Mobile Session Persistence



Similar documents
Comparing Mobile VPN Technologies WHITE PAPER

Deploying Netmotion Mobility In The Utility Industry

POLICY MANAGEMENT MODULE

Disaster Recovery White Paper

Managing Mobile Devices Over Cellular Data Networks

Mobility XE: Your Only Remote-Access VPN Seven Key Advantages to Consider

Seamless Roaming in a Remote Access VPN Environment

Wireless Network Quality of Service WHITE PAPER

SGUL VPN Connection Guide for Windows 10

Deploying a Secure Wireless VoIP Solution in Healthcare

MN-700 Base Station Configuration Guide

MOBILITY AND MOBILE NETWORK OPTIMIZATION

N300 WiFi Range Extender

Enterprise Mobility in the Telecommunications Industry

HEALTHCARE MOBILITY BEST PRACTICES

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Cisco AnyConnect Secure Mobility Solution Guide

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services

AC750 WiFi Range Extender

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

Using Entrust certificates with VPN

Layer-2 Design: Link Balancers Simplified

HIGH AVAILABILITY FOR BUSINESS- CRITICAL PROCESSES WITH VIPRINET

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills, CA USA White Paper

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

Aventail Connect Client with Smart Tunneling

Top IT Pain Points: Addressing the bandwidth issues with Ecessa solutions

Initial Access and Basic IPv4 Internet Configuration

Link Layer and Network Layer Security for Wireless Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

NetSpective Global Proxy Configuration Guide

Using a VPN with Niagara Systems. v0.3 6, July 2013

MANAGING ENTERPRISE MOBILITY

DEPLOYMENT GUIDE DEPLOYING F5 WITH VMWARE VIRTUAL DESKTOP INFRASTRUCTURE (VDI)

SiteCelerate white paper

Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance

Field Inspection Remote Access Comparison

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008

Digi Connect WAN Application Helper Configuring and Testing the Digi Connect WAN GSM

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router

MAKING THE RIGHT CONNECTIONS

Best Practices for Outdoor Wireless Security

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

Chapter 1 Configuring Internet Connectivity

Chapter 2 Configuring Your Wireless Network and Security Settings

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Virtual Data Centre. User Guide

Guideline for setting up a functional VPN

Mobile SCTP Transport Layer Mobility Management for the Internet

IP Address and Pre-configuration Information

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Wireless Networking for Small Businesses, Branches and Home Offices

Outgoing VDI Gateways:

Barracuda Link Balancer

How To Configure SSL VPN in Cyberoam

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

The Gateway to a Better Vehicle Area Network. Key considerations when evaluating laptops as communications hubs for in-vehicle communications

Wireless e-business by IBM Wireless Local Area Networks

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE

Computer Networking Networks

AnyConnect VPN Client FAQ

Chapter 5. Data Communication And Internet Technology

RedundancyMaster Help Kepware Technologies

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

WatchGuard Mobile User VPN Guide

Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide

Deploying the BIG-IP System v10 with VMware Virtual Desktop Infrastructure (VDI)

THE WINDOWS AZURE PROGRAMMING MODEL

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

SSL-VPN 200 Getting Started Guide

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Link Layer and Network Layer Security for Wireless Networks

Columbitech Mobile VPN

DMZ Network Visibility with Wireshark June 15, 2010

GlobalSCAPE DMZ Gateway, v1. User Guide

Ruckus Wireless SmartZone Controller. What s New in Release 3.2

DigiDelivery Client Quick Start

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

Security Awareness. Wireless Network Security

JARGON BUSTER CONNECTING WALES

FatPipe Networks

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Demystifying Wi-Fi Roaming

Transcription:

I N D U S T R Y I N S I G H T Mobile Session Persistence What It Is, Why It Matters, How It Works Prepared by NetMotion Wireless w w w. N e t M o t i o n W i r e l e s s. c o m

Executive Summary Mobile computing delivers higher productivity, but achieving the full benefit requires a user experience that matches an in-the-office experience. Unlike wired networks, however, wireless networks are not continuously available. The ability to deliver applications reliably over those unreliable networks is termed persistence. Makers of Virtual Private Network (VPN) software use different approaches to achieving persistence, but only a mobile VPN that offers full application session persistence can duplicate what computer users experience in the office. A Wired-Network Experience for Mobile Workers Mobile computing promises increased productivity by giving workers in the field access to the same applications they use in the office. Key to this in the office experience is reliable application performance over the wireless WAN. However, compared to high-speed Ethernet networks, wireless WANs transmit data at slower speeds, with higher error rates, higher latency, and more jitter. As a mobile device roams from network to network, its IP address changes. And as it moves through coverage gaps it is only intermittently available. Line-of-business applications that are not specifically designed for a mobile environment become unstable, resulting in lost or corrupt data and ultimately decreasing the productivity of the mobile workforce. The ability of an application or technology to overcome these differences and enable the reliable transmission of application data over unreliable networks is referred to as persistence. Definitions of Persistence Many VPN vendors talk about persistence, and there are three basic ways in which the term is used when describing a mobile VPN. Each approach has its value, but only application session persistence maintains the in-office experience mobile workers require to be productive. The three basic approaches are: 1. Persistence of Browser Sessions Browser-session persistence is applicable to browser-based SSL VPNs. This approach is similar to e-commerce applications that remember the contents of a shopping cart between visits. It works by setting session cookies in the browser so that if users close their browsers or they go to another Web site, they can resume VPN sessions by simply returning to the SSL gateway. Persistence of this type is limited to applications available through a Web portal; it does nothing to address the needs of organizations that deploy more sophisticated line-of-business applications. Real Results: Grange Insurance Speeds Claims Processing Grange adjusters use Mobility XE as the foundation for accessing claims, estimating applications, and uploading photographs while in the field. Our mobile claims associates need a stable and reliable environment with constant access to their applications. With NetMotion we are able to ensure our consistent performance in and out of coverage areas. Butch Knowlton Manager of Claims Projects & Business Analysis Page 2

2. Persistence of an IP Address IP-address persistence is typically enabled by protocols such as MobileIP. It solves a fundamental VPN routing problem: how can traffic be sent to a remote client when that client roams from network to network and the client s real IP address changes? While the persistence of an IP address solves a routing issue, it does nothing to preserve the integrity of data being sent as those addresses change, nor does it solve the problems associated with gaps in network coverage and performance issues that are common in even the most robust wireless networks. 3. Persistence of Application Sessions Application-session persistence shields applications from changes in the network environment by intercepting network calls and proxying those calls through a dedicated server on the core network. With this approach, application-session state and data integrity are maintained through address changes, network coverage gaps, and suspend-resume cycles without any modification to existing applications or reduction in functionality. Real Results: Adovcate Health Care sees 30% Reduction in IT Trouble Tickets Advocate installed a wireless network throughout their facilities so doctors and nurses could increase their efficiency, but they still had connectivity issues. Adding in Mobility XE, they found a sharp reduction in connectivity issues, which led to a 30% decreases in support incidents overall. Issues related to wireless connectivity have been reduced dramatically.. Mobility XE has provided us with a seamless, stable environment for our clinicians to work in. Dan Lutter Director, Field Technology Services JEA Achieves 30% Productivity Increase JEA field workers spent a lot of time trying to re-connect as they moved from location to location. Once they deployed Mobility XE, the disconnect problems disappeared. Workers log in one time, at the start of their session, and remain connected throughout the workday. The utility noted a 30% productivity increase, and more home service orders completed. Maintaining a persistent connection lets JEA workers get more work accomplished and greatly reduces the complexity of mobile computing. Bonnie Anderson Systems Administrator Page 3

Why Persistence Matters By focusing on real user scenarios, the value of application session persistence over other approaches is clear. What happens to my applications if I roam outside of network coverage? Application Performance Outside of Coverage Application Session Persistence (with Mobility XE Mobile VPN) Your IP-based applications automatically resume where they left off as soon as you come in range of network coverage, even if the application was using network resources at the moment you went out of range, or if you were out of range for an extended period of time. Browser Session Persistence You must re-authenticate to the SSL gateway. Only applications hosted on a web server resume where they left off. IP Address Persistence Data transfer between client and server stops when the network coverage goes away. The data in transit at that time is lost, and the application requires a restart. What happens if I suspend or hibernate my device during data transfers? Suspend During Data Transfer Application Session Persistence (with Mobility XE Mobile VPN) When you resume, any IP-based application automatically picks up where it left off before you suspended the device, even if the application was using network resources when you suspended or hibernated. Browser Session Persistence The data transfer fails and must be restarted. IP Address Persistence The data transfer fails and must be restarted. How long will my applications persist when I m outside of coverage? Application Persistence Outside of Coverage Application Session Persistence (with Mobility XE Mobile VPN) Your IP-based applications can persist indefinitely, although some network operating systems and applications have session timeouts that prevent indefinite persistence. (By default, Mobility XE maintains application sessions for several days.) Browser Session Persistence Applications persist only as long as the browser session cookie is valid. IP Address Persistence Applications persist only until either the client or the server attempts to make a network connection. At that point the exact behavior depends on the application itself; most become unresponsive while waiting for an answer from a resource that is no longer connected and require restarting. Application session persistence replicates the in-office experience a mobile worker needs to be productive. Without it, a significant portion of the workday will be spent working around tool limitations. Page 4

Mobility XE Mobile VPN The Mobility XE mobile VPN from NetMotion Wireless is a solution for session persistence. It persists connections through the many situations that interrupt connectivity in a mobile environment, while working with any application. The Mobility XE mobile VPN moves beyond the basic functionality provided by browser session persistence and Mobile IP. It sustains application sessions even through no-coverage zones, suspend-and-resume cycles, changes in network types (for example, from WWAN to WiMAX to WiFi), and the losses of connectivity inherent in mobile computing. When a Mobility XE user encounters a coverage gap, open application sessions are maintained until the user s network connection is re-established. If a user loses connectivity while an application is transmitting data, Mobility XE suspends the transmission for days, if necessary. As soon as connectivity is re-established, Mobility XE resumes transmitting the data at the exact point the application was interrupted. Other VPNs in these situations lose application sessions, causing data loss and corruption, and force users to log on again and restart applications. Mobility XE sustains application sessions even through no-coverage zones, suspend-and-resume cycles, changes in network types (i.e. WWAN to WiMAX to WiFi), and the losses of connectivity inherent in mobile computing How Mobility XE Achieves Persistence Instead of connecting directly with the application servers on the host network, mobile devices running the Mobility client communicate through the Mobility server. The server proxies the connections, maintains the state of each client, and whenever the client is unreachable it holds any pending data for later transmission. The Mobility server also handles the translation between the fixed virtual IP address that identifies the client on the host network, and the point-of-presence IP address that changes as the client roams between various networks. When a device loses contact with the network, the Mobility XE client works transparently with the operating system on the mobile device to keep client-side application sessions active. The Mobility client and Mobility server keep the secure VPN tunnel alive, by mutual agreement, unless one issues a disconnect. Meanwhile, the Mobility server and application servers on the host network exchange acknowledgements with each other. This keeps the application session alive and preserves the state of any transactions. When the client comes back in range, any interrupted data transfer resumes. The tunnel remains available and application sessions persist in many different scenarios: Suspending operation on the mobile device and later resuming it Moving to a different location on the network Connecting a mobile device over slow, bandwidth-challenged, or high-latency networks Encountering interference from microwaves, stairwells, elevator shafts anything that interferes with radio signals Changing network interfaces (for example, from a WLAN to a WWAN card) Moving across gaps in coverage Because Mobility XE works at the operating system level, it is hidden from the applications, and applications behave as they do on a wired network. This allows off-the-shelf applications to run without modification in the wireless environment. Page 5

Conclusion The success of any mobile VPN deployment is measured by the improved productivity of the mobile work force, and application persistence is key to achieving that success. The persistence in Mobility XE hides the complexity of the underlying wireless networks from applications. With Mobility XE, critical business applications just work and mobile workers can get more done. Learn More For a more in-depth look at how Mobility XE compares to competing VPN technologies, read the NetMotion Wireless white paper Comparing Mobile VPN Technologies. To learn more about the underlying technology of Mobility XE and how it achieves full application session persistence, read the Technical Overview for System Administrators. For more information about best practices in mobility deployments, please visit www.netmotionwireless.com 2011 NetMotion Wireless, Inc. All rights reserved. Page 6