How to Pick the Right WAN Optimization Solution for Your Organization

Transcription

How to Pick the Right WAN Optimization Solution for Your Organization
How to Pick the Right WAN Optimization Solution for Your ...
http://www.gartner.com/technology/reprints.do?id=1-1FCG...
How to Pick the Right WAN Optimization
Solution for Your Organization
3 April 2013 ID:G00250203
Analyst(s): Bjarne Munch
VIEW SUMMARY
STRATEGIC PLANNING ASSUMPTION
WAN optimization controllers continue to have significant differences in functionality. Network managers
who choose the wrong solution for their environments will have to deal with unresolved performance
issues, suboptimal performance resolution and higher costs.
The WAN optimization market will remain in constant
and significant change until at least 2016.
EVIDENCE
1 The evaluation of vendors' support for specific
functionality is based on a survey of the vendors
included in the Gartner "Magic Quadrant for WAN
Optimization Controllers," as well as a detailed review
of these vendors' product descriptions and data sheets.
Overview
Key Challenges
Although the WAN optimization market is mature, with a large number of viable solutions, there
remain differences among all vendors in their support for all functional areas and their adoption of
new functionality, making it a continued challenge for network managers to stay informed.
Mapping the evolving vendor solutions to specific enterprise needs and use cases can be
challenging, given that all vendors claim to provide a panacea for all environments.
Recommendations
Do not choose a WAN optimization solution based on a preconceived vendor preference, as even
leading vendors are not leaders in all functional areas.
Be sure you have current information, including product road maps, about WAN optimization
products, as this is a constantly evolving market.
Define objectives and functional requirements as the first step in selecting a WAN optimization
vendor. Then create your WAN optimization shortlist based on a vendor's ability to meet these
functional requirements.
Perform a live trial of preferred products before committing to the purchase. Participate actively in
the installation and configuration of each proof of concept to understand the complexity of
deploying each solution.
Introduction
WAN optimization is a vibrant market, equal to more than $1.2 billion in annual revenue. The Gartner
Magic Quadrant for WAN Optimization Controllers for 2012 includes eight appliance vendors, but several
other vendors are viable choices. Despite being a large and fairly mature market, there is a significant
variation in the functions each vendor supports.1 For the last eight to 10 years, WAN optimization
controllers (WOCs) have been a product area consuming similar and adjacent functions, such as
application acceleration, caching, compression and deduplication, traffic visibility, control,
measurements, content delivery network (CDN), video delivery and WAN path control. This trend of
expanding product functions is likely to continue until at least 2016.
While this trend offers network managers an opportunity to simplify their solution deployments, it also
provides a challenge to ensure that your company selects the right product with the right functionality.2
In this research, we outline key functional evaluation criteria to ensure that network managers select
the right product (see Table 1).
Table 1. Summary of Select Use Cases and Related Issues and Solutions
Use Case
Key Objective
Reduce WAN cost
To reduce WAN costs by reducing bandwidth usage
Key WOC Functions
Compression and deduplication
Caching
Optimizing streaming video
delivery
Network traffic management
Enable data center
consolidation
1 of 5
To ensure that application performance remains
acceptable after the application has been moved from
a decentralized deployment to a centralized
deployment
Application acceleration
Network traffic management
2 This is evident via recurring client inquiries about
WAN optimization. A typical client inquiry question is:
"Which vendors should I look at if I want to solve this
problem…?" In other inquiries, clients have told us they
chose a WOC based on a preconceived vendor
preference, but then, for example, found that problems
related to a poorly performing SharePoint were not
solved, because the vendor did not support SharePoint
optimization. We have seen clients shortlist two
vendors with a price difference of close to 50%, where
the vendor with a low-priced product was just as good
a fit as the vendor with an expensive offering.
NOTE 1
COMPRESSION VERSUS DEDUPLICATION
Compression and deduplication are similar. Both
methods analyze the data before transmission for
repetitive byte patterns and replace them with small
references for the transmission:
Compression identifies redundancy in a specific file
being transmitted and then removes those
redundancies. Typically, standard algorithms such
as gzip and LZ are used for compression.
Deduplication works by identifying redundancy
within all files being transmitted, and the algorithm
looks for longer byte patterns than compression.
Typically, proprietary methods are used for
deduplication. Because deduplication works
generically across all files identifying long patterns,
significantly higher compression is possible;
however, larger memory is also required.
NOTE 2
VIDEO STREAMING
Depending on the video type and format, the bit rate
for a video stream can range from 375 Kbps up to 6
Mbps for HD video. If several employees are watching
a stream at the same time, the network impact is
equally higher (e.g., 10 people watching a 375 Kbps
stream add more than 3 Mbps). To reduce network
impact, vendors implement media servers to manage
the media stream. This needs to be done for each
streaming protocol in the network. There are several
dedicated streaming protocols — e.g., the traditional
Real-Time Streaming Protocol (RTSP), Real-Time
Transport Protocol (RTP) and Real-Time Transport
Control Protocol (RTCP). Increasingly, more
enterprises are using Web- and HTTP-based video
streaming via systems such as Microsoft Silverlight,
Apple QuickTime and Adobe Flash using protocols such
as HTTP Live Streaming (HLS), HTTP Dynamic
Streaming or Smooth Streaming.
NOTE 3
THE WAN CONNECTION IS CRITICAL TO
FAST STORAGE REPLICATION
Off-site storage backup often requires very large data
volumes to be transferred within a limited time window
to minimize the time the application is out of service.
This may be done at a set time during each day or
several times during a day to reduce the risk of data
loss. A full asynchronous database backup may involve
22/08/2013 12:27
How to Pick the Right WAN Optimization Solution for Your ...
Use Case
Key Objective
Enable enterprise
mobility strategies
To optimize user experience of applications being
accessed via a mobile device
Enterprise disaster
recovery
http://www.gartner.com/technology/reprints.do?id=1-1FCG...
Key WOC Functions
To minimize the enterprise disaster recovery time
Asymmetric Web acceleration
Symmetric software-based
WAN optimization controller
(SoftWOC) client
Compression and deduplication
Network traffic management
several 100GB of data, which can take several hours of
backup time. The size of the WAN connection, as well
as latency of that connection, has a significant impact
on achievable throughput. Typically, the distance
between the primary and secondary data centers is
between 10 km and 200 km. The general backup
latency requirement is 50 ms or less.
Gartner client inquiries indicate that around 40% of
enterprises perform storage backup and replication
over a shared WAN (MPLS), while the rest use a
dedicated WAN (Ethernet). For backup performed over
a shared network, QoS and traffic management are
needed to ensure bandwidth allocation for the backup
traffic.
Source: Gartner (April 2013)
Return to Top
Analysis
Start the WOC Selection Process by Defining and Prioritizing Use Case
Objectives and Functional Requirements
The only way in which network managers can properly select a WAN optimization solution is by clearly
identifying their key objectives and the functional requirements needed to meet these objectives. We
evaluate four specific use cases and establish high-level functional requirements for each use case.
Return to Top
Reduce WAN Costs
Controlling WAN costs is a key focus for enterprises. One aspect that many network managers
investigate is using bandwidth reduction to avoid upgrading a WAN link. This is done via three different
functions: (1) caching, (2) a combination of compression and deduplication, or (3) optimized delivery of
streamed video content. Bandwidth reduction is about reducing the amount of data being transmitted
across the WAN. While WAN cost control is a typical driver, reducing the amount of transmitted data
also reduces the user's latency experience.
Return to Top
Enable Data Center Consolidation by Improving Application Response Times
Gartner clients frequently discuss application performance problems during inquiries. Often, these
discussions are brought up in connection with data center consolidation and centralized application
deployments. There can be several causes for application performance problems, which also means
there is no single solution. The functionalities typically used to solve these performance issues are
application acceleration and network traffic control.
Return to Top
Review Enterprise Mobility Strategies to Improve Efficiency of Mobile and Remote
Workers
Mobility and use of personal devices continue to see strong enterprise interest. According to "Hunting
and Harvesting in a Digital World: The 2013 CIO Agenda," enterprises are already migrating to laptops
and mobile devices as the key user devices. In combination with increased adoption of bring your own
device (BYOD), cloud computing and working outside the office LAN, this means that network managers
need to consider how to deliver business applications with acceptable performance to individual
employees. This can be done via two dedicated mobile solutions: Web acceleration or SoftWOC clients.
Return to Top
Minimize the Enterprise Disaster Recovery Time
Replicating storage data for disaster recovery has a fairly simple goal: Move data from primary storage
to secondary storage, and back, during disaster recovery as quickly and securely as possible to meet
the enterprise recovery time objective, such as less than one hour to recover a business process after
failure. The faster that the replication process can take place, the less impact and downtime there is on
the business process and for end users. WAN optimization is often used to assist in this replication via
dedicated functions for acceleration of storage replication.
Return to Top
Use Defined Functional Requirements to Shortlist WOCs
Having defined specific functional requirements, the next step is to identify specific features and
capabilities with vendors' products that can best meet the requirements.
Return to Top
Multiple Ways to Reduce WAN Bandwidth and WAN Costs
Use Caching
Caching has been used for many years and is still supported in various manners by WOC vendors, such
as Blue Coat, Cisco Systems, Citrix, Exinda and Riverbed. However, the types of caching have increased
to meet the needs of current applications. Most WOC vendors support two types of caching:
File or object caching stores or copies entire files or objects locally, and thus avoids transmitting
the same file several times across the WAN. File caching is particularly useful for frequently
accessed files or objects that are more static in nature, and can reduce bandwidth use by more
than 90%. However, this is application-specific — for example, HTTP content, images, streaming
media objects or FTP files. Thus it's important to ensure not only that relevant applications are
supported, but also that the device provides sufficient storage. Leading devices support up to
2 of 5
22/08/2013 12:27
How to Pick the Right WAN Optimization Solution for Your ...
http://www.gartner.com/technology/reprints.do?id=1-1FCG...
15TB of disk storage capacity. More vendors are planning to offer video caching functionality.
Vendors should also offer content refresh and content distribution.
Byte caching identifies frequently repeated bit or byte patterns across all content that is
transmitted, and stores these byte patterns locally in a segment store. A key difference between
the two types of file caching is that byte caching is done without regard to the relationship
between file and objects, and thus caches byte patterns that appear in multiple files and file types.
Byte caching also works on more dynamic files — e.g., editing one word in a document removes
the benefit of file caching, but leverages the byte cache. Byte caching and segment store are
integrated components of compression and deduplication.
Use Compression and Deduplication
Compression and deduplication are supported by most vendors, including Blue Coat, Cisco, Exinda,
Riverbed, Citrix, Ipanema and F5. Typically, these are implemented as an integrated two-stage process
with a generic first-pass compression based on standard gzip, Lempel-Ziv (LZ) or similar algorithm, and
a segment-store second pass based on a proprietary deduplication algorithm (see Note 1). To achieve
the greatest reduction in data transmission, both processes must be employed.
The performance of vendor-specific solutions is highly dependent on algorithms and actual
implementations, but also depends on processing power and amount of memory supported by the
appliance. Today, vendors usually use solid-state drive (SSD) flash memory for higher data throughput,
and typically in the order of gigabytes to terabytes for high compression levels.
Network managers should evaluate solutions in the context of enterprise-specific data content before
making any assumptions about compression rates. Text can typically obtain a high compression rate,
while graphic (picture) files (GIF, JPG, etc.), music files (MP3, WMA, etc.), video files (AVI, MPG, etc.)
and other already compressed traffic achieve limited additional compression. It is not possible to
compress encrypted traffic, and, thus, it is essential that the WOC support Secure Sockets Layer (SSL).
As a general rule, data deduplication can reduce bandwidth needs by at least 60%. However, in many
cases, bandwidth may be reduced by 80% to 90% or even more.
Use Optimized Video Content Delivery
Enterprise adoption of video continues to grow, with a predicted increase to 16 hours per employee per
month by 2016, from 4.1 hours in 2012. This means that enterprises are interested in how to control
and reduce the impact on the enterprise WAN (see Note 2). This adoption is for real-time video
communications and streaming video, which is used for many different purposes, such as on-demand
training and education, live video streaming of corporate events and live executive briefings.
WOC vendors, such as Blue Coat, Cisco Systems, Citrix and Riverbed, are adding functionality to their
appliances that better manage the network impact of high volumes of video traffic. In addition to
traditional functionality for traffic quality of service (QoS), caching and deduplication, vendors are
increasingly adding media servers to optimize video performance via stream splitting, video
prepopulation and video caching. These techniques can reduce WAN bandwidth utilization by more than
90%.
Return to Top
Enable Data Center Consolidation by Application Acceleration
The typical source of application performance problems continues to be transport and application
protocols that are not designed for high-latency networks (e.g., for one-way latencies above 50
millisecond [ms] performance degradation). Acceleration technologies can reduce the latency impacting
end users by 60% or more.
Most vendors perform TCP optimization, which essentially optimizes all applications. As a general
guideline, these techniques can reduce latency impact up to 30% to 40%, depending on the
implementation and the amount of memory available for TCP windowing. When combined with
application layer latency compensation techniques, latency can be reduced by at least 60%.
In addition to generic transport protocol optimization, network managers should look for specific
application layer optimization, such as:
Application protocol optimization, as well as content prepositioning, pipelining, read-head, writebehind for Messaging API (MAPI), Common Internet File System (CIFS), Server Message Block
(SMB), Network File System (NFS), HTTP, etc.
Virtual Desktop Infrastructure (VDI) acceleration, QoS and deduplication/compression of Citrix's
Independent Computing Architecture (ICA), Microsoft Remote Desktop Protocol (RDP), VMware via
Microsoft Remote Desktop Protocol (RDP), VMware PCoIP
The result is significant acceleration of the applications. Expect 60% to 70% latency improvements in
addition to the TCP improvement. Vendors include Riverbed, Blue Coat, Exinda and Cisco Systems.
Return to Top
Improve Network Performance With Advanced Network Traffic Management
As enterprise bandwidth utilization continues to increase by over 30% annually, network managers
often struggle to maintain consistently good performance for their business applications. The issues are
related not only to lack of bandwidth planning, but also to use of recreational traffic, such as viewing
YouTube and seasonal sporting events online, which create unpredictable traffic patterns and traffic
congestion. By deploying application-level bandwidth usage monitoring and combining it with
application-specific traffic management, network managers can deliver consistent application
performance for critical applications, while maintaining a high level of network utilization — up to 80%.
This area includes a range of traffic management capabilities, such as:
Identify specific application traffic based on Internet Protocol (IP) address, port number,
application-specific identification, URL and HTTP
Display bandwidth utilization for each application broken down into WAN access or subnet, hosts
and user
3 of 5
22/08/2013 12:27
How to Pick the Right WAN Optimization Solution for Your ...
http://www.gartner.com/technology/reprints.do?id=1-1FCG...
Classify applications and URL/HTTP content into priority classes and priority queuing, and tag
applications for transport over the WAN
Allocate guaranteed bandwidth or performance for specific applications, as well as manage
bandwidth usage for all other applications
Throttle/shape or block/allow traffic by application, ports, protocols, URLs, URL category, users,
user groups, IP address, file type, Multipurpose Internet Messaging Extensions (MIME) type or
time of day
Vendors include Blue Coat, Exinda, Ipanema, Riverbed and Silver Peak. Network managers need to
differentiate between vendors that only do priority tagging of applications and queue management, and
vendors (such as Blue Coat and Exinda) that also perform active traffic control, such as shaping,
throttling and blocking based on a range of configurable conditions.
Return to Top
Support Individual Personal Devices
There are two methods available to improve application performance for mobile users:
An asymmetric solution is based on functionality in the current browser, and thus does not use
a dedicated software client on the user device. All Web browsers support negotiation of
compression on HTTP streams, typically using gzip and caching. In addition, Riverbed uses
JavaScripts for Web page optimization, such as Cascading Style Sheets, images and merging Web
page files for fewer roundtrips. This can reduce data volume by close to 50%, and reduce the
impact of latency by up to 60%. Vendors include Blue Coat, F5, Radware and Riverbed.
