Flylib.com
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Main Page
Table of content
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Preface
The Audience and Purpose of This Book
Case Studies
Explanation of Artwork
About the Technical Reviewers
Acknowledgments
Summary
Chapter 1. Introduction to Content Switching
The Evolution of Layer 2 and Layer 3 Networks
Summary
Chapter 2. Understanding Layer 2, 3, and 4 Protocols
The OSI Seven Layer ModelWhat Is a Layer?
Switching at Different Layers
Understanding Layer 4 Protocols
Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
Summary
Chapter 3. Understanding Application Layer Protocols
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Real Time Streaming Protocol (RTSP)
Secure Sockets Layer (SSL)
Summary
Chapter 4. The Concepts of Content Switching
Virtual Services and Application Redirection
Resources and Real Servers
Frames, Packets, and Sessions
Deep Packet Inspection
Summary
Chapter 5. Basic Server Load Balancing
Why Load Balance Servers?
Topologies of Server Load Balancing
Layer 4 Load Balancing Metrics
Server Health Checking
Summary
Chapter 6. Content-Aware Server Load Balancing
What Is Layer 7 Server Load Balancing?
Why Use Layer 7 Server Load Balancing?
Dealing with Layer 7 Traffic
HTTP URL Parsing and Load Balancing
HTTP Header Load Balancing
HTTP Cookie Load Balancing
Load Balancing FTP
Load Balancing DNS at Layer 7
Load Balancing RTSP Streaming Media
Summary
Case Study: Content-Aware Server Load Balancing
Chapter 7. Persistence, Security, and the Internet
Internet Service ProvidersProxying and Traffic Volumes
IP Address Hashing
Cookie-Based Persistence
SSL
Summary
Case Study: Persistence
Chapter 8. Application Redirection
The Requirement for Application Redirection
VIP-Based SLB vs. Application Redirection
Web Cache Redirection (WCR)
WCR
Security Redirection
RouterLink Load Balancing
Summary
Case Study: Application Redirection
Chapter 9. Firewall and VPN Load Balancing
Why Load Balance Firewalls and VPN Switches?
Firewall Overview
Deploying Firewall Load Balancing
Policy-Based Firewall Load Balancing
VPN and MAC Persistence
Summary
Chapter 10. The Architecture of a Content Switch
Typical Layer 2 and Layer 3 Architecture Considerations
Why Content Switching Is Different
What Makes a Good Content Switch?
Different Approaches
Where To Next?
Associated Hardware
Summary
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Software Configuration Management
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Configuration Management and Software Engineering Standards Reference
Appendix P Project Statement of Work
Appendix Q Problem Trouble Report (PTR)
A Practitioners Guide to Software Test Design
Pairwise Testing
Use Case Testing
Section II - White Box Testing Techniques
Section III - Testing Paradigms
Appendix B Stateless University Registration System Case Study
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Partial Page Rendering
The AJAX Control Toolkit
Building AJAX Applications with ASP.NET
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Fashion Logistics and Quick Response
Logistics in Tesco: Past, Present and Future
Rethinking Efficient Replenishment in the Grocery Sector
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Java All-In-One Desk Reference For Dummies
Book IV - Strings, Arrays, and Collections
Handling Events
Getting Input from the User
Database for $100, Please
Fun with Fonts and Colors
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies