Application Performance and WAN Speedup
March 22, 2017

Terry Critchley
Author of "Making It in IT"

Share this

Much emphasis is placed on servers and storage when discussing Application Performance, mainly because the application lives on a server and uses storage. However, the network has considerable importance, certainly in the case of WANs where there are ways of speeding up the transmission of data of a network. These techniques usually go under the title WAN Acceleration or WAN Optimization.

It is often thought that the limiting factor in speed of network transmission is the bandwidth of the medium involved but this is not strictly true. There are techniques for getting better performance from WANs, often by biasing data transmission priorities towards more important business processes. Having designed the WAN network and its components, is that it then? Job done?

Not really, since there are tricks you can employ to enhance performance but that is a bonus not a panacea for poor design. There are ways to get apparent extra bandwidth without a disruptive upgrade.

The normal definition is the optimization of available bandwidth in the areas:

■ Don't send what you don't need to send, especially large files or print loads

■ If it must be sent, try to schedule it appropriately so as not to interfere with critical workloads. Use business prioritization as the decision yardstick

■ Use techniques to optimize use of the available bandwidth (discussed below).

1. Caching

This is the storage of data transmitted from a source to a destination at that destination. If the same data is requested at the destination, the optimization software recognizes this and stops any request to the original source for a retransmission.

2. Deduplication

Data deduplication is the replacement of multiple copies or blocks of data (at various levels of granularity) with references to a shared copy in order to save storage space and/or bandwidth (SNIA Definition). Data deduplication can operate at the file, block or bit level.

3. Compression

This is fairly obvious and the data transmission is reduced by an amount dictated by the efficiency of the data compression/decompression algorithms used. The efficiency of a compression technique is measured by the ratio original size of data to the compressed size.

4. FEC (Forward Error Correction)

A “receiver makes it right” transmission technique where extra bits are added to a packet/message for analysis at the receiving end. In general, it means that the receiving end of the transmission is able to detect, and in most cases correct, any erroneous transmissions.

Packets warranting retransmission may:

■ be corrupted due to errors, for example noise

■ lost in link or host failures

■ dropped due to buffer overflow

■ dropped due to aging or sell by date exceeded, for example the TTL (Time To Live) field in IP (Internet Protocol)

5. Traffic shaping

Traffic shaping is the practice of regulating network data transfer to assure a certain level of performance, quality of service (QoS). The practice involves favoring transmission of data from higher priority applications over lesser ones, as designated by the business organization. It is sometimes called packet shaping.

6. Congestion Control

This TCP function is designed to stop the sender shipping more data than the network can handle, as if trying to drink from a fire hose. TCP uses a number of mechanisms based on a parameter called the congestion window.

7. Protocol acceleration

A class of techniques for improving application performance by avoiding or circumventing shortcomings of various protocols. There are several forms of protocol acceleration:

■ TCP Acceleration

■ CIFS (Common Internet File Systems) and NFS (Network File System) Acceleration

■ HTTP (Hypertext Transfer Protocol) Acceleration

■ Microsoft Exchange Acceleration

See reference 7 below, under "WAN Optimization References" which presents good coverage of some of the factors listed above.

8. Transmission protocol

Choose your transmission protocol according to what you are transmitting. Some protocols are better than other at transmitting certain types of data. This will also dictate the expected loss (and hence retransmission) rate

9. Take advice

Take advice from outside if you aren't sure what you are doing.

10. Tricks of the trade

Some of the tricks of the optimization trade are:


Dr. Terry Critchley is the Author of "Making It in IT", "High Performance IT Services" and “High Availability IT Services”.

This blog was created from extracts from Terry Critchley's book: High Performance IT Services [ August 25 2016]


WAN Optimization References

There are a number of useful references on this topic. I found all the following ones useful in various areas as well as being quite easy to follow. I have therefore decided to list them all and let the network experts among you choose your own favorite.

1. WAN Optimization Part 1: TCP Limitations

2. WAN Optimization Part 2: Put Performance Second

3. WAN Optimization Part 3: Overcoming Bandwidth Limitations

4. The 2014 Application & Service Delivery Handbook. Part1: Introduction and Challenges
[Search on “Application and Service Delivery Handbook” to find versions from 2011, 2012 and 2013. Add the search term “webtorials” if the hit list is too large.]

5. The Definitive Guide to Cloud Acceleration

6. An Introduction to IP Header Compression

Dr. Terry Critchley is an IT consultant and author who previously worked for IBM, Oracle and Sun Microsystems
Share this

The Latest

March 18, 2024

Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...

March 15, 2024

In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...

March 14, 2024

The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...

March 13, 2024

In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...

March 12, 2024

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024

Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...

March 07, 2024
In this digital era, consumers prefer a seamless user experience, and here, the significance of performance testing cannot be overstated. Application performance testing is essential in ensuring that your software products, websites, or other related systems operate seamlessly under varying conditions. However, the cost of poor performance extends beyond technical glitches and slow load times; it can directly affect customer satisfaction and brand reputation. Understand the tangible and intangible consequences of poor application performance and how it can affect your business ...
March 06, 2024

Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...

March 05, 2024

Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...

March 04, 2024

This year's Super Bowl drew in viewership of nearly 124 million viewers and made history as the most-watched live broadcast event since the 1969 moon landing. To support this spike in viewership, streaming companies like YouTube TV, Hulu and Paramount+ began preparing their IT infrastructure months in advance to ensure an exceptional viewer experience without outages or major interruptions. New Relic conducted a survey to understand the importance of a seamless viewing experience and the impact of outages during major streaming events such as the Super Bowl ...