Optimize Your Broadband WAN
|
|
- Ralph Owen
- 5 years ago
- Views:
Transcription
1 Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance, despite investment in more capacity. Multiple network performance management tools are needed. Core Topic Enterprise Networking: Network Equipment Vendors and Technologies Key Issues During the five-year planning period, which networking equipment vendors and technologies will enterprises use to successfully build their networks? Which WAN technologies will have the greatest impact on enterprises? Strategic Planning Assumptions Through 2008, more than 80 percent of enterprises that migrate from narrowband WANs to broadband WANs will face poor network performance because of latency (0.7 probability). By 2006, less than 50 percent of enterprises will understand TCP's limitations in long-distance WANs, and less than 20 percent will have implemented network traffic management solutions (0.8 probability). After investing in broadband bandwidth to create high-speed WANs, enterprises are discovering that their network application performance has only marginally improved, and real-time, consistent performance is not assured. The limitations of TCP must be better understood now that the use of TCP/IP to reach over global distances is pervasive in internetworking and broadband WANs. TCP "governs" traffic with send, acknowledge, resend and congestion controls. HTTP and FTP are carried over TCP. In the LAN, bandwidth is inexpensive and traffic does not suffer from latency because of the short distances; overprovisioned bandwidth creates negligible delay. However, in the WAN, network latency increases with distance. Life can be terrible on global WANs, especially for large file transfers over different hemispheres. Network Performance Optimization Options, Techniques and Actions There are many ways to optimize the performance of networks. All are piecemeal solutions that solve particular problems for specific applications and the unique types of network traffic that they generate. Logical or physical separation of network infrastructure for disparate low-latency and high-latency applications, such as voice and video vs. data communications, can minimize the effects of competing and interacting traffic over a high-latency data communications infrastructure. This is essential where applications that demand low latency (such as voice and video) are carried on a data communications network that has high latency, and expects to buffer traffic and retransmit to handle delay or lost packets. A common example is the carriage of voice over frame relay (not often used), where voice is carried over its Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 own permanent virtual circuit (PVC), and pure data traffic remains on a separate PVC to limit interaction effects. The design issue is to mask "a little" voice inside "a lot" of data. This approach to modifying WAN performance relies on the "assurance" that each type of application will be carried on its own dedicated link, which is sufficiently optimal for the type of traffic offered. Action Item: Review the scope of logically or physically separate networks, and compare their relative total costs of ownership. Merely adding bandwidth uses brute force on the operational symptoms and ignores the network performance problem. Web caching and local replication of databases, such as Lotus Notes, reduce WAN loading by decreasing frequent "chatty" traffic over long-haul networks. Pipe size is fundamental, but it must be understood, rather than abused by overcapacity. The complexity of multiple contending applications on IP networks requires informed iterative design, not "guesstimates." Adding bandwidth does not address other issues, such as congestion control and traffic management. Because there is no bandwidth reservation in TCP/IP, large file transfers will always swamp time-sensitive usage, such as voice and video, on the same path. Mission-critical networks can't survive without some congestion control and application priority management for critical traffic. Increasing bandwidth capacity also does not offer insight into the demand and usage of bandwidth by various applications, some of which may be bandwidth "hogs." Action Item: Identify network segments where adding bandwidth is a legitimate approach (for example, LANs and campus LANs). Examine alternatives for other network segments. Web caching and replication reduce response times by locating data repositories as close to the local user as possible to reduce latency and multiple messages over long-haul networks. Caching is particularly suitable for Web applications, but it does not guarantee network availability, or reserve or restrict network resources to suit critical applications. Major Web caching vendors include 3Com, Cache Flow (now Blue Coat Systems), Cisco Systems, Dell, Equiinet, F5 Networks, Hewlett-Packard, InfoLibria, Network Appliance and Sun Microsystems. Action Item: Design caching and replication server locations that are properly suited to the traffic, applications and capacities of your network. 15 September
3 Bandwidth management solutions can provide congestion control by guaranteeing network resources to applications or users, and restricting the impact of other (foreign) users by limiting use of available bandwidth. Bandwidth management can add significant network overheads and relies on proprietary hardware to manage networks. Bandwidth management vendors include Allot Communications (NetEnforcer), Orchestream, NetScreen Technologies, Packeteer, Sun (SunSoft bandwidth allocator) and Visual Networks. Action Item: Ensure that bandwidth managers are used to create an understanding of an application's peak and intermittent bandwidth and latency needs, as well as its interactivity and impact on other traffic. Network management software alerts operators to heavy traffic usage on links or aggregate routes. These alarms do not improve network performance, but they offer strategic and tactical advice that can be used as a warning to redesign the network, especially its use of various protocols. Tools from BMC Software, Computer Associates, HP OpenView, IBM Tivoli and other vendors increase functionality, but they do not necessarily provide analysis or insight into the end-to-end performance of an application, such as the tools provided by Compuware and others do. Action Item: Leverage outputs from alerts, event alarms and traffic performance monitoring into tactical fixes and strategic dimensioning of network capacity and management of application deployments. Router-based queuing relies on router hardware to apply traffic queuing algorithms that may suit a combination of application traffic types. Queuing solutions require a deep technical understanding of the protocols at work and their impact on the application mix on the network. Each queuing variant solves a problem, and it has its own implementations and parameter settings to tune network performance. Variants include: Traffic prioritization (weighted random early detection) Rate-limiting (random early detection) Weighted fair access sharing Hierarchical class-based queuing, where packets are broken down in a hierarchical tree that allows data packets to borrow bandwidth from sister branches when capacity is used The router queuing approach adds a heavy overlay of technical complexity in router configuration and management. It also requires expert knowledge of the design and its maintenance, as 15 September
4 well as adding additional cost because new software and hardware must be applied to deliver this solution. Cisco dominates the enterprise router market and first-generation queuing solutions, although there are alternatives to its IOS and proprietary hardware. Enterasys Networks, Nortel Networks and other router vendors have router queuing solutions. Action Item: Investigate router queuing optimization, but consider the complexity that is created in configuration management as a trade-off. Intelligent routing can dynamically direct traffic across a number of internetworking links to arbitrate between network performance and available link prices. Intelligent routing assumes that an enterprise will have multiple links to the Internet, possibly through meshed networks, where intelligent routing can dynamically allocate IP traffic to the best available links. This approach does not guarantee network availability, or provide congestion control or limit network resources to particular applications. However, it will make the best of the available paths. A popular rule of thumb is, "Switch where you can; route where you must." Vendors include F5, netvmg, Proficient Networks, Radware, RouteScience Technologies and Sockeye Networks. Action Item: Midsize and large enterprises will have sufficient meshing in their networks to justify the expense and overhead of intelligent routing. Bandwidth compression is a favorite technique for voice and data communications. Bandwidth compression reduces the total number of bits offered. It is a well-established method of making the best of thin routes or restricted capacity in enterprise networks. These solutions reduce the total amount of traffic to be carried on a WAN link and effectively increase the capacity of otherwise limited pipes. Savings can occur based on the lower volume of traffic transmitted across the network. Although compression does not offer sophisticated availability guarantees, congestion control or undesirable usage control mechanisms, it is an important element in other hybrid network performance solutions. Vendors such as Expand Networks and Peribit Networks offer hybrid compression and latency optimization tools (see "Time to (Re)evaluate Network Compression"). Action Item: Evaluate compression and related hybrid technologies for their substantial improvement potential in some 15 September
