Christof Van Laer - PowerPoint PPT Presentation

1 / 96
About This Presentation
Title:

Christof Van Laer

Description:

Christof Van Laer – PowerPoint PPT presentation

Number of Views:110
Avg rating:3.0/5.0
Slides: 97
Provided by: davee4
Category:

less

Transcript and Presenter's Notes

Title: Christof Van Laer


1
Optimize your VOIP network
  • Christof Van Laer
  • Pre Sales Engineer Northern Europe
  • cvanlaer_at_packeteer.com

2
Agenda
  • The value of shaping
  • Wan visibility
  • QOS by shaping applications
  • Optimization
  • Compression and acceleration using the
    packetshaper
  • Optimization of services using I-shared
  • Central management

3
Packeteer The value of shaping
  • Christof Van Laer
  • Pre Sales Engineer Northern Europe
  • cvanlaer_at_packeteer.com

4
Company Overview
  • 10 years leadership
  • Market Leader - 1 Gartner, 1 IDC, 1 Infonetics
  • Proven effectiveness with hundreds of
    business-critical applications
  • Over 50,000 units shipped to over 7,500 customers
  • 700 sales partners in 50 countries
  • 24x7 global support
  • Partnerships
  • Brocade, Microsoft, IBM Global Services, HP
    Services, ATT, Equant, Avaya, France Telecom,
    NTT, Telecom New Zealand, Samsung, Softricity,
    Net App, EMC,Citrix, Extreme Networks, Polycom,
    Concord, BMC
  • Dozens of product awards worldwide

5
PacketeerThe Intelligent Overlay for Networked
Applications
A Great User Experiencefor Every Applicationin
Every Location
  • Ensure availability of critical applications
  • Increase application performance and employee
    productivity
  • Decrease risk and ensure the payoff of IT
    investments

6
WAN Performance Issues/Technologies
L-7 Visibility Control Protocol Acceleration
L-7 Visibility Control Compression Protocol
Acceleration
Long
  • Layer-7 Visibility is Required to Identify
    Performance Issues
  • Control Allocates Bandwidth to Ensure
    Availability
  • Compression Adds Capacity
  • Protocol Acceleration Mitigates Effects of Latency

Distance/Delay
L-7 Visibility
L-7 Visibility Control Compression
Short
Congestion
Low
High
Bandwidth
High
Low
7
About MonitoringIdentify Issues and Select the
Right Tools
  • Monitoring provides visibility
  • Identify applications
  • Monitor utilization and performance
  • Identify network issues such as
  • Recreational apps
  • Latency
  • Measure user experience
  • Monitor Service-Level Agreements
  • Benchmark app response times
  • Access performance diagnostics

8
Visibility - Whats Running on Your Network?
Application
  • Music Sharing Even When Configured on Port 80
  • HTTP by URL or Content Type
  • PASV FTP
  • Citrix-Published Application
  • H.323, SIP, MGCP, etc

URL
Dynamic Port
Sub-Application
Warning 80 of IT Professionals dont know what
applications are consuming bandwidth because
their visibility stops here.
MAC Address
  • 08002b13ae34

Bits/bytes
  • 1011001010010

Network World/Packeteer Survey, September 2003
9
Monitoring Technology Industry-Leading Layer 7
Plus Classification
  • Unique to Packeteer
  • Empowers IT organizations to
  • Identify applications on the network
  • Measure utilization by application
  • Benchmark response times SLAs for key
    applications
  • Diagnose isolate causes of performance problems

10
Classification
Abacast, ActiveX, AFP, AFS, AFS-FS, AFS-VL,
Aimster, Aimster-Init, Aimster-Cmd, Aimster-Data,
AOL-AIM-ICQ, AOL-IM, ICQ-2000, AOL-IM-Talk,
AOL-IM-IMAGE, AOL-IM-File, AOL-ISP, AOL-Default,
AOL-iChat, Apple-iTunes, AppleTalk, Ariel-419,
Ariel-422, AsheronsCall, ATSTCP, Attachmate-GW,
Audiogalaxy, AURP, BAAN, BackWeb, Battle.net,
BGP, biff, BITS, BitTorrent, Blubster, CBT,
ccMail, Chaincast, CIFS-TCP, CiscoCTI,
CiscoDiscovery, Citrix, Citrix-ICA, Citrix-SB,
CitrixIMA, CitrixIMA-Svr, CitrixIMA-CMC,
Clarent-CC, Clarent-Complex, Clarent-Mgmt,
Clarent-Voice-S, Client, CORBA, CRS, CU-DEV,
CUSeeMe, CUSeeMe-CE, CUSeeMe-CC, CUSeeMe-AV,
CVSpserver, CVSup, Day-Time, DCOM, DECnet, DHCP,
DHCP-S, DHCP-C, Dialpad, Dialpad-Ctrl,
Dialpad-Stream, DICOM, DirectConnect, DLS,
DLS-RPN, DLS-WPN, DNS, Doom, DPA, DRP, DTP,
EarthStationV, EarthV-Search, EarthV-HTTP,
EarthV-SSL, EarthV-PXP, Echo, eDonkey,
eDonkey-TCP, eDonkey-Ping, EGP, EIGRP,
EntryPoint, eXeem, FileMaker, FileMaker-DB,
FileMaker-R, FileRogue, Filetopia, Finger, FIX,
FlowRecords, FNA, FNAonTCP, FNAonTCP-1,
FNAonTCP-2, FoldingAtHome, frags, FTP,
FTP-Cmd-Clear, FTP-Data-Clear, FTP-Cmd-Secure,
FTP-Data-Secure, Furthurnet, Gnutella,
Gnutella-Init, Gnutella-Cmd, Gnutella-Upload,
Gnutella-Download, Gopher, GoToMyPC, GRE, Groove,
Groupwise, Groupwise-POA, Groupwise-MTA, H.323,
H.323-Q.931, H.323-H.245, H.323-RAS, H.323-GKD,
Half-Life, Half-Life-TCP, Half-Life-UDP, HL7,
Hopster, Hotline, Hotline-TCP, Hotline-UDP, HTTP,
HTTP-Tunnel, I-Phone, ICMP, Ident, IGMP, IGP,
IMAP, IMAP-Clear, IMAP-Secure, iMesh, INFOC-RTMS,
INT-1, IP, IPComp, IPIP, IPMobility, IPP, IPSec,
IPSec-AH, IPSec-ESP, IPv6, IPX, IRC, IRC-194,
IRC-6665, IRC-6667, IRC-Secure, IRC-Servers,
IRC-Chat, IRC-DCC, ISAKMP, JavaRMI, JavaRMI-Act,
JavaRMI-Reg, JavaRMI-Call, JDENet, Kali, KaZaA,
KaZaA-Cmd, KaZaA-Upload, KaZaA-Download,
KaZaA-Query, Kerberos, Kontiki, L2TP, LAT, LDAP,
LDAP-Clear, LDAP-Secure, lockd, Lotus-IM,
Lotus-IM-CommS, Lotus-IM-SrvrEx, Lotus-IM-MtgS,
Lotus-IM-CommC, LotusNotes, LucasArts, Marimba,
MATIP, MATIP-A, MATIP-B, MCK-Signaling,
MCK-Voice, mDNS, MeetingMaker, Megaco,
Megaco-Text, Megaco-Bin, MGCP, MGCP-Gateway,
MGCP-CallAgent, MGCP-KpAlive, Micom-VIP,
Microsoft-ds, Miscellaneous, MOP-DL, MOP-RC,
Motion, MPEG-Audio, MPEG-Video, MSN-Messenger,
MSN-Zone, MSN-Zone-TCP, MSN-Zone-UDP, MSSQ,
MSSQ-QMT, MSSQ-IS, MSSQ-CQ, MSSQ-SQ, MSSQ-Ping,
MSSQL, MSSQL-Server, MSSQL-Mon, Mythic, Napster,
Napster-Init, Napster-Cmd, Napster-Data,
Napster-UDP, Napster2, Napster2-Data,
Napster2-Other, Net2Phone, Net2Phone-UDP,
Net2Phone-TCP, NetBEUI, NetBIOS-IP,
NetBIOS-IP-NS, NetBIOS-IP-DGM, NetBIOS-IP-SSN,
NetFlowV5, NetIQ, NewsStand, NFS, NNTP,
NNTP-Clear, NNTP-Secure, NTP, NW5-CMD,
NW5-CMD-UDP, NW5-CMD-TCP, NW5-NCP, Ogg,
OpenConnect-JCP, Oracle, Oracle-netv1,
Oracle-netv2, Oracle-SSL, Oracle-JVM-SSL,
OracleClient, OracleEM, OracleEM1, OracleEM2,
OSI, OSPF, PAgP, pcANYWHERE, pcANYWHERE-D,
pcANYWHERE-S, pcANYWHERE-OD, pcANYWHERE-OS,
PeerEnabler, PEPGate, Persona, Persona-Clear,
Persona-Secure, PIM, POP3, POP3-Clear,
POP3-Secure, POP3-Kerberos, PostgreSQL, PPPoE,
PPPoE-Control, PPPoE-Data, PPTP, Printer,
Progress, PVSTP, Quake, Quake-A, Quake-B,
Quake-II-TCP, Quake-II-UDP, Quake-III, QuickTime,
RadioNetscape, RADIUS, RADIUS-Auth, RADIUS-Acct,
radmin, RARP, RC5DES, RDP, Real, Real-RDT-TCP,
Real-RDT-UDP, Real-BackChan, Real-Multicast,
Real-RTP-TCP, Real-RTP-UDP, Real-Player,
Real-Encoder, Real-Web, RemotelyAnywhere, rexec,
RIP, rlogin, RRP, rsh, RSVP, rsync, RTCP-B,
RTCP-I, RTP-B, RTP-I, RTSP, rwho, SAP,
SAP.MCAST.NET, ScourExchange, Scour-Web,
Scour-CSC, Share, SHARESUDP, Shoutcast, SIP,
SIP60, SIP61, Skinny, Skype, SkypeCommand,
SkypeData, SLP, SmartSockets, SMS, SMS-RC,
SMS-Chat, SMS-File, SMS-Auth, SMTBF, SMTP,
SMTP-Clear, SMTP-Secure, SNA, SNMP, SNMP-Mon,
SNMP-Trap, SOAP-HTTP, SOCKS, SoftEther,
SonyOnline, Soulseek, SpanningTree, SSDP, SSH,
SSL, SSL-Shell, ST2, StreamWorks, SunND, SunRPC,
SunRPC-PortMap, SunRPC-Call, SWIPE, Syslog,
T.120, TACACS, TCP, Telnet, Telnet-Clear,
Telnet-Secure, TFTP, Timbuktu, Timbuktu-HS,
Timbuktu-Ctl, Timbuk tu-Obs, Timbuktu-Snd,
Timbuktu-Xch, TimeServer, tn3270, tn3287, tn5250,
tn5250p, Tribes, Tripnosis, UDP, Unisys-TCPA,
Unreal, Unreal-Browser, Unreal-Ping,
Unreal-Status, Unreal-Play, UUCP, VDOPhone,
VDOPhone-a, VDOPhone-b, VDOPhone-UDP, VideoFrame,
VideoFrame-TCP, VideoFrame-UDP, VLAN-Bridge, VNC,
Vonage, Vonage-SIP, Vonage-RTP, VTP, WAP, WebEx,
Webshots, WHOIS, WinampStream, Windows-POPUP,
WinMedia, WinMedia-TCP, WinMedia-UDP,
WinMedia-MSBD, WinMedia-Mcast, Winny, Winny2,
WINS, WorldOfWarcraft, XboxLive, XWindows,
XWindows-DM, XWindows-S, YahooGames, YahooMsg
560 services
11
Monitoring Technology Automatic Traffic
Discovery
  • Place PacketShaper at WAN/LAN threshold
  • Turn on traffic discovery
  • PacketShaper maps traffic to its classification
    library
  • Automatically builds a list of the applications
    running on your network
  • Starts collecting performance data
  • Utilization
  • Efficiency
  • Response times

