| | Copyright |
| | Prentice Hall PTR Series in Computer Networking and Distributed Systems |
| | About Prentice Hall Professional Technical Reference |
| | Preface |
| | | The Audience and Purpose of This Book |
| | | Case Studies |
| | | Explanation of Artwork |
| | | About the Technical Reviewers |
| | | Acknowledgments |
| | | Summary |
|
| | Chapter 1. Introduction to Content Switching |
| | | The Evolution of Layer 2 and Layer 3 Networks |
| | | Summary |
|
| | Chapter 2. Understanding Layer 2, 3, and 4 Protocols |
| | | The OSI Seven Layer ModelWhat Is a Layer? |
| | | Switching at Different Layers |
| | | Understanding Layer 4 Protocols |
| | | Transport Control Protocol (TCP) |
| | | User Datagram Protocol (UDP) |
| | | Virtual Router Redundancy Protocol (VRRP) |
| | | Summary |
|
| | Chapter 3. Understanding Application Layer Protocols |
| | | HyperText Transfer Protocol (HTTP) |
| | | File Transfer Protocol (FTP) |
| | | Real Time Streaming Protocol (RTSP) |
| | | Secure Sockets Layer (SSL) |
| | | Summary |
|
| | Chapter 4. The Concepts of Content Switching |
| | | Virtual Services and Application Redirection |
| | | Resources and Real Servers |
| | | Frames, Packets, and Sessions |
| | | Deep Packet Inspection |
| | | Summary |
|
| | Chapter 5. Basic Server Load Balancing |
| | | Why Load Balance Servers? |
| | | Topologies of Server Load Balancing |
| | | Layer 4 Load Balancing Metrics |
| | | Server Health Checking |
| | | Summary |
|
| | Chapter 6. Content-Aware Server Load Balancing |
| | | What Is Layer 7 Server Load Balancing? |
| | | Why Use Layer 7 Server Load Balancing? |
| | | Dealing with Layer 7 Traffic |
| | | HTTP URL Parsing and Load Balancing |
| | | HTTP Header Load Balancing |
| | | HTTP Cookie Load Balancing |
| | | Load Balancing FTP |
| | | Load Balancing DNS at Layer 7 |
| | | Load Balancing RTSP Streaming Media |
| | | Summary |
| | | Case Study: Content-Aware Server Load Balancing |
|
| | Chapter 7. Persistence, Security, and the Internet |
| | | Internet Service ProvidersProxying and Traffic Volumes |
| | | IP Address Hashing |
| | | Cookie-Based Persistence |
| | | SSL |
| | | Summary |
| | | Case Study: Persistence |
|
| | Chapter 8. Application Redirection |
| | | The Requirement for Application Redirection |
| | | VIP-Based SLB vs. Application Redirection |
| | | Web Cache Redirection (WCR) |
| | | WCR |
| | | Security Redirection |
| | | Router/Link Load Balancing |
| | | Summary |
| | | Case Study: Application Redirection |
|
| | Chapter 9. Firewall and VPN Load Balancing |
| | | Why Load Balance Firewalls and VPN Switches? |
| | | Firewall Overview |
| | | Deploying Firewall Load Balancing |
| | | Policy-Based Firewall Load Balancing |
| | | VPN and MAC Persistence |
| | | Summary |
|
| | Chapter 10. The Architecture of a Content Switch |
| | | Typical Layer 2 and Layer 3 Architecture Considerations |
| | | Why Content Switching Is Different |
| | | What Makes a Good Content Switch? |
| | | Different Approaches |
| | | Where To Next? |
| | | Associated Hardware |
| | | Summary |
|