PacketShaper Detailed Product Overview May 2006

Download Report

Transcript PacketShaper Detailed Product Overview May 2006

PacketShaper

®

Product Overview

Agenda ■ ■ ■ Bridging the WAN-Application Gap PacketShaper and integrated modules A close look inline at each module in terms of: – Why is it important?

– – – – – What problems does it solve?

How does it help?

How does it work?

Why is it different?

What are the benefits?

2

About the PacketShaper System: PacketShaper Appliances ■ ■ ■ ■ Appliance deployed – All-in one single box – – – LAN side of WAN router 128kbps – 1Gbps range Centrally managed Hardware platform – 1- and 2-U rack-mountable models Transparent – No changes to applications or network Scalable, available, reliable – Fail-safe ■ Hardware bypass on power down or failure – Supports redundancy ■ Direct standby failover configurations 4

PacketShaper Range Branch Office Enterprise Core 5

The Packeteer PacketShaper: Bridging the WAN-Application Gap

Unique, deep visibility into all traffic on the WAN Shaping Module Compression Module Acceleration Module Control and optimize WAN traffic; match your business See what the problems are and set about solving them Monitoring Module PacketShaper PolicyCenter ReportCenter Centralized management implemented at any stage Monitoring

– – – – Module for Visibility

Standard on all PacketShaper models

Discover applications on the network Track application response and SLAs Diagnose problems and issues

Shaping

– Module for Control QoS provisioning to ensure performance of critical applications – Align network costs with the business

Compression

– – Module to Reduce WAN Data Decrease traffic by compressing data Increase capacity of network services

Acceleration

– – Module Increases Performance Overcome protocol design limits and latency Accelerate performance

Centralized Management

– – ReportCenter and PolicyCenter Reduce TCO Software 6

Example Deployment Progression

1 Gain Visibility

Core PacketShaper Monitoring Module

2 Get Control

Software Key Upgrade Shaping Module

3 Increase Capacity

Add PacketShaper to edge Compression Modules

WAN Core 4 Enhance Performance

Software Key Upgrade Acceleration Modules

WAN Edge 5 Lower TCO

Centralized Management PolicyCenter and ReportCenter 7

Benefits of Integrating WAN Application Optimization

Monitoring

Issue Analysis

Acceleration

Enhanced Performance

Integrated Application Optimization Shaping

QOS Provisioning

Compression

Increased Capacity ■ ■ ■ Manage the entire process – – – Assessing the issues Choosing the tools Resolving emergent problems Key feedback relationships between optimization tools – QoS provisions the pipe to applications – – Compression changes the size of the pipe Acceleration needs to know how much pipe there is to fill – Need to work together Manage all types of applications – Customer critical, latency sensitive applications – – – – Collaborative documents & files Real time communications IT Infrastructure Recreational and malicious 8

About Monitoring: Identify Issues and Select the Right Tools Monitoring provides visibility: ■ ■ Identify applications Monitor utilization and performance – Identify network issues such as: ■ ■ Recreational apps Latency ■ Measure user experience – Monitor Service-Level Agreements – Benchmark app response times ■ Access performance diagnostics 9

Why is PacketShaper Monitoring Important?

Before you can deal with application performance issues, you need to know what’s using the bandwidth!

Sources: *Network World / Packeteer Application Performance Survey 10

Problems Caused by Lack of Visibility ■ ■ ■ ■ ■ No information to match WAN usage to business objectives No proper idea of return on bandwidth investment Difficulty in ensuring SLA for projects such as convergence and MPLS No grasp on network performance: – – – Utilization Efficiency Response times No ability to perform diagnostics 11

PacketShaper Visibility Solution ■ ■ Layer 7 Plus – – – Goes beyond simple address and port-based analysis Unique to PacketShaper Provides application-intelligence for: ■ Performance monitoring ■ Flow forensics ■ PacketShaper Shaping and Compression functions Automatic Traffic Discovery – Analyze and automatically classify all WAN traffic 12

Monitoring Technology: Industry-Leading Layer 7 Plus Classification ■ ■ Unique to Packeteer Empowers IT organizations to: –

