Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Packet shaper -compression devices

Posted on 2012-04-06
6
Medium Priority
?
482 Views
Last Modified: 2012-05-10
I just want to know that if compression devices work only in pairs or a compression device can perform compression as a single device ,

for example i have a uplink which is feeding me intrenet and other application , and i want to utlize this and get more throughout out of it , will i be able to get with by

deploying Bluecoat 1700 will help me on this or not .
0
Comment
Question by:annasad
  • 3
  • 3
6 Comments
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 2000 total points
ID: 37815756
Typically devices like that need to be installed in pairs.  The traffic is compress/decompressed by the devices.

Now, where a device like a Bluecoat could save bandwidth is acting as a HTTP proxy server.   By caching static web pages locally you will download less data over the Internet.  However it really only saves you bandwidth if you have multiple users within your company going to the same web sites.

Say you 10 users, and they all go to the same site.  That site has say 200-300 KB of static web page information (style sheets, jpg's, and other static info).  The data will be downloaded the 1st time the 1st user goes to the site.  When the 2-10 user goes, the Bluecoat device will serve up that 200-300 KB  of data and so it will not chew up Internet bandwidth.
0
 
LVL 1

Author Comment

by:annasad
ID: 37815941
i undersatnd cashing , and proxy server concept , but my basic objective is application discovery and traffic monitoring , i was wondering if they work as a single device ??

my major traffic is SAP , internal web browsing and internal hosted applications in Global WAN cloud .
0
 
LVL 57

Accepted Solution

by:
giltjr earned 2000 total points
ID: 37815959
Your original question implied you were only interested in the compression part of Bluecoat.

--> I just want to know that if compression devices work only in pairs or a compression device can perform compression as a single device ,

Bluecoat devices, and others like it, will only work for compression if they are a proxy server or installed in pairs at the end points of a WAN connection for other types of traffic.

It will monitor traffic, and you can use it to limit bandwidth for specific types of traffic.  But that does not necessary improve performance.

Limiting bandwidth can get better performance for one type of traffic at the expense of another type of traffic.

Say you want to compress SAP traffic, you need a pair.  Why?  Because if you compress the data something has to uncompressed it. With only one device, what would uncompressed it on the other side?  If the SAP client was able to uncompress the data, then the SAP server would be able to compress and you would not need a device in the middle to do that for you.
0
Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

 
LVL 1

Author Comment

by:annasad
ID: 37815971
Agreed . how do you compare riverband with Bluecoat ?

and any other device for monitoring the traffic ? and classes , Qos priotisation
0
 
LVL 1

Author Comment

by:annasad
ID: 37951198
i believe , you have not liked me to go further in this question , so i would rather close the question . and discussion with you were quite informative and gave me impression too that i am thinking on the same lines too .
0
 
LVL 57

Expert Comment

by:giltjr
ID: 37952634
Thanks for the points.  I was not ignoring you, somehow I missed the e-mail that you updated this question.

What are you looking for?

Devices to do data compression between two, or more, specific locations?

A outbound proxy server?

A device that will do traffic shaping/bandwidth limiting?

Something that two or more of the above?
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
Make the most of your online learning experience.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question