SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
F5 White Paper




Geolocation and
Application Delivery
The data from geolocation providers offers highly
valuable data to a variety of stakeholders and is no
longer just for advertising.

by Lori MacVittie
Technical Marketing Manager, Application Services
White Paper
Geolocation and Application Delivery




Contents
Introduction                                    3

Geolocation Use Cases                           3
  Enforcing Location-Based Restrictions         4

  Optimal Request Routing and Cloud Balancing   5

  Context-Aware Security                        5

  Enhanced Visibility                           6


Geolocation Implementation                      7

Conclusion                                      8




                                                    2
White Paper
Geolocation and Application Delivery




Introduction
In the past, the use of geolocation technology was limited to content delivery
networks (CDNs) and targeted advertising. In both cases it was necessary to
determine the client’s location with as much accuracy as possible in order to
intelligently route application requests to the nearest data center for optimal user
performance or to more effectively deliver relevant advertising.

As the accuracy of geolocation technology has improved, there are more use cases
for location-based networking than ever before. Advertising and performance-
related implementations are still a valid use cases, but the enforcement of location-
based access restrictions and context-aware security is quickly becoming more
important, especially among an increasingly mobile user base.

Also of rising importance is cloud computing, which introduces new challenges to IT
in terms of global load balancing configurations. Hybrid architectures that attempt
to seamlessly use public and private cloud implementations for scalability, disaster
recovery, and availability purposes can leverage accurate geolocation data to enable
a broader spectrum of functionality and options.



Geolocation Use Cases
When geolocation data is highly accurate, it can be employed across a broader
set of functions that might depend on or be enhanced by having access to that
information.

The key is to ensure that the geolocation technology is, in fact, as accurate
as possible. This often requires that a solution wishing to take advantage of
geolocation capabilities must look to an outside source. The traditional methods of
geolocation have depended upon public IP address registries, which are now highly
suspect in regard to accuracy and thus cannot be depended upon to provide valid
location information.

Using a trusted third-party source for location determination enables solutions
to apply location-based policies with a high degree of assurance that the data
is accurate. F5 chose to partner with Quova, for example, based partially on its
guarantee of 99 percent level of accuracy of the location-based data it provides.
This level of accuracy permits a broader set of uses for geolocation technology.




                                                                                        3
White Paper
Geolocation and Application Delivery




Enforcing Location-Based Restrictions
Many IT professionals might recall that in the early days of SSL implementations,
technology enabling 128-bit key certificates could not be exported outside the
United States. This restriction applied to digital content, such as browsers, too.
The restrictions were extremely difficult to enforce at the time because geolocation
technology was in its infancy and highly inaccurate.

Today, the U.S. continues to impose similar restrictions on technology offerings,
especially those involving security and cryptography. The enforcement of such
restrictions has become easier as geolocation offerings have matured.

      Data Center




          BIG-IP
  Global Traffic Manager




          Figure 1: U.S. trade restrictions require blocking access to certain locations.


It is not just legal-based regulatory restrictions that need enforcement, however.
The increasing broadcast of video-based content and live events has given rise to
concerns regarding how to enforce broadcasting restrictions, as well.

For example, a Norwegian broadcaster may have rights to stream the Olympics in
Norway, but needs to block access to users coming from other countries because it
only has rights to broadcast in Norway. And, within the U.S., the National Football
League has specific requirements that may prohibit the live broadcasting of football
games in specific areas based on whether the game is sold out. In these and other
instances, solutions that have the ability to determine location with a high degree of
specificity—for example, by postal code—will prohibit or permit access to broadcasts.




                                                                                            4
White Paper
Geolocation and Application Delivery




A highly accurate geolocation implementation provides the necessary level of
granularity, and ensures that trade, broadcast, and other location-based restrictions
can more easily be enforced.


Optimal Request Routing and Cloud Balancing
Geolocation data provides more information than its name implies. Included
in highly accurate geolocation data can be information germane to making
application-request routing decisions.

The use of geolocation for proximity-based access to applications transparently
benefits all users. Users directed to the application instance or website that is
physically closest to them mitigates the impact of speed of light limitations on
application performance. For organizations with very large web presences, basing
decisions on physical proximity is also an efficient method of distributing resources.
The integration of accurate geolocation technology helps organizations scale
applications appropriately—providing, for example, more compute resources in
New York, where there are millions of users, and fewer resources in Topeka, Kansas,
where there might be only a few thousand users.

Cloud balancing is the routing of application requests across applications or             MSAs and DMAs are geo-
                                                                                          graphical boundaries ranging
workloads that reside in multiple clouds. It assumes that all instances of the
                                                                                          from countries down to specific
application deployed in the various clouds are accessible at all times. A large part      U.S. metropolitan areas. There
of the value proposition of cloud balancing is to optimize resource utilization while     is extensive demographic
                                                                                          information available for these
simultaneously enhancing user performance. Geolocation data advances this process         areas and accurate geolocation
by supplying information about the user connection that can be valuable to a global       data can determine which
server load balancing solution that is attempting to find the optimal data center or      specific MSAs and DMAs are
                                                                                          applicable to a given user based
cloud to which that user’s request should be directed.                                    on the IP address from which
                                                                                          they access an application.

Context-Aware Security
The increasingly mobile-enabled population—IDC’s Worldwide Digital Marketplace
Model and Forecast expects the number of mobile devices accessing the internet to
surpass the one billion mark by 2013—presents security challenges to application
providers. It may not be in the best interests of an organization to permit access to
sensitive or confidential documents to mobile workers who are accessing corporate
resources from a public or shared device. Similarly, it may be desirable to only permit
access to resources from certain locations when the connection between the client
and the resource is encrypted.



                                                                                                                             5
White Paper
Geolocation and Application Delivery




In order to provide this kind of graded authentication and authorization of access to
corporate resources based on user location, it is first necessary to ensure, as much as
possible, that the gateway to those resources are capable of accurately determining
the location of the client.

Accurate geolocation data, when combined with the other variables that make
up a request’s context, can permit or deny application and resource access in an
increasingly fine-grained manner. Geolocation information is one of the key pieces
of contextual information surrounding requests that can be used to enhance and
provide better enforcement of organizational security policies.


Enhanced Visibility
Just as accurate geolocation data has valuable benefits in terms of security and
performance of web applications and resources, it also provides greater business
value and insight through enhanced visibility. Business value and insight come from
discerning the client’s location and from additional data provided by geolocation.
For example, geolocation can be used in defined areas, such as those established
by Designated Market Areas (DMAs) and Metropolitan Statistical Areas (MSAs), to
derive deep demographic data that becomes part of the application request context
and can be subsequently incorporated into analytical evaluation of visitor and
customer web application interaction.

Understanding from where clients typically access your applications can influence
the placement of future data centers and co-location of CDN components to
improve application performance and distribution. Accurate geolocation data can
assist in prioritization of requests by aligning application delivery policies with
defined demographic-based business goals.

Data such as the time zone associated with visitors, available from provider Quova’s
geolocation data, can further assist IT in gaining visibility into use patterns based
on time. This visibility affords an opportunity to understand the potential impact
of leveraging cloud computing and employing a “follow the users” strategy for
improving application performance, potentially eliminating the need to provision
costly CDN services. Moving the content closer to the users is still a valid strategy,
but knowing the application access point for the majority of customers makes it
possible to move the entire application across cloud computing environments rather
than add additional complexity with a CDN service.

Business analysts understand the value derived from demographics, especially
those based on location. But the demographics that are typically analyzed using

                                                                                          6
White Paper
Geolocation and Application Delivery




business intelligence tools are only for customers with known locations. However,
demographics provided via geolocation for visitors can be correlated with data
on known locations to provide insight as to why those visitors have not become
customers. This information is invaluable to business analysts when determining, for
example, which products are not selling well in a particular location but may be of
interest, or in understanding the impact of location on visitor interaction with web
applications.



Geolocation Implementation
Geolocation integration can be accomplished at many different points in an
application request’s lifecycle. To realize the greatest value across the broadest
spectrum of use cases, gathering of geolocation data is most efficiently
accomplished when a request is first made for a given resource.

The Application Delivery Controller is typically deployed at a strategic point in the
application and network architecture: at the perimeter of the network, acting
as an intermediary between clients and resources. Given this strategic location,
geolocation data should be incorporated into the existing context that is already
associated with every request such as IP address, user-agent, and ability to accept
specific types of content.

Accurate geolocation data is generally provided by an external, third-party service
like Quova. These services can be billed in a variety of ways, including by the number
of queries and bandwidth transferred. To minimize the capital and operational costs
associated with retrieving geolocation data while maintaining the ability to share
that data with the broadest number of devices and applications, centralization
of the retrieval process is necessary. Centralized control has the added benefit of
decreasing organizational risk by permitting or denying access at the perimeter of
the network when location is part of the authorization process.

By integrating geolocation services with a unified application delivery service, it
is also possible to share the data retrieved from the third-party service with all
functions deployed on the Unified Application and Data Delivery platform. A unified
application delivery platform shares a core, underlying traffic management system
that enables the sharing of request context—including location data—across all
modules that are deployed on that platform. The sharing of contextual data enables
web application security, access management, acceleration, and core load balancing
services on the application delivery platform to take advantage of the geolocation



                                                                                         7
White Paper
      Geolocation and Application Delivery




      data available via the global server load balancing component, which is generally the
      component through which geolocation services are provided.



      Conclusion
      Accurate geolocation data is often viewed as useful only in certain scenarios
      involving CDNs and advertising efforts. The increasingly global nature of content
      and the migration of multimedia content distribution from typical broadcast
      channels to the Internet make geolocation a requirement for enforcing access
      restrictions and for providing the basis for traditional performance-enhancing and
      disaster recovery solutions.

      Both business and technical stakeholders will find value and a broad range of
      uses for the highly accurate data available from a trusted third-party geolocation
      provider, especially when the data is integrated into a Unified Application and
      Data Delivery platform.




F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119                         888-882-4447         www.f5.com


F5 Networks, Inc.                     F5 Networks                 F5 Networks Ltd.                        F5 Networks
Corporate Headquarters                Asia-Pacific                Europe/Middle-East/Africa               Japan K.K.
info@f5.com                           info.asia@f5.com            emeainfo@f5.com                         f5j-info@f5.com



© 2010 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, iControl, TMOS, and VIPRION are trademarks
  or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries.                             CS01-10120 0110

Weitere ähnliche Inhalte

Was ist angesagt?

Idc consumers and cloud services
Idc consumers and cloud servicesIdc consumers and cloud services
Idc consumers and cloud services
thriceBOX
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
ijsrd.com
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
Conference Papers
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
ncct
 

Was ist angesagt? (17)

Idc consumers and cloud services
Idc consumers and cloud servicesIdc consumers and cloud services
Idc consumers and cloud services
 
Bridgewater Systems 2008 Marketing Report
Bridgewater Systems 2008 Marketing ReportBridgewater Systems 2008 Marketing Report
Bridgewater Systems 2008 Marketing Report
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
Publication
PublicationPublication
Publication
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Telco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 ExcerptTelco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 Excerpt
 
Ju3617981704
Ju3617981704Ju3617981704
Ju3617981704
 
pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...pay as you decrypt decryption outsourcing for functional encryption using blo...
pay as you decrypt decryption outsourcing for functional encryption using blo...
 

Ähnlich wie Geolocation and Application Delivery

Internap dcs landscape_report
Internap dcs landscape_reportInternap dcs landscape_report
Internap dcs landscape_report
Self Employed
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
christalgrieg
 
Anonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docxAnonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docx
rossskuddershamus
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
 
Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3
Justus @GreenPacket
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Juniper Networks
 

Ähnlich wie Geolocation and Application Delivery (20)

Three Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudThree Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the Cloud
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
Internap dcs landscape_report
Internap dcs landscape_reportInternap dcs landscape_report
Internap dcs landscape_report
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
V04405122126
V04405122126V04405122126
V04405122126
 
Anonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docxAnonymous Usage of Location-Based Services Through Spatial and.docx
Anonymous Usage of Location-Based Services Through Spatial and.docx
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
Enterprise Architecture Networking
Enterprise Architecture Networking Enterprise Architecture Networking
Enterprise Architecture Networking
 
Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Pilot Texas Cloud Offering
Pilot Texas Cloud OfferingPilot Texas Cloud Offering
Pilot Texas Cloud Offering
 
Reshma.docx
Reshma.docxReshma.docx
Reshma.docx
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings
 

Mehr von FindWhitePapers

Mehr von FindWhitePapers (20)

The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business Intelligence
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean Enterprise
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing Operations
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and Opportunities
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step Approach
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor Research
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

Geolocation and Application Delivery

  • 1. F5 White Paper Geolocation and Application Delivery The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising. by Lori MacVittie Technical Marketing Manager, Application Services
  • 2. White Paper Geolocation and Application Delivery Contents Introduction 3 Geolocation Use Cases 3 Enforcing Location-Based Restrictions 4 Optimal Request Routing and Cloud Balancing 5 Context-Aware Security 5 Enhanced Visibility 6 Geolocation Implementation 7 Conclusion 8 2
  • 3. White Paper Geolocation and Application Delivery Introduction In the past, the use of geolocation technology was limited to content delivery networks (CDNs) and targeted advertising. In both cases it was necessary to determine the client’s location with as much accuracy as possible in order to intelligently route application requests to the nearest data center for optimal user performance or to more effectively deliver relevant advertising. As the accuracy of geolocation technology has improved, there are more use cases for location-based networking than ever before. Advertising and performance- related implementations are still a valid use cases, but the enforcement of location- based access restrictions and context-aware security is quickly becoming more important, especially among an increasingly mobile user base. Also of rising importance is cloud computing, which introduces new challenges to IT in terms of global load balancing configurations. Hybrid architectures that attempt to seamlessly use public and private cloud implementations for scalability, disaster recovery, and availability purposes can leverage accurate geolocation data to enable a broader spectrum of functionality and options. Geolocation Use Cases When geolocation data is highly accurate, it can be employed across a broader set of functions that might depend on or be enhanced by having access to that information. The key is to ensure that the geolocation technology is, in fact, as accurate as possible. This often requires that a solution wishing to take advantage of geolocation capabilities must look to an outside source. The traditional methods of geolocation have depended upon public IP address registries, which are now highly suspect in regard to accuracy and thus cannot be depended upon to provide valid location information. Using a trusted third-party source for location determination enables solutions to apply location-based policies with a high degree of assurance that the data is accurate. F5 chose to partner with Quova, for example, based partially on its guarantee of 99 percent level of accuracy of the location-based data it provides. This level of accuracy permits a broader set of uses for geolocation technology. 3
  • 4. White Paper Geolocation and Application Delivery Enforcing Location-Based Restrictions Many IT professionals might recall that in the early days of SSL implementations, technology enabling 128-bit key certificates could not be exported outside the United States. This restriction applied to digital content, such as browsers, too. The restrictions were extremely difficult to enforce at the time because geolocation technology was in its infancy and highly inaccurate. Today, the U.S. continues to impose similar restrictions on technology offerings, especially those involving security and cryptography. The enforcement of such restrictions has become easier as geolocation offerings have matured. Data Center BIG-IP Global Traffic Manager Figure 1: U.S. trade restrictions require blocking access to certain locations. It is not just legal-based regulatory restrictions that need enforcement, however. The increasing broadcast of video-based content and live events has given rise to concerns regarding how to enforce broadcasting restrictions, as well. For example, a Norwegian broadcaster may have rights to stream the Olympics in Norway, but needs to block access to users coming from other countries because it only has rights to broadcast in Norway. And, within the U.S., the National Football League has specific requirements that may prohibit the live broadcasting of football games in specific areas based on whether the game is sold out. In these and other instances, solutions that have the ability to determine location with a high degree of specificity—for example, by postal code—will prohibit or permit access to broadcasts. 4
  • 5. White Paper Geolocation and Application Delivery A highly accurate geolocation implementation provides the necessary level of granularity, and ensures that trade, broadcast, and other location-based restrictions can more easily be enforced. Optimal Request Routing and Cloud Balancing Geolocation data provides more information than its name implies. Included in highly accurate geolocation data can be information germane to making application-request routing decisions. The use of geolocation for proximity-based access to applications transparently benefits all users. Users directed to the application instance or website that is physically closest to them mitigates the impact of speed of light limitations on application performance. For organizations with very large web presences, basing decisions on physical proximity is also an efficient method of distributing resources. The integration of accurate geolocation technology helps organizations scale applications appropriately—providing, for example, more compute resources in New York, where there are millions of users, and fewer resources in Topeka, Kansas, where there might be only a few thousand users. Cloud balancing is the routing of application requests across applications or MSAs and DMAs are geo- graphical boundaries ranging workloads that reside in multiple clouds. It assumes that all instances of the from countries down to specific application deployed in the various clouds are accessible at all times. A large part U.S. metropolitan areas. There of the value proposition of cloud balancing is to optimize resource utilization while is extensive demographic information available for these simultaneously enhancing user performance. Geolocation data advances this process areas and accurate geolocation by supplying information about the user connection that can be valuable to a global data can determine which server load balancing solution that is attempting to find the optimal data center or specific MSAs and DMAs are applicable to a given user based cloud to which that user’s request should be directed. on the IP address from which they access an application. Context-Aware Security The increasingly mobile-enabled population—IDC’s Worldwide Digital Marketplace Model and Forecast expects the number of mobile devices accessing the internet to surpass the one billion mark by 2013—presents security challenges to application providers. It may not be in the best interests of an organization to permit access to sensitive or confidential documents to mobile workers who are accessing corporate resources from a public or shared device. Similarly, it may be desirable to only permit access to resources from certain locations when the connection between the client and the resource is encrypted. 5
