Transcript PacketShaper Detailed Product Overview May 2006
PacketShaper
®
Product Overview
Agenda ■ ■ ■ Bridging the WAN-Application Gap PacketShaper and integrated modules A close look inline at each module in terms of: – Why is it important?
– – – – – What problems does it solve?
How does it help?
How does it work?
Why is it different?
What are the benefits?
2
About the PacketShaper System: PacketShaper Appliances ■ ■ ■ ■ Appliance deployed – All-in one single box – – – LAN side of WAN router 128kbps – 1Gbps range Centrally managed Hardware platform – 1- and 2-U rack-mountable models Transparent – No changes to applications or network Scalable, available, reliable – Fail-safe ■ Hardware bypass on power down or failure – Supports redundancy ■ Direct standby failover configurations 4
PacketShaper Range Branch Office Enterprise Core 5
The Packeteer PacketShaper: Bridging the WAN-Application Gap
Unique, deep visibility into all traffic on the WAN Shaping Module Compression Module Acceleration Module Control and optimize WAN traffic; match your business See what the problems are and set about solving them Monitoring Module PacketShaper PolicyCenter ReportCenter Centralized management implemented at any stage Monitoring
– – – – Module for Visibility
Standard on all PacketShaper models
Discover applications on the network Track application response and SLAs Diagnose problems and issues
Shaping
– Module for Control QoS provisioning to ensure performance of critical applications – Align network costs with the business
Compression
– – Module to Reduce WAN Data Decrease traffic by compressing data Increase capacity of network services
Acceleration
– – Module Increases Performance Overcome protocol design limits and latency Accelerate performance
Centralized Management
– – ReportCenter and PolicyCenter Reduce TCO Software 6
Example Deployment Progression
1 Gain Visibility
Core PacketShaper Monitoring Module
2 Get Control
Software Key Upgrade Shaping Module
3 Increase Capacity
Add PacketShaper to edge Compression Modules
WAN Core 4 Enhance Performance
Software Key Upgrade Acceleration Modules
WAN Edge 5 Lower TCO
Centralized Management PolicyCenter and ReportCenter 7
Benefits of Integrating WAN Application Optimization
Monitoring
Issue Analysis
Acceleration
Enhanced Performance
Integrated Application Optimization Shaping
QOS Provisioning
Compression
Increased Capacity ■ ■ ■ Manage the entire process – – – Assessing the issues Choosing the tools Resolving emergent problems Key feedback relationships between optimization tools – QoS provisions the pipe to applications – – Compression changes the size of the pipe Acceleration needs to know how much pipe there is to fill – Need to work together Manage all types of applications – Customer critical, latency sensitive applications – – – – Collaborative documents & files Real time communications IT Infrastructure Recreational and malicious 8
About Monitoring: Identify Issues and Select the Right Tools Monitoring provides visibility: ■ ■ Identify applications Monitor utilization and performance – Identify network issues such as: ■ ■ Recreational apps Latency ■ Measure user experience – Monitor Service-Level Agreements – Benchmark app response times ■ Access performance diagnostics 9
Why is PacketShaper Monitoring Important?
Before you can deal with application performance issues, you need to know what’s using the bandwidth!