12
Visibility Reporting per class
  • avg-bps, avg-pps, bytes, guar-rate-allocs,
    guar-rate-fails, kbytes, peak-bps,
    peak-guar-rate-flows, peak-tcp-conns, pkts,
    sample-interval-msecs, sample-interval-overruns,
    sample-interval-secs, tcp-conn-aborts,
    tcp-conn-aborts, tcp-conn-exits, tcp-conn-inits,
    tcp-conn-self-denies, tcp-conn-self-denies,
    tcp-conn-server-ignores, tcp-conn-server-ignores,
    tcp-conn-server-refuses, tcp-conn-server-refuses
    , tcp-data-pkts, tcp-early-retx-toss-pkts,
    tcp-early-retx-toss-pkts, tcp-efficiency,
    tcp-retx-bytes, tcp-retx-pkts, tcp-retx-pkts,
    hostdb-alloc-fails, ipdg-alloc-fails,
    link-size-bps, pkt-size-histogram, rx-errors,
    rx-no-buffers, rx-pkts-dropped, shaping-mode,
    tcp-alloc-fails, total-passthru-bytes,
    total-passthru-pkts, total-rx-bytes,
    total-rx-pkts, total-sameside-pkts,
    total-tx-bytes, total-tx-pkts, tx-errors,
    tx-pkts-dropped, unsolicited-icmp,
    commitment-failure, dynamic-cap-count,
    dynamic-live-user, dynamic-no-partition-count,
    late-drop-bytes, late-drop-pkts,
    lowest-fully-satisfied-priority,
    partition-burst-limit-bps, partition-over-limit-ms
    ecs, partition-over-limit-secs,
    partition-over-limit-time, partition-size-bps,
    pvc-avg-bps, pvc-bytes, pvc-avg-fps,
    pvc-ecn-frames, pvc-ecn-frames, pvc-frames,
    pvc-target-bps, sched-drop-bytes,
    sched-drop-pkts, app-availability,
    avg-round-trip-time, class-hits,
    client-flood-block, conn-speed-hist,
    license-overflows, licenses-peak, licenses-total,
    network-delay-avg, network-delay-histogram,
    network-delay-median, network-delay-msec,
    normalized-network-delay-avg, pkt-exchange-time,
    pkt-exchange-time-samples, pkt-exchange-time-avg,
    peak-ipdg-conns, policy-hits, round-trip-time-msec
    s, server-delay-avg, server-delay-histogram,
    server-delay-median, server-delay-msec,
    server-flood-block, service-level,
    service-level-errors, service-level-threshold,
    slow-transactions, total-delay-avg,
    total-delay-histogram, total-delay-median,
    total-delay-msec, total-delay-threshold,
    total-trans, trans-bytes, trans-bytes-avg,
    web-response-2XX, web-response-3XX,
    web-response-4XX, web-response-5XX,
    bytes-saved-by-compression, bytes-saved-by-compres
    sion, compressible-bytes, non-compressible-bytes,
    postcompression-avg-bps, postcompression-bytes,
    precompression-bytes, precompression-avg-bps,
    compression-mode, postcompression-peak-bps,
    precompression-peak-bps

130 services
13
Visibility How streaming media applications work
  • Initiation of calls
  • Ex H.323, SIP
  • Data control flow
  • Ex RTCP-I
  • Data flow
  • Ex RTP-I

14
Network assesment for streaming media
  • Analyzing the streaming media application
  • what are the initiating protocols?
  • what are the data control protocols?
  • what are the dataflow protocols?
  • If running both VoIP and Video over IP you need
    to classify on Codecs.
  • do any protocols need to be manually created?

15
Network assesment for streaming media
  • Network readiness analysis
  • is Physical network OK?
  • Delaylt150ms
  • Packet drop lt 1
  • Jitter lt 30ms
  • is bandwidth available?
  • 20 100 Kbps per call
  • what other applications are running on the
    network?
  • Mission critical
  • Bandwidth hogs
  • shaping strategy of streaming media and other
    applications

Is your network ready for VOIP?
16
Monitoring Voice and Video Quality Metrics
  • Quality metrics for converged networks
  • Measure jitter, loss and delay for RTP traffic
    voice and video
  • Track SLAs for Voice, Video and MPLS Services
  • Extends Application SLAs to voice traffic (Real
    Time Protocol)
  • Monitor call quality for IP Telephony and Video
    conferencing
  • Monitor performance of real time classes for MPLS
    WAN Service

Data Center
Branch
WAN
Delay for RTP Traffic Real time MPLS traffic
classes
Jitter Loss
Jitter Loss
17
MonitoringVoice and Video Latency Measurement
  • Latency is calculated on a round trip measurement
    between two PacketShapers, divided by 2

Synthetic echo request
Synthetic echo response
Actual RTP Packet Flow (one-way)between source
and destination IP phone
WAN
18
Monitoring Network Utilization
Utilization
Response Times
Diagnostics
Efficiency
  • How does WAN usage align with business objectives?

NetWare consumes entire T1 for two daysSerious
impact on Citrix performance
Find out why and who
19
Monitoring Network Utilization
Utilization
Response Times
Diagnostics
Efficiency
  • Average and peak
  • Network efficiency
  • Top Talkers/Listeners
  • Packets and packet sizes

See up-to-the minute network utilization
Understand cause and effect
20
Monitoring Network Efficiency
Utilization
Response Times
Diagnostics
Efficiency
  • How efficiently is the network running?

Identify times when network efficiency drops
below 100
See when bandwidth is being wasted by
retransmissions
21
Monitoring Response Times
Utilization
Response Times
Diagnostics
Efficiency
  • How do specific applications perform?

Start solving performance issues before users
report them as problems
See how applications actually perform
22
Monitoring Response Times
Utilization
Response Times
Diagnostics
Efficiency
  • Measure health and end user experience of
    time-sensitive applications

Example SAP roundtrip times are suffering what
is the cause?
See immediately how an overloaded server is the
root of the problem
23
Monitoring Diagnostics
Utilization
Response Times
Diagnostics
Efficiency
  • Detailed Traffic Flow Analysis
  • Connection analysis
  • TCP healthanalysis
  • Packetcapture

Drill down to low-level metrics to spot attacks
as they happen
Double click on a server to see the flows and
isolate failed connections
24
Monitoring Diagnostics
Utilization
Response Times
Diagnostics
Efficiency
  • Monitor and alert for WAN-based issues
  • Significant increase in connections reveal Virus
    and DoS attacks
  • Increase in server Ignores and Refuses indicates
    overloaded server

Example DDoS attacks and Worm Virusses cause
significant increase in connection attempts
Set up alerts to warn you in future
25
Measurement Engine versus FDR
  • Measurment Engine data can be used for
  • Trend Analysis
  • Application SLA Management
  • Network SLA Management

26
Flow Detail Record (FDR)
  • Alternate method for gathering and processing
    measurements on the PacketShaper(PS)
  • PacketShaper(PS) emits an FDR containing
    measurements for an individual flow
  • PS will automatically push data to remote system
  • on a continuous basis
  • no issues with limited space
  • Integrate unique data from PS into existing
    reporting tools
  • Different from the embedded measurement
    engine(ME)
  • Based on Ciscos NetFlow

27
Flow Detail Records provides
  • Class ID, IP ToS/DiffServ, RTM total delay all
    transaction, RTM Server Delay all transaction,
    RTM Transaction count
  • VoIP Quality
  • Ping success and delay information
  • RTM data such as PET, Total Delay, Server Delay,
    Network Delay
  • Additional Information such as VLAN ID of the
    flow, TTL, Packeteer service Type, IP
    ToS/DiffServ and Port related Information

28
Flow Detail Record Benefits
  • Enhanced Troubleshooting / forensic capabilities
  • (Host IP-Pair Information, detailed flow
    information)
  • Increase Top Talker / Top Listener Capability
  • Provide Historical Data Correlation for Top
    Talker / Listener
  • Increase Top Talker / Top Listener
  • Class Count Extender (Limited Class Count in PS)
  • Increased demand for Monitoring reasons
  • Integration with Enterprise Billing
  • Ability to extract per IP, Per Application usage
    reports
  • VoIP Reporting
  • Report on Latency, Jitter, Loss and Utilization

29
Value Summary Monitoring
  • Identify issues and select the right tools
  • Identify and classify applications
  • Monitor utilization and performance
  • Identify network issues such as recreational apps
    and latency
  • Measure user experience
  • Monitor Service Level Agreements
  • Benchmark app response times
  • Access performance diagnostics

30
About ShapingApply Business Rules to WAN Traffic
  • Shaping provides control to
  • Fix critical application performance issues by
    allocating bandwidth
  • Contain recreational and malicious traffic
  • Minimize network congestion and latency

31
Why is Shaping Important?
  • To ensure Quality of Service for
    customer-critical apps
  • Smooth unpredictable QOS for customer critical
    apps
  • Prevent recreational and bandwidth hungry apps
    competing for limited bandwidth
  • To avoid network congestion
  • Cure congestion, queuing latencyand
    inefficiencies hurt applicationresponse times
  • Eliminate Branch office delays between remote
    locations.
  • To protect WAN from DoS
  • Stop uncontrolled recreational trafficand
    malicious traffic

32
Control Queuing
Flow 2
Flow 3
Flow 1
Bucket is full Dropped Packets of Flow 1, 2 and
3. Retransmits appear!
100Mbps
2Mbps
Flow 2
Flow 3
Flow 1
33
Router-based QoS Compared toPacketShaper Inbound
Rate Control
Configured in all the branches and Data Center,
router-based Queuing relies on the bulk transfers
being throttled down after packet loss
Branch Offices
A
Bulk Data
512Kbps
1Mbps
Data Center
B
512Kbps
Citrix
C
Packeteers Patented Rate Control applied only in
the Data Center slows down the Bulk traffic
without packet loss and before queues can build
512Kbps
Bulk Data
34
Control TCP Rate Control
SYN
SYN
Time
Time
SYN ACK
SYN ACK
ACK
ACK
get
get
Packet 1
TCP window 2 (set by PS)
Packet 1-2
TCP window 200
ACK 1
ACK 3
Packet 2-3
TCPwindow doesnt Increase, Ackenowledgement is
delayed
ACK 3
Packet 3-4
ACK 5
TCP window increases
Packet 4-7
Packet 6-7
Packet 5 dropped Packet 5-7 retransmitted!
ACK 8
ACK 5
Packet 5-6
Packet 9-10
ACK 7
ACK 11
Packet 7-9
PacketShaper
35
Control UDP Rate Control
Flow 2
Flow 1
Flow 3
Bucket is full Only penalty for flow 3!
100Mbps
64kbps
Flow 2
Flow 1
Flow 3
36
Partitions
VoIP 200k Guaranteed
Email Max. 300k
Intranet what is left
Burstable !!
Sub-Partitions !!
37
A Variety of Policies
A policy is a bandwidth-metric per flow.
  • Priority Policies
  • Rate Policies
  • Discard Policies
  • Never-Admit Policies
  • Ignore Policies
  • MPLS tagging / Diffserv marking

38
Real World Example
Without control Performance of Video is affected
With control policy protecting video
39
PacketShaper settings for streaming media
  • Make a VoIP folder or Video over IP folder
  • Partition with min and max values
  • Priority policies with high priority (5-7)to
    initial flows and Data control flows.
  • Rate policies to the Data flows

40
Shaping Intelligent Marking for MPLS Networks
41
Shaping PacketShaper and MPLS Working Together
MPLSLimited classes
PacketShaperAutomaticservice classification
42
Value Summary Shaping
  • Apply business rules to WAN traffic
  • Allocate bandwidth
  • Apply application-intelligent QoS for
    customer-critical apps
  • Fix application performance issues at any
    location
  • Secure the WAN from DoS
  • Pre-empt malicious events
  • Control recreational or malicious traffic
  • Deal smartly with congestion
  • Minimize latencies and inefficiencies for
    particular apps

43
Optimization using compression and acceleration
  • Christof Van Laer
  • Pre Sales Engineer Northern Europe
  • cvanlaer_at_packeteer.com

44
About CompressionReduce the Volume of WAN
Traffic
  • Compression creates bandwidth
  • Increase WAN capacity over the same physical
    links
  • Application-specific compression
  • Improve application performance
  • Apply best-suited compression algorithm for each
    application
  • Eliminate configuration overhead

45
Why is Compression Important?
  • Increase WAN capacity over the same physical
    links with application-specific compression
  • Improve application performance
  • Improve application performance and
    responsiveness
  • Apply best-suited compression algorithm for each
    application
  • Prioritize critical applications
  • Prioritize business-critical applications by
    giving them increased network capacity

46
Packeteers Solution to Increase Capacity
  • Application-Intelligence applied for selective
    compression
  • Low Latency maximizes performance
  • ActiveTunnel eliminates configuration
  • Algorithm plug-ins to maximize compression

47
Increased Capacity with Control
  • Makes sense only if application specific
  • Control allocation before adding resources
  • Ensure your customer-critical applications reap
    benefits
  • Contain bursty non-critical traffic
  • Manage end-to-latency and jitter
  • Actively throttles traffic before congestion
    occurs

Compression without Control
Compression with Control
48
PacketShaper Xpress
  • Like everything Packeteer does, it is application
    specific.
  • PacketShaper understands how well Xpress is
    working and can send more data based on actual
    compression ratios.

Compressible
Non-compressible
49
Xpress Reports
50
Compression Solution
  • Most customers experience between 21 and 31
    gains

PacketShaper Compression Module
Web Apps
General Internet
BlendedAverage
NetBIOS
Oracle
E-mail
100
75
Increase in capacity
50
25
0
31
51
21
2.51
41
2.51
Mix of traffic determines actual gains
51
Compression TechnologyIP Telephony Compression
  • UDP-RT Compression Packing for voice and video
  • RTP payload already compressed by voice/video
    codec (dont try to compress)
  • Header Compression Packet Packing
  • Use SuperPackets to pack payloads from multiple
    calls other compressible data
  • More efficient transport, removes unnecessary
    overhead
  • Increases capacity for voice and video
  • Fit more calls onto same bandwidth
  • Gains increase with capacity more calls, more
    savings

RTP Payload (call 1)
RTPHeader
IP Header
UDPHeader
Small payload (e.g. 64 bytes) Compressed by
codecs
12 bytes
20 bytes
8 bytes
52
Value Summary Compression
  • Reduce the Volume of WAN Traffic
  • Compression creates bandwidth
  • Increase WAN capacity over the same physical
    links
  • Application-specific compression
  • Improve application performance
  • Apply best-suited compression algorithm for each
    application
  • Eliminate configuration overhead

53
About Protocol AccelerationReclaim Wasted
Bandwidth
  • Optimize application performance over
    high-latency links
  • Accelerate file transfers, large and small
  • Speed database sync and backups, disaster
    recovery, XML and HTTP sessions
  • Increase link utilization on fat WAN links
  • Maximize bandwidth utilization and ROI
  • Minimize retransmission and recover more quickly
    from errors
  • Works in concert with compression leverages
    shaping

54
Why is Protocol Acceleration Important?
  • WAN latency and TCP protocol behavior are facts
    of life
  • Cause performance problems on the WAN
  • Affect more than 80 of WAN applications
  • Are not cured by simply adding more bandwidth
  • Can leverage compression and benefit from
    shaping
  • Has dramatic effect on performance of many apps
    such as
  • Datacenter mirroring
  • Backup
  • Web services

55
Xpress Acceleration Native TCP Performance
  • Delay vs. Throughput

Performance with Xpress
56
Xpress AccelerationTCP Performance Example
Branch
Router
Router
Branch
MAIN SITE
Router
RTT200 ms
Router
WAN
Applications
Router
Branch
Branch
  • Same TCP limitations on high-speed terrestrial
    links as satellite networks
  • Large file transfer from Saudi Arabia to Houston
  • RTT 200 ms
  • With 32 KB window, max transfer speed is
    1.28Mbps
  • Speed limited by TCP, no matter how much
    bandwidth available
  • If link is T1 (1,544 Mbps), link is nearly
    saturated
  • If link is T3 (44,736 Mbps), less than 3 of
    bandwidth is used

56
57
Network LatencyProblem Worse on Higher
Bandwidth Links
58
TCP Poor Performance with Latency
  • Affects all TCP Traffic
  • 80 of network traffic, including Web/HTTP, File
    Transfer (FTP), Exchange, Citrix, ERP, etc
  • Impact depends on OS and application type
  • Creates problems for large file transfers,
    backup, synchbig jobs

59
Acceleration Technology Xpress TCP
  • High performance network protocol transparent
    gateway

60
Acceleration Module Solution Xpress HTTP
  • Problem
  • Slow portals, Web-based SAP, Intranet and web
    pages
  • Solution Xpress HTTP
  • Accelerates Web-based applications Intranet
    portals
  • 8x speedup for web pages
  • Fast connection setup, Intelligent parsing,
    fetching, pre-caching of objects content
  • Applicable to HTTP and XML over HTTP

61
Xpress HTTP TechnologyIntelligent Pre-fetch
WAN
Internet
Client
Server
62
ExampleTCP Protocol Design and a CAD File
  • Engineering CAD File
  • An engineering design application working between
    data center and engineers branch office
  • Transfers a 500 MB CAD File via File Transport
    Protocol (FTP)
  • FTP uses Transmission Control Protocol (TCP) as
    in TCP/IP
  • FTP/TCP breaks the CAD file into chunks of data
    to send to the client transmission windows
  • FTP/TCP uses ACKnowledgements (ACK) to pace
    the flow of data from server
  • Application will not transmit the next window
    until it gets ACK from previous
  • Occurs very fast if in the same building

Data fills Window
ACK got it - send more data
Data fills next window
Client
Server
Fast on the LAN!
63
Acceleration Solution Transfer a 500 MB CAD
File with Xpress TCP
File Transfer on Normal WAN Link
150ms 280ms 600ms
1200ms
Xpress TCP
  • Reclaim 68 of link
  • Increase (and use) capacity 5x
  • Applications Large File Transfers
  • CAD Drawing Transfer
  • Data Replication
  • PC or Server Backup
  • Distributed Storage
  • Disaster Recovery

2 Mbps WAN
64
PacketShaper SolutionAcceleration and Control
  • End of Day Operations
  • One or a few big flows
  • Link is uncongested
  • Simple Acceleration works

65
Can Your Application Benefit from TCP
Acceleration?Key Qualifiers Applications, Link,
Latency and OS
  • Applications
  • Some applications are more conducive to TCP
    acceleration than others
  • Use our scoring system to average across your mix
    of apps.
  • Application Acceleration Ratings hyperlink
  • Link, latency and OS
  • Determine how much your network can benefit from
    Xpress TCP acceleration
  • Estimate your link's utilization and latency
    characteristics
  • Link Utilization Calculator hyperlink

66
Value summary Acceleration
  • Reclaim Wasted Bandwidth
  • Optimize application performance over
    high-latency links
  • Accelerate file transfers, large and small
  • Speed XML and HTTP sessions, disaster recovery,
    database sync and backups
  • Increase link utilization on fat WAN links
  • Maximize bandwidth utilization and ROI
  • Minimize retransmission and recover more quickly
    from errors
  • Works in concert with compression leverages
    shaping

67
About CIFS AccelerationMaking Server
Consolidation to work!
  • About Wide Area File Services (WAFS)
  • Server Consolidation Objectives and Pitfalls
  • iShared Solution
  • Performance
  • Data Reduction
  • Branch Office Services
  • Data Integrity
  • Scalability
  • Business Continuity
  • iShared for Mobile or Home-based Users
  • Why is iShared Different?
  • Summary

