Flylib.com
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Main Page
Table of content
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Preface
The Audience and Purpose of This Book
Case Studies
Explanation of Artwork
About the Technical Reviewers
Acknowledgments
Summary
Chapter 1. Introduction to Content Switching
The Evolution of Layer 2 and Layer 3 Networks
Summary
Chapter 2. Understanding Layer 2, 3, and 4 Protocols
The OSI Seven Layer ModelWhat Is a Layer?
Switching at Different Layers
Understanding Layer 4 Protocols
Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
Summary
Chapter 3. Understanding Application Layer Protocols
HyperText Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Real Time Streaming Protocol (RTSP)
Secure Sockets Layer (SSL)
Summary
Chapter 4. The Concepts of Content Switching
Virtual Services and Application Redirection
Resources and Real Servers
Frames, Packets, and Sessions
Deep Packet Inspection
Summary
Chapter 5. Basic Server Load Balancing
Why Load Balance Servers?
Topologies of Server Load Balancing
Layer 4 Load Balancing Metrics
Server Health Checking
Summary
Chapter 6. Content-Aware Server Load Balancing
What Is Layer 7 Server Load Balancing?
Why Use Layer 7 Server Load Balancing?
Dealing with Layer 7 Traffic
HTTP URL Parsing and Load Balancing
HTTP Header Load Balancing
HTTP Cookie Load Balancing
Load Balancing FTP
Load Balancing DNS at Layer 7
Load Balancing RTSP Streaming Media
Summary
Case Study: Content-Aware Server Load Balancing
Chapter 7. Persistence, Security, and the Internet
Internet Service ProvidersProxying and Traffic Volumes
IP Address Hashing
Cookie-Based Persistence
SSL
Summary
Case Study: Persistence
Chapter 8. Application Redirection
The Requirement for Application Redirection
VIP-Based SLB vs. Application Redirection
Web Cache Redirection (WCR)
WCR
Security Redirection
RouterLink Load Balancing
Summary
Case Study: Application Redirection
Chapter 9. Firewall and VPN Load Balancing
Why Load Balance Firewalls and VPN Switches?
Firewall Overview
Deploying Firewall Load Balancing
Policy-Based Firewall Load Balancing
VPN and MAC Persistence
Summary
Chapter 10. The Architecture of a Content Switch
Typical Layer 2 and Layer 3 Architecture Considerations
Why Content Switching Is Different
What Makes a Good Content Switch?
Different Approaches
Where To Next?
Associated Hardware
Summary
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85
Authors:
Matthew Syme
,
Philip Goldie
BUY ON AMAZON
Snort Cookbook
Logging to a Specific File
Logging to Email
Detecting Binary Content
Detecting Port Scans and Talkative Hosts
Staying Legal
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Introduction to the VB .NET Language
Introduction to Ink-Enabled Applications
Speech Input with SAPI
3D Rendering with OpenGL and DirectX 9
C++ How to Program (5th Edition)
Classes, Objects, Member Functions and Data Members
Summary
Exception Specifications
Other Error-Handling Techniques
J.5. Linking
An Introduction to Design Patterns in C++ with Qt 4
const Member Functions
QActions, QToolbars, and QActionGroups
Models and Views
Pointer Arithmetic
public, protected, and private Derivation
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and the World Wide Web
The Ethics of Persuasive Technology
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Accessing the File System
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies