Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Desktop Virtualization
Planning Guide
A compilation of our best educational content from
editors and experts, and industry statistics to prepare
you for your WAN optimization planning
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What are the most important factors for your organization when evaluating and purchasing
.... Page 4
desktop virtualization technologies?
..................... Page 8
What is a hybrid WAN service?
.... Page 8
What you need to know about the hybrid WAN
.. Page 10
Page 1 of 14
Page 2 of 14
1. APPLICATION OPTIMIZATION
Beefing up your service delivery model and application performance
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
ways that application optimization can help boost WAN performance and thus
boost company productivity. Find out which questions to ask vendors when
you're considering application delivery optimization. Read how businesses are
using service management tools to achieve optimization. Ultimately, the
success of application optimization is measured by how well a company is able
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
week. To that end, the traditional service delivery model, including the WAN,
3. WAN MANAGEMENT
must evolve to meet the changing needs of the enterprise. The advent of
public cloud services is just one example of changing WAN functionality, and
virtual tools are becoming an alternative to hardware for WAN optimization.
Read about how you can take advantage of new optimization technologies and
find out how to make sure your mobile employees can work more productively.
Page 3 of 14
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
applications and services are centralized, the distance between end users and
and services are constrained by the limited bandwidth of a wide area network
Page 4 of 14
Contents
A copy of information is kept locally, on the WAN optimizer, with the goal of
either avoiding or minimizing the number of times that information must be
Which challenges is
your organization
looking to address
with your new
technology purchase?
accessed from a remote site. Caching can take the form of either byte caching
or object caching. With byte caching, the sender and the receiver maintain
large disk-based caches of byte strings previously sent and received over the
WAN link. As data is queued for the WAN, it is scanned for byte strings already
in the local cache. Any strings resulting in cache hits are replaced with a short
Enhance service
delivery model with
WAN, application
optimization
token that refers to its cache location, allowing the receiver to reconstruct the
file from its copy of the cache.
Object caching stores copies of remote application objects in a local cache
server that is generally on the same LAN as the requesting system. If the
results from the cache querying the remote source server to ensure that the
a given network's bandwidth. TCP achieves flow control by using the sliding
cache contains a current version of the object, the request can be satisfied
locally at LAN speed and latency. Most of the latency involved in a cache hit
cached object is up to date.
3. Buffer tuning: Ensure the network is never idle if data is queued
pending transmission
Tuning the flow control buffers for TCP sets them to the optimal size to match
window algorithm that takes two important parameters into consideration: The
first one is the receiver advertised window size, which informs the sender of
the current buffer size of the TCP receiver; the second parameter is a
congestion window that controls the number of bytes a TCP flow may have in
the network at any given time. Tuning these buffers sets them to the optimal
size to match a given network's bandwidth. More advanced TCP tuning sets
timer values for retransmissions in a more aggressive manner than the default
values.
Page 5 of 14
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
optimizer. Common Internet File System (CIFS) and Server Message Block
(SMB) are the core protocols used to transfer files and browse remote
directory structures. Both are examples of chatty protocols.
For example, CIFS makes zero assumptions about the resiliency or reliability
Enhance service
delivery model with
WAN, application
optimization
of the underlying transport protocol and therefore incorporates its own end-toend acknowledgement of data transfers. CIFS allows a maximum of 60
kilobytes of data to be read or written at one time even if the underlying
transport protocol uses a sliding window that may be able to accommodate
much larger segments of data. These two attributes of CIFS cause the
address the chattiness of these protocols at its source by reducing the number
response time for large file transfers to increase drastically as the latency
between the client and the server increases. Protocol spoofing algorithms
of round trips required by employing predictive algorithms that are able to
identify files and subdirectories that may be accessed by the client.
5. QoS: Overcome common packet delivery problems inherent in oversubscribed networks
Page 6 of 14
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
controllers
These solutions are typically referred to as being asymmetric because an
appliance is only required in the data center and not in the branch offices.
Application delivery controllers (ADCs) perform computationally intensive
Enhance service
delivery model with
WAN, application
optimization
tasks, such as the processing of Secure Sockets Layer (SSL) traffic, which
frees up server resources. ADCs act as server load balancers (SLBs) that
balance traffic over multiple servers. Another common network offload
technology is TCP Offload Engine. This is a special network interface card that
performs TCP and IP protocol stack processing on the card, thus minimizing
Page 7 of 14
---------------------------------------------------------------------------------
---------------------------------------------------------------------------------
Page 8 of 14
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Remote users secured via clients anchored by IPsec over the Internet
When you're considering hybrid WAN connectivity, one of the areas it's
important to understand is how to engineer the way users will be supported
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN
versus how to engineer the method used to transport traffic back into the
network. With a multiprotocol label switching network playbook and a VPLS,
predictable performance of traffic is realized by using service-level indicators
together with features such as quality of service, or QoS, to prioritize
applications. When IT teams deploy hybrid WAN connectivity, which features
IPsec and Secure Sockets Layer, or SSL, over the Internet, the user
experience is sometimes hit or miss.
With this in mind, teams must carefully consider the performance of the
applications users will expect to access across each connectivity type. For
example, a user expecting to videoconference from a hotel room in a far-flung
exotic location would most probably be disappointed with the overall quality.
With this said, applications are becoming more aware of the underlying
network bandwidth. In scenarios where conditions are less than optimal, the
application will notify the user that a particular feature may not be available.
In addition to user performance, security is a concern when you're considering
the prospect of connecting a global user base back into the network across the
Internet. The address boundaries of the secure VPN within the overall hybrid
WAN must be extremely clear. There are multiple ways to secure user
connectivity back into the network, but in order to understand which features
are required for your organization, a thorough capability statement must be
created.
Within this statement, decide which resources are key to users and define the
type, location and profile within each subset. A smaller organization will find
Page 9 of 14
this task much easier than will a global enterprise with thousands of
employees, but by aligning requirements to profiles, the task is less onerous. If
robust policies exist to restrict access where required, using the Internet as
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
Page 10 of 14
Contents
only for cost reasons, but also to ease management. A hybrid WAN device
allows an organization to mix and match connectivity, terminating Layer 2 and
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN
Layer 3, as well as public Internet access from broadband to 3G and 4G -each of which adheres to specific security and traffic policies.
A hybrid WAN incorporates three approaches:
Page 11 of 14
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN
Page 12 of 14
If you are looking for more related tips and expert advice check out these
resource pages on WAN Optimization planning:
SearchNetworking.com
SearchEnterpriseWAN.com
Contents
Which challenges is
your organization
looking to address
with your new
technology purchase?
Enhance service
delivery model with
WAN, application
optimization
Basic wide area
network optimization
techniques
What are the most
important factors for
your organization
when evaluating and
purchasing desktop
virtualization
technologies?
What is a hybrid WAN
service?
What you need to
know about the hybrid
WAN
Page 13 of 14