Flylib.com
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Main Page
Table of content
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Preface
The Audience and Purpose of This Book
Case Studies
Explanation of Artwork
About the Technical Reviewers
Acknowledgments
Summary
Chapter 1. Introduction to Content Switching
The Evolution of Layer 2 and Layer 3 Networks
Summary
Chapter 2. Understanding Layer 2, 3, and 4 Protocols
The OSI Seven Layer ModelWhat Is a Layer?
Switching at Different Layers
Understanding Layer 4 Protocols
Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
Summary
Chapter 3. Understanding Application Layer Protocols
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Real Time Streaming Protocol (RTSP)
Secure Sockets Layer (SSL)
Summary
Chapter 4. The Concepts of Content Switching
Virtual Services and Application Redirection
Resources and Real Servers
Frames, Packets, and Sessions
Deep Packet Inspection
Summary
Chapter 5. Basic Server Load Balancing
Why Load Balance Servers?
Topologies of Server Load Balancing
Layer 4 Load Balancing Metrics
Server Health Checking
Summary
Chapter 6. Content-Aware Server Load Balancing
What Is Layer 7 Server Load Balancing?
Why Use Layer 7 Server Load Balancing?
Dealing with Layer 7 Traffic
HTTP URL Parsing and Load Balancing
HTTP Header Load Balancing
HTTP Cookie Load Balancing
Load Balancing FTP
Load Balancing DNS at Layer 7
Load Balancing RTSP Streaming Media
Summary
Case Study: Content-Aware Server Load Balancing
Chapter 7. Persistence, Security, and the Internet
Internet Service ProvidersProxying and Traffic Volumes
IP Address Hashing
Cookie-Based Persistence
SSL
Summary
Case Study: Persistence
Chapter 8. Application Redirection
The Requirement for Application Redirection
VIP-Based SLB vs. Application Redirection
Web Cache Redirection (WCR)
WCR
Security Redirection
RouterLink Load Balancing
Summary
Case Study: Application Redirection
Chapter 9. Firewall and VPN Load Balancing
Why Load Balance Firewalls and VPN Switches?
Firewall Overview
Deploying Firewall Load Balancing
Policy-Based Firewall Load Balancing
VPN and MAC Persistence
Summary
Chapter 10. The Architecture of a Content Switch
Typical Layer 2 and Layer 3 Architecture Considerations
Why Content Switching Is Different
What Makes a Good Content Switch?
Different Approaches
Where To Next?
Associated Hardware
Summary
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
CISSP Exam Cram 2
Security-Management Practices
Risk Assessment
Ethical Hacking
Integrity and Authentication
Steganography
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Understanding Form Technologies
Validating Form Data
Setting Form Template and Digital Signing Options
Introducing InfoPath Form Template Projects
Navigating the InfoPath Object Model
Systematic Software Testing (Artech House Computer Library)
Test Execution
The Test Manager
Improving the Testing Process
Appendix C IEEE Templates
Appendix E Simplified Unit Test Plan
Mastering Delphi 7
Writing Database Components
Reporting with Rave
Web Programming with WebBroker and WebSnap
Web Services and SOAP
The Microsoft .NET Architecture from the Delphi Perspective
InDesign Type: Professional Typography with Adobe InDesign CS2
Type Anatomy
Apostrophes
Working with Rows and Columns
Creating Styles
Paragraph Rules
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Voice of the Customer (VOC)
Data Collection
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies