TITLE

Speed safely: Application-acceleration best practices

AUTHOR(S)
Newman, David
PUB. DATE
October 2007
SOURCE
Network World;10/1/2007, Vol. 24 Issue 38, p34
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the best practices for deploying wide area networks (WAN) application-acceleration devices. Some users consider defining their key goals as one of the practices to deploy application acceleration. Some of these users aim to reduce WAN bandwidth consumption and cut monthly circuit costs. Choosing which design is better between inline or off-path WAN-acceleration devices is regarded as one best practice. To establish encrypted tunnels between pairs of devices or to keep traffic visible to all other devices along the WAN path is also considered.
ACCESSION #
26921010

 

Related Articles

  • ISP, enterprise concerns mix. Carlson, Caron // eWeek;5/23/2005, Vol. 22 Issue 21, p16 

    The article reports that computer vendors are reaching out to service providers and enterprises to address growing concerns about security, reliability and bandwidth use and to encourage improved network management. FarStone Technology Inc. will launch a new version of its technology aimed at...

  • Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel. Singh, Raju; Vatsa, A. K. // International Journal of Network Security & Its Applications;Mar2011, Vol. 3 Issue 2, p67 

    The security of bio-metric information - finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is...

  • EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK. Subashri, T.; Vaidehi, V. // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p213 

    IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in...

  • Peer-to-peer services take up over 70% of global bandwidth. Adegoke, Yinka // New Media Age;10/13/2005, p9 

    This article focuses on a report from Sandvine which revealed the total share of peer-to-peer (P2P) services in global bandwidth. Consumer use of P2P networks accounts for 71.8 percent of all bandwidth, with Web browsing taking a relatively minor 8.7 percent, according to the report, which...

  • Group Mutual Exclusion in Token Rings. Cantarell, S├ębastien; Datta, Ajoy K.; Petit, Franck; Villain, Vincent // Computer Journal;Mar2005, Vol. 48 Issue 2, p239 

    The group mutual exclusion (GME) problem was introduced by Joung. The GME solution allows n processes to share m mutually exclusive resources. We present several algorithms to solve the GME problem in token rings. The space requirement and the size of messages of all algorithms are bounded. So,...

  • WIRELESS ISSUES.  // Education Week;3/18/2010 Technology Counts, Vol. 29 Issue 26, p12 

    The article discusses the necessity of wireless infrastructure for incorporating mobile devices into the classroom. Because schools are densely populated, it notes, providing the bandwidth necessary for mobile internet access is difficult. It notes that because of the special needs of schools,...

  • Biternary Transmission.  // Network Dictionary;2007, p68 

    A definition of the term "Biternary Transmission" is presented. It refers to the digital transmission in which two binary pulse trains are combined for transmission over a channel in which the available bandwidth is sufficient for transmission of only one of the two pulse trains at a time if...

  • Bond's the Game, Copper Bonds. Barthold, Jim // Telecommunications - Americas Edition;Oct2005, Vol. 39 Issue 12, p24 

    Focuses on the efforts of telecommunication companies to bond existing copper pairs to build super-fast and super-wide transportation pipes for both residential and enterprise users. Tendency for these companies to recycle old ideas in creating a new concept; Recommendation for the use of...

  • Improving Adaptability and Per-Core Performance of Many-Core Processors Through Reconfiguration. Suri, Tameesh; Aggarwal, Aneesh // International Journal of Parallel Programming;Jun2010, Vol. 38 Issue 3/4, p203 

    Increasing the number of cores in a multi-core processor can only be achieved by reducing the resources available in each core, and hence sacrificing the per-core performance. Furthermore, having a large number of homogeneous cores may not be effective for all the applications. For instance,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics