Replify accelerator technical overview

476
-1

Published on

Replify Accelerator provides software-based WAN optimization focusing the applications they use.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
476
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Replify accelerator technical overview

  1. 1. Replify AcceleratorTechnical Overview October 2010 V1.1 © Replify 2010
  2. 2. Replify Accelerator Technical OverviewTable of ContentsBackground ............................................................................................................................................. 3Software-Based WAN Optimization ........................................................................................................ 3Optimizations .......................................................................................................................................... 4 Protocol Optimization ......................................................................................................................... 5 CIFS Optimization ............................................................................................................................ 5 HTTP Optimization .......................................................................................................................... 5 HTTPS/SSL Optimization ................................................................................................................. 6 Other Protocols ............................................................................................................................... 6 De-Duplication through Replify XDR .................................................................................................... 6 Compression ....................................................................................................................................... 7 Optimization Effectiveness ................................................................................................................. 7Deployment Scenarios ............................................................................................................................ 8 Branch Office to Data Center .............................................................................................................. 8 Individual Client to Data Center .......................................................................................................... 8 Location Awareness ............................................................................................................................ 9 Multi-Site Deployments ...................................................................................................................... 9Reporting Functionality......................................................................................................................... 10Technical Requirements........................................................................................................................ 11 Component Overview ....................................................................................................................... 11 Replify Virtual Appliance ............................................................................................................... 11 Replify Client ................................................................................................................................. 11 Replify Enterprise Manager .......................................................................................................... 12Extending WAN Optimization ............................................................................................................... 12Summary ............................................................................................................................................... 12 Commercial In Confidence Page 2 of 12
  3. 3. Replify Accelerator Technical OverviewBackgroundCompany networks are changing. Site and server consolidation is moving IT infrastructure frombranch offices to central locations, cloud computing is beginning to deliver IT services externally,and users are needing more flexibilityto move between offices, work fromhome and work remotely whiletravelling. These changes mean thatmore and more users are working Server Cloud Services Consolidationremotely from the applications theyare accessing day-to-day.The applications that users are Remoteaccessing are also becoming more Workersnetwork dependent, providing richerexperiences through web 2.0 interfaces, providing advanced collaboration capabilities, or allowingusers to participate in complex business processes.More remote users and more content-heavy applications are pushing the requirement for WANOptimization technology. Replify Accelerator provides software-based WAN optimization focusingon the user’s experience with the applications they use.Software-Based WAN OptimizationTraditional approaches to WAN optimization have made networks more efficient by providing ahardware device located at each side of the network. These hardware devices control theconnection to the network and provide efficiencies. Hardware based solutions provide greatoptimization but introduce deployment problems – IT management required on each side of thenetwork, costly purchase and upgrade processes, inability to support cloud scenarios or individualremote workers. Hardware vendors are beginning to provide their capabilities in software –however this has required re-engineering of their solutions leading to limited software versionswhich remain as costly as their hardware predecessors.Replify Accelerator has been designed from the beginning to provide the capabilities of hardwarebased WAN optimization entirely in software – with algorithms appropriate to meet therequirements of low-footprint clients, and virtualized commodity servers.As a software-based WAN Optimization solution, Accelerator has the following advantages: Full optimization capabilities within an individual client or software appliance Easy to deploy within cloud infrastructures Extensive optimizations efficiently in software Straight-forward deployment, without changing the network Targeted acceleration for problem applications or specific users Scales up and down without friction as needs change Commercial In Confidence Page 3 of 12
  4. 4. Replify Accelerator Technical OverviewReplify Accelerator intercepts traffic destined for accelerated application servers, routing the trafficthrough the Replify software on the client side of the network (either an individual PC client, orthrough a shared virtual appliance). The client side software routes traffic to the Replify server-sideappliance. With traffic routed through Replify Accelerator on both sides of the network, the Replifysoftware can remove redundant unnecessary calls across the network, pre-fetch and bulk transferand remove as many bytes from the transfer. All traffic destined for the application server is routedthrough Replify Accelerator, allowing the acceleration software to learn traffic patterns and providethe maximum optimization. Mobile worker Mobile worker DATA Mobile CENTE worker WAN R Branch OfficeRouting of the application server traffic is performed through a number of possible techniques: Individual client intercepts traffic destined for application servers The local virtual appliance acts as the default gateway for a branch or remote office Traffic in a site is routed to the local virtual appliance using policy based routing Traffic in a site is routed through the WCCP protocol which automatically routes traffic to be optimized via the local Replify virtual appliance Static routing is configured between clients and the local virtual applianceOnce the traffic is routed through Replify Software within the client network, it is then optimizedand passed through the server-side virtual appliance. The server-side virtual appliance re-createsthe original network request and sends it on to the application server being accelerated. Anyresponse from the application server goes through the same process in reverse back to the user.By understanding the traffic patterns and connections being made between the client and theapplication servers across the WAN, Replify Accelerator can remove redundant calls, and remove asmany bytes as possible transferring across the WAN link.OptimizationsReplify Accelerator provides comprehensive WAN Optimizations specifically designed for therequirements of software-based scenarios. Accelerator provides three categories of optimization: Protocol Optimization De-duplication through Replify XDR Compression Commercial In Confidence Page 4 of 12
  5. 5. Replify Accelerator Technical OverviewProtocol optimization is the only optimization which is directly dependent on the actual protocolbeing used across the network. De-duplication and compression provide benefits regardless of theprotocol or data being transferred.Protocol OptimizationProtocol optimization looks at the message sequences for specific protocols, and ensures thatredundant requests are removed and not passed over the WAN connections. The Replify client orclient-side virtual appliance recognizes requests made to application servers and identifies theprotocols being used within the requests. Many protocols do not make the most efficient use of thenetwork, making requests across the network which are not required, or which ask for informationin small, inefficient amounts.Replify provides a number of protocol optimizations to make protocols more efficient. Thesecombine with the other optimizations to ensure that traffic to and from systems such as email (viaMAPI or HTTPS), file shares, collaboration and ERP applications are fully optimized.CIFS OptimizationA typical example of an inefficient protocol is the Common Internet File System (CIFS) protocol. CIFSprovides the file share capabilities built into Windows based solutions. The CIFS protocol was notdesigned with wide area networks in mind – it transfers information across the network in smallrequests, resulting in very inefficient use of the network for large files. Small requests across thenetwork are very sensitive to any latency on the connection which results in the end user experiencesuffering.Replify Accelerator intercepts CIFS requests made across the network and identifies when largecontent is about to be transferred. Instead of making small requests for the content across theWAN, Replify Accelerator pre-fetches blocks of content in a pre-fetch buffer. Accelerator thenserves content from the pre-fetch buffer on the client side of the network instead of making furthersmall requests across the network. WANPre-fetching significantly decreases the number of requests across the network, and avoids thelatency of the network affecting the end user experience. For example, the number of requests for a2Mb file across a wide area network with 200ms latency decrease from 234 requests down to 3requests with Accelerator pre-fetching. This decreases a user’s wait time from over a minute to 15seconds. See the Replify CIFS whitepaper for more information on Accelerator’s CIFS optimizations.HTTP OptimizationReplify Accelerator’s HTTP Optimization includes header identification and manipulation, NTLMauthentication pooling, and HTTP de-chunking. These protocol optimizations focus on ensuring that Commercial In Confidence Page 5 of 12
  6. 6. Replify Accelerator Technical Overviewthe block caching and compression optimizations work effectively on the largest possible data withinthe network request.HTTPS/SSL OptimizationOften connections across the WAN are encrypted using HTTPS/SSL encryption. Encryption ensurescommunication is private. To an observer it appears as if the requests contain random data even ifthe same requested document is being returned. This encryption can prevent pattern matching andcompression optimizations built into a WAN optimization system from operating.Replify Accelerator provides optimization for encrypted information – ensuring patterns arerecognized between requests, and allowing compression to work effectively. Optimizing encryptedinformation involves providing the Replify Virtual Appliance within the data center with thecertificate of any encrypted application server. Certificates never move outside the data center. Alldata transferred from client to Replify VAs on to the target application server will continue to bemade over fully encrypted connections, ensuring the privacy of the communication is maintained.See the Replify SSL whitepaper for more information on Accelerator’s optimizations in encryptedscenarios.Other ProtocolsAccelerator has various other optimizations that help identify and accelerate traffic for particularprotocols. Other protocols currently supported include MAPI (via RPC or over HTTP), print servers,DoubleTake, iSCSI, RDP, SQL and VNC. If a protocol is not currently identified by Replify Accelerator,it will still be optimized through de-duplication and compression. Replify is continuing to enhanceAccelerator with new protocols at each release.De-Duplication through Replify XDRXDR is a key technology of the Replify Accelerator product. XDR de-duplicates patterns of informationas the information passes across the network. It is bi-directional, replacing patterns of data withcache references as information is sent to, or received from, the application servers.As Accelerator is used to optimize connections to an application server, the XDR technology learnsthe patterns being transferred between users and the server. If any pattern is seen more than once, Commercial In Confidence Page 6 of 12
  7. 7. Replify Accelerator Technical Overviewa reference to the pattern is sent across the network instead of the original block of data. Thisremoves considerable traffic from the network for similar content.The algorithms built into the XDR technology ensure that Replify Accelerator can quickly determine ifa pattern within traffic passing across the network has previously been seen and can be replacedwith a reference. The cache size available for XDR is configurable. The XDR technology ensures thatpatterns seen most frequently remain within the cache and patterns which are infrequently used aredropped from the cache. XDR can make use of in-memory and disk-based cache to ensure themaximum throughput possible.In office-to-office scenarios, with a local virtual appliance in each office, XDR provides shared cachingfor all users in the office, providing greater optimizations for all. Since the cache is based on contentthat would be sent or received by individual users, security of the content is always maintained.XDR works regardless of the type of traffic or application server, and detects patterns across multipleunrelated applications. For example if similar content is seen in an email attachment and a file sharecopy. XDR is extremely successful within collaboration scenarios where information is retrieved,changed and uploaded again. Since it is bi-directional, and protocol independent, XDR will replacedata with references if, for example, a user downloads a file from a content management applicationand subsequently sends it within an email.See the Replify XDR whitepaper for more in-depth information on Accelerator’s de-duplicationfunctionality.CompressionThe final step in Replify Accelerator’s optimizations is to compress any remaining information whichwould be sent across the wide area network. With modern data types like HTML and XML being textbased – and with the frequent transfer of text-based content, compression plays an important partin removing bytes from the network by minimizing the data that needs to be transferred.Compression is also very effective on print traffic.Optimization EffectivenessReplify Accelerator’s various optimizations combine to remove a high percentage of bytes from thenetwork, and improve the user experience to applications across remote connections. Acceleratortypically takes between 70 and 90% of information away from the network, depending on the dataand patterns of information passing across the network. Commercial In Confidence Page 7 of 12
  8. 8. Replify Accelerator Technical OverviewDeployment ScenariosAs a software-based solution Replify Accelerator has the widest deployment capabilities. It can bedeployed easily to cloud or highly distributed scenarios and can accelerate individual connectionsthrough a client installation on a laptop.All deployments can be installed and configured centrally without the need for end-userinvolvement. The software can be reconfigured centrally through the administration interfaces, orthrough active directory.Branch Office to Data CenterFor branch offices with a number of users and with some IT infrastructure, a Replify AcceleratorVirtual Appliance can be deployed within the branch office site. This branch office virtual applianceis peered with the virtual appliance on the data center side – and provides the local ReplifyAccelerator capabilities for all the users within the branch office site. User’s access to theapplication servers must be routed through their local virtual appliance. This routing can be donethrough configuration, by using the WCCP protocol, by configuring the virtual appliance as agateway, or by using the Replify client. Optimization can be provided without requiring a softwareinstallation on the client machines.Individual Client to Data CenterFor branch offices without IT Infrastructure, or for users travelling or working from home, Replifyprovides an individual client that provides the same optimizations as the virtual appliance within thebranch office. The low-footprint client can be installed and configured without end-userinvolvement. The client runs as a local service intercepting traffic destined for the applicationservers, and routing the traffic to the remote virtual appliances. The client can run invisibly to theend-user. Commercial In Confidence Page 8 of 12
