Flylib.com
Web Caching
Web Caching
ISBN: 156592536X
EAN: N/A
Year: 2001
Pages: 160
BUY ON AMAZON
Starting Page
Table of Content
Front Matter
Preface
Audience
What You Will and Won t Find Here
Caching Resources
Conventions Used in This Book
How To Contact Us
Acknowledgments
Chapter 1. Introduction
1.1 Web Architecture
1.2 Web Transport Protocols
1.3 Why Cache the Web?
1.4 Why Not Cache the Web?
1.5 Types of Web Caches
1.6 Caching Proxy Features
1.7 Meshes, Clusters, and Hierarchies
1.8 Products
Chapter 2. How Web Caching Works
2.1 HTTP Requests
2.2 Is It Cachable?
2.3 Hits, Misses, and Freshness
2.4 Hit Ratios
2.5 Validation
2.6 Forcing a Cache to Refresh
2.7 Cache Replacement
Chapter 3. Politics of Web Caching
3.1 Privacy
3.2 Request Blocking
3.3 Copyright
3.4 Offensive Content
3.5 Dynamic Web Pages
3.6 Content Integrity
3.7 Cache Busting and Server Busting
3.8 Advertising
3.9 Trust
3.10 Effects of Proxies
Chapter 4. Configuring Cache Clients
4.1 Proxy Addresses
4.2 Manual Proxy Configuration
4.3 Proxy Auto-Configuration Script
4.4 Web Proxy Auto-Discovery
4.5 Other Configuration Options
4.6 The Bottom Line
Chapter 5. Interception Proxying and Caching
5.1 Overview
5.2 The IP Layer: Routing
5.3 The TCP Layer: Ports and Delivery
5.4 The Application Layer: HTTP
5.5 Debugging Interception
5.6 Issues
5.7 To Intercept or Not To Intercept
Chapter 6. Configuring Servers to Work with Caches
6.1 Important HTTP Headers
6.2 Being Cache-Friendly
6.3 Being Cache-Unfriendly
6.4 Other Issues for Content Providers
Chapter 7. Cache Hierarchies
7.1 How Hierarchies Work
7.2 Why Join a Hierarchy?
7.3 Why Not Join a Hierarchy?
7.4 Optimizing Hierarchies
Chapter 8. Intercache Protocols
8.1 ICP
8.2 CARP
8.3 HTCP
8.4 Cache Digests
8.5 Which Protocol to Use
Chapter 9. Cache Clusters
9.1 The Hot Spare
9.2 Throughput and Load Sharing
9.3 Bandwidth
Chapter 10. Design Considerations for Caching Services
10.1 Appliance or Software Solution
10.2 Disk Space
10.3 Memory
10.4 Network Interfaces
10.5 Operating Systems
10.6 High Availability
10.7 Intercepting Traffic
10.8 Load Sharing
10.9 Location
10.10 Using a Hierarchy
Chapter 11. Monitoring the Health of Your Caches
11.1 What to Monitor?
11.2 Monitoring Tools
Chapter 12. Benchmarking Proxy Caches
12.1 Metrics
12.2 Performance Bottlenecks
12.3 Benchmarking Tools
12.4 Benchmarking Gotchas
12.5 How to Benchmark a Proxy Cache
12.6 Sample Benchmark Results
Appendix A. Analysis of Production Cache Trace Data
A.1 Reply and Object Sizes
A.2 Content Types
A.3 HTTP Headers
A.4 Protocols
A.5 Port Numbers
A.6 Popularity
A.7 Cachability
A.8 Service Times
A.9 Hit Ratios
A.10 Object Life Cycle
A.11 Request Methods
A.12 Reply Status Code
Appendix B. Internet Cache Protocol
B.1 ICPv2 Message Format
B.2 Opcodes
B.3 Option Flags
B.4 Experimental Features
Appendix C. Cache Array Routing Protocol
C.1 Membership Table
C.2 Routing Function
C.3 Examples
Appendix D. Hypertext Caching Protocol
D.1 Message Format and Magic Constants
D.2 HTCP Data Types
D.3 HTCP Opcodes
Appendix E. Cache Digests
E.1 The Cache Digest Implementation
E.2 Message Format
E.3 An Example
Appendix F. HTTP Status Codes
F.1 1xx Intermediate Status
F.2 2xx Successful Response
F.3 3xx Redirects
F.4 4xx Request Errors
F.5 5xx Server Errors
Appendix G. U.S.C. 17 Sec. 512. Limitations on Liability Relating to Material Online
Appendix H. List of Acronyms
Appendix I. Bibliography
I.1 Books and Articles
I.2 Request For Comments
Colophon
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Web Caching
ISBN: 156592536X
EAN: N/A
Year: 2001
Pages: 160
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Determining Assessment Scope
Protocols, Standards, and Applications
Summary
Web Application Vulnerabilities
Appendix A. Using the ExamGear Special Edition Software
Snort Cookbook
Optimizing Logging
Reading Unified Logged Data
Prioritizing Alerts
Securing ACID
Snort as Evidence in the U.K.
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Tcpdump
IDS and IPS Architecture
Data Correlation
Security Business Issues
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 230 Services
Article 332 Mineral-Insulated, Metal-Sheathed Cable Type MI
Article 366 Auxiliary Gutters
Article 440: Air Conditioning and Refrigerating Equipment
Notes for Tables 11(A) and 11(B)
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Constants, Variables, and Arrays
Processing Collections of Data
Handling Script Errors
Combining Different Scripting Languages
Understanding Digital Signal Processing (2nd Edition)
FFT SOFTWARE PROGRAMS
A FEW THOUGHTS ON NEGATIVE FREQUENCY
APPROXIMATE ENVELOPE DETECTION
A QUADRATURE OSCILLATOR
REFERENCES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies