Aug 23 2011
Networking

Get the Most Out of Your Network

Consider these tools and approaches to ensure optimal network uptime and  speed.

For businesses struggling to stay competitive in today’s tough economy, a reliable, top-performing network can sometimes mean the difference between growth and stagnation, profit and loss.

“The network is core to everything a small or medium-size business does today, and they may not even realize it,” says Steve Hilton, principal analyst with the enterprise research program at Analysys Mason, an international telecommuni­cations and technology advisory firm.

“If your network goes down or slows to a crawl, your link to your suppliers and customers is gone, along with any online customer support or online selling you might do. It can have a major impact, and that impact can be negative.”

Fortunately, companies that experience outages or slowdowns — or that simply need to get more out of their existing networks — don’t have to embark on a major or expensive network upgrade. There are tools and tricks that can optimize network performance, allow businesses to grow ­operations and achieve bottom-line ­business benefits.

Small Company, Big Footprint

Sometimes a maturing business simply outgrows its existing network, but that doesn’t mean it needs an extreme makeover. That certainly proved to be the case for Calisolar, a private manufacturer of solar grade silicon and solar cells headquartered in Sunnyvale, Calif.

The company had long connected its Sunnyvale, Berlin and Vaughan, Ontario, sites using a simple wide area network (WAN), which allowed employees to perform basic file server tasks, establish web connections and engage in some video conferencing. But Calisolar officials wanted to get more out the network, including the ability to utilize an integrated Voice over Internet Protocol (VoIP) telephone system and to replicate large amounts of storage data for disaster recovery purposes.

Carl Merritt, director of information technology at Calisolar, says the obvious first option was to order faster circuits from the WAN provider. But that would have required a multiyear commitment and tens of thousands of dollars in on­going monthly expenditures. Plus, the move would have had little impact on improving latency, which is key to the user’s “feel” of the network’s speed.

Keys to Networking Success

  • Base product choices not only on price, but also on the effectiveness and quality of their customer support.
  • Consider turning to a third-party IT partner or consultant for help.
  • If vendor training for your IT staff and employees is available, use it.
  • Become a network guru (or designate a member of your IT team as such).
  • Consider outsourcing network operations to an on-premises or cloud provider.

A better, less expensive option was WAN optimization, a technology that automatically monitors network traffic traveling from the LAN to the WAN link, prioritizes it based on specified company requirements and compresses it where ­possible. After researching the market, Merritt implemented two Riverbed Steelhead 2050L appliances and a VMware-based virtual Steelhead 1050L at the ­company’s small Berlin office.

The March deployment cut ­Calisolar’s data transmission over the WAN by 92 percent, on average, and generated an increase in overall network speed by 13 times.

“You can’t beat that,” Merritt says of the results. “From the user’s point of view, it’s snappy and fast because ­latency is reduced. They can really feel the ­difference.”

The implementation, which Merritt describes as “extremely easy,” enabled the company to move forward with its VoIP phone system; its California and ­Canadian offices now operate on the same extension range. Merritt also leveraged the data replication functions of ­Calisolar’s existing iSCSI storage system to establish a redundant data center for its Sunnyvale operations in Vaughan (and vice versa). The setup is more secure, Merritt says, and keeps disaster recovery under the company’s control.

According to Merritt, the WAN ­optimization tools allow Calisolar to be more creative — a critical competitive ­advantage in the dynamic alternative ­energy industry. “Now our engineering team, which is spread across three ­countries and three time zones, can work together better,” he explains.

“Because they can share data faster, they can pick up the phone and call without any ­problem. It’s like they’re on the same ­local area ­network, sitting next to each other. And the better they collaborate, the more ­effective they’ll be, which will result in better products for the company to ­produce and sell.”

Prevention Is the Best Medicine

With malware infestations, the cure is sometimes as bad as the ailment. Malware is a key culprit in the degradation of network velocity, for instance. But because many effective antimalware programs have to scan every single file on every computer and server, companies that install them often find themselves continuing to suffer from sluggish PC and network performance, says Phil Cardone, director of IT services for Radius Management Services, which operates 11 skilled nursing facilities in Massachusetts and Rhode Island.

When Cardone went searching for a program to inoculate his Southborough, Mass., company against a malware attack, he had two equally important requirements: a high “catch” rate and high speed.

He found what he was looking for in Kaspersky Business Space Security, a comprehensive product suite that speeds security scans by checking only newly created and modified files. “It’s unique in that way, and that’s where it really gains its performance and efficiency,” Cardone says, noting that Kaspersky also is one of the least expensive solutions on the market.

For Radius Management, an effective, speedy antimalware program ensures that it can reliably access and share the administrative and clinical information that’s needed to effectively care for its patients. But the solution also minimizes the risk that confidential health information could be breached — a key factor in an industry where businesses are severely fined for violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA).

“The bottom line is, as a healthcare organization, we cannot afford to have our network slowed or our patient data put at risk in any way because of malware,” Cardone states. “The moment a data leak happens, we become a non-HIPAA-compliant company and are subject to financial penalties. So it’s critical that we now have the best possible antimalware and security solution in place.”

Going on the Offense

Mascoma Savings Bank’s internal network ran without a hitch for years. But the emergence of a dangerous “What if?” scenario threatened those network operations and compelled its executive staff to take defensive steps.

What’s the most challenging aspect of network management?

33%  Measuring bandwidth and traffic utilization

29% Quickly identifying bottlenecks

21% Automating network change and configuration across the network

10% Monitoring WAN link availability and performance

7% Troubleshooting VoIP quality of service

SOURCE: CDW poll of 357 BizTech readers

“We have a lot of public areas and conference rooms with network jacks in them,” says Chris Irish, vice president of information technology for the small community bank based in White River Junction, Vt. “We realized that someone theoretically could sit down, plug in a rogue wireless device and enter our network without us knowing it until it was too late. It’s a long shot, but if it did occur, it could be devastating to our network operations and the security of our financial information.”

The key to locking down one network was adding a supplemental one. After ­consulting with an IT partner, Irish decided to implement a Cisco Unified Wireless Network solution at Mascoma’s 18 branches in Vermont and New Hampshire.

The new wireless network immediately acted as a preventive security tool. Irish and his team could use Cisco’s wireless LAN controller and location appliances from the comfort of their operations center to view all access points; immediately detect the presence of rogue APs and mitigate them; and create comprehensive reports of network activity for auditors.

“We have real-time manageability now,” Irish says. “If somebody tries to put in a rogue access point, not only will I get an instant e-mail alert, but I’ll get a mapping of [which] network jack is involved and its exact location.”

The solution also has provided a bonus benefit: a secure guest network. Before, if a bank auditor came in and needed web access, the IT team would have to physically hardwire a network jack and an outside line — a task that could take one to two hours, plus travel time. Now, Irish and his team can enable access for regulators, customers and even employees by simply issuing a temporary user ID and password.

“We can have someone up and running in less than two minutes, and we don’t have to leave our desks,” he explains. “It definitely saves us money and has made the process a thousand times more efficient than it was before.”

Robert Houser
Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.