Identify

applications on the network –

Measure

utilization by application –

Benchmark

response times & SLA’s for key applications –

Diagnose & isolate

causes of performance problems 13

Monitoring Technology: Automatic Traffic Discovery ■ ■ ■ ■ Place PacketShaper at WAN/LAN threshold Turn on traffic discovery PacketShaper maps traffic to its classification library – Automatically builds a list of the applications running on your network Starts collecting performance data – – – Utilization Efficiency Response times 14

Monitoring: Alternatives ■ ■ ■ ■

Layer 7 Plus

goes beyond to reveal: – – Sophisticated app behavior profiling Benefit from 10 years of Packeteer technology and industry leadership “Layer 7” – Can identify application-level protocols “Stateful Inspection” – Can spot applications that “port hop” Port level analysis – – Probes, network devices Limited to static port visibility 24

Value Summary Monitoring Identify issues and select the right tools ■ ■ Identify and classify applications Monitor utilization and performance – Identify network issues such as recreational apps and latency ■ Measure user experience – – Monitor Service Level Agreements Benchmark app response times ■ Access performance diagnostics 25

About Shaping Apply Business Rules to WAN Traffic Shaping provides control to: ■ Fix critical application performance issues by allocating bandwidth ■ ■ Contain recreational and malicious traffic Minimize network congestion and latency 26

Why is PacketShaper Shaping Important?

■ ■ ■ To ensure Quality of Service for customer-critical apps: – – Smooth unpredictable QOS for customer critical apps Prevent recreational and bandwidth hungry apps competing for limited bandwidth To avoid network congestion – Cure congestion, queuing latency and inefficiencies hurt application response times – Eliminate Branch office delays between remote locations.

To protect WAN from DoS – Stop uncontrolled recreational traffic and malicious traffic 27

Problems Caused by Lack of Control

Recreational apps: Surfing the Internet, iTunes, VOD, P2P, Skype, Virus & Worm propagation Branch Offices

All apps compete for less bandwidth

Bandwidth-hungry apps: Email, File Transfers, Backup, Database Sync, Distributed Storage Latency Sensitive Business apps: SAP, Oracle, Siebel PeopleSoft, VoIP, IP Video, Mainframe

10Meg to 1Gig

Router WAN

64k to T1/E1 28

PacketShaper Control Solution

Recreational apps: Surfing the Internet, iTunes, VOD, P2P, Skype, Virus & Worm propagation Branch Offices

Apps’ bandwidth matches business requirements

Bandwidth-hungry apps: Email, File Transfers, Backup, Database Sync, Distributed Storage Latency Sensitive Business apps: SAP, Oracle, Siebel PeopleSoft, VoIP, IP Video, Mainframe

10Meg to 1Gig

Router WAN

64k to T1/E1 29

Shaping Technology: Policies and Partitions ■ ■ Policy-based control definitions and partitions by: – – – Site or server Application User or user group Beyond Standard QoS – Apply policies to protect critical traffic – Smooth disruptive, bandwidth-intensive traffic – Contain recreational traffic – Block malicious traffic

Set priorities to protect business-critical apps Non-critical apps can use remaining bandwidth

30

Shaping Technology: Rate Control and Predictive Scheduler ■ ■ Manages congestion proactively – – Latency reduced Packets drops minimized – Fewer retransmissions – Improved application performance.

Improve efficiency to increase throughput

Without Shaping With Shaping

31

Shaping Technology: Application-specific Control ■ ■ ■ ■ Application Session Provisioning provides: – Hierarchical subclassifications of apps – – Per call or per session differentiation Far richer classification than routers Layer 7 Plus differentiation – – Customer-critical over recreational apps Latency-sensitive over bandwidth-hungry apps TCP

and

– UDP Rate Control Managed on a flow- by flow basis at application level Guaranteed delay bounds for IP telephony on converged networks 32

Shaping Technology: Behavioral Threat Suppression ■ ■ ■ Auto-detection of suspect servers and traffic – – – Spoofing hosts Virus infected hosts Tell-tale behavior

Cost

■ ■ Too many connections Too many failed connections

Outbreak Zero Day Gap Business continuity

– Syn attacks Implement network-level availability for business continuity – Automatic, immediate response to attacks ■ Automatic quarantine of suspect hosts ■ Intelligent throttling of malicious traffic during DoS floods Forensic information recorded

Time

33

Shaping Technology: Enhanced QoS ■ ■ ■ Bi-directional control - outbound

and

inbound from a single device Complements router based QoS in VPNs Complements MPLS 34

Shaping: Intelligent Marking for MPLS Networks ■ Layer 7 Plus intelligence and Application Session Provisioning enable accurate marking of application traffic

DiffServ, MPLS, TOS VoIP SAP Email Bandwidth allocation 256 Kbps 768 Kbps Best effort Classes of Service Branch Offices MPLS Backbone PacketShaper WAN Core

35

Shaping: PacketShaper and MPLS Working Together

PacketShaper Automatic service classification MPLS Limited classes

36

Shaping: Alternatives – Router-based QoS ■ ■ ■ ■ Manage bandwidth passively and react to congestion and packet loss Use port-based application traffic classification Use various packet-based queuing methods that: – Are not bi-directional ■ Cannot control inbound traffic at the other edge – – – Add delay to transaction time and latency Cannot provide per-flow guarantees Are only truly effective as part of a comprehensive control strategy Are managed on a per-router basis – Big management overhead in distributed deployments 37

Shaping: Alternatives – Packet Marking and MPLS ■ ■ ■ Applies only to carriers core – – – Provisioned WAN service,

not

the entire link No way of assigning preference at the last mile Biggest bottleneck is typically last mile Aggregate shaping only – – Treats all connection requests the same Lacks ability to assign limit to number of call requests Needs complementary technology to overcome deficiencies – – Application classification for accurate marking Packet rate, bandwidth and flow control 38

A Bulk Data

Router-based QoS Compared to PacketShaper Inbound Rate Control

Branch Offices 512Kbps 512Kbps

Configured in all the branches and Data Center, router-based Queuing relies on the bulk transfers being throttled down

after

packet loss…

1Mbps Data Center B Citrix C Bulk Data 512Kbps

Packeteer’s Patented Rate Control applied only in the Data Center slows down the Bulk traffic without packet loss and

before

queues can build 39

Value Summary Shaping Apply business rules to WAN traffic ■ Allocate bandwidth – Apply application-intelligent QoS for customer-critical apps – Fix application performance issues at any location ■ Secure the WAN from DoS – – Pre-empt malicious events Control recreational or malicious traffic ■ Deal smartly with congestion – Minimize latencies and inefficiencies for particular apps 40

About Compression Reduce the Volume of WAN Traffic ■ ■ ■ ■ ■ Compression creates bandwidth Increase WAN capacity over the same physical links Application-specific compression Improve application performance – Apply best-suited compression algorithm for each application Eliminate configuration overhead 41

Why is PacketShaper Compression Important?

■ ■ ■ Increase WAN capacity over the same physical links with application-specific compression Improve application performance – – Improve application performance and responsiveness Apply best-suited compression algorithm for each application Prioritize critical applications – Prioritize business-critical applications by giving them increased network capacity 42

PacketShaper Solution to Increase Capacity ■ ■ ■ ■ Application-Intelligence applied for selective compression Low Latency maximizes performance ActiveTunnel eliminates configuration Algorithm plug-ins to maximize compression 43

Increased Capacity with Control ■ ■ ■ Makes sense only if application specific Control allocation before adding resources – – Ensure your customer-critical applications reap benefits Contain “bursty” non-critical traffic Manage end-to-latency and jitter – Actively throttles traffic before congestion occurs

Compression without Control Compression with Control

44

Compression Solution ■ Most customers experience between 2:1 and 3:1 gains

100 PacketShaper Compression Module Oracle Web Apps General Internet E-mail NetBIOS Blended Average 75 50 25 0 3:1 5:1 2:1 2.5:1 4:1 2.5:1 * Mix of traffic determines actual gains

45

Value Summary Compression Reduce the Volume of WAN Traffic ■ ■ ■ ■ Compression creates bandwidth Increase WAN capacity over the same physical links Application-specific compression Improve application performance – Apply best-suited compression algorithm for each application ■ Eliminate configuration overhead 50

About Centralized Management ■ ■ ■ Manage PacketShaper deployments in branch offices from a central site Reduce Total Cost of Ownership (TCO) – – ReportCenter PolicyCenter Enable automation management tasks – – Reporting and alerts Configuration management 67

Why is Management Important?

Appliances Monitoring Shaping Compression Acceleration Performance Data Configurations Exceptions Reports Diagnostic Access Management

68

Enterprise-class Requirements for Centralized Management ■ ■ ■ ■ Centralized analysis and reporting: collection, storage, analysis, report distribution Centralized policy management and device administration Rich APIs and alerts, leading vendor integration Automation tools

PolicyCenter ReportCenter

ReportCenter provides deep insight to many PacketShapers PolicyCenter simplifies deployment, configuration and response Adaptive Response can identify and respond automatically 69

Management Workflow

1 2 Start …with PolicyCenter at overview level of hierarchy

Focus from application or network perspective

3 Scan Analyze …for abnormalities

Problems may be highlighted by exception thresholds, load, or utilization

…the detail

Identify groups trending toward problems or triggering exception thresholds

4 Identify …the source of the issue or problem

Detailed metrics at all levels help isolate the source.

5 Act!

…with PolicyCenter to resolve the problem 6 Automate?

…consider using Adaptive Response to automate 70

ReportCenter: Centralized Reporting for all PacketShaper Appliances ■ ■ ■ ■ Comprehensive – real time and historic Network-wide performance analysis and management Easy report distribution and access, per user Fast flexible hierarchy – workflow-based 71

ReportCenter Reports: Top Talkers/Listeners ■ ■ Reports on hosts that sent the most data Drilling down on the host link reveals “listeners” for these conversations 72

PolicyCenter: Cost-effective Management of PacketShaper Appliances ■ ■ ■ Flexibly organize managed devices into hierarchical groups Distribute configurations and software upgrades to multiple devices View a summary of the status of all managed devices 75

Auto-deploy PacketShaper Configurations ■ Distribute configurations & software upgrades to multiple devices – – Install multiple units at remote sites Quickly and easily deploy and configure them from a central location.

76

Adaptive Response Identify, Respond to and Resolve Problems ■ Leverages PacketShaper visibility, control, compression and acceleration to automatically: – – – Identify and respond to network events Resolve problems Document background to problems ■ Provide IT with the information required for manual intervention ■ Advanced 2nd Level Diagnostics – Restore WAN and application performance to its desired state ■ ■ Behavior-based management Performance-based management 77

Automation – 2nd Level Diagnostics Suspicious host or application – – – – Send alert on abnormal activity Identify top sources (hosts) of abnormal activity Profile and store characteristics of traffic flow Capture traffic for in-depth protocol analysis

VoIP Oracle SQL Other Traffic Alert

: Spike in application traffic

Identify

: Where is the problem?

Document

: Profile and store for analysis 78

Management Value Summary ■ ■ ■

PacketShaper Centralized management lets you:

■ Minimize administrative overhead and total cost of ownership – Respond quickly on an enterprise-scale to network or application performance changes – Define partitions and policies ■ Manage remote sites – – – Distribute software images and upgrades Disseminate new categories of applications or traffic Configure multiple appliances simultaneously Automate intelligent responses to changes Integrate with leading management tools Analyze and report – – View a summary of the status of all locations Publish definitions of events of interest 81

PacketShaper Summary: Bridging the WAN-Application Gap

Great User Experience for Every Application at Every Location

Centralized Management

– PolicyCenter and ReportCenter ■ ■ ■ ■

Monitoring

– – – for Visibility Discover applications on the network Track critical application SLAs Diagnose problems and issues

Shaping

– for Control QOS provisioning to ensure performance of critical applications – – Protect availability from new threats Align network costs with the business

Compression

– to Create Bandwidth Decrease traffic by compressing and packing data – Increase capacity of network services

Acceleration

– – to Increase Performance Overcome protocol design limits Accelerate performance 82

Thank you.