  9. 9. Replify Accelerator Technical OverviewLocation AwarenessTypically, users connect from a range of different locations – moving between offices, working fromhome or on the road. This means that a static deployment with users always being acceleratedthrough the same office-based virtual appliance would not work for many scenarios. ReplifyAccelerator’s location awareness can automatically determine the location for a connecting user,and connect to the most appropriate virtual appliance. For example, while the user is within anoffice, the Accelerator routes the traffic through the local office virtual appliance, thereby takingadvantage of the shared cache provided within the local virtual appliance. When outside the office,traffic will be optimized by the local client running on the user’s machine. Location Awareness isachieved by understanding the network addresses that users connect from, or by tagging usersbelonging to particular groups.Multi-Site DeploymentsMany real world scenarios deployments are complex – all applications and file servers are notcentralized in a data center, but are distributed throughout a number of branch offices. ReplifyAccelerator works in a distributed environment by ensuring that office-based virtual appliancesbehave not just as branch office client accessing data center virtual appliances, but also accelerateaccess to application servers available locally within their own networks. Replify uses a combinationof location awareness, virtual appliance peering, and client tagging to accelerate traffic for remoteusers accessing applications wherever they are located. A Replify Accelerator system can beconfigured to include multiple virtual appliances to provide failover and resilience. Commercial In Confidence Page 9 of 12
  10. 10. Replify Accelerator Technical OverviewReporting FunctionalityThe Replify Virtual Appliances and Enterprise Manager both provide comprehensive reportingfunctionality on the optimizations that are being provided for particular sites, for specific applicationservers, for groups of users and right down to the optimizations provided for individual users. Thereporting functionality clearly shows the data savings that are delivered by Replify Accelerator. 1 Optimization by Protocol 2 Live Traffic View showing actual (optimized) and effective (raw) traffic Commercial In Confidence Page 10 of 12
  11. 11. Replify Accelerator Technical Overview 3 Traffic by ProtocolTechnical RequirementsComponent OverviewReplify Virtual ApplianceReplify Virtual Appliances installed within operational sites create an acceleration mesh whichoptimizes inter-site traffic between the chosen applications and end-users.The Virtual Appliance can run on commodity hardware within almost any virtualization hostingenvironment required. Replify provides images for all the common virtualization platforms.Memory requirements for the virtual appliance are dependent on the traffic, number of users andthe amount of caching desired. The virtual appliance can run in as little as 350Mb of memory fornon-cached scenarios. For typical deployments with caching we recommend 2Gb of RAM.The processor and disk requirements are again dependent on traffic, users and caching. Werecommend assigning dual processors to the virtual appliance, and 40Gb of disk space if caching isrequired.Replify ClientThe Replify Client is a Windows service which is installed on the end-point devices. The Replify Clientcan provide application acceleration in exactly the same way as a Virtual Appliance, but for anindividual device. Client intelligence called “location awareness” means that the client will use a local Commercial In Confidence Page 11 of 12
  12. 12. Replify Accelerator Technical OverviewVirtual Appliance if one is present, giving the additional benefit of shared caching across multipleusers.Processor and memory overhead of the Replify Accelerator windows client is negligible. Disk usagedepends on the cache configured for each user.Replify Enterprise ManagerThe Replify Enterprise Manager (REM) provides centralized configuration and control of your Replifydeployment, with detailed reporting on all of your Clients and Virtual Appliances. The REM providesClients and VAs with their application acceleration rules and also controls the licensing across anenterprise or managed service provider.The REM processor and memory requirements are dependent on the number of users in the overallsystem. Disk usage is negligible. For typical scenarios we recommend assigning a REM with 512Mbof memory and a single processor.For detailed sizing of a Replify Accelerator system which is specific to a particular scenario, pleasecontact Replify Support (support@replify.com).Extending WAN OptimizationReplify Accelerator ensures that network connections between users and applications are used asefficiently as possible. In many scenarios, however, a user cannot depend on the availability orquality of a network. Network issues should not stop the user from accessing, updating and addingto information within mission critical applications accessed across the network. Replify works toimprove Remote Application Usability, even in scenarios where network is not always available.Accelerator’s companion product Replify Syncstor provides a synchronized store allowing usersfrustration-free uninterrupted access to application content regardless of the status of their networkconnection. For more information on Replify Syncstor, see http://www.replify.com/products/replify-syncstor/SummaryReplify Accelerator’s unique software-based WAN optimization functionality provides significantacceleration of network connections, improving usability for users accessing applications remotely.The software is designed to meet a very broad range of deployment needs including highly dispersedoffices and large numbers of remote users. Protocol optimizations, bi-directional, block level de-duplication and compression combine to provide 70-90% offload in typical scenarios. The software-only algorithms are designed to provide optimizations in low-footprint installations with commodityhardware. Commercial In Confidence Page 12 of 12

×