Sources: *Network World / Packeteer Application Performance Survey 10
Problems Caused by Lack of Visibility ■ ■ ■ ■ ■ No information to match WAN usage to business objectives No proper idea of return on bandwidth investment Difficulty in ensuring SLA for projects such as convergence and MPLS No grasp on network performance: – – – Utilization Efficiency Response times No ability to perform diagnostics 11
PacketShaper Visibility Solution ■ ■ Layer 7 Plus – – – Goes beyond simple address and port-based analysis Unique to PacketShaper Provides application-intelligence for: ■ Performance monitoring ■ Flow forensics ■ PacketShaper Shaping and Compression functions Automatic Traffic Discovery – Analyze and automatically classify all WAN traffic 12
Monitoring Technology: Industry-Leading Layer 7 Plus Classification ■ ■ Unique to Packeteer Empowers IT organizations to: –
Identify
applications on the network –
Measure
utilization by application –
Benchmark
response times & SLA’s for key applications –
Diagnose & isolate
causes of performance problems 13
Monitoring Technology: Automatic Traffic Discovery ■ ■ ■ ■ Place PacketShaper at WAN/LAN threshold Turn on traffic discovery PacketShaper maps traffic to its classification library – Automatically builds a list of the applications running on your network Starts collecting performance data – – – Utilization Efficiency Response times 14
Monitoring: Alternatives ■ ■ ■ ■
Layer 7 Plus
goes beyond to reveal: – – Sophisticated app behavior profiling Benefit from 10 years of Packeteer technology and industry leadership “Layer 7” – Can identify application-level protocols “Stateful Inspection” – Can spot applications that “port hop” Port level analysis – – Probes, network devices Limited to static port visibility 24
Value Summary Monitoring Identify issues and select the right tools ■ ■ Identify and classify applications Monitor utilization and performance – Identify network issues such as recreational apps and latency ■ Measure user experience – – Monitor Service Level Agreements Benchmark app response times ■ Access performance diagnostics 25
About Shaping Apply Business Rules to WAN Traffic Shaping provides control to: ■ Fix critical application performance issues by allocating bandwidth ■ ■ Contain recreational and malicious traffic Minimize network congestion and latency 26
Why is PacketShaper Shaping Important?
■ ■ ■ To ensure Quality of Service for customer-critical apps: – – Smooth unpredictable QOS for customer critical apps Prevent recreational and bandwidth hungry apps competing for limited bandwidth To avoid network congestion – Cure congestion, queuing latency and inefficiencies hurt application response times – Eliminate Branch office delays between remote locations.
To protect WAN from DoS – Stop uncontrolled recreational traffic and malicious traffic 27
Problems Caused by Lack of Control
Recreational apps: Surfing the Internet, iTunes, VOD, P2P, Skype, Virus & Worm propagation Branch Offices
All apps compete for less bandwidth
Bandwidth-hungry apps: Email, File Transfers, Backup, Database Sync, Distributed Storage Latency Sensitive Business apps: SAP, Oracle, Siebel PeopleSoft, VoIP, IP Video, Mainframe
10Meg to 1Gig
Router WAN
64k to T1/E1 28
PacketShaper Control Solution
Recreational apps: Surfing the Internet, iTunes, VOD, P2P, Skype, Virus & Worm propagation Branch Offices
Apps’ bandwidth matches business requirements
Bandwidth-hungry apps: Email, File Transfers, Backup, Database Sync, Distributed Storage Latency Sensitive Business apps: SAP, Oracle, Siebel PeopleSoft, VoIP, IP Video, Mainframe
10Meg to 1Gig
Router WAN
64k to T1/E1 29
Shaping Technology: Policies and Partitions ■ ■ Policy-based control definitions and partitions by: – – – Site or server Application User or user group Beyond Standard QoS – Apply policies to protect critical traffic – Smooth disruptive, bandwidth-intensive traffic – Contain recreational traffic – Block malicious traffic
Set priorities to protect business-critical apps Non-critical apps can use remaining bandwidth
30
Shaping Technology: Rate Control and Predictive Scheduler ■ ■ Manages congestion proactively – – Latency reduced Packets drops minimized – Fewer retransmissions – Improved application performance.
Improve efficiency to increase throughput
Without Shaping With Shaping
31
Shaping Technology: Application-specific Control ■ ■ ■ ■ Application Session Provisioning provides: – Hierarchical subclassifications of apps – – Per call or per session differentiation Far richer classification than routers Layer 7 Plus differentiation – – Customer-critical over recreational apps Latency-sensitive over bandwidth-hungry apps TCP
and
– UDP Rate Control Managed on a flow- by flow basis at application level Guaranteed delay bounds for IP telephony on converged networks 32
Shaping Technology: Behavioral Threat Suppression ■ ■ ■ Auto-detection of suspect servers and traffic – – – Spoofing hosts Virus infected hosts Tell-tale behavior
Cost
■ ■ Too many connections Too many failed connections
Outbreak Zero Day Gap Business continuity
– Syn attacks Implement network-level availability for business continuity – Automatic, immediate response to attacks ■ Automatic quarantine of suspect hosts ■ Intelligent throttling of malicious traffic during DoS floods Forensic information recorded
Time
33
Shaping Technology: Enhanced QoS ■ ■ ■ Bi-directional control - outbound
and
inbound from a single device Complements router based QoS in VPNs Complements MPLS 34
Shaping: Intelligent Marking for MPLS Networks ■ Layer 7 Plus intelligence and Application Session Provisioning enable accurate marking of application traffic
DiffServ, MPLS, TOS VoIP SAP Email Bandwidth allocation 256 Kbps 768 Kbps Best effort Classes of Service Branch Offices MPLS Backbone PacketShaper WAN Core
35
Shaping: PacketShaper and MPLS Working Together
PacketShaper Automatic service classification MPLS Limited classes
36
Shaping: Alternatives – Router-based QoS ■ ■ ■ ■ Manage bandwidth passively and react to congestion and packet loss Use port-based application traffic classification Use various packet-based queuing methods that: – Are not bi-directional ■ Cannot control inbound traffic at the other edge – – – Add delay to transaction time and latency Cannot provide per-flow guarantees Are only truly effective as part of a comprehensive control strategy Are managed on a per-router basis – Big management overhead in distributed deployments 37
Shaping: Alternatives – Packet Marking and MPLS ■ ■ ■ Applies only to carriers core – – – Provisioned WAN service,
not
the entire link No way of assigning preference at the last mile Biggest bottleneck is typically last mile Aggregate shaping only – – Treats all connection requests the same Lacks ability to assign limit to number of call requests Needs complementary technology to overcome deficiencies – – Application classification for accurate marking Packet rate, bandwidth and flow control 38
A Bulk Data
Router-based QoS Compared to PacketShaper Inbound Rate Control
Branch Offices 512Kbps 512Kbps
Configured in all the branches and Data Center, router-based Queuing relies on the bulk transfers being throttled down
after
packet loss…
1Mbps Data Center B Citrix C Bulk Data 512Kbps
Packeteer’s Patented Rate Control applied only in the Data Center slows down the Bulk traffic without packet loss and
before
queues can build 39
Value Summary Shaping Apply business rules to WAN traffic ■ Allocate bandwidth – Apply application-intelligent QoS for customer-critical apps – Fix application performance issues at any location ■ Secure the WAN from DoS – – Pre-empt malicious events Control recreational or malicious traffic ■ Deal smartly with congestion – Minimize latencies and inefficiencies for particular apps 40
About Compression Reduce the Volume of WAN Traffic ■ ■ ■ ■ ■ Compression creates bandwidth Increase WAN capacity over the same physical links Application-specific compression Improve application performance – Apply best-suited compression algorithm for each application Eliminate configuration overhead 41
Why is PacketShaper Compression Important?
■ ■ ■ Increase WAN capacity over the same physical links with application-specific compression Improve application performance – – Improve application performance and responsiveness Apply best-suited compression algorithm for each application Prioritize critical applications – Prioritize business-critical applications by giving them increased network capacity 42
PacketShaper Solution to Increase Capacity ■ ■ ■ ■ Application-Intelligence applied for selective compression Low Latency maximizes performance ActiveTunnel eliminates configuration Algorithm plug-ins to maximize compression 43
Increased Capacity with Control ■ ■ ■ Makes sense only if application specific Control allocation before adding resources – – Ensure your customer-critical applications reap benefits Contain “bursty” non-critical traffic Manage end-to-latency and jitter – Actively throttles traffic before congestion occurs
Compression without Control Compression with Control
44
Compression Solution ■ Most customers experience between 2:1 and 3:1 gains
100 PacketShaper Compression Module Oracle Web Apps General Internet E-mail NetBIOS Blended Average 75 50 25 0 3:1 5:1 2:1 2.5:1 4:1 2.5:1 * Mix of traffic determines actual gains
45
Value Summary Compression Reduce the Volume of WAN Traffic ■ ■ ■ ■ Compression creates bandwidth Increase WAN capacity over the same physical links Application-specific compression Improve application performance – Apply best-suited compression algorithm for each application ■ Eliminate configuration overhead 50
About Centralized Management ■ ■ ■ Manage PacketShaper deployments in branch offices from a central site Reduce Total Cost of Ownership (TCO) – – ReportCenter PolicyCenter Enable automation management tasks – – Reporting and alerts Configuration management 67
Why is Management Important?
