PacketShaper Detailed Product Overview May 2006

advertisement

PacketShaper

®

Product Overview

Agenda

Bridging the WAN-Application Gap

PacketShaper and integrated modules

A close look inline at each module in terms of:

– Why is it important?

– What problems does it solve?

– How does it help?

– How does it work?

– Why is it different?

– What are the benefits?

2

About the PacketShaper System:

PacketShaper Appliances

Appliance deployed

– All-in one single box

– LAN side of WAN router

– 128kbps – 1Gbps range

– Centrally managed

Hardware platform

– 1- and 2-U rack-mountable models

Transparent

– No changes to applications or network

Scalable, available, reliable

– Fail-safe

■ Hardware bypass on power down or failure

– Supports redundancy

■ Direct standby failover configurations

4

PacketShaper Range

Branch Office Enterprise Core

5

The Packeteer PacketShaper:

Bridging the WAN-Application Gap

Unique, deep visibility into all traffic on the WAN

Shaping

Module

Compression

Module

Acceleration

Module

Control and optimize WAN traffic; match your business

See what the problems are and set about solving them

Monitoring Module

PacketShaper

PolicyCenter ReportCenter

Centralized management implemented at any stage

Monitoring Module for Visibility

– Standard on all PacketShaper models

– Discover applications on the network

Track application response and SLAs

– Diagnose problems and issues

Shaping Module for Control

– QoS provisioning to ensure performance of critical applications

– Align network costs with the business

Compression Module to Reduce WAN Data

Decrease traffic by compressing data

– Increase capacity of network services

Acceleration Module Increases Performance

– Overcome protocol design limits and latency

– Accelerate performance

Centralized Management Software

ReportCenter and PolicyCenter

– Reduce TCO

6

Example Deployment Progression

1

Gain Visibility

Core PacketShaper

Monitoring Module

2

Get Control

Software Key Upgrade

Shaping Module

3

Increase Capacity

Add PacketShaper to edge

Compression Modules

WAN Core

4

Enhance Performance

Software Key Upgrade

Acceleration Modules

WAN Edge

5

Lower TCO

Centralized Management

PolicyCenter and ReportCenter

7

Benefits of Integrating WAN Application

Optimization

Monitoring

Issue Analysis

Acceleration

Enhanced

Performance

Integrated

Application

Optimization

Shaping

QOS

Provisioning

Compression

Increased

Capacity

Manage the entire process

– Assessing the issues

– Choosing the tools

– Resolving emergent problems

Key feedback relationships between optimization tools

– QoS provisions the pipe to applications

– Compression changes the size of the pipe

– Acceleration needs to know how much pipe there is to fill

– Need to work together

Manage all types of applications

– Customer critical, latency sensitive applications

– Collaborative documents & files

– Real time communications

– IT Infrastructure

– Recreational and malicious

8

About Monitoring:

Identify Issues and Select the Right Tools

Monitoring provides visibility:

Identify applications

Monitor utilization and performance

– Identify network issues such as:

■ Recreational apps

■ Latency

Measure user experience

– Monitor Service-Level

Agreements

– Benchmark app response times

Access performance diagnostics

9

Why is PacketShaper Monitoring

Important?

Before you can deal with application performance issues, you need to know what’s using the bandwidth!

Sources: *Network World / Packeteer Application Performance Survey

10

Problems Caused by Lack of Visibility

No information to match WAN usage to business objectives

No proper idea of return on bandwidth investment

Difficulty in ensuring SLA for projects such as convergence and MPLS

No grasp on network performance:

– Utilization

– Efficiency

– Response times

No ability to perform diagnostics

11

PacketShaper Visibility Solution

Layer 7 Plus

– Goes beyond simple address and port-based analysis

– Unique to PacketShaper

– Provides application-intelligence for:

■ Performance monitoring

■ Flow forensics

■ PacketShaper Shaping and

Compression functions

Automatic Traffic Discovery

– Analyze and automatically classify all WAN traffic

12

Monitoring Technology:

Industry-Leading Layer 7 Plus Classification

Unique to Packeteer

Empowers IT organizations to:

– Identify applications on the network

– Measure utilization by application

– Benchmark response times & SLA’s for key applications

Diagnose & isolate causes of performance problems

13

Monitoring Technology:

Automatic Traffic Discovery

Place PacketShaper at WAN/LAN threshold

Turn on traffic discovery

PacketShaper maps traffic to its classification library

– Automatically builds a list of the applications running on your network

Starts collecting performance data

– Utilization

– Efficiency

– Response times

14

Monitoring:

Alternatives

Layer 7 Plus goes beyond to reveal:

– Sophisticated app behavior profiling

– Benefit from 10 years of Packeteer technology and industry leadership

■ “Layer 7”

– Can identify application-level protocols

■ “Stateful Inspection”

– Can spot applications that “port hop”

Port level analysis

– Probes, network devices

Limited to static port visibility

24

Value Summary Monitoring

Identify issues and select the right tools

Identify and classify applications

Monitor utilization and performance

– Identify network issues such as recreational apps and latency

Measure user experience

– Monitor Service Level Agreements

– Benchmark app response times

Access performance diagnostics

25

About Shaping

Apply Business Rules to WAN Traffic

Shaping provides control to:

Fix critical application performance issues by allocating bandwidth

Contain recreational and malicious traffic

Minimize network congestion and latency

26

Why is PacketShaper Shaping Important?

To ensure Quality of Service for customer-critical apps:

– Smooth unpredictable QOS for customer critical apps

– Prevent recreational and bandwidth hungry apps competing for limited bandwidth

To avoid network congestion

– Cure congestion, queuing latency and inefficiencies hurt application response times

– Eliminate Branch office delays between remote locations.

To protect WAN from DoS

– Stop uncontrolled recreational traffic and malicious traffic

27

Problems Caused by Lack of Control

Recreational apps:

Surfing the Internet, iTunes, VOD, P2P,

Skype, Virus & Worm propagation

Branch

Offices

All apps compete for less bandwidth

Bandwidth-hungry apps:

Email, File Transfers,

Backup, Database Sync,

Distributed Storage

Latency Sensitive

Business apps:

SAP, Oracle, Siebel

PeopleSoft, VoIP,

IP Video, Mainframe

10Meg to

1Gig

Router

WAN

64k to

T1/E1

28

PacketShaper Control Solution

Recreational apps:

Surfing the Internet, iTunes, VOD, P2P,

Skype, Virus & Worm propagation

Branch

Offices

Apps’ bandwidth matches business requirements

Bandwidth-hungry apps:

Email, File Transfers,

Backup, Database Sync,

Distributed Storage

Latency Sensitive

Business apps:

SAP, Oracle, Siebel

PeopleSoft, VoIP,

IP Video, Mainframe

10Meg to

1Gig

Router

WAN

64k to

T1/E1

29

Shaping Technology:

Policies and Partitions

Policy-based control definitions and partitions by:

– Site or server

– Application

– User or user group

Beyond Standard QoS

– Apply policies to protect critical traffic

– Smooth disruptive, bandwidth-intensive traffic

– Contain recreational traffic

– Block malicious traffic

Set priorities to protect business-critical apps

Non-critical apps can use remaining bandwidth

30

Shaping Technology:

Rate Control and Predictive Scheduler

Manages congestion proactively

– Latency reduced

– Packets drops minimized

– Fewer retransmissions

Improved application performance.

Improve efficiency to increase throughput

Without Shaping With Shaping

31

Shaping Technology:

Application-specific Control

Application Session Provisioning provides:

– Hierarchical subclassifications of apps

– Per call or per session differentiation

– Far richer classification than routers

Layer 7 Plus differentiation

– Customer-critical over recreational apps

– Latency-sensitive over bandwidth-hungry apps

TCP and UDP Rate Control

– Managed on a flow- by flow basis at application level

Guaranteed delay bounds for IP telephony on converged networks

32

Shaping Technology:

