Flylib.com
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Main Page
Table of content
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Preface
The Audience and Purpose of This Book
Case Studies
Explanation of Artwork
About the Technical Reviewers
Acknowledgments
Summary
Chapter 1. Introduction to Content Switching
The Evolution of Layer 2 and Layer 3 Networks
Summary
Chapter 2. Understanding Layer 2, 3, and 4 Protocols
The OSI Seven Layer ModelWhat Is a Layer?
Switching at Different Layers
Understanding Layer 4 Protocols
Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
Summary
Chapter 3. Understanding Application Layer Protocols
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Real Time Streaming Protocol (RTSP)
Secure Sockets Layer (SSL)
Summary
Chapter 4. The Concepts of Content Switching
Virtual Services and Application Redirection
Resources and Real Servers
Frames, Packets, and Sessions
Deep Packet Inspection
Summary
Chapter 5. Basic Server Load Balancing
Why Load Balance Servers?
Topologies of Server Load Balancing
Layer 4 Load Balancing Metrics
Server Health Checking
Summary
Chapter 6. Content-Aware Server Load Balancing
What Is Layer 7 Server Load Balancing?
Why Use Layer 7 Server Load Balancing?
Dealing with Layer 7 Traffic
HTTP URL Parsing and Load Balancing
HTTP Header Load Balancing
HTTP Cookie Load Balancing
Load Balancing FTP
Load Balancing DNS at Layer 7
Load Balancing RTSP Streaming Media
Summary
Case Study: Content-Aware Server Load Balancing
Chapter 7. Persistence, Security, and the Internet
Internet Service ProvidersProxying and Traffic Volumes
IP Address Hashing
Cookie-Based Persistence
SSL
Summary
Case Study: Persistence
Chapter 8. Application Redirection
The Requirement for Application Redirection
VIP-Based SLB vs. Application Redirection
Web Cache Redirection (WCR)
WCR
Security Redirection
RouterLink Load Balancing
Summary
Case Study: Application Redirection
Chapter 9. Firewall and VPN Load Balancing
Why Load Balance Firewalls and VPN Switches?
Firewall Overview
Deploying Firewall Load Balancing
Policy-Based Firewall Load Balancing
VPN and MAC Persistence
Summary
Chapter 10. The Architecture of a Content Switch
Typical Layer 2 and Layer 3 Architecture Considerations
Why Content Switching Is Different
What Makes a Good Content Switch?
Different Approaches
Where To Next?
Associated Hardware
Summary
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex Application with an IDE
Parsing a String Containing a Number in Scientific Notation
Strings and Text
Ensuring a Single Copy of a Member Variable
Overloading the Increment and Decrement Operators
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Exploring the R1C1 Cell Reference Style
Building 3D Surface Plots
Detrending a Time Series
Using Summation Functions
Building Support for Vectors
MySQL Clustering
Configuration
Storage Nodes
Performance
Logging Commands
Miscellaneous Commands
C++ How to Program (5th Edition)
(Optional) Software Engineering Case Study: Identifying Class Attributes in the ATM System
Scope Rules
Pointer Variable Declarations and Initialization
More Pointer Exercises
I.6. Compilers and Development Tools
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Why this book is important
Service-Oriented Design (Part I: Introduction)
Considerations for positioning core SOA standards
Service design overview
Service design guidelines
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 19. Get Google Maps on Your Mobile Phone
Hack 27. Detect Networks on Mac OS X
Hack 29. Detect Networks with Kismet
Hack 75. Capture Wireless Users on a Small Scale
Hack 93. Build Cheap, Effective Roof Mounts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies