Essential Requirements for WAN Optimization. WAN Acceleration Evaluation

Size: px
Start display at page:

Download "Essential Requirements for WAN Optimization. WAN Acceleration Evaluation"

Transcription

1 WAN Acceleration Evaluation Revision November 2009

2 ESSENTIAL REQUIREMENTS FOR WAN ACCELERATION Introduction This document proposes a list of suggested requirements and evaluation criteria for selection of a WAN Acceleration product that can be deployed robustly to support a large-scale enterprise network. While many WAN acceleration products seem to perform adequately in simple lab tests in isolated network environments, very few have proven to be able to sustain full-scale production operation across a large number of different applications, under heavy traffic loads, and in larger-scale networks having from dozens to hundreds or thousands of remote locations. WAN optimization products that have proven to meet the stringent requirements of the larger, more complex networks will deliver greatest returns through stable trouble-free operation, including for deployments at more normal-sized networks. This document lists evaluation criteria used to identify products that are capable of meeting robust scaling and performance requirements. How to use this document In this document each suggested requirement is listed in bold, followed by a discussion about why the requirement is relevant and important. The reader should formulate and tailor their own list of applicable requirements to fit their specific needs. This document focuses on the essential requirements (e.g., the product must support CIFS acceleration ), as opposed to trivial requirements (e.g., the product must be weigh less than 10 pounds ). Not all requirements are necessarily applicable in every network environment; each environment has its own unique characteristics, and the reader should tailor their requirement to fit the needs of their specific network and applications Riverbed Technology. All rights reserved. 1

3 Table of Contents Configuration and Network Integration... 3 Must be able to provide references of other similar-sized successful customer deployments... 3 Must be deployable in-path at the core data center... 3 Must support multiple bypass port pairs for in-path deployment... 3 Must be deployable out-of-path with WCCP... 3 Must support autodiscovery of remote peer devices... 3 Must support manual configuration of remote peer devices where necessary... 3 Appliance-based solutions must not require additional software plug-ins or agents on client or server hosts... 4 Optimized traffic must preserve IETF-specified (RFC 2581) TCP congestion control behavior over the WAN... 4 Must detect asymmetrically-routed network traffic... 4 Must optimize asymmetrically-routed network traffic for both in-path and out-of-path configurations... 4 Transparency Mode should be optional, not mandatory (option for accurate addressing must exist)... 5 Must be available as a software client installable on Windows PC s and Laptops... 5 Scaling and High Availability... 6 Must be able to simultaneously communicate with at least peer devices (fill in your specific requirement)... 6 Must support clustering without WCCP or PBR... 6 Must not block additional application sessions when capacity is reached... 7 Must support TCP connections and application sessions per device (fill in your specific requirement)... 7 Must support TCP connections and application sessions through clustering (fill in your specific requirement)... 7 QoS policy enforcement must include both priority queuing and traffic shaping... 7 QoS policy enforcement must be applicable hierarchically... 7 Data Reduction Technology... 8 Must have disk-based data store for byte-level data... 8 Must be able to synchronize Data Stores between clustered WAN optimization devices... 8 Must have at least GB of storage capacity for byte-level data (fill in your specific requirement)... 8 Must use a universal single-instance data store architecture... 8 Must support an encrypted data store... 9 Application-Specific Optimization Technology... 9 Must address protocol chattiness and latency issues for CIFS (Windows File Sharing)... 9 Must not interfere with the operation of CIFS file locks between client and server... 9 Must address protocol chattiness and latency issues for Macintosh-based CIFS clients (OSX 10.5 and later) Must address protocol chattiness and latency issues for Exchange/MAPI Must address protocol chattiness and latency issues for Exchange 2003/MAPI Must address protocol chattiness and latency issues for Exchange 2007/MAPI Must support cross-protocol data recognition and data reduction for Exchange/MAPI Must address protocol chattiness and latency issues for NFS version Must address protocol chattiness and latency issues for enterprise web applications Must address protocol chattiness and latency issues for SSL encrypted applications Must address encoding processes for Oracle Forms application data Must fully optimize encrypted and compressed Citrix ICA traffic optimization without requiring server or client configuration changes Must address protocol chattiness for Windows print traffic Management Must have a central manager capability available Central manager must be optional, not required Must support the capability to host virtualized 3 rd -party software applications About Riverbed Riverbed Technology. All rights reserved. 2

4 Configuration and Network Integration Must be able to provide references of other similar-sized successful customer deployments With a large number of vendors offering products in this relatively-new technology area, one of the best ways to identify the most suitable product is to look at other success stories. Many WAN acceleration products look good on paper, but only a small number of vendors have had their products successfully rolled out in large-scale production network environments. The solution must have consistent and demonstrated success in a real-life production network, and not just in a simple two-box lab demonstration in an isolated test lab. Some vendors encourage customers to limit their evaluations to a lab environment, where they can avoid unfavorable conditions (e.g., unknown applications, heavy traffic loads, etc ). Often they introduce contrived conditions (e.g., artificially-high packet loss levels) that unfairly benefit their own products. The best way to see if a product will work and work well is to look for concrete examples of full-scale successful deployments in other customer networks that are similar to your own. The vendor should be able to furnish these customer references if indeed they exist. Be sure to check that the references have actually deployed at a scale similar to your own network, not just that the customer has purchased a comparable number of devices. Must be deployable in-path at the core data center Some vendors recommend a PBR or WCCP-based deployment for the data center, because their devices are not capable of passing-through significant amounts of traffic loads that would be seen when deployed in-path in the data center. However, use of WCCP and PBR in these environments requires creation and constant maintenance of lengthly and complex ACL s, due to the large heterogeneous mix of application and traffic types seen in the core data center. In contrast to a branch office environment where there are a limited number of applications used by a relatively small number of employees, the core data center typically hosts a large number of applications that are being accessed by employees located in many branch offices. Configuring ACL s for WCCP or PBR traffic redirection is inevitably going to be a complex and continuous process, repeated whenever a new application or traffic type shows up in the network. For a large enterprise, the burden of managing these ACL s for traffic redirection is very difficult if not impossible to handle. As a result, an in-path deployment approach may be far more preferable in the data center. Must support multiple bypass port pairs for in-path deployment Larger networks, particularly those designed for high availability and redundancy will have redundant Ethernet LAN connections. To efficiently support these environments, the WAN optimization product should support multiple Ethernet bypass port pairs so that a single appliance can be simultaneously connected to multiple Ethernet LAN connections. This avoids having to use a separate appliance for each Ethernet connection. Must be deployable out-of-path with WCCP WCCP should be an available deployment option, as it allows the WAN acceleration device to physically reside outside of the network path. This option allows traffic that cannot or should not be optimized to avoid any contact with the WAN acceleration device, should that be desirable. Must support autodiscovery of remote peer devices The WAN acceleration device must be able to dynamically detect the presence and IP address of any other WAN acceleration devices, on demand and without advance administrator configuration. True autodiscovery significantly reduces the amount of tedious configuration work and potential for configuration error, especially in networks with large numbers of WAN acceleration devices or sites with WAN acceleration devices. Furthermore, autodiscovery avoids the need to enter host subnets in the configuration process, another source of headaches and errors. In contrast, tunneling-based products require that all host subnets be identified. This is an administrative burden, particularly for networks with large numbers of subnets and those that use formal subnet tracking tools management processes. Each and every time an IP address subnet assignment is created, deleted, or changed, the change must be reflected not only in your existing address tracking tools, but also must be reflected in the WAN optimization solution s management interface. The long-term task of keeping these two configuration databases synchronized, up-to-date, and accurate is a potential source of conflict and error in the foreseeable future. Must support manual configuration of remote peer devices where necessary In some environments, firewalls and intrusion protection devices may block use of the TCP options field, and this can interfere 2009 Riverbed Technology. All rights reserved. 3

5 with the operation of the autodiscovery mechanism. In these environments, one can either change the configuration of the firewall, or alternatively disable the autodiscovery mechanism and instead manually configure IP address information of each remote peer device. Because the former approach can compromise security, the latter option of manually configuring peering relationships is the better choice in many cases. However, some WAN optimization products lack this ability to disable autodiscovery and instead use fixed rules that specify the IP address of the peer device. These WAN optimization products should be avoided as they lack the flexibility to be deployed in highly-secure environments where firewalls disallow use of the TCP options field. Appliance-based solutions must not require additional software plug-ins or agents on client or server hosts A truly transparent appliance-based solution should not require software agents on client or server hosts. This defeats the purpose of having an appliance-based solution. Optimized traffic must preserve IETF-specified (RFC 2581) TCP congestion control behavior over the WAN Some WAN acceleration products do not honor IETF-specified TCP congestion control semantics. Rather, they use TCP windowing tricks to boost performance and throughput to levels that normally wouldn t be allowed by standard TCP congestion control safeguards specified in RFC2581. These products attempt to boost performance by stealing bandwidth from other applications sharing the WAN infrastructure. If you are planning to deploy WAN acceleration devices an environment with shared WAN connections, then non-tcp compliant products should be avoided. The danger for these products is when multiple non-tcp traffic flows collide in a shared WAN environment, significant levels of network congestion and packet loss will occur, affecting all traffic sharing the WAN. Products that do not honor slow start and congestion avoidance principles outlined in RFC2581 will not know how to adequately handle such situations. Rather than fall back and reduce their transmission throughput under heavy network congestion, these products attempt to power-through the congestion, by maintaining their transmission rate in the face of packet loss. The result is severely degraded network conditions for all traffic sharing the WAN. Must detect asymmetrically-routed network traffic Asymmetric routing is unavoidable in most large and highly-available IP networks. Whether your network already has redundancy features such as multiple network paths, or at some future point you believe you may add additional connections to provide the redundancy, the WAN acceleration product that you select should have the capability of detecting and not harming or blocking traffic that is asymmetrically-routed. Some WAN optimization products block traffic that is routed through a different WAN optimization device for each direction of traffic flow. These products are incapable of detecting asymmetric routing conditions, particularly when a given WAN optimization device only sees the client s request, but not the server s response. When this condition occurs, the WAN optimization device must be able to realize that asymmetric routing is probably going on, and that it should not attempt to intercept and optimize the traffic, but rather let it pass-through without disruption. Products that cannot do this should be avoided, because they block traffic and break applications when asymmetric routing exists in a network. This may be an important requirement even if you don t believe you have asymmetric routing. Often, in the initial state of the network asymmetric routing will not exist at all until a link failure or some other event occurs, which triggers activation of an alternate network path. In this case, a WAN acceleration deployment that initially works fine may suddenly start blocking traffic and breaking applications as a result of normal IP re-routing operations through the dynamic routing protocol (e.g., OSPF, BGP, etc...). Note that detecting asymmetrically-routed traffic only means that the traffic will be passed-through without optimization, and does not necessarily mean that the traffic will be optimized. The next requirement deals with the ability to actually optimize asymmetrically-routed network traffic. Must optimize asymmetrically-routed network traffic for both in-path and out-of-path configurations The WAN acceleration product should not only detect, but given adequate configuration, also be able to optimize asymmetricallyrouted network traffic. While WCCP can be used to address asymmetric routing, there are some environments where WCCP may not be possible. As a result, the WAN acceleration solution must have explicit mechanisms to address asymmetric routing for inpath/in-line configurations, where the device is deployed using bypass interfaces. To accomplish this requires that the product have an ability to forward and re-direct traffic appropriately so that the asymmetry is eliminated as far as the WAN optimization 2009 Riverbed Technology. All rights reserved. 4

6 device is concerned. Note that WAN acceleration devices that address protocol chattiness issues must be able to intercept and optimize traffic in both directions of data flow. If one direction of data flow is intercepted and optimized by one WAN optimization device, and the return path for that traffic follows a path supported by a different device, then problems can occur because each of the two different devices only see one duplex of the traffic. This requirement states that the WAN optimization devices must communicate, coordinate, and appropriately forward the traffic flow so that the device performing the optimization service can see both directions of traffic flow. Transparency Mode should be optional, not mandatory (option for accurate addressing must exist) Some WAN acceleration vendors offer a transparency feature that uses the original IP address of the client and server to address packets containing optimized data for delivery over the WAN. This feature allows network monitoring devices to observe the original source and destination of the network traffic, but it also hides the real sender and receiver of the processed, compressed, and transformed traffic, which are the WAN optimization devices, not the original client and server. The alternative approach to transparency is accurate addressing for the processed, compressed, and transformed traffic. This approach accurately reflects on the compressed traffic that the WAN optimization device is sending the traffic to another WAN optimization device, so that there is no possibility of misrouting of the traffic. The transparency feature achieves a worthy objective by providing traffic visibility, but it also creates a number of significant impacts to the overall integrity of the functioning IP network. As a result in many situations this feature may need to be disabled in order to avoid routing problems and application disruptions. Unfortunately, Transparency mode is not only the default mode for some WAN acceleration products, but for some products it cannot be disabled even if the customer does not want to use this feature. This raises an important issue for customers with large networks having redundant WAN routers and asymmetrically-routed traffic. Because the optimized WAN traffic contains the IP address of the end-host, and not the WAN optimization device, traffic can potentially be routed to the wrong WAN optimization device, particularly in networks with asymmetric routing and multiple WAN optimization devices deployed at the data center site. Furthermore, routing loops can develop because network routers cannot distinguish between traffic that has already been processed by the WAN acceleration device, and traffic that has yet to be processed, and as a result they may continuously route already-processed traffic back to the WAN acceleration device in a continuous loop, resulting in black-holing of the traffic. Finally, a very-real possibility exists for the wrongly-addressed packets to actually be delivered to the end-host, resulting in confusion and application disruptions when that traffic contains random bytelevel data compressed by the WAN acceleration device. In order to avoid these issues, the WAN optimization solution must have a capability for accurate addressing. This capability can be optionally enabled, but it must exist, and when it is utilized, the optimized, compressed, and transformed data sent over the WAN segment of the network will accurately utilize the real IP addresses of the WAN optimization devices. This prevents any chance of misrouting of the traffic from occurring. While the Transparency feature might be useful in a limited number of cases, nevertheless in many enterprise networks, it can cause serious problems and challenges, and it may need to be disabled in order for the WAN acceleration solution to function without disrupting the network and various applications. Must be available as a software client installable on Windows PC s and Laptops According to IDC s Mobile Worker Forecast , about 450 million workers will use mobile computers in the near future. If your corporation has a number of mobile users, then the requirements for the WAN optimization solution must be available not only as a separate hardware appliance deployed in data centers and branch offices, but also as a software client on mobile Windows laptop computers. The software client should support an invisible mode, allowing installation and configuration to be centralized, because mobile users will generally not have a technical background that allows them to comfortably navigate complex configuration tasks. Operation of the mobile software client should be completely transparent to the end user. The software client should be tested and work well with your VPN client and anti-virus software, and interoperate well with the various applications that are used by the end user Riverbed Technology. All rights reserved. 5

7 The software client should work with the same WAN optimization product in the data center that is also supporting remote branch office appliances. This will allow standardization on one WAN optimization device in the data center, including the ability to load balance and cluster data center devices for scalability and high availability. Otherwise, two separate sets of products in the data center would be needed one to support remote branch office appliances, and the other to support mobile software clients. The software client should be capable of simultaneously connecting to more than one WAN optimization device, in order to support network environments where servers are located at more than one data center. Without this capability, the mobile software client can only receive optimized performance for applications from only one data center. Though this requirement is seemingly fundamental, one of the more prominent mobile software client products has this very limitation. The software client should have the ability to auto-detect when it is in a location with a WAN optimization appliance and automatically disable its optimization. This capability is needed in the common use case where an employee with a software client-equipped laptop roams in and out of corporate offices that have WAN optimization appliances. When the employee is working in the office, it is typically preferable to defer to the local appliance for WAN optimization, in order to leverage the appliances data store that is shared among all employees, and to avoid unnecessary consumption of a client license. This feature should be fully automated and should not require manual configuration of subnets or DNS servers. The software client should also have a branch warming capability, so that its data store is pre-warmed when the user is working form an office with a local appliance, so that subsequent data transfers are warm as soon as the client leaves the office, even though it was previously relying on the appliance for optimization. With this feature, users get the best of both worlds: the ability to rely on the appliance while in the office, and immediate warm performance after leaving the office. Scaling and High Availability Must be able to simultaneously communicate with at least peer devices (fill in your specific requirement) This requirement is important for customers having (or potentially having) large numbers of sites where WAN acceleration devices will be deployed. It becomes an even more important requirement if your network includes an MPLS-based WAN, which provides for any-to-any connectivity. Many WAN acceleration devices can only connect with a small number of remote peer devices, while others can connect with thousands of peer devices, each deployed at a different site. Be careful about products that claim to increase the number of peers that they can communicate with through clustering approaches. Load balancing and clustering through WCCP unaware of device peering relationships, and the same is true for many proprietary clustering approaches (e.g., Juniper s WX/WXC cluster). With random traffic load balancing, there is no way to determine which clustered/load balanced device will receive a given traffic flow. As a result, every device in the cluster must form relationships with the same peer devices. For example, if a given WAN acceleration product can peer with a maximum of 50 devices using WCCP to cluster 3 of these devices together does not necessarily raise the peer limit to 150, because each of the 3 clustered devices typically must support peering relationships with the same 50 peer devices. Furthermore, note that this architectural requirement has implications on the solution s ability to support individual mobile software clients. If a given WAN optimization device can only support connectivity to 50 peer devices, then effectively each data center device can only support 50 mobile software clients. On the other hand, many enterprise environments expect to have far greater than 50 mobile employees using a software-based Windows client-pc solution. Must support clustering without WCCP or PBR WCCP does have drawbacks, one of which is increased demand on router processing resources. In some environments the traffic load is such that WCCP places too much demands on the processing resources of the router or switch, and therefore an alternate load balancing and clustering approach must be supported, without use of WCCP. Another problem with both WCCP and PBR is that they are unaware of device peering relationships or device overload; they can tell when a device is up or down, but they have no finer-grained visibility in to the state of the cluster. Finally, note that WCCP requires at least 30 seconds to detect a failure among its clustered devices. The WCCP hello timer interval cannot be changed, and a failure of a device clustered through WCCP will likely result in black-holing of traffic for at least 30 seconds before WCCP recognizes that the failed device is no longer responsive Riverbed Technology. All rights reserved. 6

8 Must not block additional application sessions when capacity is reached A solution that scales properly must be able to survive overload conditions without disrupting application sessions for additional traffic beyond the device capacity. In a large massively-scaled network environment, there will be time periods where application demand spikes to higher levels. To accommodate this, when the session capacity of the WAN acceleration device is reached, additional sessions should be passed-through and not be adversely affected. Note that some WAN acceleration devices use an application-specific caching (e.g., file cache) approach. These devices handle session requests similar to how an application server would if the maximum number of application sessions that can be supported by the server is reached, then additional connections are denied. Unfortunately, this behavior is not appropriate for a WAN acceleration device deployed to intercept and generically optimize all application traffic, and any such device should be eliminated from consideration as it will not scale, unless the device can be adequately oversized so as to guarantee that the connection-denial never occurs. Must support TCP connections and application sessions per device (fill in your specific requirement) Scaling the solution requires that each WAN optimization device be able to accelerate a significant amount of network traffic. Bandwidth metrics are often deceptive, as raw packet compression capacity does not accurately measure the solution s ability to apply layer-7 application-specific acceleration techniques designed to address latency and protocol chattiness issues. Rather, a more accurate metric of a device s scaling capability is the number of TCP connections and application sessions that can be intercepted and accelerated. Note that these are two separate and equally-important metrics that must be considered and compared across all WAN optimization solutions being considered. Note that some vendors emphasize a very high connection limit for generic TCP connections, but they have significantly lower application-level session (e.g., CIFS, MAPI, etc ) limits that they avoid disclosing. Make sure you specifically enquire on the vendor s limits for both TCP connections and application sessions. Must support TCP connections and application sessions through clustering (fill in your specific requirement) Many network environments are sufficiently large that multiple WAN optimization devices must be deployed at some sites, particularly the data center hub site. In these cases, multiple WAN optimization devices must be clustered in order to scale the solution as required, and the total number of TCP connections and application sessions that the clustered solution must be compared across all WAN optimization solutions being considered. QoS policy enforcement must include both priority queuing and traffic shaping QoS is important to ensure real-time transactional traffic such as VoIP, RDP and Citrix ICA receive priority access to bandwidth in the network. However, some WAN optimization devices are only capable of providing traffic shaping and bandwidth reservation; these devices do not have any priority queuing capability to deliver packet prioritization. This creates an issue when traffic classes exceed initial manually-configured bandwidth guarantees. If priority queuing is not available, then it is possible for FTP traffic to be prioritized and expedited ahead of a time-sensitive VoIP or Citrix ICA packet. For this reason, QoS policy enforcement capability in the WAN optimization device must have the ability to perform both priority queuing and bandwidth guarantees/traffic shaping. QoS policy enforcement must be applicable hierarchically QoS policies must be able to address not only the WAN bandwidth available locally, but also the bandwidth at the remote site. This is important for shared WAN infrastructure such as MPLS clouds, where the bandwidth available at the data center is likely not the same as the bandwidth available at branch offices. To address these situations, the WAN optimization device must be able to apply QoS enforcement policies in a hierarchical manner, for example shaping traffic not only to the 45 Mbps bandwidth that is available locally at the data center, but also addressing the fact that most branch offices are only connected with a T1 WAN (1.5Mbps). Must be able to individually apply QoS policy enforcement policy to each of the four virtual channels in Citrix ICA traffic The WAN optimization device should have the ability to decode the ICA Priority Packet Tagging that identifies each virtual channel from which the packetized ICA data originated. This capability allows the WAN optimization solution to deliver more granular QoS enforcement, as well as to apply the appropriate DSCP marking to packets from each virtual channel. Some QoS solutions that decode ICA Priority fields might re-order packets, for example sending a high-priority interactive packet ahead of a lower-priority bulk packet, even though the bulk was transmitted first by the sender. While this may appear as a logical scheduling approach, it can have adverse effects on performance due to the out-of-order delivery of packets from the same TCP flow. The receiving endpoint s TCP stack must queue the out-of-order packets to deliver them in-order thus increasing jitter, delay, and possibly 2009 Riverbed Technology. All rights reserved. 7

9 even causing retransmissions. Therefore, when applying QoS to Citrix ICA traffic, the QoS scheduler must respect the ordering of packets within an ICA flow, and must not re-order packets. Data Reduction Technology Must have disk-based data store for byte-level data A sufficiently-large disk-based data store with multiple gigabytes to terabytes of data storage capacity, used to retain byte-level repetitive byte patterns is essential for effective WAN optimization. A disk-based data store is persistent across reboots, and will retain learned repetitive byte patterns for a period of weeks, if not months or years. The overall end-user experience is significantly enhanced when a file or attachment last accessed a number of weeks ago is accessed with LAN-like speeds. Furthermore, transfer times for large files, such as a 100MB FTP file transfer, are significantly faster if the entire byte-level data can be retained in the disk-based data store. In contrast, WAN acceleration products that only retain learned byte patterns in DRAM memory are significantly less effective due to their lack of storage capacity. Some DRAM-only products, due to storage constraints, only store repetitive byte patterns that are observed at least twice these products only provide warm performance acceleration on the third transfer of a given file. Other DRAM-only products store all byte patterns that they observe, and any learned files are retained in memory for a period of a few minutes before they are flushed out by newer byte patterns that are more recently acquired. Must be able to synchronize Data Stores between clustered WAN optimization devices In order to support high availability, redundancy, and failover of the WAN optimization solution, the byte-level contents of the diskbased data store must be able to be copied and synchronized between clustered WAN optimization devices. This may be between an active and a passive device (one-way synchronization), or it may be between two devices that are actively optimizing traffic (bi-directional synchronization). In the event of failure or loss of one WAN optimization device, then there will be no loss of data and the other device will be able to continue accelerating with the same data store as the previously-operational device. Data store synchronization between redundant WAN optimization devices must be supported regardless of the deployment approach, and this includes not only for in-path deployments, but also deployments that make use of WCCP. Must have at least GB of storage capacity for byte-level data (fill in your specific requirement) Backup and data replication applications involve transfers of potentially hundreds of GB to several TB of data. The WAN optimization device must be capable of storing the entire set of byte patterns transferred for the entire backup and data replication process. Of course, this will vary depending on your specific application and environment, but the data store must match or exceed the nominal amount of application data to be backed-up or replicated. It is important to distinguish between a byte-level data store and an application-level cache. Disk-based storage can be utilized to store either byte-level data or application-level data. The byte-level data storage capacity required in the WAN optimization device is typically far less than the amount of file-level data being transferred over the WAN. A byte-level data store eliminates the bytelevel data redundancies found among different versions of the same or similar files. It is not uncommon to be able to support three to five times as much application-level data with a given byte-level data store (e.g., a 500GB data store can often support between 1.5 to 2.5TB of files, attachments, web objects, etc ). On the other hand an application-level cache (e.g., a file cache or web cache) must have a data storage capacity that is greater than the amount of application-level data being transferred over the WAN. Note that for some WAN optimization products, data is stored twice first at the byte level and then again at the file level. For such products, the amount of disk storage needed is far greater than the amount of application-level (i.e., files) data that must be transferred over the WAN. A memory-only WAN acceleration device stores much less data than disk-based devices, and will provide minimal benefit for backup and data replication applications because the stored data will quickly be overwritten. Must use a universal single-instance data store architecture The WAN optimization solution must use a universal data store that stores each byte-pattern once, regardless of the number of remote peer devices accessing the file. In the case of an identical file fetched by users at 10 different branch offices, the relevant data must only be stored and represented only once in the data center WAN optimization device not 10 separate times. Each additional accelerated transfer of that file to any remote site leverages the same instance of data stored in the central WAN optimization device, and must not consume additional storage Riverbed Technology. All rights reserved. 8

10 Note that some WAN optimization devices use a partitioned data store for each peer device, which stores each instance of data once for each tunnel or remote peer device. For a given file retrieved by users at different remote sites, the data center WAN optimization device must store the same instances of byte-level data at least once for each remote site. As a concrete example, where users at 10 different branch offices retrieve the same file, the core WAN optimization device in the data center must store the relevant data 10 times once for each tunnel or remote peer WAN optimization device. A partitioned data store architecture also has implications on the solution s capability to support a software client-based solution for mobile users. In this case a separate data partition must be created and maintained for each mobile software client. If 10GB were set aside for each mobile software client, then supporting 1000 mobile software users would consume 10TB of data store capacity in the central data center appliance. The per-peer data store architecture used by some WAN optimization devices will not scale to meet the needs of larger more complex networks having many remote sites and/or individual mobile client users. As a result, the WAN optimization solution must use a single-instance universal data store architecture. Some vendors will claim that a per-peer data store is actually a good feature on the dubious premise that it dedicates storage capacity for each site, and thus prevents high traffic activity in one remote site from overwriting data used to optimize traffic to other remote sites. However, this reasoning overlooks the fact that premature eviction of data is also possible with a per-peer data store -- a single client performing a very large transfer can evict data from the data store for that entire site, thus impacting optimization for all other users at that site. Under the reasonable assumption that the per-peer datastore is smaller than a single global data store, this consequence is far more likely with a per-peer data store than with a unified data store. Must support an encrypted data store Data stored on the disk drives of the WAN acceleration device can introduce a new security exposure if the disks are physically removed. For this reason the data store should be encrypted with strong encryption algorithms in order to prevent compromise of sensitive confidential information. This can be especially true if SSL-based applications are being accelerated by the WAN acceleration device. Because WAN optimization requires a symmetric deployment meaning devices are deployed at both the remote site and data center encryption should be a requirement to protect data at the branch office, where security may be inadequate. Data that the end-user had trusted would be encrypted and confidential should not be stored in clear-text format in the disk drives of the WAN acceleration device. Application-Specific Optimization Technology Must address protocol chattiness and latency issues for CIFS (Windows File Sharing) CIFS, also known as Windows File Sharing, is one of the more common application protocols seen over the WAN. The WAN optimization solution must not only address scarce bandwidth issues through data reduction and compression technologies, but it must also address latency and protocol chattiness issues associated with CIFS chatty protocol behavior. Furthermore, the WAN optimization must not only accelerate simple CIFS desktop drag & drop copy operations, but it must also accelerate more complex CIFS operations that are initiated from within applications, such as when an application user clicks the save-as button within the MS-Excel application. Must not interfere with the operation of CIFS file locks between client and server The CIFS acceleration mechanism must be transparent to CIFS file lock operation between client and server. In order to provide safe acceleration of CIFS traffic, end-to-end file locking mechanisms employed by the Windows operating system must be able to continue functioning. As a result, a WAN outage should be handled no differently from a PC being disconnected while a file operation is taking place in this case the Windows operating system will save a local backup copy of the file, and the end-user can recover normally through existing Windows file recovery processes. Note that file caches inherently intercept these file locks and use a proprietary mechanism to relay file lock information across the WAN. If a WAN disruption or other event (such as a glitch in the WAN optimization device) prevents the local and remote WAN optimization devices from communicating over the WAN, the result can be data corruption or blocked file access because of incorrect file locking Riverbed Technology. All rights reserved. 9

11 Must address latency and protocol chattiness issues for SMB-Signed CIFS traffic Some Windows hosts such as the Domain Controllers require that the CIFS traffic that they send and receive be SMB signed. Digitally signing SMB messages enables the recipient of the packets to confirm their point of origin and authenticity (that is, verifying that the packets came from the expected location and have not been modified during transit). SMB Signing does not keep data confidential; it does not cause any data to be encrypted. However, it does prevent hostile parties from adding or altering data in the connection. Many WAN optimization products are not able to deliver latency optimization for SMB signed traffic. These products are unable to deliver latency optimization and address CIFS protocol chattiness issues for Windows Domain Controllers and other Windows hosts that require SMB signing. In addition, in many environments security requirements mandate that SMB signing be used for all CIFS traffic. WAN optimization products that lack the ability to address latency and protocol chattiness issues for SMB-signed CIFS traffic will deliver only data reduction and compression benefit for these environments, but CIFS performance may still be very slow over high-latency WAN links. If your environment supports multiple Active Directory domains, then ensure that the WAN optimization product supports latency optimization of SMB signed CIFS traffic when the client and server are in different AD domains. Must address protocol chattiness and latency issues for Macintosh-based CIFS clients (OSX 10.5 and later) Macintosh workstations have recently been experiencing an increasing presence in the enterprise. Although Macintosh workstations use the same CIFS protocol that Windows machines use to access files over the network, the actual CIFS implementation in the Leopard OSX operating system has some very significant differences compared to the Windows CIFS implementation. Specifically, the Macintosh CIFS implementations (specifically the Leopard 10.5 and Snow Leopard 10.6 operating systems) use oplocks differently, and request different file attributes compared to the Windows CIFS implementation. Use of a WAN optimization product that fails to recognize these significant differences will result in very slow data transfers for certain file requests, or even worse--risk data corruption in a multi-user environment. For these reasons, it is important that the WAN optimization device have implementation-specific CIFS acceleration mechanisms engineered to recognize and optimize Macintosh traffic, in order to avoid further slowing it down or potentially risking data corruption. Must address protocol chattiness and latency issues for Exchange/MAPI The WAN optimization solution must be able to not only reduce bandwidth consumption through compression and disk-based data reduction techniques, but also address latency and protocol chattiness issues associated with the chatty Exchange/MAPI protocol. Exchange is one of the more common applications used over the WAN; acceleration of Exchange/MAPI traffic allows consolidation of Exchange servers to central data centers, thus saving cost, improving backup and data protection processes, and increasing overall IT efficiency. Must address protocol chattiness and latency issues for Exchange 2003/MAPI2003 When an Outlook 2003 client connects to an Exchange 2003 server, chatty protocol behavior will slow down transfer performance, although the slow performance can be masked if Outlook Cache Mode is used. Exchange 2003 uses a different version of the MAPI protocol than earlier Exchange servers. WAN optimization products that claim to optimize Exchange/MAPI do not necessarily optimize Exchange 2003/MAPI2003, because the latter uses a different protocol. Must address protocol chattiness and latency issues for Exchange 2007/MAPI2007 When an Outlook 2007 client connects to an Exchange 2007 server, chatty protocol behavior will slow down transfer performance, although the slow performance can be masked if Outlook Cache Mode is used. Exchange 2007 uses a different version of the MAPI protocol than earlier Exchange servers. WAN optimization products that claim to optimize Exchange2003/MAPI2003 do not necessarily optimize Exchange 2007/MAPI2007, because the latter uses a different protocol Riverbed Technology. All rights reserved. 10

12 Must address protocol chattiness and latency issues for encrypted MAPI for Exchange 2003/2007 The default configuration for Exchange 2007 automatically encrypts Exchange attachments. Previous versions of Exchange also have the ability to encrypt MAPI attachments. Most WAN optimization product require that Exchange encryption be disabled, but this obviously reduces the amount of security for end-users. To avoid any increased security exposure, the WAN optimization solution must be able to provide compression, data deduplication, and latency optimization for Exchange 2003 or 2007 even when encryption for Exchange is enabled. Must support cross-protocol data recognition and data reduction for Exchange/MAPI Exchange 5.5, Exchange 2003, and Exchange 2007 servers all encode their attachments before sending them to the Outlook client, even when Exchange encryption is not enabled. Because of the Exchange special encoding, the original byte-patterns of the file are changed when they are viewed over the network. As a result, the byte-patterns for the encoded attachment are different than if the same file was sent using a different protocol such as CIFS, HTTP, or FTP. A WAN optimization device must first undo the encoding before applying data reduction algorithms, if the byte patterns of the file are to be stored and recognized in their native format. This approach allows the WAN optimization device to deliver cross-protocol data recognition and data reduction. For example, when an attachment is initially retrieved by the Outlook client from an Exchange server, it will also be accelerated when that attachment is then sent over for the first time using CIFS or FTP. If a WAN optimization device applies data reduction algorithms to the file attachment s encoded form, then the WAN optimization device cannot deliver cross-protocol data reduction because the data had initially been stored and recognized in its encoded format by that WAN optimization device. Must address protocol chattiness and latency issues for Lotus Notes Lotus Notes client interactions with the Lotus Notes server involves some chatty protocol behavior, particularly when sending attachments. Slow performance results in high-latency WAN environments. Must address protocol chattiness and latency issues for NFS version 3 Environments with Unix hosts often use NFS to transfer files across the WAN. If your environment includes Unix-based workstations and servers, then you may want to include NFS protocol optimization to your requirements. Must address protocol chattiness and latency issues for enterprise web applications Simple web applications and static web pages generally perform well with WAN optimization solutions that deliver disk-based compression and data reduction mechanisms. However, more complex enterprise-class business applications often exhibit chatty behavior when accessing various web objects needed to populate a given web page. If your environment includes such applications (e.g., Siebel, Oracle, SAP, etc ), then a feature that pre-fetches web objects and addresses latency-related performance issues for enterprise web applications should be one of your requirements. Note that the capabilities to optimize web applications must go beyond just compression and data deduplication of the HTTP data traveling through the WAN. Chatty behavior that results from the web client serially fetching large numbers of web objects from busy web pages can result in very slow performance in high-latency WAN environments. The WAN optimization product must be able to address these impacts. Due to the diversity in the design and implementation of web applications (e.g., static or dynamic pages, with or without cookies, small objects or large objects, different authentication methods), no single latency optimization is consistently effective for all types of web applications. Rather, a diverse set of different HTTP latency optimizations have the best potential to optimize different web applications. As a result, the HTTP optimization feature should include multiple different optimizations such as parse-and-prefetch, URL learning, or object caching. For the same reason, it should be possible to selectively enable/disable different HTTP optimization mechanisms on a per-server basis. Must address protocol chattiness and latency issues for SSL encrypted applications SSL-encrypted web traffic comprises an increasing portion of today s enterprise network traffic. The traffic must not only be encrypted for confidentiality, but also authenticated to ensure the data comes from the correct source. Unfortunately, these requirements also prevent many WAN acceleration solutions from accelerating SSL traffic, because the encrypted traffic has been scrambled and any repetitive data patterns have been hidden in the encrypted data stream. However, there are some WAN optimization solutions available that are now able to securely terminate the security layer in a safe manner, without compromising security. Once they can access the underlying clear-text data, WAN optimization algorithms and techniques can now be applied before the traffic is re-encrypted for delivery over the WAN. If the SSL-encrypted traffic in your network is slow due to bandwidth and latency issues in the WAN, then consider adding a 2009 Riverbed Technology. All rights reserved. 11

13 requirement for the WAN optimization device to accelerate the traffic in a safe and secure manner, without disrupting the existing trust model. Configuration of SSL optimization should not require explicit manual entry of the SSL server IP addresses by the administrator. In order to support large environments with many SSL servers, the WAN optimization solution should automatically detect the IP address of each individual SSL server. Must address encoding processes for Oracle Forms application data Oracle 11i and 12 E-Business Suite, also known as Oracle Forms, uses a proprietary encoding method that transforms the original application data when it is transported over the network. The WAN optimization solution should dynamically recognize Oracle Forms applications, and perform decoding of the application data prior to its applying data reduction algorithms. This allows the WAN optimization device to recognize common byte-level data patterns and to effectively perform data reduction algorithms. Those WAN acceleration devices without this capability will not be able to recognize common byte-level data patterns, because the application data has been scrambled through a special encoding process by Oracle Forms. The WAN optimization solution must be able to support all of the different modes for Oracle E-Business Suite, including JInitiator (also known as native or sockets mode), JRE, HTTP, and HTTPS mode. Must fully optimize encrypted and compressed Citrix ICA traffic optimization without requiring server or client configuration changes Many organizations using Citrix XenApp have struggled with the performance and feasibility of delivering desktop virtualization across the WAN. The resulting performance issues impact employee productivity and application usability. To address these issues, the WAN optimization device must be able to optimize Citrix ICA traffic and consistently deliver superior data reduction compared to the default compression capabilities provided by the Citrix XenApp presentation server. Citrix ICA optimization must include the capability to dynamically disable the XenApp server s default encryption and compression so that the WAN optimization device can dynamically apply its own advanced data reduction algorithms to the raw Citrix ICA data. Manual reconfiguration of the XenApp presentation server should not be necessary, as the WAN optimization device should be able to interact with the proprietary API s of the XenApp server to disable the default compression and encryption. Full optimization of Citrix ICA traffic also requires specific QoS capabilities, which are described earlier in this document. Must address protocol chattiness for Windows print traffic Windows print traffic across the WAN can not only be affected by bandwidth constraints, but also latency issues. The WAN optimization solution must address the chatty protocol behavior that exists in Windows print traffic, in order to facilitate printing of documents over the WAN. Management Must have a central manager capability available Management is an important issue when scaling a solution. As more sites deploy the WAN optimization solution, it is important to have a central manager capability, in order to monitor the health and performance of large numbers of remote appliances. The central manager must be able to store configuration files and software images. These will be handy whenever the need to replace a given hardware device comes up, as the configuration file and software image can then be pushed out to the replacement hardware. Central manager must be optional, not required Often, there will be a need to deploy in limited environments, where only two devices one at each site are involved. In these cases, use of a central manager should be optional, not required. A central manager in a limited 2-3 site deployment not only raises cost, but also increases administrative burden and complexity for what should be a very simple deployment. In very large networks, processes and custom tools built around scripting, statistics export, and SNMP may be a better fit for the organization. In such a situation a mandatory central manager is not just an unfortunate waste of money, but may become a point at which the organization s preferred management system is undercut Riverbed Technology. All rights reserved. 12

14 Must support the capability to host virtualized 3 rd -party software applications The capability to host virtualized 3 rd -party software applications on the WAN optimization device allows additional server hardware in the branch office to be removed. If the WAN optimization device cannot host these services, then separate server hardware may have to be maintained at the branch office to support these services. Examples of these software applications include print server, Windows Active Directory, DNS, DHCP, multimedia streaming server, and various security software capabilities. The WAN optimization device must be able to host each of these services in a virtualized partition. Multiple virtual partitions must be supported, allowing multiple separate software packages to be hosted and active simultaneously. The virtualization feature must support flexible routing of data between and among the virtual software partitions and the WAN optimization mechanism. It must support 3 rd -party applications that must interact with the data stream before and/or after the data has been processed for WAN optimization. For example, firewalls may need to access the data stream before it is processed for WAN optimization, in order to inspect the original clear-text data stream for threats; the same firewall may need to access the data stream after it is processed for WAN optimization in order to deliver secure VPN tunneling services over the Public Internet. Similar requirements may exist for virtualized network monitoring applications, that need to receive a copy of the data stream through a virtual span port. In addition, the virtualization should use proven hypervisor technology from a leading vendor such as VMWare. The technology should be licensed and jointly supported by the virtualization software vendor. Open-source virtualization software should be avoided, as there is little or no accountability for such software. About Riverbed Riverbed Technology is the IT infrastructure performance company. The Riverbed family of wide area network (WAN) optimization solutions liberates businesses from common IT constraints by increasing application performance, enabling consolidation, and providing enterprise-wide network and application visibility all while eliminating the need to increase bandwidth, storage or servers. Thousands of companies with distributed operations use Riverbed to make their IT infrastructure faster, less expensive and more responsive. Additional information about Riverbed (NASDAQ: RVBD) is available at Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA Tel: (415) Riverbed Technology Ltd. 1, The Courtyard, Eastern Rd. Bracknell, Berkshire RG12 2XB United Kingdom Tel: Riverbed Technology Pte. Ltd. 391A Orchard Road #22-06/10 Ngee Ann City Tower A Singapore Tel: Riverbed Technology K.K. Shiba-Koen Plaza Building 9F 3-6-9, Shiba, Minato-ku Tokyo, Japan Tel: Riverbed Technology. All rights reserved. 13

WAN Optimization. Riverbed Steelhead Appliances

WAN Optimization. Riverbed Steelhead Appliances WAN Optimization Riverbed Steelhead Appliances Steelhead appliances deliver the highest performance and the most scalable wide-area data services solution available, overcoming both bandwidth and latency

More information

Optimizing Thin-client Traffic over the WAN

Optimizing Thin-client Traffic over the WAN Optimizing Thin-client Traffic over the WAN OPTIMIZING THIN-CLIENT TRAFFIC OVER THE WAN Introduction Thin-client traffic is a large and growing component of many enterprise network environments. Examples

More information

Optimizing Thin-client Traffic over the WAN WHITE PAPER

Optimizing Thin-client Traffic over the WAN WHITE PAPER Optimizing Thin-client Traffic over the WAN WHITE PAPER OPTIMIZING THIN-CLIENT TRAFFIC OVER THE WAN Introduction Thin-client traffic is a large and growing component of many enterprise network environments.

More information

WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed

WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

How Network Transparency Affects Application Acceleration Deployment

How Network Transparency Affects Application Acceleration Deployment How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration

More information

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Cisco Wide Area Application Services (WAAS) Software Version 4.0 Cisco Wide Area Application Services () Software Version 4.0 Product Overview Cisco Wide Area Application Services () is a powerful application acceleration and WAN optimization solution that optimizes

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

PRODUCTS & TECHNOLOGY

PRODUCTS & TECHNOLOGY PRODUCTS & TECHNOLOGY DATA CENTER CLASS WAN OPTIMIZATION Today s major IT initiatives all have one thing in common: they require a well performing Wide Area Network (WAN). However, many enterprise WANs

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of

More information

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...

More information

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is

More information

Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization

Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization Microsoft Exchange 2010 /Outlook 2010 Performance with Riverbed WAN Optimization A Riverbed whitepaper Riverbed participated in an early Microsoft TAP program to validate interoperability for Exchange

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

How To Use The Cisco Wide Area Application Services (Waas) Network Module

How To Use The Cisco Wide Area Application Services (Waas) Network Module Cisco Wide Area Application Services (WAAS) Network Module The Cisco Wide Area Application Services (WAAS) Network Module for the Cisco Integrated Services Routers (ISR) is a powerful WAN optimization

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

AppDirector Load balancing IBM Websphere and AppXcel

AppDirector Load balancing IBM Websphere and AppXcel TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT

More information

How To Migrate To A Network (Wan) From A Server To A Server (Wlan)

How To Migrate To A Network (Wan) From A Server To A Server (Wlan) The Role of WAN Optimization in Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use

More information

Best Practices for Deploying WAN Optimization with Data Replication

Best Practices for Deploying WAN Optimization with Data Replication Best Practices for Deploying WAN Optimization with Data Replication Keys for Successful Data Protection Across the WAN The Weak Link in data Protection All too often, the Wide Area Network (WAN) link is

More information

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate

More information

WanVelocity. WAN Optimization & Acceleration

WanVelocity. WAN Optimization & Acceleration WanVelocity D A T A S H E E T WAN Optimization & Acceleration WanVelocity significantly accelerates applications while reducing bandwidth costs using a combination of application acceleration, network

More information

How To Choose A Wan Optimization Controller

How To Choose A Wan Optimization Controller How to Pick the Right WAN Optimization Solution for Your Organization 3 April 2013 ID:G00250203 Analyst(s): Bjarne Munch VIEW SUMMARY WAN optimization controllers continue to have significant differences

More information

The Ultimate Guide to Gaining Control of the WAN

The Ultimate Guide to Gaining Control of the WAN LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

WAN Optimization with Cisco s WAAS

WAN Optimization with Cisco s WAAS WAN Optimization with Cisco s WAAS May 2007 Introduction Choosing the best WAN optimization solution for branch office consolidation and acceleration can be challenging due to the wide range of solutions

More information

The Next Generation of Wide Area Networking

The Next Generation of Wide Area Networking The Next Generation of Wide Area Networking Introduction As pointed out in The 2014 State of the WAN Report 1, the vast majority of WAN traffic currently uses either the Internet or MPLS. Since the Internet

More information

Cisco Wide Area Application Services (WAAS) Software Version 4.1

Cisco Wide Area Application Services (WAAS) Software Version 4.1 Cisco Wide Area Application Services (WAAS) Software Version 4.1 Product Overview Cisco Wide Area Application Services (WAAS) Software is a comprehensive WAN optimization solution that accelerates applications

More information

AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY

AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY TABLE OF CONTENTS Understanding WAN Challenges 2 Network Memory - Maximize Bandwidth Efficiency 2 Network Integrity - Overcome Congestion and Packet

More information

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Building a better branch office. www.citrix.com

Building a better branch office. www.citrix.com Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch

More information

ishaper Unified Appliance for the Next Generation Branch Office ishaper Packeteer. Great Performance for Every Application at Every Location.

ishaper Unified Appliance for the Next Generation Branch Office ishaper Packeteer. Great Performance for Every Application at Every Location. ishaper Fast WAN. Fast Apps. Fast Business. ishaper Unified Appliance for the Next Generation Branch Office Packeteer ishaper marries the best of real-time WAN optimization, monitoring and shaping with

More information

Desktop virtualization and the branch office. Optimizing virtual desktops and applications to the branch office VDI. www.citrix.

Desktop virtualization and the branch office. Optimizing virtual desktops and applications to the branch office VDI. www.citrix. Desktop virtualization and the branch office White Paper Optimizing virtual desktops and applications to the branch office VDI www.citrix.com Introduction The challenge of managing applications and desktop

More information

WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput.

WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput. BUSINESS SOLUTIONS Pumping up the WAN WAN optimization and acceleration products reduce cost and bandwidth requirements while speeding throughput. Today s data center managers are looking for improvement

More information

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS acelera WAN optimization controllers accelerate applications, speed data transfers and reduce bandwidth costs using a combination

More information

WAN Optimization and Cloud Computing. Josh Tseng, Riverbed

WAN Optimization and Cloud Computing. Josh Tseng, Riverbed WAN Optimization and Cloud Computing Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection

More information

Riverbed vs. Juniper WXOS/JWOS

Riverbed vs. Juniper WXOS/JWOS COMPETITIVE BRIEF 1 Riverbed vs. Juniper WXOS/JWOS Introduction More than 15,000 customers have purchased and deployed Riverbed WAN optimization solutions in their production networks. Although Juniper

More information

OPTIMIZING THE NETWORK FOR APPLICATIONS

OPTIMIZING THE NETWORK FOR APPLICATIONS OPTIMIZING THE NETWORK FOR APPLICATIONS Intelligent WAN and network optimization technology allow organizations to more effectively use enterprise networks as demands on bandwidth grow. Enterprises use

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

white paper AN OVERVIEW OF SILVER PEAK S VXOA TECHNOLOGY REAL-TIME TECHNIQUES FOR OVERCOMING COMMON WAN BANDWIDTH, DISTANCE AND CONGESTION CHALLENGES

white paper AN OVERVIEW OF SILVER PEAK S VXOA TECHNOLOGY REAL-TIME TECHNIQUES FOR OVERCOMING COMMON WAN BANDWIDTH, DISTANCE AND CONGESTION CHALLENGES AN OVERVIEW OF SILVER PEAK S VXOA TECHNOLOGY REAL-TIME TECHNIQUES FOR OVERCOMING COMMON WAN BANDWIDTH, DISTANCE AND CONGESTION CHALLENGES AN OVERVIEW OF SILVER PEAK S VXOA TECHNOLOGY REAL-TIME TECHNIQUES

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

Important Considerations for Cisco WAAS in Large-Scale Enterprise Deployments

Important Considerations for Cisco WAAS in Large-Scale Enterprise Deployments Important Considerations for Cisco WAAS in Large-Scale Enterprise Deployments January 2012 IMPORTANT CONSIDERATIONS FOR CISCO WAAS IN LARGE-SCALE ENTERPRISE DEPLOYMENTS Many vendors offer seemingly-comparable

More information

Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration

Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration A Dell Technical White Paper Abstract This technical report details the benefits that Silver Peak s replication

More information

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS

MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS MOVE AT THE SPEED OF BUSINESS. a CELERA DATASHEET WAN OPTIMIZATION CONTROLLERS acelera WAN optimization controllers accelerate applications, speed data transfers and reduce bandwidth costs using a combination

More information

STEELHEAD PRODUCT FAMILY

STEELHEAD PRODUCT FAMILY RIVERBED STEELHEAD PRODUCT FAMILY IMPROVE PRODUCTIVITY ANd ENABLE GLOBAL COLLABORATION Today, tens of thousands of organizations rely on WAN optimization as the foundation for delivering application and

More information

The Role of WAN Optimization in Cloud Infrastructures

The Role of WAN Optimization in Cloud Infrastructures The Role of WAN Optimization in Cloud Infrastructures Josh Tseng, Riverbed Technology Author: Josh Tseng, Riverbed Technology SNIA Legal Notice The material contained in this tutorial is copyrighted by

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Cisco Virtual Wide Area Application Services: Technical Overview

Cisco Virtual Wide Area Application Services: Technical Overview Cisco Virtual Wide Area Application Services: Technical Overview What You Will Learn Organizations are offering private and virtual private cloud-based application delivery over the WAN to their end users

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Executive Summary Organizations

More information

Data Center Real User Monitoring

Data Center Real User Monitoring Data Center Real User Monitoring WAN Optimization Getting Started Release 12.2.0 Please direct questions about Data Center Real User Monitoring or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support

More information

Solution Brief. Solving Application Performance Problems with Managed WAN Optimization. Vicki Jones Senior Product Manager Global Crossing

Solution Brief. Solving Application Performance Problems with Managed WAN Optimization. Vicki Jones Senior Product Manager Global Crossing Solution Brief Solving Application Performance Problems with Managed WAN Optimization Vicki Jones Senior Product Manager Global Crossing January 2010 A ssuring good performance for applications delivered

More information

Health Check+ Report

Health Check+ Report Health Check+ Report Created for Riverbed Elite Partner Riverbed Authorized Support Partner Riverbed Authorized Training Partner Riverbed Authorized Consulting Partner Page 2 of 69 Contents Introduction...

More information

Features. Key benefits. HDX WAN optimization. QoS

Features. Key benefits. HDX WAN optimization. QoS Citrix CloudBridge and Branch Repeater Datasheet CloudBridge and Branch Repeater Accelerates, controls and optimizes applications to all locations datacenter, branch offices, public and private clouds

More information

FatPipe Networks Network optimisation and link redundancy for satellite communications

FatPipe Networks Network optimisation and link redundancy for satellite communications FatPipe Networks Network optimisation and link redundancy for satellite communications Next generation WAN acceleration Version 01 rev 05 Gregory Fedyk Regional Director UK/IRE, France and Benelux Isik

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

Preparing Your IP network for High Definition Video Conferencing

Preparing Your IP network for High Definition Video Conferencing White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Deliver Secure and Accelerated Remote Access to Applications

Deliver Secure and Accelerated Remote Access to Applications DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application

More information

UNIFIED PERFORMANCE MANAGEMENT

UNIFIED PERFORMANCE MANAGEMENT UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution

More information

Best Practices in Legal IT. How to share data and protect critical assets across the WAN

Best Practices in Legal IT. How to share data and protect critical assets across the WAN Best Practices in Legal IT How to share data and protect critical assets across the WAN Agenda Requirements for Data Center outsourcing Timothy Titus, Director of Managed Network Services Overcoming WAN

More information

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

Silver Peak s Virtual Acceleration Open Architecture (VXOA) Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,

More information

Clouds, Performance Platforms, and Agility Mark Stuart Day Riverbed Technology

Clouds, Performance Platforms, and Agility Mark Stuart Day Riverbed Technology Clouds, Performance Platforms, and Agility Mark Stuart Day Riverbed Technology Some hot questions 2 Will all IT migrate to the cloud? Will cloud services eliminate all concerns about performance and scale?

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

PREPARED FOR ABC CORPORATION

PREPARED FOR ABC CORPORATION NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY

More information

Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER

Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more

More information

Fundamental Approaches to WAN Optimization. Josh Tseng, Riverbed

Fundamental Approaches to WAN Optimization. Josh Tseng, Riverbed Fundamental Approaches to WAN Optimization Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large

More information

Optimizing Performance for Voice over IP and UDP Traffic

Optimizing Performance for Voice over IP and UDP Traffic A Riverbed Technology White Paper OPTIMIZING PERFORMANCE FOR VOICE OVER IP AND UDP TRAFFIC Optimizing Performance for Voice over IP and UDP Traffic 2006 Riverbed Technology, Inc. All rights reserved. 0

More information

Optimization of Citrix ICA with Steelhead Appliances and RiOS 6.0 WHITE PAPER

Optimization of Citrix ICA with Steelhead Appliances and RiOS 6.0 WHITE PAPER Optimization of Citrix ICA with Steelhead Appliances and RiOS 6.0 WHITE PAPER INTRODUCTION Desktop virtualization architectures enable enterprises to host their applications and data centrally and to access

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Riverbed Optimization System (RiOS) 6.0

Riverbed Optimization System (RiOS) 6.0 WHITE PAPER Riverbed Optimization System (RiOS) 6.0 A Technical Overview TABLE OF CONTENTS Introduction... 2 Why Customers Choose Riverbed... 3 The RiOS TCP-Proxy Architecture... 3 Application-independent

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

Remote IT Infrastructure Consolidation

Remote IT Infrastructure Consolidation A Riverbed Technology White Paper REMOTE IT INFRASTRUCTURE CONSOLIDATION Remote IT Infrastructure Consolidation The 3 Barriers to Centralizing Remote Infrastructure 2006 Riverbed Technology, Inc. All rights

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Cisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture

Cisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture White Paper Cisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture What You Will Learn Enterprises face numerous challenges in the delivery of applications and critical business data to the

More information

Application acceleration and WAN optimization

Application acceleration and WAN optimization WIDE AREA NETWORKS Buyer s Guide To Application Acceleration: Ten Questions To Ask Every Vendor Robin Layland Enterprises needs are different. Vendors products are different. How do you go about matching

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability

More information

Essential IT Guide: Ensuring Highly Available Access to Business-critical Applications

Essential IT Guide: Ensuring Highly Available Access to Business-critical Applications White Paper Essential IT Guide: Ensuring Highly Available Access to Business-critical Applications Supporting Branch-office and Remote Users in a Centralized World Juniper Networks, Inc. 1194 North Mathilda

More information

FIVE WAYS TO OPTIMIZE OFFSITE DATA STORAGE AND BUSINESS CONTINUITY

FIVE WAYS TO OPTIMIZE OFFSITE DATA STORAGE AND BUSINESS CONTINUITY FIVE WAYS TO OPTIMIZE OFFSITE DATA STORAGE AND BUSINESS CONTINUITY A WAN OPTIMIZATION PRIMER FOR STORAGE PROFESSIONALS FIVE WAYS TO OPTIMIZE OFFSITE DATA STORAGE AND BUSINESS CONTINUITY A WAN OPTIMIZATION

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

Executive summary. Introduction Trade off between user experience and TCO payoff

Executive summary. Introduction Trade off between user experience and TCO payoff Virtual desktop White Paper How fast is my virtual desktop? Delivering a high definition desktop experience to branch office users with Citrix Branch Repeater DVI www.citrix.com Executive summary Emerging

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

Certes Networks Layer 4 Encryption. Network Services Impact Test Results Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over

More information