Behavioral Threat Suppression

Auto-detection of suspect servers and traffic

– Spoofing hosts

Cost

– Virus infected hosts

– Tell-tale behavior

Zero Day Gap

■ Too many connections Outbreak

Business continuity

■ Too many failed connections

– Syn attacks

Implement network-level availability for business continuity

– Automatic, immediate response to attacks

■ Automatic quarantine of suspect hosts

■ Intelligent throttling of malicious traffic during DoS floods

Forensic information recorded

Time

33

Shaping Technology:

Enhanced QoS

Bi-directional control - outbound and inbound from a single device

Complements router based QoS in VPNs

Complements MPLS

34

Shaping: Intelligent Marking for MPLS Networks

Layer 7 Plus intelligence and Application Session

Provisioning enable accurate marking of application traffic

DiffServ, MPLS, TOS

VoIP

SAP

Email

Bandwidth allocation

256 Kbps

768 Kbps

Best effort

Classes of Service

Branch

Offices

MPLS

Backbone

PacketShaper

WAN Core

35

Shaping:

PacketShaper and MPLS Working Together

PacketShaper

Automatic service classification

MPLS

Limited classes

36

Shaping:

Alternatives – Router-based QoS

Manage bandwidth passively and react to congestion and packet loss

Use port-based application traffic classification

Use various packet-based queuing methods that:

– Are not bi-directional

■ Cannot control inbound traffic at the other edge

– Add delay to transaction time and latency

– Cannot provide per-flow guarantees

– Are only truly effective as part of a comprehensive control strategy

Are managed on a per-router basis

– Big management overhead in distributed deployments

37

Shaping:

Alternatives – Packet Marking and MPLS

Applies only to carriers core

– Provisioned WAN service, not the entire link

– No way of assigning preference at the last mile

– Biggest bottleneck is typically last mile

Aggregate shaping only

– Treats all connection requests the same

– Lacks ability to assign limit to number of call requests

Needs complementary technology to overcome deficiencies

– Application classification for accurate marking

– Packet rate, bandwidth and flow control

38

A

Bulk Data

Router-based QoS Compared to

PacketShaper Inbound Rate Control

Branch Offices

512Kbps

512Kbps

Configured in all the branches and Data Center, router-based

Queuing relies on the bulk transfers being throttled down after packet loss…

1Mbps

Data

Center

B

Citrix

C

Bulk Data

512Kbps

Packeteer’s Patented Rate Control applied only in the Data Center slows down the Bulk traffic without packet loss and before queues can build

39

Value Summary Shaping

Apply business rules to WAN traffic

Allocate bandwidth

– Apply application-intelligent QoS for customer-critical apps

– Fix application performance issues at any location

Secure the WAN from DoS

– Pre-empt malicious events

– Control recreational or malicious traffic

Deal smartly with congestion

– Minimize latencies and inefficiencies for particular apps

40

About Compression

Reduce the Volume of WAN Traffic

Compression creates bandwidth

Increase WAN capacity over the same physical links

Application-specific compression

Improve application performance

– Apply best-suited compression algorithm for each application

Eliminate configuration overhead

41

Why is PacketShaper Compression

Important?

Increase WAN capacity over the same physical links with application-specific compression

Improve application performance

– Improve application performance and responsiveness

– Apply best-suited compression algorithm for each application

Prioritize critical applications

– Prioritize business-critical applications by giving them increased network capacity

42

PacketShaper Solution to Increase

Capacity

Application-Intelligence applied for selective compression

Low Latency maximizes performance

ActiveTunnel eliminates configuration

Algorithm plug-ins to maximize compression

43

Increased Capacity with Control

Makes sense only if application specific

Control allocation before adding resources

– Ensure your customer-critical applications reap benefits

– Contain “bursty” non-critical traffic

Manage end-to-latency and jitter

– Actively throttles traffic before congestion occurs

Compression without Control Compression with Control

44

Compression Solution

Most customers experience between 2:1 and 3:1 gains

100

PacketShaper Compression Module

Oracle

Web

Apps

General

Internet E-mail NetBIOS

Blended

Average

75

50

25

0

3:1 5:1 2:1 2.5:1 4:1 2.5:1

* Mix of traffic determines actual gains 45

Value Summary Compression

Reduce the Volume of WAN Traffic

Compression creates bandwidth

Increase WAN capacity over the same physical links

Application-specific compression

Improve application performance

– Apply best-suited compression algorithm for each application

Eliminate configuration overhead

50

About Centralized Management

Manage PacketShaper deployments in branch offices from a central site

Reduce Total Cost of Ownership (TCO)

– ReportCenter

– PolicyCenter

Enable automation management tasks

– Reporting and alerts

– Configuration management

67

Why is Management Important?

Appliances

Monitoring

Shaping

Compression

Acceleration

Performance Data

Configurations

Exceptions Reports

Diagnostic Access

Management

68

Enterprise-class Requirements for

Centralized Management

Centralized analysis and reporting: collection, storage, analysis, report distribution

Centralized policy management and device administration

Rich APIs and alerts, leading vendor integration

Automation tools

PolicyCenter ReportCenter

ReportCenter provides deep insight to many PacketShapers

PolicyCenter simplifies deployment, configuration and response

Adaptive Response can identify and respond automatically

69

Management Workflow

1

2

Start

…with PolicyCenter at overview level of hierarchy

Focus from application or network perspective

3

Scan

Analyze

…for abnormalities

Problems may be highlighted by exception thresholds, load, or utilization

…the detail

Identify groups trending toward problems or triggering exception thresholds

4 Identify

…the source of the issue or problem

Detailed metrics at all levels help isolate the source.

5 Act!

…with PolicyCenter to resolve the problem

6 Automate?

…consider using Adaptive Response to automate

70

ReportCenter: Centralized Reporting for all

PacketShaper Appliances

Comprehensive – real time and historic

Network-wide performance analysis and management

Easy report distribution and access, per user

Fast flexible hierarchy – workflow-based

71

ReportCenter Reports:

Top Talkers/Listeners

Reports on hosts that sent the most data

■ Drilling down on the host link reveals “listeners” for these conversations

72

PolicyCenter: Cost-effective Management of PacketShaper Appliances

Flexibly organize managed devices into hierarchical groups

Distribute configurations and software upgrades to multiple devices

View a summary of the status of all managed devices

75

Auto-deploy PacketShaper Configurations

Distribute configurations & software upgrades to multiple devices

– Install multiple units at remote sites

– Quickly and easily deploy and configure them from a central location.

76

Adaptive Response

Identify, Respond to and Resolve Problems

Leverages PacketShaper visibility, control, compression and acceleration to automatically:

– Identify and respond to network events

– Resolve problems

– Document background to problems

■ Provide IT with the information required for manual intervention

■ Advanced 2nd Level Diagnostics

– Restore WAN and application performance to its desired state

Behavior-based management

Performance-based management

77

Automation – 2nd Level Diagnostics

Suspicious host or application

– Send alert on abnormal activity

– Identify top sources (hosts) of abnormal activity

– Profile and store characteristics of traffic flow

– Capture traffic for in-depth protocol analysis

VoIP

Oracle

SQL

Other Traffic

Alert : Spike in application traffic

Identify : Where is the problem?

Document : Profile and store for analysis

78

Management Value Summary

PacketShaper Centralized management lets you:

Minimize administrative overhead and total cost of ownership

– Respond quickly on an enterprise-scale to network or application performance changes

– Define partitions and policies

Manage remote sites

– Distribute software images and upgrades

Disseminate new categories of applications or traffic

– Configure multiple appliances simultaneously

Automate intelligent responses to changes

Integrate with leading management tools

Analyze and report

– View a summary of the status of all locations

– Publish definitions of events of interest

81

PacketShaper Summary:

Bridging the WAN-Application Gap

Great User Experience for Every Application at Every Location

Centralized Management

– PolicyCenter and ReportCenter

Monitoring for Visibility

Discover applications on the network

Track critical application SLAs

– Diagnose problems and issues

Shaping for Control

QOS provisioning to ensure performance of critical applications

– Protect availability from new threats

– Align network costs with the business

Compression to Create Bandwidth

– Decrease traffic by compressing and packing data

– Increase capacity of network services

Acceleration to Increase Performance

Overcome protocol design limits

– Accelerate performance

82

Thank you.

Download