Jump to content

WAN optimization: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Line 34: Line 34:
==External links==
==External links==


* [http://www.silver-peak.com Silver Peak's WAN optimization]
* [http://www.ipanematech.com Ipanema's WAN Governance solutions]
* [http://www.ipanematech.com Ipanema's WAN Governance solutions]
* [http://www.riverbed.com Riverbed's WAN optimization solution]
* [http://www.riverbed.com Riverbed's WAN optimization solution]

Revision as of 15:34, 1 May 2009

WAN optimization products seek to accelerate a broad range of applications accessed by distributed enterprise users via eliminating redundant transmissions, staging data in local caches, compressing and prioritizing data, and streamlining chatty protocols (e.g., CIFS).

WAN Optimization is a superset of WAFS in that it also addresses:

Component techniques of WAN Optimization include WAFS, CIFS proxy, HTTPS Proxy, media multicasting, Web caching and bandwidth management.

Detailed descriptions of WAN/Internet Optimization techniques

Compression - Relies on data patterns that can be represented more efficiently. Best suited for point to point leased lines.

Caching/Proxy - Relies on human behavior , accessing the same data over and over. Best suited for point to point leased lines, but also viable for Internet Connections and VPN tunnels.

Protocol spoofing - Bundles multiple requests from chatty applications into one. Best suited for Point to Point WAN links.

Traffic shaping - Controls data usage based on spotting specific patterns in the data and allowing or disallowing specific traffic. Best suited for both point to point leased lines and Internet connections. May be hard to keep current with ever expanding types of applications.

Equalizing - Makes assumptions on what needs immediate priority based on the data usage. Excellent choice for wide open unregulated Internet connections and clogged VPN tunnels.

Connection Limits - Prevents access gridlock in routers and access points due to denial of service or peer to peer. Best suited for wide open Internet access links , can also be used on WAN links.

Simple Rate Limits - Prevents one user from getting more than a fixed amount of data. Best suited as a stop gap first effort for a remedying a congested Internet connection or WAN link.

See also

Notes and references