💻
Database Magazine
GlossaryBest Practices and TipsFAQsResources
  • Database Magazine
  • Glossary of Terms
    • A
      • Archive
      • Active backup for Office 365
      • AWS Backup
      • Active Directory
      • Agent
      • Anti-ransomware solutions
    • B
      • Backup
      • Backup and Recovery
      • Backup as a service
      • Bare-metal backup
      • Backup repository
      • Backup schedule
      • Backup Solutions
      • Business Continuity
    • C
      • Cloud Backup
      • Continuous Data Protection (CDP)
      • Compression
      • Consistency check
      • Cold Backup
      • Cloud Data Management (CDM)
    • D
      • Data Deduplication
      • Disaster Recovery (DR)
      • Differential Backup
      • Disk-to-Disk (D2D) Backup
      • Disaster Recovery (DR)
    • E
      • Encryption
      • Endpoint Backup
      • Erasure Coding
      • Export/Import
      • Enterprise Backup Software
    • F
      • Full Backup
      • Failover
      • File-Level Backup
      • File Sync and Share
      • Fireproof and Waterproof Storage
    • G
      • Grandfather-Father-Son (GFS)
      • Granular Recovery
      • Geographically Dispersed Backup
      • Ghost Imaging
      • Global Deduplication
    • H
      • Hybrid Backup
      • Hot Backup
      • High Availability (HA)
      • Hard Disk Drive (HDD)
      • Hybrid Cloud Backup
    • I
      • Incremental Backup
      • Image-based Backup
      • Instant Recovery
      • Integrity Check
      • Infrastructure as a Service (IaaS)
    • J
      • Journaling
      • Job Scheduler
      • Just-in-Time Recovery
      • Journal-Based Recovery
      • Jumbo Frames
    • K
      • Key Management
      • Kernel-Based Recovery
      • Kickstart
      • Kept Versions
      • Kill Switch
    • L
      • Long-Term Retention
      • Log-Based Recovery
      • Local Backup
      • Latency
      • Load Balancing
    • M
      • Metadata
      • Mirroring
      • Multi-Site Replication
      • Media Rotation
      • Mounting
    • N
      • Nearline Storage
      • Network-Attached Storage (NAS)
      • Non-Destructive Recovery
    • O
      • Offsite Backup
      • Online Backup
      • Object Storage
      • Offsite Replication
      • Open File Backup
      • Overwrite Protection
      • One-Click Restore
    • P
      • Point-in-Time Recovery
      • Primary Storage
      • Physical Backup
      • Private Cloud Backup
      • P2V (Physical-to-Virtual) Conversion
    • Q
      • Quiesce
      • Quick Recovery
      • Quota Management
      • Quality of Service (QoS)
      • Query-Based Recovery
    • R
      • Recovery Point Objective (RPO)
      • Recovery Time Objective (RTO)
      • Replication
      • Restore
      • Retention Policy
    • S
      • Snapshot
      • Storage Area Network (SAN)
      • Secondary Storage
      • Single Point of Failure (SPOF)
      • Synthetic Full Backup
    • T
      • Tape Backup
      • Two-Factor Authentication (2FA)
      • Thin Provisioning
      • Test Restore
      • Transaction Log
    • U
      • Universal Restore
    • V
      • Versioning
      • Virtual Machine (VM) Backup
      • Verification
      • Vaulting
      • Virtual Tape Library (VTL)
    • W
      • Warm Site
      • Workload Mobility
      • WAN Acceleration
      • Write-Once, Read-Many (WORM)
      • Windows Backup
    • X
      • XOR (Exclusive OR)
    • Y
      • Yearly Backup
    • Z
      • Zero Data Loss
  • Best Practices and Tips
    • How to backup Microsoft 365 using third-party backup tools
  • FAQs
    • Does Office 365 have backups?
    • What is the best backup for Office 365?
    • How do I backup my Office 365 backup?
    • What is the backup tool for Office 365?
    • Does Office 365 have storage?
    • Is OneDrive a reliable backup solution?
    • What is an Incremental Backup?
    • Does VMware have a backup tool?
    • What is VMware considered backup?
    • What are the types of backup in VMware?
    • Is VMware snapshot a backup?
    • What is the best way to backup a Hyper-V VM?
    • How do I create a backup in Hyper-V?
    • Should you backup a Hyper-V host?
    • What is the difference between Hyper-V snapshot and backup?
    • What is the disaster recovery in IT industry?
    • What should an IT disaster recovery plan include?
    • What are the main steps in IT disaster recovery?
    • What is the difference between IT security and disaster recovery?
    • What is a NAS backup?
    • How do I backup my NAS data?
    • Can NAS be used as a backup?
    • What is Nutanix used for?
    • What is Nutanix storage?
    • What is RPO and RTO in Nutanix?
    • What is MSP backup?
    • What is managed backup service?
    • How do I restore my MSP backup?
    • What is Azure Backup?
    • What is the purpose of Azure Backup?
    • What are the different types of Azure cloud backups?
    • Is Azure Backup a PaaS?
    • What are the downsides of Backblaze?
    • Does Backblaze backup everything?
    • Is Backblaze better than Google Drive?
  • Resources
Powered by GitBook
On this page
  • Definition
  • Explanation
  • Related terms
  1. Glossary of Terms
  2. W

