Much emphasis is placed on servers and storage when discussing Application Performance, mainly because the application lives on a server and uses storage. However, the network has considerable importance, certainly in the case of WANs where there are ways of speeding up the transmission of data of a network. These techniques usually go under the title WAN Acceleration or WAN Optimization.
It is often thought that the limiting factor in speed of network transmission is the bandwidth of the medium involved but this is not strictly true. There are techniques for getting better performance from WANs, often by biasing data transmission priorities towards more important business processes. Having designed the WAN network and its components, is that it then? Job done?
Not really, since there are tricks you can employ to enhance performance but that is a bonus not a panacea for poor design. There are ways to get apparent extra bandwidth without a disruptive upgrade.
The normal definition is the optimization of available bandwidth in the areas:
■ Don't send what you don't need to send, especially large files or print loads
■ If it must be sent, try to schedule it appropriately so as not to interfere with critical workloads. Use business prioritization as the decision yardstick
■ Use techniques to optimize use of the available bandwidth (discussed below).
This is the storage of data transmitted from a source to a destination at that destination. If the same data is requested at the destination, the optimization software recognizes this and stops any request to the original source for a retransmission.
Data deduplication is the replacement of multiple copies or blocks of data (at various levels of granularity) with references to a shared copy in order to save storage space and/or bandwidth (SNIA Definition). Data deduplication can operate at the file, block or bit level.
This is fairly obvious and the data transmission is reduced by an amount dictated by the efficiency of the data compression/decompression algorithms used. The efficiency of a compression technique is measured by the ratio original size of data to the compressed size.
4. FEC (Forward Error Correction)
A “receiver makes it right” transmission technique where extra bits are added to a packet/message for analysis at the receiving end. In general, it means that the receiving end of the transmission is able to detect, and in most cases correct, any erroneous transmissions.
Packets warranting retransmission may:
■ be corrupted due to errors, for example noise
■ lost in link or host failures
■ dropped due to buffer overflow
■ dropped due to aging or sell by date exceeded, for example the TTL (Time To Live) field in IP (Internet Protocol)
5. Traffic shaping
Traffic shaping is the practice of regulating network data transfer to assure a certain level of performance, quality of service (QoS). The practice involves favoring transmission of data from higher priority applications over lesser ones, as designated by the business organization. It is sometimes called packet shaping.
6. Congestion Control
This TCP function is designed to stop the sender shipping more data than the network can handle, as if trying to drink from a fire hose. TCP uses a number of mechanisms based on a parameter called the congestion window.
7. Protocol acceleration
A class of techniques for improving application performance by avoiding or circumventing shortcomings of various protocols. There are several forms of protocol acceleration:
■ TCP Acceleration
■ CIFS (Common Internet File Systems) and NFS (Network File System) Acceleration
■ HTTP (Hypertext Transfer Protocol) Acceleration
■ Microsoft Exchange Acceleration
See reference 7 below, under "WAN Optimization References" which presents good coverage of some of the factors listed above.
8. Transmission protocol
Choose your transmission protocol according to what you are transmitting. Some protocols are better than other at transmitting certain types of data. This will also dictate the expected loss (and hence retransmission) rate
9. Take advice
Take advice from outside if you aren't sure what you are doing.
10. Tricks of the trade
Some of the tricks of the optimization trade are:
Dr. Terry Critchley is the Author of "Making It in IT", "High Performance IT Services" and “High Availability IT Services”.
This blog was created from extracts from Terry Critchley's book: High Performance IT Services [ August 25 2016]
There are a number of useful references on this topic. I found all the following ones useful in various areas as well as being quite easy to follow. I have therefore decided to list them all and let the network experts among you choose your own favorite. 4. The 2014 Application & Service Delivery Handbook. Part1: Introduction and Challenges
WAN Optimization References
[Search on “Application and Service Delivery Handbook” to find versions from 2011, 2012 and 2013. Add the search term “webtorials” if the hit list is too large.]
There are a number of useful references on this topic. I found all the following ones useful in various areas as well as being quite easy to follow. I have therefore decided to list them all and let the network experts among you choose your own favorite.
4. The 2014 Application & Service Delivery Handbook. Part1: Introduction and Challenges
In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I've found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM's most critical value points, and in a basic sense fails to recognize what UEM is truly about ...
We now live in the kind of connected world where established businesses that are not evolving digitally are in jeopardy of becoming extinct. New research shows companies are preparing to make digital transformation a priority in the near future. However most of them have a long way to go before achieving any kind of mastery over the multiple disciples required to effectively innovate ...
IT Transformation can result in bottom-line benefits that drive business differentiation, innovation and growth, according to new research conducted by Enterprise Strategy Group (ESG) ...
While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions ...
This is the third in a series of three blogs directed at recent EMA research on the digital war room. In this blog, we'll look at three areas that have emerged in a spotlight in and of themselves — as signs of changing times — let alone as they may impact digital war room decision making. They are the growing focus on development and agile/DevOps; the impacts of cloud; and the growing need for security and operations (SecOps) to team more effectively ...
As we've seen, hardware is at the root of a large proportion of data center outages, and the costs and consequences are often exacerbated when VMs are affected. The best answer, therefore, is for IT pros to get back to basics ...
Risk is relative. The Peltzman Effect describes how humans change behavior when risk factors are reduced. They often act more recklessly and drive risk right back up. The phenomenon is recognized by many economists, its effects have been studied in the field of medicine, and I'd argue it is at the root of an interesting trend in IT — namely the increasing cost of downtime despite our more reliable virtualized environments ...
How do enterprises prepare for the future that our Cloud Vision 2020 survey forecasts? I see three immediate takeaways to focus on ...
When will we be at a point where virtually all enterprise workloads are run in the cloud and how will that change things for IT? To find out, we commissioned a survey, Cloud Vision 2020: The Future of the Cloud. The results were fascinating. I'll share three fundamental lessons we learned in the survey ...
The digital war room — physical, virtual or hybrid — is not in retreat but in fact is growing in scope to include greater participation from development and security. It's also becoming more proactive, with on average more than 30% of "major incidents" before they impacted business service performance. In this blog I'm providing a few additional highlights from the insights we got on digital war room organization and processes ...