Feeds

Managing network bandwidth

Big pipes only get you so far

Designing a Defense for Mobile Applications

For those of us approaching what I'd like to think of as early maturity (or even late youth), it's inspiring to see some things come to pass that we'd dreamed of during our formative years, such as complete smoking bans and low cost air travel within Europe. It's also good to see some of the promises turning into reality in the world of communications, like the prospect of a wide choice of broadband service providers and low cost bandwidth, which seemed such a long way off back at the start of telecom deregulation.

So, while I am still recovering from being able to fly to and from CeBIT for £155, maybe it's a good moment to consider the temptations of cheaper network bandwidth.

The IT industry has always been good at throwing resource at a problem, whether it's memory, disk space or CPU cycles. The issue is that the new capacity or horsepower made available soon gets consumed, usually putting us back where we started. I recently upgraded my CRM application, for example, which had ‘progressed’ from a proprietary format to .NET running on a SQL database. Not only had it ballooned in size, but my brand new 3 GHz machine with a gig of RAM is practically on its knees trying to run it.

When you look at some of the developments in the communications arena, are things really any different?

WAN congestion has historically been an expensive problem that was worth attention because of BT's near-monopoly on leased line services here in the UK. Workarounds such as EPS 8 and 9 circuits had their use, but have fallen increasingly out of favour as they were not designed to support the higher speeds of today's digital modems. Now that Ofcom has really got stuck into deregulation though, the cost per bit has plummeted and this kind of workaround is no longer necessary.

As an IT manager, if you are running between fire drills, it's easy to take advantage of this newly available bandwidth to keep enterprise applications running (a 10Mbps LES circuit compared to a 64K leased line is an embarrassment of riches). But other problems like patch Tuesday and SPAM can still bring the network to its knees without warning if the use of that bandwidth is not under control.

Fortunately there are vendors that take the idea of managing your network bandwidth seriously and its important for IT managers to take a look at these, despite the temptation to continue to feed badly behaved applications with ever bigger pipes.

One company that has a strong philosophical starting point is Blue Coat Systems of Sunnyvale, CA. The company, which began life as CacheFlow, now asserts that there are three components to a connection: performance (compression, caching, bandwidth management and protocol optimisation), security (encryption and threat management), and choice.

Of the three, choice is critical, as it not only means prioritisation, but understanding the unwanted applications that may be on the network such as uncontrolled personal IM and Skype, and doing something about them.

The idea is expressed very well in Blue Coat's literature: "At the core, Blue Coat appliances use a proxy/cache architecture, which enables two key functions—visibility of user/application interaction, and control of that interaction. With visibility comes context and understanding, and with control comes the ability to accelerate desirable applications, while limiting the impact of undesirable applications."

The latest announcement from the company adds the protocols CIFS and MAPI to the fairly common industry offering of SSL and HTTP acceleration. It's good to see a company with a mantra of application acceleration looking to move beyond the low hanging fruit of TCP optimisation.

As I recently commented in another review, no single box can address all the key network issues. In combining extra protocol optimisation with a sound fundamental approach, however, Blue Coat has its customers' backs covered, making it a strong contender to provide one of the key components necessary to achieve a genuinely well managed distributed application network.

Copyright © 2006, IT-Analysis.com

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.