5 network segments, but understand these technologies' limitations and the costs of proprietary equipment and software. Augmentation of the standard TCP protocol stack with trafficshaping algorithms can dramatically improve throughput in saturated high-latency networks. Augmenting the standard TCP protocol stack considers the limitations of TCP. The use of proprietary mathematical algorithms can reproduce traffic streams identically without much of the original protocol overhead. This requires a proprietary client and server, with both using the optimized protocol stack. Augmentation mitigates the impact of transporting TCP-based applications (especially large FTP files), particularly over highlatency, global WANs. Its network performance gains are most spectacular when proprietary algorithms relieve the saturation effects of high-latency, round-trip times and packet loss in large file transfers, such as multimedia or database replication (see Figure 1). Digital Fountain and Foursticks are examples of protocol augmentation algorithm vendors. Maximum TCP Throughput (Mbps) 45 Figure 1 Maximum Throughput for TCP-Based Applications TCP Augmented Protocol Traffic saturation in TCP with high latency. T3 barely delivers T (T1 speed) WAN Bandwidth (Mbps) (T3 capacity) Source: Gartner Research (August 2003) Action Item: Enterprises that shift large files or data transfers over continental, international or global networks likely will discover significant bandwidth cost and throughput 15 September
6 improvements using suitable TCP-augmented protocols that are deployed over proprietary servers and clients. Other techniques such as forward error correction help networks with very-high-performance requirements, such as air traffic control and military applications. Bottom Line: As WAN bandwidth becomes less expensive and broadband capacity routinely is used, your largest operating exposure may be the limitations of TCP/IP in WANs. Simply adding bandwidth to achieve high performance will work in LANs, metropolitan-area networks and short-haul WANs, but not in long-haul networks, where the latency caused by distance severely affects network throughput. Audit your network for performance and evaluate WAN traffic management options based on the design problem or limitation to ensure that your investment in fast network capacity is not wasted, and that IT applications do not run poorly. 15 September
NetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More information10 Reasons your WAN is Broken
Lack of Visibility Most WAN performance problems are driven by underperforming connections or applications. It isn t uncommon to be paying for a 20 Mbps WAN link that performs at 10 Mbps. The root cause
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationChoosing the Right Acceleration Solution
Choosing the Right Acceleration Solution In the previous piece in this series, What is Network Acceleration, we outlined the various techniques used to improve network performance. Now, we will discuss
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationIT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationHyperIP : SRDF Application Note
HyperIP : SRDF Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably enhances large data movement over big bandwidth and long-haul IP networks. HyperIP
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationIt s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration
It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More informationISV Support Is Key When Choosing a Server Operating System
Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationDPRO Kimberly K. Hiller, Gerald Arcuri
Kimberly K. Hiller, Gerald Arcuri Technology Overview 27 August 2003 Routers: Overview Summary Routers continue to evolve with better performance and a larger variety of WAN and LAN options, and security.
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More informationWarpTCP WHITE PAPER. Technology Overview. networks. -Improving the way the world connects -
WarpTCP WHITE PAPER Technology Overview -Improving the way the world connects - WarpTCP - Attacking the Root Cause TCP throughput reduction is often the bottleneck that causes data to move at slow speed.
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationWhy Performance Matters When Building Your New SD-WAN
Why Performance Matters When Building Your New SD-WAN Not all SD-WANs are created equal. Brought to you by Silver Peak The New Generation of High Performance SD-WANs As enterprise IT considers ways to
More informationOptimize and Accelerate Your Mission- Critical Applications across the WAN
BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationDISRUPTIVE TECHNOLOGIES IN THE DATACENTER
DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationEqualLogic Storage and Non-Stacking Switches. Sizing and Configuration
EqualLogic Storage and Non-Stacking Switches Sizing and Configuration THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationNot all SD-WANs are Created Equal: Performance Matters
SD-WAN Lowers Costs and Increases Productivity As applications increasingly migrate from the corporate data center into the cloud, networking professionals are quickly realizing that traditional WANs were
More informationNEXT-GENERATION DATACENTER MANAGEMENT
NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationThe Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing
. White Paper The Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing Executive Summary The Cisco WebEx Node for the Cisco ASR 1000 Series,
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationEMC Celerra Replicator V2 with Silver Peak WAN Optimization
EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN
More informationNew Cisco 2800 And 3800 Series Integrated Services Router Wan Optimization Bundles
Q&A New Cisco 2800 And 3800 Series Integrated Wan Optimization Bundles Q. What are the components of the new Cisco 2800 and 3800 series integrated services router WAN optimization bundles? A. There are
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationLessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO
Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption
More informationAcceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC)
Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC) Conducted by Certeon for IBM Ready for Rational CCRC Certification November 28 PAGE 1 Table of Contents Certeon Acceleration
More informationWeb Services Take Root in Banks and With Asset Managers
Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations
More informationExternal RAID-Based Storage System Analysis by Form Factor
Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a
More informationVoice, Video and Data Convergence:
: A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More informationExecutive Brief June 2014
(707) 595-3607 Executive Brief June 2014 Comparing IBM Power Systems to Cost/Benefit Case for Transactional Applications Introduction Demand for transaction processing solutions continues to grow. Although
More informationNetworking Issues in LAN Telephony. Brian Yang
Networking Issues in LAN Telephony Brian Yang 5-3-00 Topics Some background Flow Based QoS Class Based QoS and popular algorithms Strict Priority (SP) Round-Robin (RR), Weighted Round Robin (WRR) and Weighted
More informationEvents Will Transform Application Servers
Technology, Y. Natis Research Note 8 July 2003 Events Will Transform Application Servers Today's application servers can act as simple "event servers." To handle complex events, application servers will
More informationAsia/Pacific: Systems Consolidation, Hype or Reality?
Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control
More informationVirtual WAN Optimization Controllers
Virtual WAN Optimization Controllers vwan Virtual WAN Optimization Controllers accelerate applications, speed data transfers and reduce bandwidth costs using a combination of application, network and protocol
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationVirtual WAN Optimization Controllers
acel E RA VA DATAS HEET Virtual WAN Optimization Controllers acelera VA Virtual WAN Optimization Controllers accelerate applications, speed data transfers and reduce bandwidth costs using a combination
More informationThe Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN
The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler Jim@Kubernan.Com Background and Goal Many papers have been written on the effect that limited bandwidth
More informationOne of the big complaints from remote
Remote Access Response Time Blues Robin Layland Robin Layland is president of Layland Consulting, a firm that specializes in network architecture and new technology. He has more than 25 years experience
More informationDatabase Design Tool Magic Quadrant 2H02
Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database
More informationWAN Cost Savings Report From Talari. This custom report was created for: Quinn Philips, Cogent ROI - December 15, 2015.
WAN Cost Savings Report From Talari This custom report was created for: Quinn Philips, Cogent ROI - December 15, 2015 Personalized Personalized based on vertical industry identified by the prospect. Introduction
More informationBest Practices for Deploying Web Services via Integration
Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationAcceleration Performance Tests for IBM Rational ClearTeam Explorer
Acceleration Performance Tests for IBM Rational ClearTeam Explorer Conducted by Array Networks for IBM Ready for Rational ClearTeam Explorer Certification Table of Contents White Paper Executive Summary
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationCisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com
Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing
More informationQoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm
QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors
More informationManaging Your IP Telephony Environment
Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining
More informationNetwork Capacity Expansion System
Network Capacity Expansion System Expanding Capacity of Wide Area Networks at Remote and Mobile Sites Multisite and global organizations today are facing several unique wide area network (WAN) challenges:
More informationTRANSFORM THE GOVERNMENT IT DATA CENTER INTO A DYNAMIC SERVICE - ORIENTED DELIVER CENTER. Antony Cassano Access & Security Solutions Division Manager
TRANSFORM THE GOVERNMENT IT DATA CENTER INTO A DYNAMIC SERVICE - ORIENTED DELIVER CENTER Antony Cassano Access & Security Solutions Division Manager Technology Trends Current technology trends promote
More informationWhat is Network Acceleration?
What is Network Acceleration? How do WAN Optimization, Network Acceleration, and Protocol Streamlining work, and what can they do for your network? Contents Introduction Availability Improvement Data Reduction
More informationMPLS vs SDWAN.
MPLS vs SDWAN MPLS MPLS It offers excellent QoS when it comes to avoiding packet loss and keeping a business s most important traffic flowing. This reliability is especially essential to maintain the quality
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationArchitecting the High Performance Storage Network
Architecting the High Performance Storage Network Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary...3 3.0 SAN Architectural Principals...5 4.0 The Current Best Practices
More informationCIO Update: Gartner s Storage Services Magic Quadrant
IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationOpenService NerveCenter Event Correlation Network Management
John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability
More informationSpam Filtering Works Better With a Management Policy
Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will
More informationVideo-Aware Link Adaption
WHITE PAPER Video-Aware Link Adaption Enhances real-time video over LTE October 2012 InterDigital, Inc. All rights reserved. Contents 1 Executive Summary...2 2 InterDigital s Solution...4 2.1 Adaptation
More informationUnderstanding VLANs. Existing Shared LAN Configurations CHAPTER
CHAPTER 1 Understanding VLANs This chapter provides an introduction to VLANs and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses
More informationApplication-Aware Network INTRODUCTION: IT CHANGES EVOLVE THE NETWORK. By Zeus Kerravala -
WHITE PAPER Application-Aware Network AN APPLICATION-AWARE NETWORK IS KEY TO MAXIMIZING PRODUCTIVITY By Zeus Kerravala - INTRODUCTION: IT CHANGES EVOLVE THE NETWORK Enterprise IT has seen several major
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationManagement Update: Wireless LAN Predictions for 2004
IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will
More informationMagic Quadrant Selection Criteria
Markets, G. Johnson Research Note 30 May 2003 Magic Quadrant for Australian xdsl Providers, 2003 The Australian generic digital subscriber line market is rapidly consolidating. Network service providers
More informationAction Recommendation for 2004
Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth
More informationSD-WAN Transform Your Agency
Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is
More informationHow can we gain the insights and control we need to optimize the performance of applications running on our network?
SOLUTION BRIEF CA Network Flow Analysis and Cisco Application Visibility and Control How can we gain the insights and control we need to optimize the performance of applications running on our network?
More informationSupercharge your virtual app and desktop user experience
Supercharge your virtual app and desktop user experience How Citrix SD-WAN creates a reliable WAN for high-performance application delivery Citrix.com ebook Align Cloud Strategy to Business Goals 1 Delivering
More informationHigher Performance Delivered at a Lower Cost A New Approach to WAN Optimization
Higher Performance Delivered at a Lower Cost A New Approach to WAN Optimization Employing intelligent WAN optimization technology over virtually any broadband access technology, HughesNet offers the distributed
More informationDennis Breithaupt Senior Systems Engineer, Enterprise Accounts 2014 Riverbed Technology. All rights reserved.
Dennis Breithaupt Senior Systems Engineer, Enterprise Accounts dennis.breithaupt@riverbed.com 2014 Riverbed Technology. All rights reserved. 1 Data protection challenges Replicating more data more often?
More informationWill Traffic Spikes Overwhelm Your Data Center Network? A Dell Technical White Paper
Will Traffic Spikes Overwhelm Your Data Center Network? A Dell Technical White Paper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationHybrid networking & mission critical Internet
Hybrid networking & mission critical Internet Hybrid Will Be the New Normal for Next Generation Enterprise WAN Public cloud services and mobility are driving business needs where the Internet and MPLS
More informationApplying QoS Features Using the MQC
QoS: Modular QoS Command-Line Interface Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 900 Series) First Published: November 30, 2012 Last Modified: March 31, 2014 This chapter discusses the Modular
More informationBenefits of deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic storage
Benefits of deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic storage Faster, more efficient data replication and backup between office locations Introduction Data backup and replication processes
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationFUJITSU Software Interstage Information Integrator V11
FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics
More informationThe Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed
The Role of WAN Optimization in Cloud Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationPerformance/Throughput
Markets, S. Zaffos Research Note 31 March 2003 ATA Disks Redefine RAID Price/Performance Cost-optimized storage infrastructures should include redundant arrays of independent disks built with low-cost
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More information