WAN Acceleration

Discover how WAN acceleration enhances network performance and optimizes data transfer over wide area networks (WANs).

Definition

WAN acceleration, also known as WAN optimization, refers to the techniques and technologies used to improve network performance and optimize data transfer across wide area networks (WANs). It involves mitigating the effects of latency, packet loss, and limited bandwidth to enhance the efficiency and speed of data transmission between geographically dispersed locations.

Explanation

WAN acceleration plays a vital role in addressing the challenges associated with transmitting data over long distances and across WANs. Here are key aspects and benefits of WAN acceleration:

  1. Bandwidth Optimization: WAN acceleration employs various techniques to optimize bandwidth utilization. Data compression, deduplication, and caching are commonly used methods to reduce the amount of data transmitted over the network, minimizing bandwidth consumption and improving overall network efficiency.

  2. Latency Mitigation: WAN acceleration techniques aim to mitigate the impact of latency, which is the delay experienced when transmitting data over long distances. By implementing strategies such as data pre-fetching, protocol optimization, and traffic prioritization, WAN acceleration minimizes latency and improves application response times, particularly for latency-sensitive applications like voice and video conferencing.

  3. Data Redundancy Elimination: WAN acceleration leverages data deduplication techniques to eliminate redundant data from being transmitted over the network. By identifying and removing duplicate data segments, WAN acceleration reduces the amount of data sent, resulting in faster data transfers and improved network performance.

  4. Improved Application Performance: WAN acceleration enhances the performance of critical applications accessed over WANs. By optimizing network traffic and reducing latency, it ensures smoother and more responsive application experiences, enabling efficient collaboration and productivity across distributed teams.

  5. Data Replication and Backup Efficiency: WAN acceleration facilitates efficient data replication and backup processes. By minimizing the amount of data transmitted and optimizing network resources, it enables faster and more reliable replication of data between geographically dispersed sites, ensuring data consistency and enhancing disaster recovery capabilities.

Key Considerations: When implementing WAN acceleration, organizations should consider the following:

  • Network Infrastructure: Assessing the existing network infrastructure and its capabilities is crucial for determining the appropriate WAN acceleration techniques and technologies to deploy. Consider factors such as bandwidth, latency, and network topology to optimize performance effectively.

  • Security: Ensure that WAN acceleration solutions incorporate robust security measures to protect data during transmission. Encryption and secure tunneling protocols should be implemented to safeguard sensitive information.

  • Scalability and Flexibility: Choose WAN acceleration solutions that can scale to meet future growth requirements and adapt to evolving network needs. Consider solutions that support different deployment models, including physical appliances, virtual appliances, or cloud-based acceleration services.

  • Network Monitoring and Management: Implement comprehensive network monitoring and management tools to gain visibility into WAN performance and troubleshoot potential issues. Monitoring and analytics capabilities help identify areas for optimization and ensure efficient operation of WAN acceleration solutions.

Related terms

  • WAN Optimization Controller (WOC): A specialized device or software solution used to implement WAN acceleration techniques and optimize network performance over WANs.

  • Bandwidth Throttling: The deliberate limitation of available network bandwidth to control and allocate resources based on predefined policies. Bandwidth throttling can be used in conjunction with WAN acceleration to optimize network usage and prioritize critical applications.

  • Quality of Service (QoS): Refers to the set of techniques and mechanisms used to manage and prioritize network traffic based on predefined rules. QoS ensures that critical applications receive the necessary network resources and guarantees consistent performance levels for different types of traffic.

WAN acceleration enhances network performance, optimizes data transfer, and mitigates the challenges associated with wide area networks. By implementing WAN acceleration techniques and technologies, organizations can achieve faster data transfers, improved application responsiveness, and efficient utilization of network resources, leading to enhanced productivity and collaboration across distributed environments.

PreviousWorkload MobilityNextWrite-Once, Read-Many (WORM)

Last updated 1 year ago