Slough, UK. –November 11th 2009 – Expand Networks www.expand.com , the leader in optimising WANs for branch office consolidation and virtualisation, today reveals its revamped channel strategy for the UK market in light of the continued and growing success of its channel partners in key market areas including server-based computing, virtual desktop infrastructure (VDI), virtualised and cloud based IP infrastructures and satellite based communications.
To better support its partners and enable them to take advantage of these burgeoning market opportunities Expand has overhauled its distribution model with the appointment of three new value-add distribution partners – Cloud Distribution, CDG UK and Sematron – and plans to continue its aggressive reseller recruitment programme over the coming months.
Newly formed Cloud Distribution will focus on the WAN optimisation requirements of virtualised and cloud-based IP infrastructures as more and more organisations move toward the web as a delivery platform for applications and services. Expand’s Virtual Accelerator solution is ideal for these environments with a unique ability to be deployed on virtual machines as a virtual appliance as well as being able to accelerate virtualised applications and Expand Network’s Mobile Accelerator Client, with unique HIVE technology, is a key innovation that will help maximise this market opportunity.
The relationship with CDG UK, a current Expand partner across other European territories, will be extended into the UK market with a focus on server-based computing and VDI where Expand’s Accelerator appliance and Virtual and Mobile Accelerators enable the delivery of applications and services to distributed enterprise environments.
Finally, Sematron will focus on the growing area of satellite based communications where Expand has a unique solution to overcome the latency challenges faced when delivering data services over satellite links.
“WAN Optimisation is a key enabler for many of today’s major enterprise IT initiatives,” explains Adam Davison, VP Corporate Sales & Marketing, Expand Networks. “Having aligned our go-to-market focus earlier this year we have seen a growing appetite within the channel for our solutions, as WAN Optimisation becomes increasingly recognized as something of a recession-bucking technology.
We are seeing tremendous market success and company growth and needed to restructure our channel model and strategy to better support this.”
“These distributor signings lay the foundations of an energised channel strategy that will support our resellers in meeting the changing business initiatives of the UK enterprise, both now and into the future.
Expand has worked hard to place itself among the top players in the market and to further establish this leadership, we require a high-quality channel, that is fully committed to our solutions. With CDG, Cloud Distribution and Sematron on board, we all share a common goal focused on delivering strategic solutions to meet key enterprise initiatives. This collaborative approach, underpinned by strong sales support and value adding services will ultimately allow our partners to benefit from the best margins available," concludes Davison.
visit our website @ http://www.cloud-distribution.com
Showing posts with label WANOptimization. Show all posts
Showing posts with label WANOptimization. Show all posts
Wednesday, 11 November 2009
Saturday, 8 August 2009
Introduction to WAN Optimization Techniques
Ever wondered why WAN optimization is required in consolidated data centre scenarios? Or how much difference WAN optimization makes in such situations? This article gives an overview of the techniques that are applied to optimize the data that is sent across the WAN network in order to reduce the bandwidth consumed by them and also to reduce the delay associated with WAN links.
What is WAN Optimization and why is it required?
Wide Area Networking has enabled a lot of applications (both for connectivity as well as optimization). We can today use the Internet Leased Lines and MPLS VPN Connectivity for connecting different branches of an organization. These are quite cost effective when compared to IPLC or dedicated Leased Line connectivity. One of the consequences of the affordability of such higher bandwidth and connectivity is the consolidation of servers and core networking components in a single data centre. This has definitely reduced a lot of cost (when compared to individual servers that needed to be replicated at each branch, in a few cases) and enabled applications like Virtualization (Where the resources of a server are shared between multiple applications as there is always umpteen processing power that is not utilized at all points of time, for example).
But consolidating resources through Wide Area Networking also comes with its own problems. There is a delay or latency induced in the packets that has to travel all the distance. This delay might also be due to the line conditions, amount of traffic at that instant, hardware induced delays like buffer delays both at the local end and ISP end. And there are always real time applications like voice, video etc. that travels along with bandwidth intensive applications like email and ERP that might cause un-acceptable delays if proper QoS policies are not set.
So, all these factors plus a lot more creates the need to have WAN optimization processes in place. Although the WAN optimization techniques do not eliminate the delays, they reduce it to a good extant. And WAN optimization induces its own security concerns but fortunately WAN optimization techniques address security in a much broader sense due to their unique position in the enterprise network where all the packets need to pass through such devices.
WAN Optimization Techniques:
Protocol Substitution:
¤ WAN Optimization devices manage chatty protocols inside the LAN and then encapsulate and manage communications across the WAN using less chatty protocols. For example, TCP (Transmission Control Protocol) requires acknowledgements for transmissions received and includes other mechanisms to do windowing, congestion management, slow start, etc. to manage its performance characteristics which induce further delays. Such TCP packets are often repackaged inside UDP packets for WAN transport or applications are re-architected to replace TCP with UDP for WAN Optimization.
¤ Multiple long messages are consolidated in to one or more longer ones. Each protocol has its own size of packaging messages. Video packets for example are longer than http packets. If the packets are small, they need to be sent and acknowledged more often and delay sensitive packets (which are longer) might have to wait. So, it is more efficient to combine a number of such small packets and send them in one go to reduce the number and frequency of such packets to traverse the WAN Link and to enable designers to choose optimization techniques uniformly for such WAN friendly message structures.
Data Substitution/ Cashing:
WAN optimization can look for recurring strings and data elements at the application layer. If these elements are copied across the WAN Link once, and they don’t change thereafter, a couple of WAN optimization devices can index them and exchange only index values between them so that frequently sent data elements need not be sent again and again through the WAN Link. For example, if a website like the company website is accessed by many members in an organization frequently, then most of the data of that website could be stored locally in a cache and sent to the employees instead of contacting the remote web server other than transactions which involve some real time processing like authentication etc.
Data Compression/ Encryption:
A variety of compression techniques are used to compress the WAN traffic. Header and Payload compression techniques use pattern matching algorithms to identify short, frequently recurring byte patterns that can be replaced by even shorter segments to reduce the final transmitted sizes. Different techniques might be employed to compress data across the WAN link but data which are already compressed like ZIP files or H.264 video packets etc. cannot be compressed much again. The traffic that is sent in the WAN links are often encrypted for security reasons as public networks are more and more utilized these days.
What is WAN Optimization and why is it required?
Wide Area Networking has enabled a lot of applications (both for connectivity as well as optimization). We can today use the Internet Leased Lines and MPLS VPN Connectivity for connecting different branches of an organization. These are quite cost effective when compared to IPLC or dedicated Leased Line connectivity. One of the consequences of the affordability of such higher bandwidth and connectivity is the consolidation of servers and core networking components in a single data centre. This has definitely reduced a lot of cost (when compared to individual servers that needed to be replicated at each branch, in a few cases) and enabled applications like Virtualization (Where the resources of a server are shared between multiple applications as there is always umpteen processing power that is not utilized at all points of time, for example).
But consolidating resources through Wide Area Networking also comes with its own problems. There is a delay or latency induced in the packets that has to travel all the distance. This delay might also be due to the line conditions, amount of traffic at that instant, hardware induced delays like buffer delays both at the local end and ISP end. And there are always real time applications like voice, video etc. that travels along with bandwidth intensive applications like email and ERP that might cause un-acceptable delays if proper QoS policies are not set.
So, all these factors plus a lot more creates the need to have WAN optimization processes in place. Although the WAN optimization techniques do not eliminate the delays, they reduce it to a good extant. And WAN optimization induces its own security concerns but fortunately WAN optimization techniques address security in a much broader sense due to their unique position in the enterprise network where all the packets need to pass through such devices.
WAN Optimization Techniques:
Protocol Substitution:
¤ WAN Optimization devices manage chatty protocols inside the LAN and then encapsulate and manage communications across the WAN using less chatty protocols. For example, TCP (Transmission Control Protocol) requires acknowledgements for transmissions received and includes other mechanisms to do windowing, congestion management, slow start, etc. to manage its performance characteristics which induce further delays. Such TCP packets are often repackaged inside UDP packets for WAN transport or applications are re-architected to replace TCP with UDP for WAN Optimization.
¤ Multiple long messages are consolidated in to one or more longer ones. Each protocol has its own size of packaging messages. Video packets for example are longer than http packets. If the packets are small, they need to be sent and acknowledged more often and delay sensitive packets (which are longer) might have to wait. So, it is more efficient to combine a number of such small packets and send them in one go to reduce the number and frequency of such packets to traverse the WAN Link and to enable designers to choose optimization techniques uniformly for such WAN friendly message structures.
Data Substitution/ Cashing:
WAN optimization can look for recurring strings and data elements at the application layer. If these elements are copied across the WAN Link once, and they don’t change thereafter, a couple of WAN optimization devices can index them and exchange only index values between them so that frequently sent data elements need not be sent again and again through the WAN Link. For example, if a website like the company website is accessed by many members in an organization frequently, then most of the data of that website could be stored locally in a cache and sent to the employees instead of contacting the remote web server other than transactions which involve some real time processing like authentication etc.
Data Compression/ Encryption:
A variety of compression techniques are used to compress the WAN traffic. Header and Payload compression techniques use pattern matching algorithms to identify short, frequently recurring byte patterns that can be replaced by even shorter segments to reduce the final transmitted sizes. Different techniques might be employed to compress data across the WAN link but data which are already compressed like ZIP files or H.264 video packets etc. cannot be compressed much again. The traffic that is sent in the WAN links are often encrypted for security reasons as public networks are more and more utilized these days.
Blogged with the Flock Browser
Labels:
ApplicationAcceleration,
DBAM,
PacketShaping,
WANOptimization
Subscribe to:
Posts (Atom)
