TRADITIONAL CACHING CHALLENGES
Traditional caching is not optimized to address today’s dynamic environment where the same content can be retrieved from different sources or can be re-used with minimal changes. In some cases, it is protocol- or content-dependent. Sometimes, its implementation may disrupt other functions like billing and it may also pose legal challenges regarding the storage of copyrighted content.
But the key challenge from the telecom network operators’ perspective is that focus on optimization of the Internet connection utilization, creates new bottlenecks at the metro and backhaul networks. These are the very network segments that connect end users to the cached content stored in the local data centers. Operators face rising bandwidth delivery costs to keep up with the demand. To further complicate things, there are also more demanding latency requirements because users now expect instant-response access to their content.
Mercury vDeduplication is part of ECI’s Mobile Edge Computing (MEC) offering, which addresses all of the above challenges, adopting several key principles:
•Eliminate redundant patterns at the bit-stream level being agnostic to content types and protocols, and thus able to optimize maximum traffic
•Analyze and store small content atoms, resulting in more compact storage
•Move storage to the edge of the network to minimize user access time and save on operators’ backhaul network costs
•Use Carrier-Grade hardware based on x86 general purpose processors for best cost/performance.
This concept reduces the network traffic by 15% to 35%, outperforming other optimization techniques. It also provides a better user experience.
SHOW ME THE MONEY
Mercury vDeduplication is relevant for various types of service providers from fixed operators to ISPs. vDeduplication has special importance for Mobile operators, where end user connection speeds are still limited. Even with LTE and new lastmile backhaul connections, mobile networks are still not up to speed, especially when based on non-fiber technologies. The following simplified example illustrates some of Mercury vDeduplication key advantages.
KEY ADVANTAGES OF VDEDUPLICATION
•Operates on 100% of traffic – Operating at the bit-stream level, the solution is agnostic to protocol, application, or content source. It can optimize bandwidth usage, even when some of the traffic is encrypted. This is why it can guarantee 15% to 35% bandwidth savings.
•Future proof – As new formats and protocols are introduced, observing the bit-streams enables the solution to maintain its performance without having to tailor the mechanisms or update the systems.
•IP Mobility support – The solution is aware of handovers from one cell to another, but never impacts it. It doesn’t terminate or modify TCP sessions or GTP (GPRS Tunneling Protocol) tunnels, so that the traffic flow continues seamlessly upon handovers as well.
•Legally safe – Agnostic and unaware to the content, nor storing any files or serving content, copyrights are never infringed.
•Maintains original quality
•Seamless integration – Can work on top of other optimization techniques, increasing virtual bandwidth capacity by 15% to 35%.
•High availability – The servers are located at the service provider’s premises – not in-line or en-route – so in case of a failure, the traffic will be unaffected.
•Encryption – Two major types of encryption are being used: IPsec and encryption by content providers. ECI can decrypt the traffic through its MEC architecture, run it through its Mercury vDeduplication and encrypt it again. Overall savings provided are calculated for traffic containing encrypted content.
•Transparent – Simply compresses the traffic on one side and decompresses it at the other, leaving the traffic flowing at the network core untouched.
•Compact storage space – Mercury vDeduplication operates on very small content pieces. It does not store files. Instead, it stores the most popular bit-level chunks. The result is very cost-effective and compact storage that does not increase linearly with bandwidth growth.
|Packaging||Virtual Appliance/VM Image|
|Categories||Networking > Virtual Network Functions > Acceleration, Optimization and Caching|
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.