68
Creating an Ideal Extended Enterprise
Branch Office
Regional Office
Data Center
Wide Area Network
Remote Office
A streamlined, consolidated branch office IT
environmentwithout sacrificing performance,
access, or security!
Backup
Enterprise-class, well managed storage in the
data center
69
Server Consolidation Unanticipated Issues Have
Enterprises Hitting the Panic Button
  • Microsoft File Access performance problems
    challenges
  • Microsoft file access is VERY slow CIFS over the
    WAN is very poor combination
  • Change in application delivery infrastructure
  • DNS, DHCP, Print jobs, domain traffic, SMS
    traffic ALL centralized into the Data Center
  • Increased WAN Traffic
  • All file access, all DNS, DHCP, Print, domain,
    etc.
  • Impact to critical applications
  • Business critical applications (ERP, CRM, VOIP,
    etc) now contend with increased WAN load
  • IT infrastructure services (I.e DHCP, DNS, Print,
    etc) have increased latency that impacts all apps

70
Tacit Networks Approach
  • Step 3 Results
  • Real-time global collaboration
  • Lower costshigher productivity
  • Total edge data protection and 100 percent
    coherency/consistency
  • End-to-end security
  • Remote IT peace of mind
  • Step 1 Drop-in Appliance
  • Low profile footprint at each site
  • Seamless integration
  • As CLIENT to data center server
  • As SERVER to remote clients
  • Caching to ensure local-like response to users

SC/IP
SC/IP
SC/IP
SC/IP
Wide Area Network
  • Step 2 WAN-Optimized Protocol Distributed
    Filesystem
  • Optimizes data movement over the WAN between
    appliances
  • Extends applications to remote offices
  • Slashes latency by removing the chattiness of
    file and application protocols
  • Optimizes bandwidth via compression
    differencing
  • Minimizes WAN traffic on updates/saves
  • Ensures secure, reliable transmission across WANs

Backup
71
Dictionary-based Compression
  • Each end of the link maintains a dictionary of
    datastreams sent and/or seen
  • New datastreams catalogued in the dictionary with
    a tag assigned
  • Subsequent transfers of a common datastream dont
    require the physical data to be transferred
  • Only a tag telling the receiver where to locate
    the datastream in the dictionary

DataCenter
RemoteOffice
Tag Sent
Tag Rcd
10011000110011011110100111000110111011110110100100
100101001010101010011111101111
10011000110011011110100111000110111011110110100100
100101001010101010011111101111
Datastream requested
Datastream delivered
72
Tacits Core Technology
  • One-Point Storage Caching
  • Coherent, read/write LRU RAID-backed caching at
    edge
  • No data mirroring required at datacenter
  • Cache can be pre-populated for frequently used
    data
  • WAN-Optimized Transport (SC/IP)
  • Latency Optimizations Data streaming,
    read-ahead, clustered I/O
  • Bandwidth Optimizations File-aware
    differencing, compression, wide-dictionary
    compression

Data Center
Ishared Remote
Ishared Server
Remote Office
SC/IP
Wide Area Network
Backup
  • Distributed Filesystem
  • 100 coherency via lock/lease management
  • Asynchronous write-back with synchronous logging
    to RAID disk
  • Ensures data integrity and survives WAN
    disruptions
  • Global Namespace
  • Single view of storage resources from multiple
    fileservers locations
  • Easy drag and drop to move files even if its
    from one fileserver to another

73
Tacit Performance Impact
Time to open a 5 MB Word file1
Standard Network Share
122 seconds
Tacit NetworksCold Cache
11 seconds
Tacit Networks offers an order of magnitude
improvement over traditional WAN file sharing
Tacit Networks Warm Cache
3 seconds
Time to save a 6.7 MB AutoCAD file2
Standard Network Share
192 seconds
Tacit Networks
6 seconds
Tacit Networks unique architecture delivers
maximum performance on write operations as well
74
Accessing Shares Using UNC Path Names
75
Branch Office Email Problems
  • 90 of the average MS/Exchange store is
    attachments
  • Result Remote users have poor response time due
    to WAN latency
  • Network incurs massive bandwidth usage
  • Redundant data delivery to the branch office
    attachments are sent once for every user!
  • Resulting bandwidth consumption can slow WAN to a
    crawl
  • Administrators are forced to deploy localized
    mail servers ? drives up cost and risk

Remote Office
Data Center
10MB Sent to User 1
Exchange Server
10MB Forwarded to team
Wide Area Network
100 MB Opened by Team Members!
76
Building on WAFS Ishared Exchange Services (IES)
  • IES fixes Exchange bandwidth / latency issues for
    the branch office
  • Attachments only delivered once per branch
    office! (Single-instance delivery)
  • Bandwidth reduced 97 percent
  • Local-like email performance for branch users

Remote Office
Data Center
Exchange Server
Locally opened by team members
77
Building on WAFSAdditional Branch Services
Stackable Branch Office Services
  • Ishared Web Services
  • Web caching for optimum performance of
    web-enabled applications
  • Ishared Management Services
  • Optimized SMS software upgrade/patch distribution
  • Ishared Network Services
  • DNS/DHCP and Domain Controller services without
    requirement for local servers
  • Ishared Print Services
  • Replace local print servers without spooling over
    the WAN

