Sie sind auf Seite 1von 4

WAN Optimization

WAN Optimization

What is it?
WAN optimization gives complete control over network to speed up the performance. It can help
improve performance of critical application, which will increase user productivity.
WAN optimization is method of capitalize on network performance by classifying, prioritizing,
accelerating business applications and adding layered approach to secure information and
protect users from the threats.
Advantage of WAN Optimization
Boost up Productivity: Prioritizing and accelerating critical application will speed up access of
information to end users, which will intern in high productivity.
Cost effective: It saves cost by controlling bandwidth utilization of network.

Prioritization and Classification of traffic: Why you need it?


Even though Internet is open and cooperative in nature, competitions for network resource
availability tend to be unfair of selfish. As network bandwidth is the limited resource, prioritizing
and classifying traffic enables you to manage network services effectively.
Wittily managed traffic improves latency, service availability and bandwidth utilization without any
negative aspect. Imagine business heads are trying to do video conferencing to his client but
because of load of web browsing the video conference is jerky.
If you could have prioritized and classified traffic and managed your bandwidth intelligently to meet
your business requirements, you could get optimal ROI for your bandwidth investment.

Optimization: How Cyberoam will do it?


Cyberoam provides different methods of optimizing traffic.
Optimization with bandwidth management
Cyberoam applies following approach on traffic prioritization and classification.

1. Web category based bandwidth management


Unmanaged bandwidth leads to poor productivity due to delay in critical applications and
sometimes even lost opportunities. Hence, Cyberoam allows allocating bandwidth based on the
Web category apart from allocating and prioritizing bandwidth based on users. It will not only
improve the network productivity by limiting the bandwidth used by the recreational applications
but also guarantee the performance of the critical business application.
To achieve high degree of network utilization and fairness, Cyberoam:

Classifies traffic based on Web Category

WAN Optimization

Provides differentiated bandwidth based on the Web Category under which the URL is
categorized.

For granular control, it is also possible to limit bandwidth per user per category. For example, you
can not only allow access to Blogs category but limit the bandwidth used.
Cyberoam provides 82+ default web categories as well as allows to create custom categories if
needed. Apart from web categories, bandwidth control can be implemented even on the file type
categories.
Implementation:

Check surfing trend through category-based web usage

Identify web category, which is accessed most

Determine web category, which consumes most bandwidth

Identify Users performing maximum data transfer

Define Web filter policy

Define Web Category based QoS policy

Prioritize bandwidth allocation

Schedule access

Configure firewall rule for the identified Users and attach web filter policy and Web Category
based QoS policy.

2. Application based bandwidth management


Cyberoam provides a way to create application-specific policies to regulate web browsing and file
transfer. It enables application layer bandwidth management and allows to create policies for any
application. This helps avoid network congestion and web-based threats when employees surf
non-business-related web sites.
For the granular control, it is also possible to limit bandwidth per user per application. For example,
you can allow the usage of all the Instant Messengers but can limit the bandwidth used of two IMs
-Yahoo Messenger and jabber for a specific user. Similarly, you can restrict the bandwidth usage
for the streaming media, which impacts legitimate business by using valuable bandwidth. If the
access is allowed during business hours, bandwidth allocation can be prioritizes so that the
business critical-applications do not suffer.
Cyberoam provides 11+ default Application categories.
Implementation:

Define Application filter policy for Category

Define Application filter policy for Category

Define Application Category based QoS policy

Set Priority

Schedule access

Configure firewall rule and attach application filter policy and Application Category based QoS
policy.

WAN Optimization

3. User based bandwidth management


Corporate Networks must support myriad applications, but not all the applications have a direct
relation with the business activities like:

Business applications can also have non-critical aspects - Email, File transfers

Frivolous applications can also have a business aspect Chatting & Audio-visual
presentations

In view of the above scenario, controlling only the Application access will not be sufficient; you
need to control individual Users access to the Internet i.e. you need to place bandwidth limits as
well as deny access based on content type.
E.g., you want to allow marketing group to view high bandwidth streaming media, but allow the
Accounting group to view up to only 64k OR block MP3 files for everyone except Webmaster OR
block MP3 files from being downloaded.
Uncontrolled traffic consumes bandwidth in many different ways. To implement effective bandwidth
management, one must first understand the behavior and bandwidth impact associated with
Organizations common traffic types and how applying controls can affect performance.

Identify User

Identify traffic that will be generated

Identify Content type

Allocate/reserve bandwidth

Deny/Allow access to Content type

If employees are waiting to download Excel or Visio files while the Webmaster tests his/her
development Web content, frustration will be felt by all due to the slow-down in performance.
Isolating the Webmaster from the rest of the staff can help better bandwidth utilization. Because
the control is placed on per-user basis, whenever the user requirement changes, only the Users
policy needs to be changed. This also ensures consistent control on the Users access i.e. the
access control is applied irrespective of the time and place from where user logs in.

4. Cashing with external Cache Server


Cyberoam provides facility to integrate it with any other external cache server through which we
can achieve various methods of caching.

WAN Optimization

Following methods can be followed by Cache server.


Object caching
An object is a collection of data that you can request by name, such as an image on a web page.
In a network, requests to retrieve an object, such as a document, a video, or an image on a Web
page, are a lot like trudging all the way to the library to look up a word in a dictionary. The request
travels to the server, which returns the object so far, so good. But if you need to retrieve the
object again, youve got to repeat the whole routine. A hundred different users requesting the new
training video at the same time puts a lot of traffic on the WAN.
Byte Caching
If object caching works with entire objects, byte caching works at a lower level, looking at patterns
of 1s and 0s. Instead of streams of raw data traveling over the network, the data gets compressed,
cached, and represented by a small token, which can whiz around the network much faster.

Das könnte Ihnen auch gefallen