MOBILITY AND MOBILE NETWORK OPTIMIZATION



Similar documents
Deploying Netmotion Mobility In The Utility Industry

Comparing Mobile VPN Technologies WHITE PAPER

Wireless Network Quality of Service WHITE PAPER

POLICY MANAGEMENT MODULE

MANAGING ENTERPRISE MOBILITY

NETMOTION WIRELESS LOCALITY PRODUCT GUIDE

Managing Mobile Devices Over Cellular Data Networks

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

The Problem with TCP. Overcoming TCP s Drawbacks

HyperIP : VERITAS Replication Application Note

Protocol Data Units and Encapsulation

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

Frequently Asked Questions

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

SiteCelerate white paper

TCP for Wireless Networks

Enterprise Mobility in the Telecommunications Industry

Optimizing Performance for Voice over IP and UDP Traffic

Ethernet. Ethernet. Network Devices

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

Per-Flow Queuing Allot's Approach to Bandwidth Management

High Performance VPN Solutions Over Satellite Networks

Mobile Computing/ Mobile Networks

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

The OSI and TCP/IP Models. Lesson 2

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

SwiftBroadband and IP data connections

TECHNICAL CHALLENGES OF VoIP BYPASS

Galileo International. Firewall & Proxy Specifications

NETWORK LAYER/INTERNET PROTOCOLS

The BANDIT Device in the Network

Requirements of Voice in an IP Internetwork

Mobility XE: Your Only Remote-Access VPN Seven Key Advantages to Consider

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

Computer Networks CS321

Protocols and Architecture. Protocol Architecture.

Overview of Computer Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

TamoSoft Throughput Test

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Using Remote Desktop Software with the LAN-Cell

Application Note: Onsight Device VPN Configuration V1.1

Cisco Application Networking for Citrix Presentation Server

Strategies for Managing Cellular

LESSON Networking Fundamentals. Understand TCP/IP

Protocols. Packets. What's in an IP packet

Mobile Communications Chapter 9: Mobile Transport Layer

Improved Digital Media Delivery with Telestream HyperLaunch

Network Security TCP/IP Refresher

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Ten Best Practices for Optimizing ADC Deployments

The OSI & Internet layering models

An Introduction to VoIP Protocols

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Definition. A Historical Example

Three Key Design Considerations of IP Video Surveillance Systems

The OSI Model: Understanding the Seven Layers of Computer Networks

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

Chapter 12 Supporting Network Address Translation (NAT)

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Analysis of TCP Performance Over Asymmetric Wireless Links

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Cisco Integrated Services Routers Performance Overview

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Introduction to LAN/WAN. Network Layer (part II)

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

RFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do

How do I get to

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Encapsulating Voice in IP Packets

Clearing the Way for VoIP

2. IP Networks, IP Hosts and IP Ports

Key Components of WAN Optimization Controller Functionality

Measure wireless network performance using testing tool iperf

UPPER LAYER SWITCHING

A Dell Technical White Paper Dell PowerConnect Team

Network Management and Monitoring Software

AN OVERVIEW OF SILVER PEAK S WAN ACCELERATION TECHNOLOGY

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL

CS268 Exam Solutions. 1) End-to-End (20 pts)

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

D1.2 Network Load Balancing

A SENSIBLE GUIDE TO LATENCY MANAGEMENT

Transport Layer Protocols

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents

Transcription:

MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com

Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn a mobile deployment from a business benefit into a liability. This paper outlines some of the techniques that NetMotion Wireless s market-leading mobile VPN, Mobility, uses to optimize the performance and profitability of a mobile deployment. Data Compression Data compression is important to the overall performance of wireless networks for several reasons. Organizations that rely on cellular data networks for their business balance the costs against productivity gains and customer satisfaction. Selecting the right data plan and managing overage charges significantly improves the return on a mobile investment. By compressing data sent over the wireless network, organizations purchase smaller data plans and reduce the risk of overage charges. The cost reductions and improved efficiency fall straight to the bottom line. NetMotion s solution automatically compresses data sent over mobile networks by up to 50 percent, simultaneously improving throughput and lowering data utilization. To further improve performance, Mobility automatically disables compression when devices attach to high-speed WiFi and Ethernet networks where sending uncompressed data is faster than spend the CPU cycles to compress it. System administrators can customize compression settings, determine when it should be enabled, and whether it should be enabled globally (for all users and devices), for a group of devices, a specific device, or an individual user. For example, Mobility can be configured to automatically switch compression on or off based on the current interface speed. As a result, users roaming between highbandwidth 802.11 WiFi networks and cellular data networks automatically get the best performance possible. Mobility compresses data that is transmitted between the server and client using algorithms outlined in RFC 1951 (LZ77 Deflate/Inflate). Only the application payload of each frame is compressed the transport headers are not modified. This allows Mobility to operate through any policy enforcement equipment, such as firewalls and network address translators (NATs). It also operates over any IP-based network. Unlike other compression technologies that are associated with specific applications, the Mobility implementation is applied to all application data that traverses the Mobility tunnel. No modification or reconfiguration of the application is necessary to take advantage of this functionality. The overhead on the client and server is less than 16K of memory per Mobility connection for dictionary and other housekeeping purposes. The effectiveness of compression also varies on the type of data being sent. As outlined in RFC 1951: A simple counting argument shows that no lossless compression algorithm can compress every possible input data set. English text usually compresses by a factor of 2.5 to 3; executable files usually compress somewhat less; graphical data such as raster images may compress much more. Regardless of the actual compression ratios of the data being sent, Mobility abides by the no expansion policy as defined in RFC 1951: transmitted data does not increase in size. Packet Sizing TCP/IP packet sizes are not always optimum for wireless transmission. In a wireless environment, error rates rise and effective bandwidth decreases as users get farther away from cell towers, making errors more likely in marginal coverage areas. Sending large packets in these situations increases the probability that an entire packet has to be thrown away and re-sent whereas smaller packets may increase overall efficiency by decreasing the number of re-sends. Many network administrators are unaware that even WLANs can have substantial numbers of dropped packets. Moreover, in recent multi-day surveys of local wireless network performance, packet loss averaged 8 10 percent under good coverage conditions (4 bars). 2

The UDP protocol is much more appropriate than TCP for use over wireless networks. It avoids the overhead and inefficiencies of TCP, which was not designed with wireless networks in mind. The NetMotion Mobility Internet Mobility Protocol (IMP) rides on top of UDP and implements its own methods for guaranteeing packet delivery while dynamically adjusting both packet sizes and timing parameters for network conditions. IMP, used in conjunction with UDP, handles the far greater variety of transmission speeds and connection conditions encountered in wireless networking. Using this approach also allows IMP to apply its own compression and link optimizations, which can significantly improve the throughput over bandwidth-constrained networks. Selective Acknowledgement Algorithm When transmitting data over a wide area wireless connection, packet loss can have a severe impact on performance. When one side is transmitting a train of packets, it is quite possible for some of the frames to evaporate and never reach their ultimate destination. Mobility takes packet loss into account when sending and receiving data. Using sequence numbers, Mobility can detect whether a frame has been received out of order. If it receives a frame carrying a sequence number greater than the one it is expecting, it alerts the transmitting peer that it did not receive one or more of the frames in the sequence. The transmitting peer then retransmits the missing frame(s). In contrast, implementations without selective acknowledgment not only retransmit the missing frames, but may also re-send the frames that were correctly received by the peer. These gratuitous retransmissions waste bandwidth and processing resources. Message Coalescence Most standard network protocol implementations use acknowledgment frames as feedback to the sender that the peer has successfully received the sent packet(s). The feedback is continuous: every other frame (at most) is acknowledged, generating a stream of small control frames in the reverse direction. These extra frames, though small, can add up to significant overhead. Mobility reduces the reverse flow of information from every other frame to one in four or greater. It does this by using its selective acknowledgment policy, and adjusting its metrics for determining network latency. This allows more application-level data to be transmitted instead of using the bandwidth for additional control information. To further reduce bandwidth consumption, Mobility uses a message bundling (or multiplexing) technique. With this algorithm, both control and application data from multiple distinct message streams are passed in the same frame. Without this feature, information is encapsulated in its own frame when an application transmits data. As more connections are established, more protocol overhead is required. By bundling flows together, Mobility fills the frames, making significantly better use of bandwidth. Reduced and Synchronized Retransmissions Much of the poor performance over WWAN links can be attributed to retransmission policies that are overaggressive. Most IP implementations have been tuned to work in high-bandwidth, low-loss environments (like wired infrastructures). But wireless wide area connections experience variable latency, which can easily be misconstrued by normal implementations as packet loss. The transport protocol then incorrectly retransmits a copy of a previous frame. 3

This retransmission affects performance in two ways: Duplicate data is forwarded over an already bandwidth-challenged link. This unnecessary transmission consumes the precious resources of a limited pipe and delays transmission of new data and the acknowledgments for data that has already been transmitted. When a transport retransmits a frame, it normally assumes that network congestion has caused the loss and employs a back-off algorithm, reducing the total amount of data that can be transmitted at any one time. By increasing the actual retransmission time when a frame is really lost, the recovery time may be significantly increased, thus reducing overall performance for no good reason. This can result in a spiraling effect, further reducing the transmission of data to an almost stop-and-wait exchange. Mobility uses many heuristics beyond the standard round-trip calculation to determine network latency. These extra calculations allow Mobility to adjust more rapidly to varying latency and the other conditions that wireless networks exhibit. Mobility significantly reduces the amount of duplicate data that is sent, allowing more application data to fit into the communications pipe. A simple but effective example of these heuristics is Mobility s synchronized retransmission policy. Typically, when a frame is transmitted, a timeout is set for when an acknowledgment for the frame should be received. If the acknowledgment has not been received, transports often blindly submit another copy of the frame. But when Mobility decides to retransmit a frame, it checks to see if the underlying network layer has processed the previous copy of the frame. If not, it delays submitting another copy. If a mobile device is temporarily out of range, for example, there is no need to send another copy if the previous one has not yet left the local system. Another example of Mobility s advanced features is its ability to share information about the link characteristics across all application-level connections. Here s how typical transport implementations operate: As each application creates a connection to a peer, the transport mechanism determines the characteristics of the link. Once this information is gathered, performance increases. But it takes time for enough application data (possibly upwards of 64k) to be passed through the link. When the connection is terminated, all the learned information is lost. In contrast, Mobility does the following: Mobility retains the learned information; if an application starts another connection, it starts out using the tuned parameter settings. When Mobility roams from one network interconnect to another, the new characteristics are applied to all active connections at once. Each connection does not need to go through the exercise of recalculating these values, possibly causing more retransmissions. 4

Packet Fragmentation IP packet fragmentation is regarded by the networking community as a necessary evil that squanders resources in a number of ways, including: Intervening systems (for example, a router) must do further processing on fragmented frames instead of just forwarding them to their ultimate destination. It consumes significant resources on the receiving system to reassemble a frame. If any part of the fragmented frame is lost, the entire frame must be retransmitted again. There is a maximum message size that can be transferred across a network. When roaming between networks, the maximum size may change. When a user roams from one network to another, and periodically while connected, Mobility probes the network to discover what that maximum message size is and adjusts accordingly. If the application submits a request to send data that is too large to fit in a single message, Mobility fragments it before passing it to the underlying network layer so that the data traverses the network as normal (unfragmented) frames and does not cause any extra overhead on intermediary systems. The Mobility packet fragmentation algorithm minimizes the computational and memory-related resources necessary for fragmentation and reassembly of the message. In the event of a retransmission, the need for fragmentation is reassessed. If the maximum message size actually grew, the frame may be retransmitted in its entirety, again conserving network overhead. Conclusion Mobile initiatives have great promise for field organizations. Deploying a VPN built for mobility such as Mobility is essential to realizing the full benefits of the investment and achieving best practices. These include delivering secure, reliable network connections, promoting user acceptance, and gaining management visibility and control. In this way, organizations can ensure that they achieve greater productivity and deliver exceptional customer service. 5

netmotionwireless.com FOR MORE INFORMATION, CONTACT US: United States Seattle, Washington Telephone: (206) 691-5500 Toll Free: (866) 262-7626 sales@netmotionwireless.com EMEA Telephone: +44 (0) 1753 362228 emea@netmotionwireless.com 2015 NetMotion Wireless, Inc. All rights reserved. NetMotion is a registered trademark, and NetMotion Wireless Locality, NetMotion Mobility, Roamable IPSec, InterNetwork Roaming, Best-Bandwidth Routing and Analytics Module are trademarks of NetMotion Wireless, Inc. Microsoft, Microsoft Windows, Active Directory, ActiveSync, Internet Explorer, Windows Mobile, Windows Server, Windows XP, SQL Server, Windows XP Tablet PC Edition and Windows Vista are registered trademarks of Microsoft Corporation. All other trademarks, trade names or company names referenced herein are used for identification purposes only and are the property of their respective owners. NetMotion Wireless technology is protected by one or more of the following US Patents: 5,717,737; 6,198,920; 6,418,324; 6,546,425; 6,826,405; 6,981,047; 7,136,645; 7,293,107; 7,574,208; 7,602,782; 7,644,171; 7,778,260 and Canadian Patent 2,303,987. Other US and foreign patents pending.