A symmetric solution is based on a SoftWOC client to be loaded onto the user device. A
SoftWOC offers features similar to a branch office appliance, across all applications, not just
browser-based applications, reducing latency up to 70%. These clients also support deduplication
and can reduce data volume up to 90%. In addition to understanding specific feature support,
network managers should evaluate support for OSs such as Windows CE, Windows XP, Windows
7, Windows 8, Apple iOS, Mac OS and Android. It is critical to evaluate mobile device
requirements for memory and processing power to perform application acceleration and
deduplication. Vendors that offer a SoftWOC include Riverbed, Cisco Systems, Circadence and
Citrix.
Return to Top
Reduce the Enterprise Disaster Recovery Time With Date Center to Date Center Storage
Replication Acceleration
The purpose of WAN optimization in this context is to speed up the transport of high data volumes
between data centers via data deduplication, IP/TCP acceleration and storage protocol acceleration for
the relevant storage replication solutions from Dell, EMC, Hitachi Data Systems, NetApp, Oracle and
others. While storage systems already perform block deduplication, WOCs can add byte-level
deduplication.
A key selection criterion is the data throughput the device supports. Therefore, network and storage
managers should start by defining their throughput objectives (e.g., 300GB per hour). Vendors'
marketing materials often focus on the speed of network interfaces as a key benchmark for the
throughput that their appliances support. Currently, the largest interface available is up to 10 Gbps (see
Note 3). However, the amount and type of memory supported by the device is equally, if not more,
important than the throughput. Strong data reduction is paramount to fast replication (and thus
throughput), and byte deduplication requires a large local store of very fast memory. Leading devices
support up to 5TB of SSD. Vendors include Silver Peak, Riverbed, F5 and Citrix.
Return to Top
Always Perform an On-Site Proof of Concept Before Signing the Purchasing
Contract
After compiling the vendor shortlist, network managers should test their preferred device before final
purchase. The purpose is twofold:
Network managers need to ensure that the device fulfills the specific functional needs of their use
cases within the enterprise network environment.
The enterprise networking staff needs to understand how easy or difficult it is to deploy and
operate the device.
There is a significant difference in how various vendors' devices are configured, deployed and managed.
Therefore, network managers need to include this information in their final selection criteria.
Testing is preferably done at real-world enterprise locations that provide a representative sampling of
the enterprise network (connection type, application and content traffic types, latency and bandwidth
characteristics). Alternatively, testing can be done on a test bed with a network impairment simulator
to mimic typical and worst-case network conditions. Network managers first should establish a baseline
noting their current application's performance and bandwidth use. Many WOCs monitor and report
these parameters. During initial testing, the network team should find out if the device can report the
impact on performance.
The test should be performed over a few weeks, typically three to five, to ensure most workload
conditions are tested. It is important to be prepared to fine-tune the device, as well as the applications
and changes to the network, to gain optimum performance. For example, the testers may have to turn
off application-based encryption and/or compression, use a particular port number with the application,
change QoS settings in the router or increase WAN bandwidth for a certain class of end users.
It is important that the enterprise network staff do not work in silos. They should work alongside the
vendor or vendor partner during the test phase to get hands-on experience. They should include
security staff in the proof of concept to understand and test the support of SSL, and the handling of
4 of 5
22/08/2013 12:27
How to Pick the Right WAN Optimization Solution for Your ...
http://www.gartner.com/technology/reprints.do?id=1-1FCG...
encryption keys and certificates. Finally, the enterprise network staff needs to report to the selection
team about the complexity and time involved in operating the device or devices.
Return to Top
© 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
or distributed in any form without Gartner’s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for
Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all
warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This
publication consists of the opinions of Gartner’s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to
change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research
should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered
in Gartner research. Gartner’s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research
organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see
“Guiding Principles on Independence and Objectivity.”
About Gartner | Careers | Newsroom | Policies | Site Index | IT Glossary | Contact Gartner
5 of 5
22/08/2013 12:27