Optimizing Network Performance with Content Switching Server, Firewall and Cache Load Balancing: Server, Firewall, and Cache Load Balancing
by Syme, Matthew; Goldie, PhilipRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
| Preface | p. xvii |
| Introduction to Content Switching | p. 1 |
| The Evolution of Layer 2 and Layer 3 Networks | p. 1 |
| The Bigger, Faster Internet | p. 2 |
| The Drive for Richer Content | p. 3 |
| Solving the Problems with Content Switching | p. 4 |
| The Pioneers | p. 7 |
| Current Market Landscape | p. 10 |
| Summary | p. 10 |
| Understanding Layer 2, 3, and 4 Protocols | p. 13 |
| The OSI Seven Layer Model--What Is a Layer? | p. 13 |
| The Application Layer (Layer 7) | p. 14 |
| The Presentation Layer (Layer 6) | p. 14 |
| The Session Layer (Layer 5) | p. 15 |
| The Transport Layer (Layer 4) | p. 15 |
| The Network Layer (Layer 3) | p. 15 |
| The Data Link Layer (Layer 2) | p. 16 |
| The Physical Layer (Layer 1) | p. 16 |
| Putting All the Layers Together | p. 16 |
| Switching at Different Layers | p. 19 |
| Layer 2 Switching | p. 20 |
| Layer 3 Switching and Routing | p. 20 |
| Understanding Layer 4 Protocols | p. 21 |
| Transport Control Protocol (TCP) | p. 23 |
| The Lifecycle of a TCP Session | p. 24 |
| User Datagram Protocol (UDP) | p. 29 |
| A Simple UDP Data Flow | p. 30 |
| Virtual Router Redundancy Protocol (VRRP) | p. 31 |
| Layer 2 and 3 Redundancy | p. 32 |
| The Components of VRRP | p. 33 |
| VRRP Addressing | p. 34 |
| VRRP Operation | p. 35 |
| Summary | p. 36 |
| Understanding Application Layer Protocols | p. 37 |
| HyperText Transfer Protocol (HTTP) | p. 37 |
| Basic HTTP Page Retrieval | p. 38 |
| HTTP Methods | p. 39 |
| The HTTP URL | p. 40 |
| Persistent Connections in HTTP | p. 40 |
| Other HTTP Headers | p. 41 |
| Cookies--The HTTP State Management Mechanism | p. 44 |
| HTTP--Further Reading | p. 47 |
| File Transfer Protocol (FTP) | p. 47 |
| FTP Basics | p. 47 |
| Active Mode FTP | p. 48 |
| Passive Mode FTP | p. 48 |
| FTP--Further Reading | p. 50 |
| Real Time Streaming Protocol (RTSP) | p. 51 |
| The Components of RTSP Delivery | p. 51 |
| RTSP Operation | p. 52 |
| Other Options for Data Delivery | p. 55 |
| RTSP and RTP--Further Reading | p. 58 |
| Secure Sockets Layer (SSL) | p. 58 |
| The Need for Application Security | p. 58 |
| Fitting SSL into the Seven Layer Model | p. 60 |
| Encryption and Cryptography | p. 60 |
| SSL in Action | p. 68 |
| SSL Summary | p. 70 |
| Summary | p. 70 |
| The Concepts of Content Switching | p. 71 |
| Virtual Services and Application Redirection | p. 71 |
| Virtual Services and Virtual IP Addresses | p. 72 |
| Application Redirection | p. 73 |
| Resources and Real Servers | p. 74 |
| Frames, Packets, and Sessions | p. 74 |
| Deep Packet Inspection | p. 76 |
| Summary | p. 76 |
| Basic Server Load Balancing | p. 77 |
| Why Load Balance Servers? | p. 77 |
| The Alternatives to Server Load Balancing | p. 78 |
| Topologies of Server Load Balancing | p. 79 |
| Layer 2 (Bridging) Server Load Balancing | p. 79 |
| Layer 3 (Routing) Server Load Balancing | p. 82 |
| Single Arm Server Load Balancing | p. 85 |
| Implementing High Availability for SLB | p. 88 |
| Layer 4 Load Balancing Metrics | p. 96 |
| Least Connections | p. 97 |
| Round Robin | p. 97 |
| IP Address Hashing | p. 98 |
| Response Time and Server Agent | p. 100 |
| Bandwidth | p. 100 |
| Weighting and Maximum Connections | p. 101 |
| Server Health Checking | p. 101 |
| Link-Based Health Checks | p. 102 |
| ARP Health Checks | p. 102 |
| ICMP Health Checks | p. 103 |
| TCP Health Checks | p. 103 |
| Application Health Checks | p. 104 |
| Health Check Scripting | p. 104 |
| Summary | p. 104 |
| Case Study: Layer 4 Server Load Balancing | p. 105 |
| Content-Aware Server Load Balancing | p. 109 |
| What is Layer 7 Server Load Balancing? | p. 109 |
| Why Use Layer 7 Server Load Balancing? | p. 110 |
| All Servers Are Not Built Equally | p. 110 |
| All Content Must Be Available Everywhere | p. 111 |
| You Get What You Pay For | p. 111 |
| Future Proofing | p. 111 |
| Dealing with Layer 7 Traffic | p. 112 |
| Immediate vs. Delayed Binding of Sessions | p. 113 |
| Using Delayed Binding as a Security Mechanism | p. 115 |
| Layer 7 Parsing and the Connection: Keep-Alive Header | p. 116 |
| HTTP URL Parsing and Load Balancing | p. 118 |
| Examples of URL Parsing | p. 119 |
| HTTP Header Load Balancing | p. 119 |
| Applications of HTTP Header Load Balancing | p. 121 |
| HTTP Cookie Load Balancing | p. 127 |
| Applications of Cookie Load Balancing | p. 128 |
| Load Balancing FTP | p. 132 |
| Load Balancing FTP in Active Mode | p. 132 |
| Load Balancing FTP in Passive Mode | p. 135 |
| Load Balancing DNS at Layer 7 | p. 138 |
| Applications of Layer 7 DNS Load Balancing | p. 139 |
| Load Balancing RTSP Streaming Media | p. 141 |
| Load Balancing RTSP at Layer 4 Only | p. 142 |
| Applications of Layer 7 RTSP Load Balancing | p. 144 |
| Summary | p. 147 |
| Case Study: Content-Aware Server Load Balancing | p. 148 |
| Persistence, Security, and the Internet | p. 151 |
| Internet Service Providers--Proxying and Traffic Volumes | p. 152 |
| Proxies | p. 153 |
| IP Address Hashing | p. 156 |
| Cookie-Based Persistence | p. 157 |
| Cookies | p. 157 |
| Cookie Types | p. 159 |
| Cookies in Action | p. 160 |
| SSL | p. 162 |
| SSL Session ID Persistence | p. 162 |
| Fixing the Model with SSL Offload | p. 163 |
| Summary | p. 170 |
| Case Study: Persistence | p. 171 |
| Deploying Persistence | p. 171 |
| Application Redirection | p. 175 |
| The Requirement for Application Redirection | p. 176 |
| VIP-Based SLB vs. Application Redirection | p. 177 |
| Web Cache Redirection (WCR) | p. 178 |
| How Caching Works | p. 179 |
| Cache Types | p. 184 |
| WCR | p. 191 |
| IP Spoofing | p. 192 |
| Layer 4 Web Cache Redirection | p. 192 |
| Layer 7 WCR | p. 198 |
| Vendor Issues | p. 203 |
| Security Redirection | p. 205 |
| Router/Link Load Balancing | p. 205 |
| Summary | p. 209 |
| Case Study: Application Redirection | p. 210 |
| Deploying Application Redirection | p. 210 |
| Firewall and VPN Load Balancing | p. 213 |
| Why Load Balance Firewalls and VPN Switches? | p. 214 |
| Firewall Overview | p. 215 |
| Stateful Firewall | p. 215 |
| Firewall Synchronization | p. 216 |
| Layer 2 Firewalls | p. 217 |
| Deploying Firewall Load Balancing | p. 218 |
| Using VRRP | p. 218 |
| Using Software-Based Solutions | p. 219 |
| Using Content Switches | p. 219 |
| Creating the Paths | p. 220 |
| Health Checking Firewalls | p. 222 |
| Traffic Flow through a Firewall Load Balanced Sandwich | p. 222 |
| NATing Firewalls | p. 225 |
| Policy-Based Firewall Load Balancing | p. 228 |
| Topology Examples | p. 229 |
| Layer 2 Firewalls | p. 232 |
| Layering Firewalls for Greater Security | p. 233 |
| Using the Content Switch for Additional Protection | p. 235 |
| Adding Demilitarized Zones (DMZs) | p. 236 |
| VPN and MAC Persistence | p. 238 |
| VPN in Action | p. 238 |
| Load Balancing VPNs | p. 239 |
| Failure Scenarios | p. 241 |
| Summary | p. 243 |
| Case Study: Firewall and VPN Load Balancing | p. 244 |
| Deploying Firewall and VPN Load Balancing | p. 244 |
| The Architecture of a Content Switch | p. 247 |
| Typical Layer 2 and Layer 3 Architecture Considerations | p. 247 |
| Why Content Switching is Different | p. 248 |
| Packets vs. Sessions | p. 249 |
| Breaking the Rules | p. 249 |
| What Makes a Good Content Switch? | p. 250 |
| Session Setup vs. Simultaneous Sessions | p. 250 |
| Layer 4-7 Handling | p. 252 |
| Different Approaches | p. 253 |
| PC Architectures | p. 253 |
| ASIC-Based Architectures | p. 255 |
| Where To Next? | p. 256 |
| Associated Hardware | p. 256 |
| Summary | p. 257 |
| Index | p. 259 |
| Table of Contents provided by Ingram. All Rights Reserved. |
Excerpts
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.