Feeds

Speeding up the net - is it possible?

It takes a little control

High performance access to file storage

The best way to get reliable performance out of a wide area network (WAN) is to install your own high-speed gigabit fibre optic cables between all the locations in your organisation. This could provide seemingly unlimited bandwidth for your employees to use the applications they like and not have to think twice about the volume of content they send around the network.

In reality, of course, for all but the largest organisations this is not affordable - and even for them it is impractical to link every remote outpost to a private physical network. Even the NHS, which has given BT a few billion pounds to build such a network, is relying on public network connections to link in most surgeries, clinics, and external organisations to its shiny new private backbone.

Nearly all businesses today are reliant on wide area computer communications to a greater or lesser extent and for many this means using shared networks. This often includes the internet, which is anyway a mishmash of privately owned networks - a "virtual public network" if you like.

In theory the internet treats all traffic equally, but despite the high-minded claims of the so called "net neutralists", it is possible to buy high priority bandwidth on any shared network, including those privately owned elements of the internet. Virtual private network (VPN) providers use a mix of their own networking facilities and public ones to provide priority wide area services.

One trend that is contributing to the increase in network traffic is the growth of subscription-based applications that are accessed over the public internet, (called software as a service or SaaS).

But while access to such applications might be via a public network, SaaS providers link their own internal hubs together using a private physical network. An example is WebEx which has built its own private MediaTone Network (MTN) to link all its hubs and ensure optimal performance for its subscribers. If your WebEx session is slow, don't blame the internet, blame WebEx (or maybe its new owner Cisco which probably supplied much of the network equipment that runs MTN).

The reality is that for all organisations, wide area networking is going to involve a mixture of public and private physical networks, the performance of which is always going to be variable. But that does not mean there is nothing to be done - there are many ways to control and accelerate WAN traffic to ensure employees' communications remain reliable and employees productive.

Control means first making sure employees are focused on the things they should be doing and not inadvertently consuming bandwidth for non-work purposes such as browsing YouTube, downloading MP3 files or keeping up with the cricket via IPTV.

The simplest way to limit internet activity is with software from vendors such as Clearswift, Marshal, Secure Computing, Trend Micro, or Websense. Such products allow network managers to ban certain types of activity and block specific websites or types of websites.

Some license their libraries of URLs which can then be embedded in appliances that act as a proxy for all internet activity. This includes the growing band of unified threat management vendors: SonicWALL, Symantec, and many others. It is also possible to subscribe to managed services from vendors such as MessageLabs and ScanSafe which offer similar capabilities.

After traffic has been limited to only that which is essential to the business, there is still more that can be done. Web acceleration appliances from vendors such as Expand and Riverbed ensure traffic is compressed before transmission and that regularly used files are cached locally and not transmitted each time they are requested. These are widely used for speeding up communications between branch offices. Cisco's ISRs and Microsoft's ISA Server do the same sort of thing.

Other vendors such as Blue Coat provide multiple capabilities - allowing the bad stuff to be stopped and the good stuff sent on its way - in a single appliance. On top of all this, networking company Akamai will help navigate optimal routes over the public internet, claiming greater than 50 per cent performance gains for certain applications.

Ensuring secure reliable connectivity is just the start. Businesses also need to address performance. There is no shortage of products and services to help get acceptable performance out of the mishmash of services that constitute any particular WAN. The main problem is working out which of the multitude of vendors to spend money with.

Find out more in Quocirca's free white paper A Short Guide to a Fast WAN

Copyright © 2007, Quocirca

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.