Pages

Friday, February 11, 2011

Techniques WAN Optimization

Internet or Wide Area Network (WAN) is successful in providing secure and flexible methods for business operations. One can accelerate application performance and increase throughput levels by optimizing the Wide Area Networks (WANs). Business productivity depends on application performance management. WAN optimization and acceleration technologies are tools that are used for accelerating the networks. The companies that require faster and efficient WAN end user experience and better use of their network, implement WAN optimization and related technologies.

These are the some technologies used by a business for optimizing the WAN:

Deduplication:
It involves the deletion of duplicate data and helps in storage of single copy of the useful data so that a company can reduce its storage needs. Data deduplication methods improve bandwidth efficiency. Uses of the deduplication technology are data protection, accelerating the speed of service and substantial reduction of costs.

Compression:
IT is the technique of reducing data size in order to save space or time of transmission. Data compression, also known as source coding is the process where information is encoded using unique encoding strategies that utilize fewer bits or other information carrying units.

Caching:
Caching also called as Proxy, which access the same data repeatedly and is reliant on human behavior. Caching is suited for point-to-point leased lines but also used for VPN tunnels and Internet connections.

Wide Area File Services (WAFS):
WAFS is basically a storage technology, which helps in accessing a remote data center possible over a WAN.

Connection Limits:
It helps routers and access points to access through IP traffic that is caused due to denial of service. This is most suitable for open Internet access links, but can also be used on WAN links.

Simple Rate Limits:
It allows a single user to receive only a specified amount of data.

Traffic Shaping:
It is a technique where data usage is controlled and specific traffic is allowed or disallowed. This technique is suitable in cases of Internet connections and point-to-point leased lines.

Equalizing:
It is a technique where the immediate priority is determined based on data usage. This involves:
  • Common Internet File System (CIFS) proxy
  • Hypertext Transfer Protocol over SSL (HTTPS) Proxy
  • Media multicasting
  • Forward Error Correction (FEC)


No comments: