Liad Ofek Vice President, Technical Services Expand Networks.

Slides:



Advertisements
Similar presentations
Deloitte Technology Fast 500 Asia Pacific Winners Accelerating Your Network WACC Technology.
Advertisements

Defense Communications as a Scarce Resource
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
1. 2 Branch Office Network Performance Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 What can happen when you accelerate a flow twice?
Data center class wan optimization
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Blue Coat ® and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Citrix Partner Update The Citrix Delivery Centre.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Charles Rutledge VP Marketing Quintum Technologies, Inc.
Sangfor WAN Optimization
Expand Networks Confidential and Proprietary WAN Optimization – On Your Terms Innovative Commercial & Service Enablement Models for Telcos, MSP’s & Cloud.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
A Practical Guide To The World Of LAN Telephony Charles Rutledge VP Marketing Quintum Technologies, Inc.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Hosted by Gain Maximum WAN and LAN Performance Michael Hoch Research Director Aberdeen Group.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 WAN Application Acceleration Overview Bob Yee Product Marketing WAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Module 4: Designing Routing and Switching Requirements.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
© 2006 Cisco Systems, Inc. All rights reserved. 3.5: Implementing QoS with Cisco AutoQoS.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Demystifying Quality of Service (QoS). Page 2 What Is Quality of Service?  Ability of a network to provide improved service to selected network traffic.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Dave Martin Vice President, Product Management
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Strictly Confidential | © 2013 Silver Peak Systems, Inc. All Rights Reserved. ACCELERATE & OPTIMIZE ANY APP Rick Suehring, Regional Sales Manager
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Barracuda NG Firewall ™
Networking in the Enterprise
Networking in the Enterprise
Securing the Network Perimeter with ISA 2004
Virtual Private Network
Introduction to Dell SonicWALL WAN Acceleration
File Transfer Issues with TCP Acceleration with FileCatalyst
Vice President, Technical Services
Cisco Prime NAM for WAN Optimization Deployment
QoS based pricing in IP Networks
Presentation transcript:

Liad Ofek Vice President, Technical Services Expand Networks

Clearing the Way for VoIP in the Branch  What’s the Hidden Cost?  The promise and the reality of VoIP  VoIP challenges in the Branch Office  The Expand Compass Solution for VoIP deployments

Conflicting Commercial & User Requirements Remote User 80% of Users are Remote! 87% of Users are Remote! Corporate HQ annoyed  San Francisco Remote User annoyed  Poor response time frustrated  London Remote User frustrated  High support costs gives up  Tokyo Remote User gives up  Lack of productivity HQ  Cost-reduction  Simplicity  Consolidation  Business Continuity  Regulatory Compliance REMOTE  Globalization  Productivity

The Promise of Voice/Video and Data Convergence  Reduces cost  Simplifies management  Provides enhanced features  Delivers greater mobility for the distributed business  Provides same quality as PSTN calls  Converged Voice, Data, Video – unified infrastructure for feature- rich applications  Convergence made easy and even more cost-effective with MPLS (Multi-protocol packet switching) Voice/Video Over IP are here to stay…BUT...

The Reality  The WAN limits the success of Convergence  Low speed links for remote sites – 128kbps, 512kbps, T1’s/E1’s  Low visibility for existing application bandwidth consumption  Performance challenges  Unacceptable voice quality  Greedy and bursty competing applications  MPLS access points are still congested…QoS is not enough  More data is thrown over the WAN  Server consolidation  Web services  Disaster recovery  Voice is not the only business critical application  Other data applications can’t be degraded to improve voice quality

More Applications Deployed To The Branch ______ ______ ______  87% of employees work from the branch (Nemertes, 2004)  New applications   Internet / Intranet  VoIP  Same WAN  Frame Relay  Leased lines  IP VPN  MPLS

Insufficient Capacity and Burst Remote Branch Challenges

Latency and Chatty Applications Insufficient Capacity and Burst Remote Branch Challenges

Intermittent Connectivity and Packet Loss Latency and Chatty Applications Insufficient Capacity and Burst Remote Branch Challenges

Congestion and Greedy Applications Intermittent Connectivity and Packet Loss Latency and Chatty Applications Insufficient Capacity and Burst Remote Branch Challenges

The Complete Technology Solution for VoIP

WAN Optimization Compression - reduce data over the WAN: free up the WAN capacity for Voice  WAN Compression  Gigabyte Caching

Best-of-breed WAN Compression  Patented algorithms  Byte-level caching  Packet header reduction  Adaptive packet compression  Fully transparent

Next-Generation WAN Compression  When data repeats, content is delivered from the edge  The “bandwidth effect”

WAN Throughput Improvements  Increase WAN capacity  Benefits all applications  Transparent to WAN, applications, servers and users  Alternative to WAN upgrades with a 3 – 9 month ROI We have literally been able to trick our 56Kbps lines into behaving like T1s – Julie Williams, VP & Compliance Officer First National Bank Iowa Microsoft Exchange 0% Lotus Notes SAP NetBIOS Intranet Web XML Disaster Recovery Citrix 200%400%600%800%1000%1200% 0%2X4X6X8X10X12X Typical Improvements Peak Improvements Additional WAN capacity

WAN Optimization QoS - Guarantee voice quality  Shaping  Traffic priority  MPLS tagging  Policy scheduling  Bandwidth limitation

QoS - Gain Application Control  Prioritize and control apps  Guaranteed, min/max bandwidth for key applications  Control/block rogue applications  Seamless integration with other optimization services We were able to configure VoIP QoS with a simple configuration at 30% less than the Telco cost –Jacob Nielsen, Network Administrator Brenntag Nordic

Acceleration Optimize all applications to improve application response time Application Acceleration  Voice Optimization (Fragmentation)  HTTP Acceleration  FTP Acceleration  DNS Acceleration  HTTPS Acceleration  Citrix Acceleration Protocol Acceleration  TCP Acceleration  SCPS Reliability

H How Does Voice Optimization Work ?  If applications sharing a low bandwidth link include FTP and VoIP, small VoIP packets may be delayed  Fragmentation will sub-divide the large packets and insert the small  Reassembly performed at remote Accelerator  Applied only to QoS default and low priority queues H H H H H H H H H

Visibility & Management Visibility for VoIP performance ExpandView  Central Management  Inventory & License Management  Global Visibility  Ease of Deployment Application & Network Visibility  Automatic Application Discovery  NetFlow  SLA Management

Visibility Into Application Performance  Visibility for World-class NOCs  Network, application & performance statistics  Application performance and alerting  Network trending and analysis …more impressive were the monitoring capabilities that offered in- depth visibility & enabled us to tune the performance of Microsoft Office –Ovvyng Harewood, IT Director for the Ministry of Finance, Gov of Barbados

Security Encryption  IP Sec Tunneling  3 DES AAA  Authentication  Authorization  Accounting  RADIUS  TACACS+

WAFS (Wide Area File Services) Will VoIP be affected by server consolidation ?  Terminate CIFS protocol locally (proxy) to eliminate “chattiness” over the WAN  Cache the objects to provide LAN-like performance  Consolidate other RBO services to provide LAN performance (print, DNS, DHCP, Etc.)

How Does WAFS Work?

Summary  Merging voice and data networks can cause significant problems which can offset the financial benefits of VoIP if not addressed properly  Technologies like compression, QoS, protocol and application acceleration, and monitoring are essential to establishing VoIP as an integral application for the branch