SlideShare une entreprise Scribd logo
1  sur  15
Introduction
to
Wan Acceleration Devices
Rishabh Dangwal
About me:Trivia geek, redbull addict & Independent security enthusiastic.
Currently employed at Orange Business Services
www.theprohack.com
Agenda
 The Elephant & the mice
 Spoke end issues
 Wan Acceleration
 Wan Optimization
 The Techniques
Lets talk about..
 A mice..& An Elephant
(I am not kidding..)
A *Closer* look ..
 Short-live TCP connections
 <1 sec
 Causes timeouts (due to
3WHS)
 Long lived TCP connections
 >1 hour
 Consistent, but take huge
network resource
Issues at Spoke End
 Application performance
 Bandwidth choking
 Latency/jitter/chatty applications
 Complex Infra
 Different types of servers
 Storage
 Data Security? Compliances ?
Issues at Spoke End continued..
 QOS ?
 Reactive measure
 Almost useless in solving congestion issues
 Increase Bandwidth ?
 Is not a solution
 Rise of hybrid networks.
WAN Acceleration?
 Techniques for increasing data-transfer efficiency
across WAN
 At core is WAN Caching
 Maturing at a good rate
WAN Acceleration continued..
 Kick in Wan accelerators & we have got –
 Less local servers
 Achieve LAN Level app performance
 Centralize
 Converge
 Preserve services
Wan Optimization
 Traditional Wan Optimization
 Results
 Changes header info
 Applications break, services may not work
 *Extra* integration required
 Moooore downtime
Image credits : Cisco
Wan Optimization Continued..
 Latest Deployment
 Results
 NO header changed*
 NO app misbehavior*
 Data Offloading
 Less headaches
*till the time your connectivity is stable
Image Credits: Cisco
The Techniques
 Selective Acknowledgement
 Window Scaling, Protocol matching
 Latency Mitigation
 Reduce Data Redundancy
The Techniques continued..
 Pattern Matching
 Fingerprinting & Reconstruction
 Load Shedding
 Chunk Storing
 & much *much* more..
Bottomline
• Is one of the next big things
• Need of hour in complex hybrid networks
• BigData over WAN?
Questions ?
Please put a static route for Questions, queries and
Feedback on this presentation towards
admin@theprohack.com

Contenu connexe

En vedette

Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LANAhmar Hashmi
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processingbwire sedrick
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & controlbwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management DevicesRahul P
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Patternguy_davis
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANsAram
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORKNur Ana
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)Raaz Shrestha
 
Transmission media
Transmission mediaTransmission media
Transmission mediakinish kumar
 

En vedette (20)

Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Lan wan
Lan wanLan wan
Lan wan
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
WIDE AREA NETWORK
WIDE AREA NETWORKWIDE AREA NETWORK
WIDE AREA NETWORK
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Isdn networking
Isdn networkingIsdn networking
Isdn networking
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Networking
NetworkingNetworking
Networking
 
Isdn99
Isdn99Isdn99
Isdn99
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Transmission media
Transmission mediaTransmission media
Transmission media
 

Similaire à Introduction to Wan Acceleration Devices

Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3gueste47133
 
Wan Nirvana
Wan NirvanaWan Nirvana
Wan Nirvanaanindyar
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goalskamaelian
 
Who Needs Mobile Ip Anyway
Who Needs Mobile Ip AnywayWho Needs Mobile Ip Anyway
Who Needs Mobile Ip Anywaykarimhallaba
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentationAdvanced comm
 
Network Automation - Interconnection tools
Network Automation - Interconnection toolsNetwork Automation - Interconnection tools
Network Automation - Interconnection toolsAndy Davidson
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Govmichaelking
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkSecurity Session
 
Stop Losing Sleep V1.0 20100414
Stop Losing Sleep V1.0 20100414Stop Losing Sleep V1.0 20100414
Stop Losing Sleep V1.0 20100414FONMaster
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionImperva Incapsula
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephonyKundan Singh
 
AETA_2004_VOIP.ppt
AETA_2004_VOIP.pptAETA_2004_VOIP.ppt
AETA_2004_VOIP.pptVideoguy
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVYoshihiro Nakajima
 
PHP Performance: Principles and tools
PHP Performance: Principles and toolsPHP Performance: Principles and tools
PHP Performance: Principles and tools10n Software, LLC
 
Natural Laws of Software Performance
Natural Laws of Software PerformanceNatural Laws of Software Performance
Natural Laws of Software PerformanceGibraltar Software
 
Network characteristics of the cloud
Network characteristics of the cloudNetwork characteristics of the cloud
Network characteristics of the cloudCloud Genius
 

Similaire à Introduction to Wan Acceleration Devices (20)

Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3Nss Labs Dpi Intro V3
Nss Labs Dpi Intro V3
 
Wan Nirvana
Wan NirvanaWan Nirvana
Wan Nirvana
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goals
 
Who Needs Mobile Ip Anyway
Who Needs Mobile Ip AnywayWho Needs Mobile Ip Anyway
Who Needs Mobile Ip Anyway
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentation
 
Network Automation - Interconnection tools
Network Automation - Interconnection toolsNetwork Automation - Interconnection tools
Network Automation - Interconnection tools
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Gov
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Stop Losing Sleep V1.0 20100414
Stop Losing Sleep V1.0 20100414Stop Losing Sleep V1.0 20100414
Stop Losing Sleep V1.0 20100414
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
Peer-to-peer Internet telephony
Peer-to-peer Internet telephonyPeer-to-peer Internet telephony
Peer-to-peer Internet telephony
 
Matrix
MatrixMatrix
Matrix
 
AETA_2004_VOIP.ppt
AETA_2004_VOIP.pptAETA_2004_VOIP.ppt
AETA_2004_VOIP.ppt
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFV
 
PHP Performance: Principles and tools
PHP Performance: Principles and toolsPHP Performance: Principles and tools
PHP Performance: Principles and tools
 
network problem.pptx
network problem.pptxnetwork problem.pptx
network problem.pptx
 
Natural Laws of Software Performance
Natural Laws of Software PerformanceNatural Laws of Software Performance
Natural Laws of Software Performance
 
Network characteristics of the cloud
Network characteristics of the cloudNetwork characteristics of the cloud
Network characteristics of the cloud
 

Plus de Rishabh Dangwal

Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue TeamingRishabh Dangwal
 
An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNETRishabh Dangwal
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationRishabh Dangwal
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security failsRishabh Dangwal
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comRishabh Dangwal
 
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.comUnderstanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.comRishabh Dangwal
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalRishabh Dangwal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalRishabh Dangwal
 

Plus de Rishabh Dangwal (9)

Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue Teaming
 
An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Network nags - when security fails
Network nags  - when security failsNetwork nags  - when security fails
Network nags - when security fails
 
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.comUnderstanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
Understanding DDOS Mitigation by Rishabh Dangwal - www.theprohack.com
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
An introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh DangwalAn introduction to Digital Security - Rishabh Dangwal
An introduction to Digital Security - Rishabh Dangwal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Introduction to Wan Acceleration Devices

  • 1. Introduction to Wan Acceleration Devices Rishabh Dangwal About me:Trivia geek, redbull addict & Independent security enthusiastic. Currently employed at Orange Business Services www.theprohack.com
  • 2. Agenda  The Elephant & the mice  Spoke end issues  Wan Acceleration  Wan Optimization  The Techniques
  • 3. Lets talk about..  A mice..& An Elephant (I am not kidding..)
  • 4. A *Closer* look ..  Short-live TCP connections  <1 sec  Causes timeouts (due to 3WHS)  Long lived TCP connections  >1 hour  Consistent, but take huge network resource
  • 5. Issues at Spoke End  Application performance  Bandwidth choking  Latency/jitter/chatty applications  Complex Infra  Different types of servers  Storage  Data Security? Compliances ?
  • 6. Issues at Spoke End continued..  QOS ?  Reactive measure  Almost useless in solving congestion issues  Increase Bandwidth ?  Is not a solution  Rise of hybrid networks.
  • 7. WAN Acceleration?  Techniques for increasing data-transfer efficiency across WAN  At core is WAN Caching  Maturing at a good rate
  • 8. WAN Acceleration continued..  Kick in Wan accelerators & we have got –  Less local servers  Achieve LAN Level app performance  Centralize  Converge  Preserve services
  • 9. Wan Optimization  Traditional Wan Optimization  Results  Changes header info  Applications break, services may not work  *Extra* integration required  Moooore downtime Image credits : Cisco
  • 10. Wan Optimization Continued..  Latest Deployment  Results  NO header changed*  NO app misbehavior*  Data Offloading  Less headaches *till the time your connectivity is stable Image Credits: Cisco
  • 11. The Techniques  Selective Acknowledgement  Window Scaling, Protocol matching  Latency Mitigation  Reduce Data Redundancy
  • 12. The Techniques continued..  Pattern Matching  Fingerprinting & Reconstruction  Load Shedding  Chunk Storing  & much *much* more..
  • 13. Bottomline • Is one of the next big things • Need of hour in complex hybrid networks • BigData over WAN?
  • 15. Please put a static route for Questions, queries and Feedback on this presentation towards admin@theprohack.com