In today’s business environment, the network is arguably more important than the physical office. Networks are the glue that hold businesses together, particularly when operations expand beyond the boundaries of any one physical space. Whether a business operates multiple branch offices, supports a mobile workforce, or utilizes off-site computing resources from storage to application serving, […]
In today’s business environment, the network is arguably more important than the physical office. Networks are the glue that hold businesses together, particularly when operations expand beyond the boundaries of any one physical space.
Whether a business operates multiple branch offices, supports a mobile workforce, or utilizes off-site computing resources from storage to application serving, the network that binds these distributed nodes is the WAN.
In the “old” days the traffic that flowed over the LAN was relatively light and often text-based. But as network activity expands into data archiving, voice, and multimedia, the links between WAN nodes (i.e., LANs) are becoming increasingly squeezed.
With increasingly high contention for WAN resources, businesses are left with two options to prevent or improve slowing performance and diminished productivity:
In short, WAN optimization boils down to “technologies that actively control and modify traffic traveling across individual WAN links,” according to Jim Frey, managing research director at EMA. Improving the efficiency of these network links is the job for a WOC, or WAN optimization controller.
The original generation of WOCs were discrete hardware appliances co-located at either end of the link. For example, if Acme Corporation is headquartered in NYC with branch offices in Houston and LA, their WAN might look like this:
Segment 1: NYC<->LA
Segment 2: NYC<-> Houston
Three WOC appliances would optimize the entire WAN — one each in NYC, LA, and Houston.
Today, WOCs are not limited to discrete appliances. In some cases, they may be blade units installed in a data center, or purely software-based virtual appliances running on an existing server.
Traditionally, most WOC deployments are symmetrical, with a WOC at each end. But there are also asymmetrical deployments where a WOC is located only at the head end. An asymmetrical WOC deployment is typically used in a specialized scenario, such as an organization where the distributed workers or offices are highly mobile or located in places with limited infrastructure. In other words, where there is no location for a co-located WOC.
What does a WOC actually do? Well, it depends. There are actually many strategies available for squeezing efficiency out of network communications. Depending both on an organization’s needs and the capabilities of a particular vendor’s WOC, just which strategies are used can vary.
Every WAN possesses several key areas of inefficiency:
The technical strategies employed by WAN’s can typically include:
Compression – Lots of data flowing across a WAN can be significantly compressed, sometimes as much as 90 percent. Text-based content such as e-mails, webpages, and database results can especially enjoy high compression rates. While some applications and protocols include compression in their native behavior, many more do not. A WOC can address this problem at a global level from the edge of the network.
Caching – If 25 employees in the Houston office all request the same large PDF documents from the NYC office, transferring that same file 25 times across the WAN link is an inefficient use of expensive bandwidth. A WOC can cache frequently accessed content at the branch end, so that multiple requests incur no extra network activity over the WAN.
De-duplication – Often, multiple copies of the same file reside on the network. For example, 25 employees in the Houston office might all save the same PDF to their accounts on the server. Aside from wasting storage space, duplicate data can stress the WAN if and when remote backup jobs are executed; consuming excessive bandwidth to transmit the same files repeatedly. A WOC can identify duplicate files and replace copies with links, so that only one unique copy is stored and transmitted across the WAN.
Prioritization and other network management – A WOC can implement some of the function of an intelligent network router. Quality-of-service (QoS) algorithms prioritize time sensitive traffic over low priority data, which may not reduce total bandwidth use, but effectively improves performance and response time. Deep packet inspection (DPI) can analyze network traffic to determine its function and promote or demote it per defined traffic shaping rules.
Driven both by increasingly hungry network applications and the explosion of interest in cloud-based solutions, WOC products are a growing product niche for many vendors.
Some vendors, like Riverbed, Streamcore, and Replify are smaller companies focused specifically on WOC solutions, particularly those that address specialized needs like mobile and media. More recognizable names like Citrix, Cisco, and Juniper are diverse networking companies for whom WOC products are among a stable of offerings.
How does a business choose?
EMA’s Frey suggests that an organization who “already has a relationship with any of these three vendors… it behooves the prospective customers to consider the WOC solutions from these players.”
On the other hand, the smaller WOC vendors “have found a niche and exploited it based on any number of factors ranging from price, application support, deployment options or technology expertise that gives them an edge over incumbent players.”
Aaron Weiss a technology writer, screenwriter and Web development consultant who spends his free time stacking wood for the winter in upstate New York.
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.