traditional packet shaping or WAN optimization. So the industry responded by introducing the concept of Application Bandwidth Management (sometimes called Application Acceleration.) This takes deep packet inspection up the OSI (IP protocol) stack; in some cases all the way up to OSI L7 (the application specific data payload layer). The idea is to accurately classify applications based upon detailed information within the IP data flows and reprioritize (meaning down-prioritize) traffic that does not meet IT criteria to a lower speed. This is a really good concept. However, like policies for deep packet inspection and WAN optimization, it is grounded in a singular set of complex rules for a static family of complex but discernible traffic flows that are not encrypted. So it works really well for applications requiring a transport agent (software client) to be running on the user platform, when it is running in a private and controllable network environment. But as commercial applications move to the web services model, particularly when hosted by a third party, the ability to discern the traffic flows correctly diminishes rapidly. If the application runs over a browser, it is unlikely to remain discernible for very long. Therefore, the deployment of very expensive L7 packet engines do not have a long-term ROI since their ability to detect and down-prioritize known traffic flows will decline over time. Dynamic Bandwidth Control CirrusWorks has taken a radically different approach to the bandwidth congestion problem. Rather than try and discern deep secrets from the user payload data as it is moving past, CirrusWorks arbitrates congestion as it occurs by making the best decisions possible based purely upon the available bandwidth of the WAN circuit and the activities and instantaneous data demands of the users (devices). CirrusWorks provides dynamic traffic shaping without the technical difficulties associated with establishing, maintaining and tuning programmatic rule sets. This patent pending concept by CirrusWorks maintains asynchronous (upstream and downstream) statistics on user behavior without need to look at the user data payload at any level in the OSI stack. By simply understanding the periodicity of transmission/reception, gross packets and packet volumes over a historical period at L2 (the Data Link Layer), we know a lot about what each user is doing, how they vary from the average user and if they are impacting the QoS of others. CirrusWorks has replaced inefficient and ineffective packet disassembly/sleuthing with statistical and mathematical methods that effectively define a user s transmission profile dynamically and instantly. We dynamically establish priorities among the users, being able to momentarily demote users who have a recent history of using large amounts of bandwidth over the sampling period. This in turn will promote traffic which is burst, transient or transaction in nature. We haven t created more bandwidth. But at every instant, we are ensuring a best-fit use of the bandwidth that we have available. No packet or application rules are required to make these best-fit decisions CirrusWorks, Inc. All rights reserved. 4

6 The CirrusWorks Governor Platform INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION The CirrusWorks Governor platform is a Layer-2 QoS bridge that doesn t rely on deep packet inspection or rule sets to deal with congestion. CirrusWorks has replaced traditional L3-L7 packet disassembly and recognition with a cost effective L2 realtime flow analysis engine that makes decisions without analyzing the user data payload. Using behavioral analytics on the L2 traffic streams and monitoring historical device usage, CirrusWorks makes instantaneous MAC layer decisions based upon actual offered traffic and the aggregate dynamic data demand based upon their recent past activity. This unique software ensures that burst traffic is cleared in an expedited fashion, while less time-dependent traffic is down-prioritized during periods of congestion. When congestion is relieved, all traffic is returned to normal (ad-hoc demand) flow. CirrusWorks extremely fast congestion engagement algorithms will normally begin to abate the congestion and control usage in less than 1 second. This granularity is far below the L3 timeout window of most IP based applications. Thus, transactional data flows that must occur in near real time continue to run unabated and unaffected during the congestion period. Most users (including those engaged in bulk data movement such as video) never see an impact from CirrusWorks algorithmic approach. The impingement (delay) methodology of CirrusWorks makes very fast, but minute adjustments in flow delay for MAC addresses that are currently using too much bandwidth in either direction (asynchronous decision processes). This approach applies only the amount of impingement necessary to reach optimization at each instant. So there is never a negative QoS big brother effect as is seen in the other data flow management technologies. Why Operate on Layer 2? In the OSI model (the various IP stacks in particular) only Layer 2 (Data Link layer = L2) represents the real-time aggregate data demand of each device/user. The upper levels of the protocol stack (L3 and above) were originally written to be flexible when running over unreliable or congested shared network infrastructure. So L3 and above try to be elastic and rely on complex end-to-end retransmission capabilities. Timeouts and retransmissions pollute the decisions made by traffic arbitration devices and often render the arbitration useless as the endpoints will attempt to recover from impingement at these layers. The management of L2 (WAN) predates the IP protocols and the Internet. This concept was entrenched within the switching fabric for Frame Relay, X.25, and SNA. L2 management has been the backbone of managing flows over oversubscribed WAN links and still multi-threading user traffic for large numbers of devices. And while the CirrusWorks Governor is not actually managing L2 within the WAN, it is making data delay decisions at the edge (within the LAN) based upon what we are seeing and understanding at that data frame level. Even in today s modern multi-segment IP networks, OSI L2 represents a proxy for a device as if it were in a point-to-point type of network (viewing device traffic as if it were spanning a single physical segment.) This is a very different view than looking at every L3+ data transmission independently. And it has very different results on how successful an impingement or delay will be and how that management will impact the data flows of other devices. For the purposes of this discussion, L2 traffic management may be considered absolute, where the L3+ traffic management is subject to impacts from the end points and even the applications themselves. Small adjustments to L2 (per device) yield absolute and instantaneous results that cannot be overridden by complex data protocols CirrusWorks, Inc. All rights reserved. 5

7 CirrusWorks Governor in Collaboration INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION The CirrusWorks Governor may be implemented as a stand-alone platform, or in conjunction with other traffic shaping or application-aware systems. In this deployment model, the Governor arbitrates traffic oversubscription, over and above that which may already be modified or managed by a traffic shaper or a WAN optimizer. Landscape of Equipment Options We re often asked to qualify and quantify CirrusWorks in a quadrant landscape of equipment vendors. CirrusWorks places itself in a low cost + low complexity quadrant. We are solving the problems encountered by the majority of IT organizations and their users CirrusWorks, Inc. All rights reserved. 6

8 Competitive Product Review INTERNET BANDWIDTH CONGESTION AND OPTIMIZATION There are no direct comparisons possible among the various technologies and industry players in the bandwidth congestion space. Each vendor is offering something different by technology and price point. CirrusWorks offers the following analysis as we believe it indicative of the marketplace and how narrow and tailored the other offerings become by the introduction of static rules and static policy management. Technology Focus Dynamic Bandwidth Control Bandwidth Equalization Traffic Shaping WAN Optimization Application Bandwidth Mgmt Company CirrusWorks Net Equalizer Blue Coat & Cisco F5 & Silver Peak Riverbed & X-Roads Decision Model Behavioral Based Yes Yes No No No Static Rules & Policies No Yes Yes Yes Yes Applicability Data Center Large Enterprise Distributed WAN / MPLS Small/Medium Enterprise TeleWorking / Residential About CirrusWorks CirrusWorks is the leader in dynamic bandwidth management. The CirrusWorks Governor optimizes traffic during peak congestion periods to ensure fast and reliable Internet performance for all users. Only CirrusWorks employs AutoAlgorithms that adapt to unpredictable traffic patterns in real time, without the need to pre-configure static rule sets or policies. For more information, visit CirrusWorks, Inc. 510 N Washington Street, Suite 300 Falls Church, VA info@cirrusworks.net CirrusWorks, Inc. All rights reserved. CirrusWorks and CirrusWorks Governor are trademarks or registered trademarks of CirrusWorks, Inc. or its subsidiaries in the United States and other countries. All other names are trademarks of their respective owners. WP-IBC CirrusWorks, Inc. All rights reserved. 7

Is Your Network Ready for VoIP? > White Paper

Is Your Network Ready for VoIP? > White Paper > White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

How Network Transparency Affects Application Acceleration Deployment

How Network Transparency Affects Application Acceleration Deployment How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

The Need to Rethink the WAN

The Need to Rethink the WAN The Need to Rethink the WAN Introduction In the past few decades, technology advances in the Internet, cloud computing, virtualization, and other technologies have proceeded at a brisk pace. During that

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers

More information

The Next Generation of Wide Area Networking

The Next Generation of Wide Area Networking The Next Generation of Wide Area Networking Introduction As pointed out in The 2014 State of the WAN Report 1, the vast majority of WAN traffic currently uses either the Internet or MPLS. Since the Internet

More information

Best Practices for Deploying WAN Optimization with Data Replication

Best Practices for Deploying WAN Optimization with Data Replication Best Practices for Deploying WAN Optimization with Data Replication Keys for Successful Data Protection Across the WAN The Weak Link in data Protection All too often, the Wide Area Network (WAN) link is

More information

Optimizing Performance for Voice over IP and UDP Traffic

Optimizing Performance for Voice over IP and UDP Traffic A Riverbed Technology White Paper OPTIMIZING PERFORMANCE FOR VOICE OVER IP AND UDP TRAFFIC Optimizing Performance for Voice over IP and UDP Traffic 2006 Riverbed Technology, Inc. All rights reserved. 0

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper > A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations

More information

WAN Performance Analysis A Study on the Impact of Windows 7

WAN Performance Analysis A Study on the Impact of Windows 7 A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface. Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local

More information

CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE

CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE Engineering Version 1.3 June 3, 2015 Table of Contents Foreword... 3 Current Network... 4 Understanding Usage/Personas... 4 Modeling/Personas...

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

End-to-End QoS Network Design

End-to-End QoS Network Design End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction

More information

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is

More information

NComputing L-Series LAN Deployment

NComputing L-Series LAN Deployment NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Testing VoIP on MPLS Networks

Testing VoIP on MPLS Networks Application Note Testing VoIP on MPLS Networks Why does MPLS matter for VoIP? Multi-protocol label switching (MPLS) enables a common IP-based network to be used for all network services and for multiple

More information

STEELHEAD HYBRID NETWORKING

STEELHEAD HYBRID NETWORKING STEELHEAD HYBRID NETWORKING INCREASE NETWORK APPLICATION PERFORMANCE AND AVAILABILITY WHILE REDUCING COSTS WITH RIVERBED PATH SELECTION THE RISE OF THE HYBRID INFRASTRUCTURE Today, businesses are rapidly

More information

Combining Voice over IP with Policy-Based Quality of Service

Combining Voice over IP with Policy-Based Quality of Service TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

The Broadband Service Optimization Handbook Chapter 3

The Broadband Service Optimization Handbook Chapter 3 Gaining detailed information about the traffic on your network and the behavior of your subscribers is crucial to achieving success in the highly competitive service provider market. The latest breed of

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Elfiq Networks Vital for Hospitality

Elfiq Networks Vital for Hospitality Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...

More information

How To Improve Performance On A Network With A Slow Connection

How To Improve Performance On A Network With A Slow Connection The Three Components of Optimizing WAN Bandwidth Ashton, Metzler & Associates October 2002 1 Introduction There are two fundamental truths that characterize an enterprise Wide Area Network (WAN). The first

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem

More information

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network

More information

Introduction. The Inherent Unpredictability of IP Networks # $# #

Introduction. The Inherent Unpredictability of IP Networks # $# # Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK INTRODUCTION Managing and designing an enterprise network is becoming more complex. Delivering real-time applications is a top priority

More information

Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step

Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step Acceleration, Optimization, Security and the Data Center: Application Delivery s Next Step Robin Layland Layland Consulting April 2009 The economic downturn is putting pressure on IT to reduce costs and

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

Mesh VPN Link Sharing (MVLS) Solutions

Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their

More information

White Paper. Optimizing Video Performance Across the Distributed Enterprise >

White Paper. Optimizing Video Performance Across the Distributed Enterprise > White Paper Optimizing Video Performance Across the Distributed Enterprise > High-Quality Videoconferencing to Any User, On Any Network, Anywhere Do more with less: that s the message echoing through corporate

More information

Monitoring Service Delivery in an MPLS Environment

Monitoring Service Delivery in an MPLS Environment Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications

More information

Site2Site VPN Optimization Solutions

Site2Site VPN Optimization Solutions XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Improve Application Performance in the Hybrid Enterprise

Improve Application Performance in the Hybrid Enterprise Solution Brief Improve Application Performance in the Hybrid Enterprise The sun has set on the traditional enterprise network. Improvements to the public Internet, pervasive computing, big data, and the

More information

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical

More information

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

DOCSIS 1.1 Cable Modem Termination Systems

DOCSIS 1.1 Cable Modem Termination Systems DOCSIS 1.1 Cable Modem Termination Systems Chris Bridge cbridge@motorola.com DOCSIS 1.1 Features QoS management Dynamic QoS management Dynamic QoS addition Dynamic QoS change Dynamic QoS deletion Policy-based

More information

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

HIGH-SPEED BRIDGE TO CLOUD STORAGE

HIGH-SPEED BRIDGE TO CLOUD STORAGE HIGH-SPEED BRIDGE TO CLOUD STORAGE Addressing throughput bottlenecks with Signiant s SkyDrop 2 The heart of the Internet is a pulsing movement of data circulating among billions of devices worldwide between

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Solving the Big Dilemma of Big Data

Solving the Big Dilemma of Big Data shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Per-Flow Queuing Allot s Approach to Bandwidth Management

Per-Flow Queuing Allot s Approach to Bandwidth Management Allot s Approach to Bandwidth Management February 2002 Table of Contents Introduction...3 An Overview of TCP/IP...3 What is Bandwidth Management?...4 Allot s Per-Flow Queuing...5 How It Works... 5 Per-Flow

More information

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim Saisei FlowCommand The Saisei FlowCommand family of network performance enforcement (NPE) solutions offers a new paradigm for real-time user- and application-policy enforcement and visibility made possible

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Voice Over IP Performance Assurance

Voice Over IP Performance Assurance Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

Silver Peak s Virtual Acceleration Open Architecture (VXOA) Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY

AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY TABLE OF CONTENTS Understanding WAN Challenges 2 Network Memory - Maximize Bandwidth Efficiency 2 Network Integrity - Overcome Congestion and Packet

More information

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008

Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application

More information

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview

More information