Much emphasis is placed on servers and storage when discussing Application Performance, mainly because the application lives on a server and uses storage. However, the network has considerable importance, certainly in the case of WANs where there are ways of speeding up the transmission of data of a network. These techniques usually go under the title WAN Acceleration or WAN Optimization.
It is often thought that the limiting factor in speed of network transmission is the bandwidth of the medium involved but this is not strictly true. There are techniques for getting better performance from WANs, often by biasing data transmission priorities towards more important business processes. Having designed the WAN network and its components, is that it then? Job done?
Not really, since there are tricks you can employ to enhance performance but that is a bonus not a panacea for poor design. There are ways to get apparent extra bandwidth without a disruptive upgrade.
The normal definition is the optimization of available bandwidth in the areas:
■ Don't send what you don't need to send, especially large files or print loads
■ If it must be sent, try to schedule it appropriately so as not to interfere with critical workloads. Use business prioritization as the decision yardstick
■ Use techniques to optimize use of the available bandwidth (discussed below).
This is the storage of data transmitted from a source to a destination at that destination. If the same data is requested at the destination, the optimization software recognizes this and stops any request to the original source for a retransmission.
Data deduplication is the replacement of multiple copies or blocks of data (at various levels of granularity) with references to a shared copy in order to save storage space and/or bandwidth (SNIA Definition). Data deduplication can operate at the file, block or bit level.
This is fairly obvious and the data transmission is reduced by an amount dictated by the efficiency of the data compression/decompression algorithms used. The efficiency of a compression technique is measured by the ratio original size of data to the compressed size.
4. FEC (Forward Error Correction)
A “receiver makes it right” transmission technique where extra bits are added to a packet/message for analysis at the receiving end. In general, it means that the receiving end of the transmission is able to detect, and in most cases correct, any erroneous transmissions.
Packets warranting retransmission may:
■ be corrupted due to errors, for example noise
■ lost in link or host failures
■ dropped due to buffer overflow
■ dropped due to aging or sell by date exceeded, for example the TTL (Time To Live) field in IP (Internet Protocol)
5. Traffic shaping
Traffic shaping is the practice of regulating network data transfer to assure a certain level of performance, quality of service (QoS). The practice involves favoring transmission of data from higher priority applications over lesser ones, as designated by the business organization. It is sometimes called packet shaping.
6. Congestion Control
This TCP function is designed to stop the sender shipping more data than the network can handle, as if trying to drink from a fire hose. TCP uses a number of mechanisms based on a parameter called the congestion window.
7. Protocol acceleration
A class of techniques for improving application performance by avoiding or circumventing shortcomings of various protocols. There are several forms of protocol acceleration:
■ TCP Acceleration
■ CIFS (Common Internet File Systems) and NFS (Network File System) Acceleration
■ HTTP (Hypertext Transfer Protocol) Acceleration
■ Microsoft Exchange Acceleration
See reference 7 below, under "WAN Optimization References" which presents good coverage of some of the factors listed above.
8. Transmission protocol
Choose your transmission protocol according to what you are transmitting. Some protocols are better than other at transmitting certain types of data. This will also dictate the expected loss (and hence retransmission) rate
9. Take advice
Take advice from outside if you aren't sure what you are doing.
10. Tricks of the trade
Some of the tricks of the optimization trade are:
Dr. Terry Critchley is the Author of "Making It in IT", "High Performance IT Services" and “High Availability IT Services”.
This blog was created from extracts from Terry Critchley's book: High Performance IT Services [ August 25 2016]
There are a number of useful references on this topic. I found all the following ones useful in various areas as well as being quite easy to follow. I have therefore decided to list them all and let the network experts among you choose your own favorite. 4. The 2014 Application & Service Delivery Handbook. Part1: Introduction and Challenges 7. Bandwidth Management Techniques — Tips and Actions
WAN Optimization References
[Search on “Application and Service Delivery Handbook” to find versions from 2011, 2012 and 2013. Add the search term “webtorials” if the hit list is too large.]
This last link discusses in layman's terms many of the speedup techniques covered above.
There are a number of useful references on this topic. I found all the following ones useful in various areas as well as being quite easy to follow. I have therefore decided to list them all and let the network experts among you choose your own favorite.
4. The 2014 Application & Service Delivery Handbook. Part1: Introduction and Challenges
7. Bandwidth Management Techniques — Tips and Actions
Just in time for the holiday shopping season, APMdigest asked experts from across the industry for their opinions on the best way to measure eCommerce performance, in terms of applications, networks and infrastructure. Part 3, the final installment, covers the customer journey ...
Just in time for the holiday shopping season, APMdigest asked experts from across the industry for their opinions on the best way to measure eCommerce performance, in terms of applications, networks and infrastructure. Part 2 covers APM and monitoring ...
As the holiday shopping season looms ahead, and online sales are positioned to challenge or even beat in-store purchases, eCommerce is on the minds of many decision makers. To help organizations decide how to gauge their eCommerce success, APMdigest compiled a list of expert opinions on the best way to measure eCommerce performance ...
More than 90 percent of respondents are concerned about data and application security in public clouds while nearly 60 percent of respondents reported that public cloud environments make it more difficult to obtain visibility into data traffic, according to a new Cloud Security survey ...
Today's technology advances have enabled end-users to operate more efficiently, and for businesses to more easily interact with customers and gather and store huge amounts of data that previously would be impossible to collect. In kind, IT departments can also collect valuable telemetry from their distributed enterprise devices to allow for many of the same benefits. But now that all this data is within reach, how can organizations make sense of it all? ...
CIOs trying to lead digital transformation at the speed needed to succeed need a mix of three scale accelerators, according to Gartner, Inc. The three scale accelerators include: digital dexterity, network effect technologies, and an industrialized digital platform ...
While the majority of IT practitioners in the UK believe their organization is equipped to support digital services, over half of them also say they face consumer-impacting incidents at least one or more times a week, sometimes costing their organizations millions in lost revenue for every hour that an application is down, according to PagerDuty's State of Digital Operations Report: United Kingdom ...
Today's IT is under considerable pressure to remain agile, responsive and scalable to meet the changing needs of business. IT infrastructure can't become a bottleneck, it must be the enabler. But as new paradigms, such as DevOps, are adopted, data center complexity increases and infrastructure constraints can block the ability to achieve these goals ...
It's 3:47am. You and the rest of the Ops team have been summoned from your peaceful slumber to mitigate an application delivery outage. Your mind races as you switch to problem solving mode. It's time to start thinking about how to make this mitigation FUN! ...
With the increased complexity of IT environments, the rising cyber threats and the growing number of IT alerts, IT organizations have come to the realization that throwing more people at IT issues doesn't solve the problem ...