Appliances Monitoring Shaping Compression Acceleration Performance Data Configurations Exceptions Reports Diagnostic Access Management
68
Enterprise-class Requirements for Centralized Management ■ ■ ■ ■ Centralized analysis and reporting: collection, storage, analysis, report distribution Centralized policy management and device administration Rich APIs and alerts, leading vendor integration Automation tools
PolicyCenter ReportCenter
ReportCenter provides deep insight to many PacketShapers PolicyCenter simplifies deployment, configuration and response Adaptive Response can identify and respond automatically 69
Management Workflow
1 2 Start …with PolicyCenter at overview level of hierarchy
Focus from application or network perspective
3 Scan Analyze …for abnormalities
Problems may be highlighted by exception thresholds, load, or utilization
…the detail
Identify groups trending toward problems or triggering exception thresholds
4 Identify …the source of the issue or problem
Detailed metrics at all levels help isolate the source.
5 Act!
…with PolicyCenter to resolve the problem 6 Automate?
…consider using Adaptive Response to automate 70
ReportCenter: Centralized Reporting for all PacketShaper Appliances ■ ■ ■ ■ Comprehensive – real time and historic Network-wide performance analysis and management Easy report distribution and access, per user Fast flexible hierarchy – workflow-based 71
ReportCenter Reports: Top Talkers/Listeners ■ ■ Reports on hosts that sent the most data Drilling down on the host link reveals “listeners” for these conversations 72
PolicyCenter: Cost-effective Management of PacketShaper Appliances ■ ■ ■ Flexibly organize managed devices into hierarchical groups Distribute configurations and software upgrades to multiple devices View a summary of the status of all managed devices 75
Auto-deploy PacketShaper Configurations ■ Distribute configurations & software upgrades to multiple devices – – Install multiple units at remote sites Quickly and easily deploy and configure them from a central location.
76
Adaptive Response Identify, Respond to and Resolve Problems ■ Leverages PacketShaper visibility, control, compression and acceleration to automatically: – – – Identify and respond to network events Resolve problems Document background to problems ■ Provide IT with the information required for manual intervention ■ Advanced 2nd Level Diagnostics – Restore WAN and application performance to its desired state ■ ■ Behavior-based management Performance-based management 77
Automation – 2nd Level Diagnostics Suspicious host or application – – – – Send alert on abnormal activity Identify top sources (hosts) of abnormal activity Profile and store characteristics of traffic flow Capture traffic for in-depth protocol analysis
VoIP Oracle SQL Other Traffic Alert
: Spike in application traffic
Identify
: Where is the problem?
Document
: Profile and store for analysis 78
Management Value Summary ■ ■ ■
PacketShaper Centralized management lets you:
■ Minimize administrative overhead and total cost of ownership – Respond quickly on an enterprise-scale to network or application performance changes – Define partitions and policies ■ Manage remote sites – – – Distribute software images and upgrades Disseminate new categories of applications or traffic Configure multiple appliances simultaneously Automate intelligent responses to changes Integrate with leading management tools Analyze and report – – View a summary of the status of all locations Publish definitions of events of interest 81
PacketShaper Summary: Bridging the WAN-Application Gap
Great User Experience for Every Application at Every Location
■
Centralized Management
– PolicyCenter and ReportCenter ■ ■ ■ ■
Monitoring
– – – for Visibility Discover applications on the network Track critical application SLAs Diagnose problems and issues
Shaping
– for Control QOS provisioning to ensure performance of critical applications – – Protect availability from new threats Align network costs with the business
Compression
– to Create Bandwidth Decrease traffic by compressing and packing data – Increase capacity of network services
Acceleration
– – to Increase Performance Overcome protocol design limits Accelerate performance 82