Presentation is loading. Please wait.

Presentation is loading. Please wait.

Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager

Similar presentations


Presentation on theme: "Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager"— Presentation transcript:

1 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager rsuehring@silver-peak.com

2 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. “THE NETWORK DICTATES THE END USER EXPERIENCE” GARTNER GROUP 2014

3 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WAN VS. LAN Latency, Packet Loss, Out-of-Order Packets, Congestion

4 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LANWAN WHY IS A WAN NOT LIKE A LAN? LOSS MPLS 0.1% - 2% METRO ETHERNET 0.1% - 2% IP VPN 1.0% - 8.0% CONGESTION $/Port = High LATENCY 20-300ms LOSS None CONGESTION $/Port = low LATENCY ~1ms

5 PRIVATE LINES, DARK FIBER LAN LIKE QUALITY COMES AT A HIGH COST Latency Loss Congestion

6 MPLS, IP-VPN, METRO ETHERNET LOWER COST LINKS MAKES A WAN FEEL LIKE A … WAN Latency Loss Congestion

7 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LATENCY – SLOWS COMMUNICATIONS ACROSS WAN Transmit Ack Latency 1ms Total 4ms LAN Transmit Ack Latency 100ms Total 400ms WAN

8 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. LATENCY EFFECT ON THROUGHPUT Latency Mbps Throughput Receive Window Size Round Trip Time ≤ Performance of an application across the WAN is always dependent on the latency. Calculating Throughput The equation never asks for the bandwidth size!

9 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WHAT ABOUT THE STORAGE GUYS? Latency Gigabytes Per Hour Latency between locations has everything to do with how much traffic can be replicated. LatencyFromToGB/HR 5 msSan FranciscoSan Jose46 25 msSan FranciscoPhoenix9 50 msSan FranciscoChicago4 100 msSan FranciscoNew York2

10 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. PACKET LOSS 1 2 3 45 Packet Lost Caused by carrier congestion and SLA When packets are lost TCP window sized reduce by ½ Lost packets must be retransmitted Request Retransmit

11 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WE DID THE MATH FOR YOU! EFFECTIVE THROUGHPUT WITH LOSS From: NetForecast, “Improving Effective WAN Throughput for Large Data Flows, by Peter Sevcik and Rebecca Wetzel, Nov 2008 (http://bit.ly/12aL3gt) Mbps % Loss

12 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. OUT-OF-ORDER PACKETS 2 3 4 Caused by packets taking different routes Out-of-Order packets cause retransmission TCP window reduced to ensure reliability Detect Out-of-Order Request Retransmit 1

13 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. Latency, Packet Loss & Out-of-Order Packets Packet retransmission slows down TCP connections and degrades UDP WHAT DO YOU REALLY GET? What you actually experience What you pay for

14 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. Email SharePoint File Servers AD, DNS Internet Email SharePoint File Servers AD, DNS Internet EVERY APPLICATION CROSSES THE WAN CONGESTION Server Centralization VoIP Video Conferencing Screen Sharing VDI Printing VoIP Video Conferencing Screen Sharing VDI Printing Collaboration Storage Replication Remote Backup Failover to Cloud Storage Replication Remote Backup Failover to Cloud Disaster Recovery

15 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THE SILVER PEAK APPROACH OPTIMIZE AND CONDITION THE WAN

16 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. APPLY 1 OR ALL 3 TECHNIQUES THE SOLUTION NETWORK INTEGRITY FIX CONGESTION / PACKET LOSS Traffic Shaping/Quality of Service (QoS) Forward Error Correction (FEC) Packet Order Correction (POC) NETWORK MEMORY INCREASE BANDWIDTH Real-Time deduplication of all IP traffic TM NETWORK ACCELERATION EXTEND DISTANCE Mitigate protocol latency and chattiness LATENCY LOSS CONGESTION

17 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. OVERCOME LATENCY Transmit Ack Latency 100 ms* Total time: 500 ms Without Network Acceleration Transmit Ack Latency 100 ms* Total time: 100 ms With Network Acceleration *Latency is determined by: -Speed of light -Route taken -Congestion in network *Latency is determined by: -Speed of light -Route taken -Congestion in network

18 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ELIMINATE PACKET LOSS 1 2 3 45P Packet Lost Lost Packet Rebuilt from Parity Parity dynamically adjusted based on amount of loss Lost packets rebuilt at the receiving Silver Peak Receiver unaware packet loss has occurred No window size decrease

19 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. CORRECTING OUT-OF-ORDER PACKETS 1 2 3 4 1 2 3 4 Packets are tagged as they leave the Silver Peak Out-of-Order packets are reordered at the receiving side Receiving client unaware that out-of-order packets have occurred No window size decrease Detect Out-of-Order Reorder

20 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. CLEARING CONGESTION Not Cached Cached 1. Byte Fingerprint & Store 2. Compress + Transmit 3. Byte Fingerprint & Store 4. Uncompress & Deliver 1. Byte Fingerprint Match 2. Send Retrieve Instructions 3. Get Local Data from Cache 4. Deliver LAYER 3 BYTE LEVEL DEDUPLICATION

21 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THE SILVER PEAK APPROACH Optimize Anything

22 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WANOP BACKGROUND Gen 2 Gen 3 Optimize all protocols Optimize any application Correct for WAN problems Designed for TCP only Optimize a select set of applications Gen 1 Packet Shaping QOS

23 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. APPLICATION ACCELERATION Bulk TCP File CIFS, NFS, FTP, AFS Web HTTP/S, SharePoint Email Exchange, Notes, SMTP Data Replication SnapMirror, Celerra, HNAS, EqualLogic, etc. Remote Backup IP – Layer 3 (Network) Real-Time TCP VDI MSFT RDP, Citrix ICA SQL Queries MS, Oracle, Sybase, etc. Data Replication SRDF,RecoverPoint, HUR, Compellent, etc. Bulk UDP Video Streaming DNS File, NFS Aspera VMware Replication Real-Time UDP VoIP Video conferencing Streaming data VDI PCoIP VMware Lync Proprietary/ Encapsulated IP – IP GRE RTP RDP IP v6 in IPv4 FCIP VPLEX Cisco OTV TCP – Layer 4 (Transport) UDP – Layer 4 (Transport) LEGACY WAN OPTIMIZATION, GEN 1 AND GEN2

24 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. GENERATION 3 – OPTIMIZE ANYTHING NETWORK ACCELERATION & OPTIMIZATION Bulk TCP File CIFS, NFS, FTP, AFS Web HTTP/S, SharePoint Email Exchange, Notes, SMTP Data Replication SnapMirror, Celerra, HNAS, EqualLogic, etc. Remote Backup IP – Layer 3 (Network) Real-Time TCP VDI MSFT RDP, Citrix ICA SQL Queries MS, Oracle, Sybase, etc. Data Replication SRDF,RecoverPoint, HUR, Compellent, etc. Bulk UDP Video Streaming DNS File, NFS Aspera VMware Replication Real-Time UDP VoIP Video conferencing Streaming data VDI PCoIP VMware Lync Proprietary/ Encapsulated IP – IP GRE RTP RDP IP v6 in IPv4 FCIP VPLEX Cisco OTV TCP – Layer 4 (Transport) UDP – Layer 4 (Transport)

25 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. WHAT DOES IT REALLY MEAN? LAYER 4-7 LAYER 3 Set & forget - Optimize ANY & ALL traffic Fix network health issues, accelerates & deduplicates Optimization is 100% independent of the application or version Only optimize specific set applications Coordinate software upgrades with WANOP appliance version to avoid breaking applications and optimization Unsupported applications can break

26 Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. THANK YOU


Download ppt "Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager"

Similar presentations


Ads by Google