| | Copyright |
| | Acknowledgements |
| | Figures |
| | Tables |
| | Preface |
| | | The Sun BluePrints Program |
| | | Who Should Read This Book |
| | | How This Book Is Organized |
| | | Shell Prompts |
| | | Typographic Conventions |
| | | Accessing Sun Documentation |
| | Chapter 1. Overview |
| | | Evolution of Web Services Infrastructures |
| | | The Data Center IP Network |
| | | Network Traffic Characteristics |
| | | End-to-End Session: Tuning the Transport Layer |
| | | Network Edge Traffic Steering: IP Services |
| | | Server Networking Internals |
| | | Network Availability Design Patterns |
| | | Reference Implementations |
| | Chapter 2. Network Traffic Patterns: Application Layer |
| | | Services on Demand Architecture |
| | | Multi-Tier Architecture and Traffic Patterns |
| | | Web Services Tier |
| | | Application Services Tier |
| | | Architecture Examples |
| | | Example Solution |
| | Chapter 3. Tuning TCP: Transport Layer |
| | | TCP Tuning Domains |
| | | TCP State Model |
| | | TCP Congestion Control and Flow Control Sliding Windows |
| | | TCP and RDMA Future Data Center Transport Protocols |
| | Chapter 4. Routers, Switches, and Appliances IP-Based Services: Network Layer |
| | | Packet Switch Internals |
| | | Emerging Network Services and Appliances |
| | | Layer 7 Switching |
| | | Quality of Service |
| | | QoS Components |
| | | QoS-Capable Devices |
| | | Secure Sockets Layer |
| | Chapter 5. Server Network Interface Cards: Datalink and Physical Layer |
| | | Token Ring Networks |
| | | Fiber Distributed Data Interface Networks |
| | | Ethernet Technology |
| | | Fast Ethernet Interfaces |
| | | 10/100 dmfe Fast Ethernet |
| | | Fiber Gigabit Ethernet |
| | | Sun VLAN Technology |
| | | Sun Trunking Technology |
| | | Network Configuration |
| | | Installing the Solaris Operating System Over a Network |
| | | Configuring Driver Parameters |
| | | Using /etc/system to Tune Parameters |
| | | Network Interface Card General Statistics |
| | | Ethernet Media Independent Interface Kernel Statistics |
| | | Maximizing the Performance of an Ethernet NIC Interface |
| | Chapter 6. Network Availability Design Strategies |
| | | Network Architecture and Availability |
| | | Layer 2 Strategies |
| | | Layer 3 Strategies |
| | | Conclusions Drawn from Evaluating Fault Detection and Recovery Times |
| | Chapter 7. Reference Design Implementations |
| | | Logical Network Architecture |
| | | Physical Network Implementations |
| | | Switch Configuration |
| | | Network Security |
| | Appendix A. Lyapunov Analysis |
| | Glossary |
| | | A |
| | | B |
| | | C |
| | | D |
| | | E |
| | | F |
| | | G |
| | | H |
| | | I |
| | | J |
| | | L |
| | | M |
| | | N |
| | | O |
| | | P |
| | | Q |
| | | R |
| | | S |
| | | T |
| | | U |
| | | W |
| | Index |