®
Agenda
■
Bridging the WAN-Application Gap
■
PacketShaper and integrated modules
■
A close look inline at each module in terms of:
– Why is it important?
– What problems does it solve?
– How does it help?
– How does it work?
– Why is it different?
– What are the benefits?
2
About the PacketShaper System:
PacketShaper Appliances
■
Appliance deployed
– All-in one single box
– LAN side of WAN router
– 128kbps – 1Gbps range
– Centrally managed
■
Hardware platform
– 1- and 2-U rack-mountable models
■
Transparent
– No changes to applications or network
■
Scalable, available, reliable
– Fail-safe
■ Hardware bypass on power down or failure
– Supports redundancy
■ Direct standby failover configurations
4
PacketShaper Range
Branch Office Enterprise Core
5
The Packeteer PacketShaper:
Bridging the WAN-Application Gap
Unique, deep visibility into all traffic on the WAN
Shaping
Module
Compression
Module
Acceleration
Module
Control and optimize WAN traffic; match your business
See what the problems are and set about solving them
Monitoring Module
PacketShaper
PolicyCenter ReportCenter
Centralized management implemented at any stage
Monitoring Module for Visibility
– Standard on all PacketShaper models
– Discover applications on the network
–
Track application response and SLAs
– Diagnose problems and issues
Shaping Module for Control
– QoS provisioning to ensure performance of critical applications
– Align network costs with the business
Compression Module to Reduce WAN Data
–
Decrease traffic by compressing data
– Increase capacity of network services
Acceleration Module Increases Performance
– Overcome protocol design limits and latency
– Accelerate performance
Centralized Management Software
–
ReportCenter and PolicyCenter
– Reduce TCO
6
Example Deployment Progression
1
Gain Visibility
Core PacketShaper
Monitoring Module
2
Get Control
Software Key Upgrade
Shaping Module
3
Increase Capacity
Add PacketShaper to edge
Compression Modules
WAN Core
4
Enhance Performance
Software Key Upgrade
Acceleration Modules
WAN Edge
5
Lower TCO
Centralized Management
PolicyCenter and ReportCenter
7
Benefits of Integrating WAN Application
Optimization
Monitoring
Issue Analysis
Acceleration
Enhanced
Performance
Integrated
Application
Optimization
Shaping
QOS
Provisioning
Compression
Increased
Capacity
■
Manage the entire process
– Assessing the issues
– Choosing the tools
– Resolving emergent problems
■
Key feedback relationships between optimization tools
– QoS provisions the pipe to applications
– Compression changes the size of the pipe
– Acceleration needs to know how much pipe there is to fill
– Need to work together
■
Manage all types of applications
– Customer critical, latency sensitive applications
– Collaborative documents & files
– Real time communications
– IT Infrastructure
– Recreational and malicious
8
About Monitoring:
Identify Issues and Select the Right Tools
Monitoring provides visibility:
■
Identify applications
■
Monitor utilization and performance
– Identify network issues such as:
■ Recreational apps
■ Latency
■
Measure user experience
– Monitor Service-Level
Agreements
– Benchmark app response times
■
Access performance diagnostics
9
Why is PacketShaper Monitoring
Important?
Before you can deal with application performance issues, you need to know what’s using the bandwidth!
Sources: *Network World / Packeteer Application Performance Survey
10
Problems Caused by Lack of Visibility
■
No information to match WAN usage to business objectives
■
No proper idea of return on bandwidth investment
■
Difficulty in ensuring SLA for projects such as convergence and MPLS
■
No grasp on network performance:
– Utilization
– Efficiency
– Response times
■
No ability to perform diagnostics
11
PacketShaper Visibility Solution
■
Layer 7 Plus
– Goes beyond simple address and port-based analysis
– Unique to PacketShaper
– Provides application-intelligence for:
■ Performance monitoring
■ Flow forensics
■ PacketShaper Shaping and
Compression functions
■
Automatic Traffic Discovery
– Analyze and automatically classify all WAN traffic
12
Monitoring Technology:
Industry-Leading Layer 7 Plus Classification
■
Unique to Packeteer
■
Empowers IT organizations to:
– Identify applications on the network
– Measure utilization by application
– Benchmark response times & SLA’s for key applications
–
Diagnose & isolate causes of performance problems
13
Monitoring Technology:
Automatic Traffic Discovery
■
Place PacketShaper at WAN/LAN threshold
■
Turn on traffic discovery
■
PacketShaper maps traffic to its classification library
– Automatically builds a list of the applications running on your network
■
Starts collecting performance data
– Utilization
– Efficiency
– Response times
14
Monitoring:
Alternatives
■
Layer 7 Plus goes beyond to reveal:
– Sophisticated app behavior profiling
– Benefit from 10 years of Packeteer technology and industry leadership
■ “Layer 7”
– Can identify application-level protocols
■ “Stateful Inspection”
– Can spot applications that “port hop”
■
Port level analysis
– Probes, network devices
–
Limited to static port visibility
24
Value Summary Monitoring
Identify issues and select the right tools
■
Identify and classify applications
■
Monitor utilization and performance
– Identify network issues such as recreational apps and latency
■
Measure user experience
– Monitor Service Level Agreements
– Benchmark app response times
■
Access performance diagnostics
25
About Shaping
Apply Business Rules to WAN Traffic
Shaping provides control to:
■
Fix critical application performance issues by allocating bandwidth
■
Contain recreational and malicious traffic
■
Minimize network congestion and latency
26
Why is PacketShaper Shaping Important?
■
To ensure Quality of Service for customer-critical apps:
– Smooth unpredictable QOS for customer critical apps
– Prevent recreational and bandwidth hungry apps competing for limited bandwidth
■
To avoid network congestion
– Cure congestion, queuing latency and inefficiencies hurt application response times
– Eliminate Branch office delays between remote locations.
■
To protect WAN from DoS
– Stop uncontrolled recreational traffic and malicious traffic
27
Problems Caused by Lack of Control
Recreational apps:
Surfing the Internet, iTunes, VOD, P2P,
Skype, Virus & Worm propagation
Branch
Offices
All apps compete for less bandwidth
Bandwidth-hungry apps:
Email, File Transfers,
Backup, Database Sync,
Distributed Storage
Latency Sensitive
Business apps:
SAP, Oracle, Siebel
PeopleSoft, VoIP,
IP Video, Mainframe
10Meg to
1Gig
Router
WAN
64k to
T1/E1
28
PacketShaper Control Solution
Recreational apps:
Surfing the Internet, iTunes, VOD, P2P,
Skype, Virus & Worm propagation
Branch
Offices
Apps’ bandwidth matches business requirements
Bandwidth-hungry apps:
Email, File Transfers,
Backup, Database Sync,
Distributed Storage
Latency Sensitive
Business apps:
SAP, Oracle, Siebel
PeopleSoft, VoIP,
IP Video, Mainframe
10Meg to
1Gig
Router
WAN
64k to
T1/E1
29
Shaping Technology:
Policies and Partitions
■
Policy-based control definitions and partitions by:
– Site or server
– Application
– User or user group
■
Beyond Standard QoS
– Apply policies to protect critical traffic
– Smooth disruptive, bandwidth-intensive traffic
– Contain recreational traffic
– Block malicious traffic
Set priorities to protect business-critical apps
Non-critical apps can use remaining bandwidth
30
Shaping Technology:
Rate Control and Predictive Scheduler
■
Manages congestion proactively
– Latency reduced
– Packets drops minimized
– Fewer retransmissions
–
Improved application performance.
■
Improve efficiency to increase throughput
Without Shaping With Shaping
31
Shaping Technology:
Application-specific Control
■
Application Session Provisioning provides:
– Hierarchical subclassifications of apps
– Per call or per session differentiation
– Far richer classification than routers
■
Layer 7 Plus differentiation
– Customer-critical over recreational apps
– Latency-sensitive over bandwidth-hungry apps
■
TCP and UDP Rate Control
– Managed on a flow- by flow basis at application level
■
Guaranteed delay bounds for IP telephony on converged networks
32
Shaping Technology:
Behavioral Threat Suppression
■
Auto-detection of suspect servers and traffic
– Spoofing hosts
Cost
– Virus infected hosts
– Tell-tale behavior
Zero Day Gap
■ Too many connections Outbreak
Business continuity
■ Too many failed connections
– Syn attacks
■
Implement network-level availability for business continuity
– Automatic, immediate response to attacks
■ Automatic quarantine of suspect hosts
■ Intelligent throttling of malicious traffic during DoS floods
■
Forensic information recorded
Time
33
Shaping Technology:
Enhanced QoS
■
Bi-directional control - outbound and inbound from a single device
■
Complements router based QoS in VPNs
■
Complements MPLS
34
Shaping: Intelligent Marking for MPLS Networks
■
Layer 7 Plus intelligence and Application Session
Provisioning enable accurate marking of application traffic
DiffServ, MPLS, TOS
VoIP
SAP
Bandwidth allocation
256 Kbps
768 Kbps
Best effort
Classes of Service
Branch
Offices
MPLS
Backbone
PacketShaper
WAN Core
35
Shaping:
PacketShaper and MPLS Working Together
PacketShaper
Automatic service classification
MPLS
Limited classes
36
Shaping:
Alternatives – Router-based QoS
■
Manage bandwidth passively and react to congestion and packet loss
■
Use port-based application traffic classification
■
Use various packet-based queuing methods that:
– Are not bi-directional
■ Cannot control inbound traffic at the other edge
– Add delay to transaction time and latency
– Cannot provide per-flow guarantees
– Are only truly effective as part of a comprehensive control strategy
■
Are managed on a per-router basis
– Big management overhead in distributed deployments
37
Shaping:
Alternatives – Packet Marking and MPLS
■
Applies only to carriers core
– Provisioned WAN service, not the entire link
– No way of assigning preference at the last mile
– Biggest bottleneck is typically last mile
■
Aggregate shaping only
– Treats all connection requests the same
– Lacks ability to assign limit to number of call requests
■
Needs complementary technology to overcome deficiencies
– Application classification for accurate marking
– Packet rate, bandwidth and flow control
38
A
Bulk Data
Router-based QoS Compared to
PacketShaper Inbound Rate Control
Branch Offices
512Kbps
512Kbps
Configured in all the branches and Data Center, router-based
Queuing relies on the bulk transfers being throttled down after packet loss…
1Mbps
Data
Center
B
Citrix
C
Bulk Data
512Kbps
Packeteer’s Patented Rate Control applied only in the Data Center slows down the Bulk traffic without packet loss and before queues can build
39
Value Summary Shaping
Apply business rules to WAN traffic
■
Allocate bandwidth
– Apply application-intelligent QoS for customer-critical apps
– Fix application performance issues at any location
■
Secure the WAN from DoS
– Pre-empt malicious events
– Control recreational or malicious traffic
■
Deal smartly with congestion
– Minimize latencies and inefficiencies for particular apps
40
About Compression
Reduce the Volume of WAN Traffic
■
Compression creates bandwidth
■
Increase WAN capacity over the same physical links
■
Application-specific compression
■
Improve application performance
– Apply best-suited compression algorithm for each application
■
Eliminate configuration overhead
41
Why is PacketShaper Compression
Important?
■
Increase WAN capacity over the same physical links with application-specific compression
■
Improve application performance
– Improve application performance and responsiveness
– Apply best-suited compression algorithm for each application
■
Prioritize critical applications
– Prioritize business-critical applications by giving them increased network capacity
42
PacketShaper Solution to Increase
Capacity
■
Application-Intelligence applied for selective compression
■
Low Latency maximizes performance
■
ActiveTunnel eliminates configuration
■
Algorithm plug-ins to maximize compression
43
Increased Capacity with Control
■
Makes sense only if application specific
■
Control allocation before adding resources
– Ensure your customer-critical applications reap benefits
– Contain “bursty” non-critical traffic
■
Manage end-to-latency and jitter
– Actively throttles traffic before congestion occurs
Compression without Control Compression with Control
44
Compression Solution
■
Most customers experience between 2:1 and 3:1 gains
100
PacketShaper Compression Module
Oracle
Web
Apps
General
Internet E-mail NetBIOS
Blended
Average
75
50
25
0
3:1 5:1 2:1 2.5:1 4:1 2.5:1
* Mix of traffic determines actual gains 45
Value Summary Compression
Reduce the Volume of WAN Traffic
■
Compression creates bandwidth
■
Increase WAN capacity over the same physical links
■
Application-specific compression
■
Improve application performance
– Apply best-suited compression algorithm for each application
■
Eliminate configuration overhead
50
About Centralized Management
■
Manage PacketShaper deployments in branch offices from a central site
■
Reduce Total Cost of Ownership (TCO)
– ReportCenter
– PolicyCenter
■
Enable automation management tasks
– Reporting and alerts
– Configuration management
67
Why is Management Important?
Appliances
Monitoring
Shaping
Compression
Acceleration
Performance Data
Configurations
Exceptions Reports
Diagnostic Access
Management
68
Enterprise-class Requirements for
Centralized Management
■
Centralized analysis and reporting: collection, storage, analysis, report distribution
■
Centralized policy management and device administration
■
Rich APIs and alerts, leading vendor integration
■
Automation tools
PolicyCenter ReportCenter
ReportCenter provides deep insight to many PacketShapers
PolicyCenter simplifies deployment, configuration and response
Adaptive Response can identify and respond automatically
69
Management Workflow
1
2
Start
…with PolicyCenter at overview level of hierarchy
Focus from application or network perspective
3
Scan
Analyze
…for abnormalities
Problems may be highlighted by exception thresholds, load, or utilization
…the detail
Identify groups trending toward problems or triggering exception thresholds
4 Identify
…the source of the issue or problem
Detailed metrics at all levels help isolate the source.
5 Act!
…with PolicyCenter to resolve the problem
6 Automate?
…consider using Adaptive Response to automate
70
ReportCenter: Centralized Reporting for all
PacketShaper Appliances
■
Comprehensive – real time and historic
■
Network-wide performance analysis and management
■
Easy report distribution and access, per user
■
Fast flexible hierarchy – workflow-based
71
ReportCenter Reports:
Top Talkers/Listeners
■
Reports on hosts that sent the most data
■ Drilling down on the host link reveals “listeners” for these conversations
72
PolicyCenter: Cost-effective Management of PacketShaper Appliances
■
Flexibly organize managed devices into hierarchical groups
■
Distribute configurations and software upgrades to multiple devices
■
View a summary of the status of all managed devices
75
Auto-deploy PacketShaper Configurations
■
Distribute configurations & software upgrades to multiple devices
– Install multiple units at remote sites
– Quickly and easily deploy and configure them from a central location.
76
Adaptive Response
Identify, Respond to and Resolve Problems
■
Leverages PacketShaper visibility, control, compression and acceleration to automatically:
– Identify and respond to network events
– Resolve problems
– Document background to problems
■ Provide IT with the information required for manual intervention
■ Advanced 2nd Level Diagnostics
– Restore WAN and application performance to its desired state
■
■
Behavior-based management
Performance-based management
77
Automation – 2nd Level Diagnostics
Suspicious host or application
– Send alert on abnormal activity
– Identify top sources (hosts) of abnormal activity
– Profile and store characteristics of traffic flow
– Capture traffic for in-depth protocol analysis
VoIP
Oracle
SQL
Other Traffic
Alert : Spike in application traffic
Identify : Where is the problem?
Document : Profile and store for analysis
78
Management Value Summary
PacketShaper Centralized management lets you:
■
Minimize administrative overhead and total cost of ownership
– Respond quickly on an enterprise-scale to network or application performance changes
– Define partitions and policies
■
Manage remote sites
– Distribute software images and upgrades
–
Disseminate new categories of applications or traffic
– Configure multiple appliances simultaneously
■
Automate intelligent responses to changes
■
Integrate with leading management tools
■
Analyze and report
– View a summary of the status of all locations
– Publish definitions of events of interest
81
PacketShaper Summary:
Bridging the WAN-Application Gap
Great User Experience for Every Application at Every Location
■
Centralized Management
– PolicyCenter and ReportCenter
■
Monitoring for Visibility
–
Discover applications on the network
–
Track critical application SLAs
– Diagnose problems and issues
■
Shaping for Control
–
QOS provisioning to ensure performance of critical applications
– Protect availability from new threats
– Align network costs with the business
■
Compression to Create Bandwidth
– Decrease traffic by compressing and packing data
– Increase capacity of network services
■
Acceleration to Increase Performance
–
Overcome protocol design limits
– Accelerate performance
82