Remote Office
Web Cache SMS Dist DNS/DHCPDomain Ctrl Print
Wide Area Network
Data Center
Wide Area File/Email Services
Backup
78
Visibility _at_ Microsoft.com
Embedded Partner of the year
79
Mobiliti Solution
80
Mobiliti Technology
Adaptive File Differencing
Mobiliti Server
Wide Area Network
File Server
Roaming User
  • Compresses data and transfers only file changes,
    not the whole file
  • Reduces synchronization and backup time by up to
    99
  • Delta Differencing Methodologies
  • Block-level differencing
  • Byte-level differencing
  • Write monitor differencing
  • Patented write monitor technology handles PST and
    other large files substantially better than
    existing techniques

81
Central management
  • Christof Van Laer
  • Pre Sales Engineer Northern Europe
  • cvanlaer_at_packeteer.com

82
About Centralized Management
  • Manage PacketShaper deployments in branch offices
    from a central site
  • Reduce Total Cost of Ownership (TCO)
  • ReportCenter
  • PolicyCenter
  • Enable automation management tasks
  • Reporting and alerts
  • Configuration management

83
Why is Management Important?
Appliances
Management
Monitoring Shaping Compression Acceleration
84
Enterprise-class Requirements forCentralized
Management
  • Centralized analysis and reporting collection,
    storage, analysis, report distribution
  • Centralized policy management and device
    administration
  • Rich APIs and alerts, leading vendor integration
  • Automation tools

ReportCenter provides deep insight to many
PacketShapers PolicyCenter simplifies
deployment, configuration and response Adaptive
Response can identify and respond automatically
PolicyCenter
ReportCenter
85
Management Workflow
Start
with PolicyCenter at overview level of
hierarchyFocus from application or network
perspective
1
Scan
for abnormalitiesProblems may be highlighted by
exception thresholds, load, or utilization
2
Analyze
the detailIdentify groups trending toward
problemsor triggering exception thresholds
3
Identify
the source of the issue or problem Detailed
metrics at all levels help isolate the source.
4
Act!
with PolicyCenter to resolve the problem
5
Automate?
consider using Adaptive Responseto automate
6
86
ReportCenter Centralized Reporting for all
PacketShaper Appliances
  • Comprehensive real time and historic
  • Network-wide performance analysis and management
  • Easy report distribution and access, per user
  • Fast flexible hierarchy workflow-based

87
PolicyCenter Cost-effective Management of
PacketShaper Appliances
  • Flexibly organize managed devices into
    hierarchical groups
  • Distribute configurations and software upgrades
    to multiple devices
  • View a summary of the status of all managed
    devices

Easy Depolyment now available!
88
Integration with Industry-Leading Management
Applications
BMC Patrol Dashboard
89
Management Value Summary
  • PacketShaper Centralized management lets you
  • Minimize administrative overhead and total cost
    of ownership
  • Respond quickly on an enterprise-scale to network
    or application performance changes
  • Define partitions and policies
  • Manage remote sites
  • Distribute software images and upgrades
  • Disseminate new categories of applications or
    traffic
  • Configure multiple appliances simultaneously
  • Automate intelligent responses to changes
  • Integrate with leading management tools
  • Analyze and report
  • View a summary of the status of all locations
  • Publish definitions of events of interest

90
Product overview
  • Christof Van Laer
  • Pre Sales Engineer Northern Europe
  • cvanlaer_at_packeteer.com

91
Technologies By Product
PacketShaper
Tacit I-Shared
SkyX Accelerator
92
About the PacketShaper SystemPacketShaper
Appliances
  • Majority of technology supported
  • Monitoring, Shaping, Compression, Protocol
    Acceleration
  • Appliance deployed
  • All-in one single box
  • LAN side of WAN router
  • 128kbps 1Gbps range
  • Centrally managed
  • Hardware platform
  • 1- and 2-U rack-mountable models
  • Transparent
  • No changes to applications or network
  • Scalable, available, reliable
  • Fail-safe via Hardware bypass
  • Supports redundancy

93
SkyX AcceleratorAcceleration Specialist
  • Acceleration to Enhance Performance
  • Overcome protocol design limits
  • Accelerate performance
  • Compression to Create Bandwidth
  • Decrease traffic by compressing and packing data
  • Increase capacity of network services
  • Data Center Scalability
  • Rated to 155 Mbps, tested to 622 Mbps
  • High flow density
  • Specialized Acceleration
  • IPV6 acceleration
  • SCPS compatible
  • Client-Server deployment options
  • Mobile and remote client software

94
I-Shared Branch Office IT ApplianceBranch
office in a Box
  • Wide Area File Services - WAFS
  • Access centralized storage over the WAN at
    LAN-speed with data integrity
  • Result True enterprise storage consolidation by
    extending datacenter storage over the WAN without
    compromising security, integrity
  • Branch Office IT Services
  • Consolidate branch office servers onto a single
    IT appliance
  • Result Lower cost / risk, ease of management,
    availability, and performance
  • Application Acceleration Services
  • Speed up critical email, web and application data
    over the WAN
  • Result increased performance/productivity,
    without requirement for distributed servers
  • TCP/IP Optimization Services
  • Optimize data movement over the network to
    eliminate redundant data transfer and speed
    response time
  • Result Increased performance, lower bandwidth
    requirements

95
How to compare to competition?
Remote Application Delivery
WAN Application Optimization
Managed Storage Server Infrastructure
Collaborative File Applications
Transactional, Recreational Communications
I-Share
WAN Opt WAFS Vendors
Juniper, Cisco, Riverbed, Orbital
96
cvanlaer_at_packeteer.com www.packeteer.com
Write a Comment
User Comments (0)
About PowerShow.com