WAN Optimization Techniques
Deduplication
One of the WAN Optimization Techniques used is deduplication which eliminates the transfer of redundant data across the LAN/WAN by sending references/checksums instead of the actual data. By having this WAN Optimization technique work at the byte level, benefits are achieved across multiple IP applications.
Data deduplication is a proven WAN optimization technique of reducing storage needs by the elimination of redundant data. Only a single unique instance of the data is retained on storage media. Redundant data is replaced with a pointer to the unique data copy. IE: A typical Mail system may contain 50 instances of the same ten megabyte (MB) file. If the mail server is backed up or archived for redundancy purposes, all 50 instances are saved, requiring 500 MB storage space. Using the WAN optimization technique of data deduplication, only one instance of the attachment is stored and each subsequent instance is just referenced back to the original saved copy. In this example, a 500 MB storage demand could be reduced to only five MB.
The use of Data deduplication offers other benefits as well. Due to the lower storage space requirements a consumer will save money on disk costs. Data deduplication also reduces the amount of data that must be sent across diverse WAN connections for Disaster recovery/remote backups, and replication.
Data deduplication can operate at two levels; the file or block level. File deduplication eliminates duplicate files as above mentioned, but this is not the most efficient means of deduplication. Block deduplication looks further within a file and saves only the unique iterations of each block contained in the file. The individual chunks of data are processed using types of hash algorithms such as MD5 or SHA-1 (common VPN Authentication methods). The use of either the MD5 or SHA-1 process generates a unique number for each block which is then stored in an index. If and when the file is updated, only the changed data is saved and the index updated. If only a few bytes of the document or presentation are changed, then only the changed blocks are saved and these changes do not mean an entirely new file. This type or WAN optimization technique makes block deduplication far more efficient. That being said, block deduplication takes more processing power and will require a more robust hardware platform and uses a much larger index to track the individual pieces of file that changed.
The use of data deduplication is often used in conjunction with other forms of WAN optimization techniques such as compression. Together these WAN optimization techniques can be very effective at optimizing the use of storage space as well as the reduction of WAN traffic between multiple sites accessing the same resource materials.
Compression
Another WAN optimization technique in use is compression. Compression relies on data patterns that can be represented more efficiently. Compression techniques similar to ZIP and RAR are applied to data passing through hardware (or virtual machine) based WAN acceleration appliances. The use of compression will require a device on each end of the compression tunnel. The sending device will compress the traffic as it flows to the receiver. At the receiving end the traffic must then be decompressed with the same compression algorithm that the sender used.
Latency/TCP optimization
With the advent of more diverse networks coming online throughout the world it is inevitable that such networks will be bound by the laws of TCP (Transmission Control Protocol) that govern how reliable networks communicate. TCP provides the ability to guarantee the sending and receiving of segments as those segments traverse diverse networking paths. Basic fundamentals of TCP include the sliding window algorithm (TCP’s window field is used by the receiver to tell the sender how many bytes of data the receiver is willing to accept) to adjust dynamically to changing network latencies.
With more and more corporations/users coming online it is apparent that there is a great need of TCP congestion control. For every segment that is sent out, this segment is stored in a queue and awaits the acknowledgment of the segment. Should the segment acknowledgement not be received within the default time the segment would be transmitted once again.
When TCP transmits a segment the initial sender of the segment starts a timer (much like a TTL time for DNS) which logs and calculates how long it took for an acknowledgment for that segment to return from the receiving client. If an acknowledgement is returned before the time reaches zero the timer is reset. If an acknowledgement for the segment does not return within the timeout period, the sender will once again send the segment and double the retransmission timer value for each consecutive timeout (up to 64 seconds). If there are network problems such as flopping ISP lines or high latency lines (i.e.: satellite connections) segments may take a high amount of time to be successfully transmitted before the sender eventually times out the segment and generates an error. Crucial to TCP is the measurement of the round trip time between two communicating TCP hosts (referred to as the RTT or Round Trip Time). The round trip time may vary during the TCP connection as network traffic patterns fluctuate and as routes become available or unavailable due to latencies experienced on the line.
Different TCP WAN optimization techniques exist:
IE: Tahoe, Reno, New Reno are a few of the most common WAN optimization techniques
Forward Error Correction
This WAN optimization technique handles packet loss by adding additional loss-recovery packets for every “N” packet that are sent. This would reduce the packet transmission in congested WAN connections. This WAN optimization technique is used for controlling errors in data transmission over unreliable or noisy communication channels which exist with cheaper low-end ISP connections.
Protocol spoofing
Protocol spoofing, is used in multiple types of data communications to improve network performance in situations where existing protocols are inadequate. For example due to long delays or high error rates/collisions or the high RTT (Round Trip Time) of packets.
Other WAN Optimization techniques also exist to attempt to remedy the network performance issues that exist in today’s modern Network infrastructures.