Sei sulla pagina 1di 14

2015

Desktop Virtualization
Planning Guide
A compilation of our best educational content from
editors and experts, and industry statistics to prepare
you for your WAN optimization planning

2015 Desktop Virtualization


Planning Guide

Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

The package of information you just downloaded was


written and assembled as an excellent guide for IT
professionals, like yourself, who are looking to address WAN
optimization planning. In a recent survey, we asked qualified
IT professionals in Asia Pacific on their desktop virtualization
purchases and plans for the coming months. 54% of
respondents said they are purchasing new technology to help
with their WAN optimization.
In this e-guide you will find related articles, including best
practices and technical tips to help your organization with
everything you need to know for WAN optimization.
We hope you enjoy this package of information and find it
useful when developing your new desktop virtualization plan
and strategies in your organization.
Contents
Which challenges is your organization looking to address with your new technology
purchase?
. Page 2
Enhance service delivery model with WAN, application optimization
.... Page 2

What is a hybrid WAN


service?

Basic wide area network optimization techniques

What you need to


know about the hybrid
WAN

What are the most important factors for your organization when evaluating and purchasing

.... Page 4
desktop virtualization technologies?
..................... Page 8
What is a hybrid WAN service?
.... Page 8
What you need to know about the hybrid WAN
.. Page 10

Page 1 of 14

2015 Desktop Virtualization


Planning Guide

Which challenges is your organization looking to address


with your new technology purchase?
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN

54% of our respondents are purchasing new technology to


address their apprehension about performance over the
WAN
--------------------------------------------------------------------------------Enhance service delivery model with WAN, application
optimization
Finding new ways to optimize and accelerate your WAN is a
critical necessity as traffic and the number of mobile devices
increase across the enterprise.
In today's enterprise, finding ways to improve application performance to
enhance your service delivery model and associated network capabilities is a
necessity. Combine this with the increased capabilities of mobile devices and
tablets, and the demand for network application optimization is at an all-time
high. In order for businesses to function efficiently, the WAN must be secure,
reliable and accessible. This guide discusses some of the steps enterprises
can take to boost application performance over the WAN today, and provides a
glimpse into the innovations that will underpin WAN infrastructure tomorrow.
Since all network configurations are unique, so are the techniques required to
manage WAN optimization.

Page 2 of 14

2015 Desktop Virtualization


Planning Guide

1. APPLICATION OPTIMIZATION
Beefing up your service delivery model and application performance

Contents

Application delivery controllers plus performance management technology


equals a new approach to application optimization. This section discusses

Which challenges is
your organization
looking to address
with your new
technology purchase?

ways that application optimization can help boost WAN performance and thus
boost company productivity. Find out which questions to ask vendors when
you're considering application delivery optimization. Read how businesses are
using service management tools to achieve optimization. Ultimately, the
success of application optimization is measured by how well a company is able

Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques

to meet its service-level agreements.


2. REINVENTING THE WAN
Reinventing the wide area network delivery
Work is no longer a physical place where everyone goes to get things done.
Instead, work happens in multiple locations, 24 hours a day, seven days a

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

week. To that end, the traditional service delivery model, including the WAN,

What is a hybrid WAN


service?

3. WAN MANAGEMENT

What you need to


know about the hybrid
WAN

must evolve to meet the changing needs of the enterprise. The advent of
public cloud services is just one example of changing WAN functionality, and
virtual tools are becoming an alternative to hardware for WAN optimization.
Read about how you can take advantage of new optimization technologies and
find out how to make sure your mobile employees can work more productively.

Managing the WAN: New frontiers in service delivery models


Wide area network delivery becomes more complex with the introduction of the
cloud, mobile device capabilities and the increase in security threats. Read
about ways to keep mobile data from clogging up your network and why the
mode of protocol spoofing is a benefit when optimizing WAN traffic. Learn why
the data center can no longer be the gateway to the Internet.

Page 3 of 14

2015 Desktop Virtualization


Planning Guide

Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization

Basic wide area network optimization techniques


Adding bandwidth to your network does not always fix slow
applications problems. Consider these WAN optimization
techniques first.
Centralization and server consolidation continue to be key initiatives for IT
organizations everywhere. The benefits are clear: simplified IT management,
increased data compliance and control, and reduced hardware, software and
management costs.
Unfortunately, these initiatives are usually accompanied by new and complex
application performance challenges. If these challenges are not met, they can
and usually do result in project delays or outright failures, additional costs, and
dissatisfied end users and business leaders. This is because, when

Basic wide area


network optimization
techniques

applications and services are centralized, the distance between end users and

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

and services are constrained by the limited bandwidth of a wide area network

What is a hybrid WAN


service?

network optimization and how each works to optimize traffic.

What you need to


know about the hybrid
WAN

services increases. When this happens, networks experience additional


latency and packet loss increases while the connections between end users
(WAN) connection. The best solution is not to buy more bandwidth or increase
server processing power.
Instead, the ideal solution is to implement wide area network optimization
techniques and to do so at the start -- not toward the end of your centralization
project. Below, I will discuss the most common techniques used in wide area

1. Compression: Reduce the amount of data sent over the network


The role of compression is to reduce the size of a file prior to transmission or
storage. One factor influencing the effectiveness of compression is the amount
of redundancy in the traffic. Applications that transfer highly-redundant data,
such as text and HTML on Web pages, will benefit significantly from advanced
compression. Applications that transfer data that has already been
compressed, such as VoIP or JPG images, will see little improvement in
performance from compression.

Page 4 of 14

2015 Desktop Virtualization


Planning Guide

2. Caching: Store downloaded network data locally for subsequent


retrieval and reuse

Contents

A copy of information is kept locally, on the WAN optimizer, with the goal of
either avoiding or minimizing the number of times that information must be

Which challenges is
your organization
looking to address
with your new
technology purchase?

accessed from a remote site. Caching can take the form of either byte caching
or object caching. With byte caching, the sender and the receiver maintain
large disk-based caches of byte strings previously sent and received over the
WAN link. As data is queued for the WAN, it is scanned for byte strings already
in the local cache. Any strings resulting in cache hits are replaced with a short

Enhance service
delivery model with
WAN, application
optimization

token that refers to its cache location, allowing the receiver to reconstruct the
file from its copy of the cache.
Object caching stores copies of remote application objects in a local cache

Basic wide area


network optimization
techniques

server that is generally on the same LAN as the requesting system. If the

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

results from the cache querying the remote source server to ensure that the

What is a hybrid WAN


service?

a given network's bandwidth. TCP achieves flow control by using the sliding

What you need to


know about the hybrid
WAN

cache contains a current version of the object, the request can be satisfied
locally at LAN speed and latency. Most of the latency involved in a cache hit
cached object is up to date.
3. Buffer tuning: Ensure the network is never idle if data is queued
pending transmission
Tuning the flow control buffers for TCP sets them to the optimal size to match
window algorithm that takes two important parameters into consideration: The
first one is the receiver advertised window size, which informs the sender of
the current buffer size of the TCP receiver; the second parameter is a
congestion window that controls the number of bytes a TCP flow may have in
the network at any given time. Tuning these buffers sets them to the optimal
size to match a given network's bandwidth. More advanced TCP tuning sets
timer values for retransmissions in a more aggressive manner than the default
values.

Page 5 of 14

2015 Desktop Virtualization


Planning Guide

4. Protocol spoofing: Reduce the number of round trips necessary for a


transaction

Contents

This refers to a network optimization technique in which a client makes a


request of a distant server, but the request is responded to locally by the WAN

Which challenges is
your organization
looking to address
with your new
technology purchase?

optimizer. Common Internet File System (CIFS) and Server Message Block
(SMB) are the core protocols used to transfer files and browse remote
directory structures. Both are examples of chatty protocols.
For example, CIFS makes zero assumptions about the resiliency or reliability

Enhance service
delivery model with
WAN, application
optimization

of the underlying transport protocol and therefore incorporates its own end-toend acknowledgement of data transfers. CIFS allows a maximum of 60
kilobytes of data to be read or written at one time even if the underlying
transport protocol uses a sliding window that may be able to accommodate

Basic wide area


network optimization
techniques

much larger segments of data. These two attributes of CIFS cause the

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

address the chattiness of these protocols at its source by reducing the number

What is a hybrid WAN


service?

Quality of Service (QoS) is a tool that provides better service to selected

What you need to


know about the hybrid
WAN

response time for large file transfers to increase drastically as the latency
between the client and the server increases. Protocol spoofing algorithms
of round trips required by employing predictive algorithms that are able to
identify files and subdirectories that may be accessed by the client.
5. QoS: Overcome common packet delivery problems inherent in oversubscribed networks

packets that belong to a pre-specified class of service (CoS). This assumes


that applications have been classified for specific levels of service and that
their data traffic can be identified to belong to that class. CoS is done by either
raising the priority of a packet or limiting the priority of another packet.
Congestion management tools raise the priority of a packet by providing a
unique queue in routers and/or switches for each class separately and
servicing the queue for each class in different ways. The queue management
tool used for congestion avoidance raises priority by dropping lower-priority
packets before higher-priority ones. Policy shaping provides priority to packets
by limiting the throughput of other queues. Congestion management, queue

Page 6 of 14

2015 Desktop Virtualization


Planning Guide

management, link efficiency and shaping/policy tools provide QoS within a


single network element.

Contents

6. Application delivery: Offload computationally intensive


communications tasks from servers and clients to application delivery

Which challenges is
your organization
looking to address
with your new
technology purchase?

controllers
These solutions are typically referred to as being asymmetric because an
appliance is only required in the data center and not in the branch offices.
Application delivery controllers (ADCs) perform computationally intensive

Enhance service
delivery model with
WAN, application
optimization

tasks, such as the processing of Secure Sockets Layer (SSL) traffic, which
frees up server resources. ADCs act as server load balancers (SLBs) that
balance traffic over multiple servers. Another common network offload
technology is TCP Offload Engine. This is a special network interface card that

Basic wide area


network optimization
techniques

performs TCP and IP protocol stack processing on the card, thus minimizing

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

When used effectively, each of these wide area network optimization

What is a hybrid WAN


service?

hospitality market verticals.

What you need to


know about the hybrid
WAN

Page 7 of 14

the workload of the machine's CPU.

techniques can overcome the challenges introduced by increased latency and


bandwidth constraints created by consolidation and centralization efforts.
About the author:
Henry Svendblad has over 15 years of IT management experience in the
software development, healthcare, professional services, education, and

---------------------------------------------------------------------------------

2015 Desktop Virtualization


Planning Guide

What are the most important factors for your organization


when evaluating and purchasing desktop virtualization
technologies?
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques

37% of our respondents said that working well over a WAN


was their most important consideration

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

---------------------------------------------------------------------------------

What is a hybrid WAN


service?
What you need to
know about the hybrid
WAN

What is a hybrid WAN service?


When considering hybrid WAN architecture, organizations
must focus on the end-user experience and security.
The overall landscape for business is changing fast. Users today are
connecting to the corporate network with new, feature-rich applications via a
myriad of devices from various global locations. This evolution creates a
network architecture that must meet needs across a wide set of requirements.
The truth is, there is not one single wide area network (WAN) platform that
exists to meet every requirement across users and offices.
In almost every design we create, the outcome revolves around hybrid WAN
connectivity -- an approach that leverages the public Internet VPN with
traditional WAN services. For example, our designs would normally include the
following:

A core network created using Layer 3 virtual private routed networks,


or VPRns

Page 8 of 14

2015 Desktop Virtualization


Planning Guide

A metropolitan area network connected via dedicated fiber

Data center connectivity within different geographic regions connected


via a virtual private LAN Service (VPLS)

Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?

Remote users secured via clients anchored by IPsec over the Internet

Remote offices and difficult-to-connect sites connected via IPsec over


the Internet using a dedicated VPN device

Fast-start 3G and 4G connectivity

When you're considering hybrid WAN connectivity, one of the areas it's
important to understand is how to engineer the way users will be supported

Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN

versus how to engineer the method used to transport traffic back into the
network. With a multiprotocol label switching network playbook and a VPLS,
predictable performance of traffic is realized by using service-level indicators
together with features such as quality of service, or QoS, to prioritize
applications. When IT teams deploy hybrid WAN connectivity, which features
IPsec and Secure Sockets Layer, or SSL, over the Internet, the user
experience is sometimes hit or miss.
With this in mind, teams must carefully consider the performance of the
applications users will expect to access across each connectivity type. For
example, a user expecting to videoconference from a hotel room in a far-flung
exotic location would most probably be disappointed with the overall quality.
With this said, applications are becoming more aware of the underlying
network bandwidth. In scenarios where conditions are less than optimal, the
application will notify the user that a particular feature may not be available.
In addition to user performance, security is a concern when you're considering
the prospect of connecting a global user base back into the network across the
Internet. The address boundaries of the secure VPN within the overall hybrid
WAN must be extremely clear. There are multiple ways to secure user
connectivity back into the network, but in order to understand which features
are required for your organization, a thorough capability statement must be
created.
Within this statement, decide which resources are key to users and define the
type, location and profile within each subset. A smaller organization will find

Page 9 of 14

2015 Desktop Virtualization


Planning Guide

this task much easier than will a global enterprise with thousands of
employees, but by aligning requirements to profiles, the task is less onerous. If
robust policies exist to restrict access where required, using the Internet as

Contents

leverage to complete the overall connectivity requirement is a must in today's


highly connected business.

Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques

About the author:


Robert Sturt heads up The Network Union, an authorized MPLS BT global
and UK business partner.

What you need to know about the hybrid WAN


The ballooning amount of data generated by users and
applications is fueling the development of hybrid WANs.
Here's what you need to know.
The days of the wide area network (WAN) supporting straightforward data

What are the most


important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?

requirements are over. Today's hyper-connected world is generating and

What is a hybrid WAN


service?

capability and processing power of ubiquitous and feature-rich applications that

What you need to


know about the hybrid
WAN

consuming data at significant rates across multiple types of virtual private


network (VPN) connectivity, ranging from Ethernet and Multiprotocol Label
Switching (MPLS) to Internet Protocol Security (IPSec) over 3G, 4G and
leased-line Internet.
Indeed, the growth of IP traffic is expected to increase significantly due to the
run across laptops, PCs, tablets and phones. At the same time, IT budgets
remain under pressure, even as enterprises are required to provide seamless
access to resources -- regardless of location and access type.
Internet and traditional WAN services play an equally significant role for
enterprise connectivity, and therefore must be served with equal importance.
The hybrid VPN enables both the public Internet and private WAN to be
deployed through its ability to terminate multiple interfaces -- each with the
capability to serve traffic differently based on source.
To that end, network designs are increasingly including a hybrid WAN-- one
underpinned by solid integration between private IP and public IP to ensure

Page 10 of 14

2015 Desktop Virtualization


Planning Guide

performance. In the past, corporate network connectivity has often existed


within silos, with IT provisioning multiple hardware devices to deal with a
particular termination type. Today, IT teams are looking to consolidate -- not

Contents

only for cost reasons, but also to ease management. A hybrid WAN device
allows an organization to mix and match connectivity, terminating Layer 2 and

Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN

Layer 3, as well as public Internet access from broadband to 3G and 4G -each of which adheres to specific security and traffic policies.
A hybrid WAN incorporates three approaches:

A network VPN: Uses global and national service providers, generally


MPLS and virtual private LAN-based VPN services.

CPE hardware-based VPN: Anchored by routers and firewalls capable


of running IPSec between end sites. The customer premises
equipment (CPE) resides at the customer's location.

Application VPN: Application tunnels from hosts are created


independently on a per-user or per-application basis.

The overall supportable features of a hybrid WAN include:


Transport independence: The ability to terminate all traffic sources from both
office and remote users, including MPLS, virtual private LAN service and
IPSec over the Internet. Transport independence also supports policy-based
application routing; in other words, the CPE will send traffic to the appropriate
resource based on certain parameters.
Network flow control: Includes application awareness, which is the capability
to deny or deliver applications intended for a subset of users; statistical
reporting, or the ability to report on bandwidth usage, latency, jitter and uptime
per connection; policy-based routing, permitting traffic to be routed based on
network performance requirements. In these cases, less mission-critical traffic
may be routed over a lower-priority circuit or connection. Flow control also
includes the ability to load-balance over multiple connections, providing
aggregated bandwidth.

Page 11 of 14

2015 Desktop Virtualization


Planning Guide

Application performance optimization: This encompasses sending


applications through a specific network path to create an optimized delivery
path, based on acceleration and application optimization via caching and local

Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN

Page 12 of 14

packet acknowledgment services.


Security: Is achieved through capabilities that include IPSec and Secure
Socket Layer termination with further support for token access and network
firewalling to restrict traffic types, certain users or to segregate extranet
partners.
Regardless of the capability of these hybrid services, IT managers must pay
special attention to application and security requirements. As with all designs,
your specific goals and objectives will dictate how a hybrid WAN approach may
work for you. If, for example, you need branch connectivity for only limited
times or you require fast provisioning via broadband providers, a hybrid
approach may be the answer. But enterprises must also gauge how they want
to segment users and applications, and enable overall access to their network.
About the author
Robert Sturt heads up The Network Union, an authorized MPLS BT global
and UK business partner.

If you are looking for more related tips and expert advice check out these
resource pages on WAN Optimization planning:

SearchNetworking.com

SearchEnterpriseWAN.com

2015 Desktop Virtualization


Planning Guide

Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN

Page 13 of 14

Free resources for technology professionals


TechTarget publishes targeted technology media that address your need for
information and resources for researching products, developing strategy and
making cost-effective purchase decisions. Our network of technology-specific
Web sites gives you access to industry experts, independent content and
analysis and the Webs largest library of vendor-provided white papers,
webcasts, podcasts, videos, virtual trade shows, research reports and more
drawing on the rich R&D resources of technology providers to address
market trends, challenges and solutions. Our live events and virtual seminars
give you access to vendor neutral, expert commentary and advice on the
issues and challenges you face daily. Our social community IT Knowledge
Exchange allows you to share real world information in real time with peers
and experts.

What makes TechTarget unique?


TechTarget is squarely focused on the enterprise IT space. Our team of
editors and network of industry experts provide the richest, most relevant
content to IT professionals and management. We leverage the immediacy of
the Web, the networking and face-to-face opportunities of events and virtual
events, and the ability to interact with peersall to create compelling and
actionable information for enterprise IT professionals across all industries
and markets.

Related TechTarget Websites

Potrebbero piacerti anche