  • 6. White Paper Geolocation and Application Delivery In order to provide this kind of graded authentication and authorization of access to corporate resources based on user location, it is first necessary to ensure, as much as possible, that the gateway to those resources are capable of accurately determining the location of the client. Accurate geolocation data, when combined with the other variables that make up a request’s context, can permit or deny application and resource access in an increasingly fine-grained manner. Geolocation information is one of the key pieces of contextual information surrounding requests that can be used to enhance and provide better enforcement of organizational security policies. Enhanced Visibility Just as accurate geolocation data has valuable benefits in terms of security and performance of web applications and resources, it also provides greater business value and insight through enhanced visibility. Business value and insight come from discerning the client’s location and from additional data provided by geolocation. For example, geolocation can be used in defined areas, such as those established by Designated Market Areas (DMAs) and Metropolitan Statistical Areas (MSAs), to derive deep demographic data that becomes part of the application request context and can be subsequently incorporated into analytical evaluation of visitor and customer web application interaction. Understanding from where clients typically access your applications can influence the placement of future data centers and co-location of CDN components to improve application performance and distribution. Accurate geolocation data can assist in prioritization of requests by aligning application delivery policies with defined demographic-based business goals. Data such as the time zone associated with visitors, available from provider Quova’s geolocation data, can further assist IT in gaining visibility into use patterns based on time. This visibility affords an opportunity to understand the potential impact of leveraging cloud computing and employing a “follow the users” strategy for improving application performance, potentially eliminating the need to provision costly CDN services. Moving the content closer to the users is still a valid strategy, but knowing the application access point for the majority of customers makes it possible to move the entire application across cloud computing environments rather than add additional complexity with a CDN service. Business analysts understand the value derived from demographics, especially those based on location. But the demographics that are typically analyzed using 6
  • 7. White Paper Geolocation and Application Delivery business intelligence tools are only for customers with known locations. However, demographics provided via geolocation for visitors can be correlated with data on known locations to provide insight as to why those visitors have not become customers. This information is invaluable to business analysts when determining, for example, which products are not selling well in a particular location but may be of interest, or in understanding the impact of location on visitor interaction with web applications. Geolocation Implementation Geolocation integration can be accomplished at many different points in an application request’s lifecycle. To realize the greatest value across the broadest spectrum of use cases, gathering of geolocation data is most efficiently accomplished when a request is first made for a given resource. The Application Delivery Controller is typically deployed at a strategic point in the application and network architecture: at the perimeter of the network, acting as an intermediary between clients and resources. Given this strategic location, geolocation data should be incorporated into the existing context that is already associated with every request such as IP address, user-agent, and ability to accept specific types of content. Accurate geolocation data is generally provided by an external, third-party service like Quova. These services can be billed in a variety of ways, including by the number of queries and bandwidth transferred. To minimize the capital and operational costs associated with retrieving geolocation data while maintaining the ability to share that data with the broadest number of devices and applications, centralization of the retrieval process is necessary. Centralized control has the added benefit of decreasing organizational risk by permitting or denying access at the perimeter of the network when location is part of the authorization process. By integrating geolocation services with a unified application delivery service, it is also possible to share the data retrieved from the third-party service with all functions deployed on the Unified Application and Data Delivery platform. A unified application delivery platform shares a core, underlying traffic management system that enables the sharing of request context—including location data—across all modules that are deployed on that platform. The sharing of contextual data enables web application security, access management, acceleration, and core load balancing services on the application delivery platform to take advantage of the geolocation 7
  • 8. White Paper Geolocation and Application Delivery data available via the global server load balancing component, which is generally the component through which geolocation services are provided. Conclusion Accurate geolocation data is often viewed as useful only in certain scenarios involving CDNs and advertising efforts. The increasingly global nature of content and the migration of multimedia content distribution from typical broadcast channels to the Internet make geolocation a requirement for enforcing access restrictions and for providing the basis for traditional performance-enhancing and disaster recovery solutions. Both business and technical stakeholders will find value and a broad range of uses for the highly accurate data available from a trusted third-party geolocation provider, especially when the data is integrated into a Unified Application and Data Delivery platform. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks, Inc. F5 Networks F5 Networks Ltd. F5 Networks Corporate Headquarters Asia-Pacific Europe/Middle-East/Africa Japan K.K. info@f5.com info.asia@f5.com emeainfo@f5.com f5j-info@f5.com © 2010 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, FirePass, iControl, TMOS, and VIPRION are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. CS01-10120 0110