Essential Guide

Enhance service delivery model with WAN, application optimization

A comprehensive collection of articles, videos and more, hand-picked by our editors
Q

What is protocol spoofing as it relates to WAN optimization?

Learn in this expert response what protocol spoofing is and how it can be used as a WAN optimization technique.

What is protocol spoofing as it relates to WAN optimization and application delivery technology?

Questions?

Have a WAN optimization question? Email our experts or consult your peers at the IT Knowledge Exchange.

When talking about any kind of "spoofing," most IT professionals assume we're discussing a type of IT security attack -- like content spoofing, where a hacker presents a fake website to an end user as if it were legitimate; IP spoofing, where a hijacker conceals a hosts identity to look like a real one; or Caller ID spoofing, where callers can masquerade as someone else by falsifying the number on a Caller ID screen. 

"Protocol spoofing" is actually a homonym, expert Ed Tittel explains: In the information security world, protocol spoofing masks a TCP packet to look like something legitimate. In the world of application delivery optimization, it is not malicious -- but rather helpful in optimizing traffic across a wide area network. Protocol spoofing is a WAN optimization technique that is synonymous with the term "protocol substitution."

To optimize notoriously slow and chatty protocols -- like TCP and Server Message Block -- some WAN optimizers, application delivery controllers and network gateways can respond to protocol messages rather than the endpoint that is farther away. These devices (whether hardware or software) connect a bandwidth-hungry protocol, like TCP, to a lower-bandwidth protocol, like UDP, so that there are fewer packet headers and network handshakes. This type of spoofing makes applications more responsive.

According to Henry Svendblad, protocol spoofing reduces the number of round trips it normally takes for a transaction to take place. In example, the Common Internet File System, or CIFS, file transfer protocol allows only a certain amount of data to be read or written at one time, even if the underlying transport protocol is able to read or write more data at a time. This type of protocol can make a file seem like it is taking forever to transfer. Protocol spoofing can reduce the number of round trips needed to send data, by using predictive algorithms that identify files and subdirectories that may be accessed by the end client.

For more information:

This was first published in October 2013

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Enhance service delivery model with WAN, application optimization

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchNetworking

SearchUnifiedCommunications

SearchTelecom

SearchSDN

Close