WAN Optimization Techniques, WAN Avaliability, WAN Management
WAN Optimization WAN optimization is an outgrowth of the consolidation of data and applications at off-site datacenters, and now clou...
https://wanoptimizationtech.blogspot.com/2013/03/wan-optimization-techniques.html
WAN Optimization
• Compression, which is similar to ZIPing a file, reduces redundant data to minimize transmission time.
• Caching, which is similar to how a Web browser stores data locally and then recalls it
instead of reloading it over the network.
• Deduplication, which eliminates the transfer of redundant data across the network by
sending references, such as a link to a file on the server.
• Latency optimization, which is similar to caching. This means that the server recognizes that
a document is being edited, so it saves it locally rather than accessing the main server.
• Traffic shaping, which controls data flow. In other words, network administrators can set
routers to recognize what gets first dibs at WAN bandwidth to avoid bogging down services.
• Equalizing, which also controls traffic but instead of a human deciding what takes precedence,
the network hardware makes the call.
• Quality of Service, which prioritizes IP traffic based on which applications are most needed.
• Application accelerators and load balancers, which are front-end hardware placed before
routers in a network that act like bandwidth managers.
• Transmission Control Protocol (TCP) acceleration, which reduces latency in the network by
offloading TCP acknowledgements to the local appliances instead of remote computers
(WAN) optimization - Evolution
http://www.wanoptimization.org
Wide-area network (WAN) optimization emerged several years ago as a way to acceleratecentralized application architectures. As chief information officers and their information technology organizations consolidated data, storage and servers, WAN optimization became a critical enabling technology to speed response times and reduce bandwidth for central
file access, allowing for centralized storage architectures and applications. Now, WAN optimization is evolving as applications increasingly migrate to the Internet.
Two applications exemplify this shift: video and software as a service (SaaS). As usage explodes, government agencies must optimize these applications.
“Organizations continue to consolidate and centralize IT infrastructure and WAN optimization has been a critical enabling technology for those efforts, accelerating user access and reducing bandwidth,” said Mark Urban, senior director of product marketing for WAN optimization.
When you design internetworks, you must make several key decisions concerning
connectivity between different users or groups of users in your WAN environment. Some
of these decisions include security, availability, or bandwidth, for example.
When selecting a WAN connection, you should also consider the following:
• Availability—Each method of connectivity has characteristics inherent in its design,
usage, and implementation. For example, Frame Relay is not available in all
geographic regions.
• Bandwidth—WAN bandwidth is expensive, and organizations cannot afford to pay
for more bandwidth than they need. Determining usage over the WAN is a necessary
step toward evaluating the most cost-effective WAN services for your needs.
• Cost—WAN usage costs are typically 80 percent of the entire information services
budget. Cost is a major consideration when different WAN services and different
service providers are evaluated. If, for example, you use the line for only 1 hour a day,
you might want to select a dial-on-demand connection such as an asynchronous or
ISDN connection.
• Ease of management—Network designers are often concerned about the degree of
difficulty associated with managing connections. Connection management includes
both the configuration at initial startup and the outgoing configuration tasks of normal
operation. Traffic management is the capability of the connection to adjust to different
rates of traffic regardless of whether the traffic is steady state or bursty in nature.
Dedicated lines are often easier to manage than shared lines.
• Application traffic—The application traffic might be many small packets, such as a
terminal session, or very large packets, such as during file transfer.
• QoS and reliability—How critical is the traffic intended to travel over the link? A
backup connection might be necessary.
• Access control—A dedicated connection might help control access, but electronic
commerce cannot occur on a wide scale unless consumers can access some portion of
your network.
• QoS—QoS is a major concern to network administrators these days, because
companies are not spending as much on WAN costs and are being smarter and trying
to get the most out of what they have.
connectivity between different users or groups of users in your WAN environment. Some
of these decisions include security, availability, or bandwidth, for example.
When selecting a WAN connection, you should also consider the following:
• Availability—Each method of connectivity has characteristics inherent in its design,
usage, and implementation. For example, Frame Relay is not available in all
geographic regions.
• Bandwidth—WAN bandwidth is expensive, and organizations cannot afford to pay
for more bandwidth than they need. Determining usage over the WAN is a necessary
step toward evaluating the most cost-effective WAN services for your needs.
• Cost—WAN usage costs are typically 80 percent of the entire information services
budget. Cost is a major consideration when different WAN services and different
service providers are evaluated. If, for example, you use the line for only 1 hour a day,
you might want to select a dial-on-demand connection such as an asynchronous or
ISDN connection.
• Ease of management—Network designers are often concerned about the degree of
difficulty associated with managing connections. Connection management includes
both the configuration at initial startup and the outgoing configuration tasks of normal
operation. Traffic management is the capability of the connection to adjust to different
rates of traffic regardless of whether the traffic is steady state or bursty in nature.
Dedicated lines are often easier to manage than shared lines.
• Application traffic—The application traffic might be many small packets, such as a
terminal session, or very large packets, such as during file transfer.
• QoS and reliability—How critical is the traffic intended to travel over the link? A
backup connection might be necessary.
• Access control—A dedicated connection might help control access, but electronic
commerce cannot occur on a wide scale unless consumers can access some portion of
your network.
• QoS—QoS is a major concern to network administrators these days, because
companies are not spending as much on WAN costs and are being smarter and trying
to get the most out of what they have.
What is WAN Optimization ?
WAN optimization, furthermore renowned as WAN acceleration, is the category of technologies and methods utilised to maximize the effectiveness of facts and figures flow over a broad locality mesh (WAN). In an enterprise WAN, the aim of optimization is to boost the hasten of access to critical submissions and data.
WAN optimization encompasses:
traffic forming, in which traffic is prioritized and bandwidth is allotted accordingly.
facts and figures deduplication, which reduces the facts and figures that must be dispatched across a WAN for isolated backups, replication, and disaster recovery.
compression, which shrinks the dimensions of facts and figures to limit bandwidth use.
facts and figures caching, in which often used facts and figures is hosted in the local area or on a local server for faster access.
supervising the mesh to notice non-essential traffic.
conceiving and enforcing rules about downloads and Internet use.
protocol spoofing, which is a method of bundling chatty protocols so they are, in effect, a single protocol.
WAN optimization encompasses:
traffic forming, in which traffic is prioritized and bandwidth is allotted accordingly.
facts and figures deduplication, which reduces the facts and figures that must be dispatched across a WAN for isolated backups, replication, and disaster recovery.
compression, which shrinks the dimensions of facts and figures to limit bandwidth use.
facts and figures caching, in which often used facts and figures is hosted in the local area or on a local server for faster access.
supervising the mesh to notice non-essential traffic.
conceiving and enforcing rules about downloads and Internet use.
protocol spoofing, which is a method of bundling chatty protocols so they are, in effect, a single protocol.
Thanks for sharing the brief description recording WAN network which is very common nowadays. As in the growing industry required more output in less time same as also WAN connection you can reduce your bandwidth cost and accelerate the application speeds with WAN Optimization
ReplyDelete40G MAC, Ultra Low-Latency
ReplyDeleteWe offer a wide range of 10G bit Low latency TOE, 10G MAC, Ultra Low Latency and 40G MAC, Ultra Low-Latency connectivity solutions for the global financial community.
To help enterprises differentiate their network infrastructure equipment and network security from the competition and adjust them to their individual needs, Intilop Corporation offers a high-performance and low-latency TCP/IP offload engine, as well as Full TCP Offload technologies and devices.
ReplyDelete