Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager

Slides:



Advertisements
Similar presentations
Deloitte Technology Fast 500 Asia Pacific Winners Accelerating Your Network WACC Technology.
Advertisements

Strictly Confidential | © 2012 Silver Peak Systems, Inc. All Rights Reserved. May 22nd, 2013 STORAGE REPLICATION ACCELERATION Taking Control of the Problem.
Streaming Video over the Internet
Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. DATA CENTER CLASS WAN OPTIMIZATION. ACCELERATE & OPTIMIZE ANY APP Colm Foley.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
Data center class wan optimization
The next generation of data Acceleration
The next generation of data Acceleration
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Services Networking for Home & Small Business.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Application layer (continued) Week 4 – Lecture 2.
TCP/IP: the transport layer Skills: none IT concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
CS332 Ch. 28 Spring 2014 Victor Norman. Access delay vs. Queuing Delay Q: What is the difference between access delay and queuing delay? A: I think the.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Process-to-Process Delivery:
1 CMSCD1011 Introduction to Computer Audio Lecture 10: Streaming audio for Internet transmission Dr David England School of Computing and Mathematical.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
1 Transport Layer Computer Networks. 2 Where are we?
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
11 September 2015 RE Meyers, Ms.Ed. CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Network Services Networking for Home & Small Business.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
TCP/IP Transport and Application (Topic 6)
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Networking Basics CCNA 1 Chapter 11.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Chapter 5 Network and Transport Layers
LESSON Networking Fundamentals Understand TCP/IP.
The Transport Layer Implementation Services Functions Protocols
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Introduction to Networking
Process-to-Process Delivery:
File Transfer Issues with TCP Acceleration with FileCatalyst
Beyond FTP & hard drives: Accelerating LAN file transfers
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. “THE NETWORK DICTATES THE END USER EXPERIENCE” GARTNER GROUP 2014

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WAN VS. LAN Latency, Packet Loss, Out-of-Order Packets, Congestion

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LANWAN WHY IS A WAN NOT LIKE A LAN? LOSS MPLS 0.1% - 2% METRO ETHERNET 0.1% - 2% IP VPN 1.0% - 8.0% CONGESTION $/Port = High LATENCY ms LOSS None CONGESTION $/Port = low LATENCY ~1ms

PRIVATE LINES, DARK FIBER LAN LIKE QUALITY COMES AT A HIGH COST Latency Loss Congestion

MPLS, IP-VPN, METRO ETHERNET LOWER COST LINKS MAKES A WAN FEEL LIKE A … WAN Latency Loss Congestion

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LATENCY – SLOWS COMMUNICATIONS ACROSS WAN Transmit Ack Latency 1ms Total 4ms LAN Transmit Ack Latency 100ms Total 400ms WAN

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LATENCY EFFECT ON THROUGHPUT Latency Mbps Throughput Receive Window Size Round Trip Time ≤ Performance of an application across the WAN is always dependent on the latency. Calculating Throughput The equation never asks for the bandwidth size!

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WHAT ABOUT THE STORAGE GUYS? Latency Gigabytes Per Hour Latency between locations has everything to do with how much traffic can be replicated. LatencyFromToGB/HR 5 msSan FranciscoSan Jose46 25 msSan FranciscoPhoenix9 50 msSan FranciscoChicago4 100 msSan FranciscoNew York2

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. PACKET LOSS Packet Lost Caused by carrier congestion and SLA When packets are lost TCP window sized reduce by ½ Lost packets must be retransmitted Request Retransmit

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WE DID THE MATH FOR YOU! EFFECTIVE THROUGHPUT WITH LOSS From: NetForecast, “Improving Effective WAN Throughput for Large Data Flows, by Peter Sevcik and Rebecca Wetzel, Nov 2008 ( Mbps % Loss

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. OUT-OF-ORDER PACKETS Caused by packets taking different routes Out-of-Order packets cause retransmission TCP window reduced to ensure reliability Detect Out-of-Order Request Retransmit 1

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. Latency, Packet Loss & Out-of-Order Packets Packet retransmission slows down TCP connections and degrades UDP WHAT DO YOU REALLY GET? What you actually experience What you pay for

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. SharePoint File Servers AD, DNS Internet SharePoint File Servers AD, DNS Internet EVERY APPLICATION CROSSES THE WAN CONGESTION Server Centralization VoIP Video Conferencing Screen Sharing VDI Printing VoIP Video Conferencing Screen Sharing VDI Printing Collaboration Storage Replication Remote Backup Failover to Cloud Storage Replication Remote Backup Failover to Cloud Disaster Recovery

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THE SILVER PEAK APPROACH OPTIMIZE AND CONDITION THE WAN

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. APPLY 1 OR ALL 3 TECHNIQUES THE SOLUTION NETWORK INTEGRITY FIX CONGESTION / PACKET LOSS Traffic Shaping/Quality of Service (QoS) Forward Error Correction (FEC) Packet Order Correction (POC) NETWORK MEMORY INCREASE BANDWIDTH Real-Time deduplication of all IP traffic TM NETWORK ACCELERATION EXTEND DISTANCE Mitigate protocol latency and chattiness LATENCY LOSS CONGESTION

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. OVERCOME LATENCY Transmit Ack Latency 100 ms* Total time: 500 ms Without Network Acceleration Transmit Ack Latency 100 ms* Total time: 100 ms With Network Acceleration *Latency is determined by: -Speed of light -Route taken -Congestion in network *Latency is determined by: -Speed of light -Route taken -Congestion in network

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ELIMINATE PACKET LOSS P Packet Lost Lost Packet Rebuilt from Parity Parity dynamically adjusted based on amount of loss Lost packets rebuilt at the receiving Silver Peak Receiver unaware packet loss has occurred No window size decrease

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. CORRECTING OUT-OF-ORDER PACKETS Packets are tagged as they leave the Silver Peak Out-of-Order packets are reordered at the receiving side Receiving client unaware that out-of-order packets have occurred No window size decrease Detect Out-of-Order Reorder

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. CLEARING CONGESTION Not Cached Cached 1. Byte Fingerprint & Store 2. Compress + Transmit 3. Byte Fingerprint & Store 4. Uncompress & Deliver 1. Byte Fingerprint Match 2. Send Retrieve Instructions 3. Get Local Data from Cache 4. Deliver LAYER 3 BYTE LEVEL DEDUPLICATION

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THE SILVER PEAK APPROACH Optimize Anything

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WANOP BACKGROUND Gen 2 Gen 3 Optimize all protocols Optimize any application Correct for WAN problems Designed for TCP only Optimize a select set of applications Gen 1 Packet Shaping QOS

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. APPLICATION ACCELERATION Bulk TCP File CIFS, NFS, FTP, AFS Web HTTP/S, SharePoint Exchange, Notes, SMTP Data Replication SnapMirror, Celerra, HNAS, EqualLogic, etc. Remote Backup IP – Layer 3 (Network) Real-Time TCP VDI MSFT RDP, Citrix ICA SQL Queries MS, Oracle, Sybase, etc. Data Replication SRDF,RecoverPoint, HUR, Compellent, etc. Bulk UDP Video Streaming DNS File, NFS Aspera VMware Replication Real-Time UDP VoIP Video conferencing Streaming data VDI PCoIP VMware Lync Proprietary/ Encapsulated IP – IP GRE RTP RDP IP v6 in IPv4 FCIP VPLEX Cisco OTV TCP – Layer 4 (Transport) UDP – Layer 4 (Transport) LEGACY WAN OPTIMIZATION, GEN 1 AND GEN2

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. GENERATION 3 – OPTIMIZE ANYTHING NETWORK ACCELERATION & OPTIMIZATION Bulk TCP File CIFS, NFS, FTP, AFS Web HTTP/S, SharePoint Exchange, Notes, SMTP Data Replication SnapMirror, Celerra, HNAS, EqualLogic, etc. Remote Backup IP – Layer 3 (Network) Real-Time TCP VDI MSFT RDP, Citrix ICA SQL Queries MS, Oracle, Sybase, etc. Data Replication SRDF,RecoverPoint, HUR, Compellent, etc. Bulk UDP Video Streaming DNS File, NFS Aspera VMware Replication Real-Time UDP VoIP Video conferencing Streaming data VDI PCoIP VMware Lync Proprietary/ Encapsulated IP – IP GRE RTP RDP IP v6 in IPv4 FCIP VPLEX Cisco OTV TCP – Layer 4 (Transport) UDP – Layer 4 (Transport)

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WHAT DOES IT REALLY MEAN? LAYER 4-7 LAYER 3 Set & forget - Optimize ANY & ALL traffic Fix network health issues, accelerates & deduplicates Optimization is 100% independent of the application or version Only optimize specific set applications Coordinate software upgrades with WANOP appliance version to avoid breaking applications and optimization Unsupported applications can break

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THANK YOU