Optimizing Network Performance with Content Switching Server, Firewall and Cache Load Balancing: Server, Firewall, and Cache Load Balancing

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2003-07-02
Publisher(s): Prentice Hall
List Price: $52.49

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Enrich the user experience while keeping control of your networkNetworking professionals: At last, comprehensive coverage of content switching technology is in your hands! Optimizing Network Performance with Content Switching: Server, Firewall, and Cache Load Balancing, by topic experts Matthew Syme and Philip Goldie, provides sharp insights into this wide-ranging, rapidly changing technology. You'll learn the concepts, the background, and the architectures of content switching, as well as how it works and where and why it should be deployed to maximize the performance of your networks and servers. Fueled by increasing bandwidth and ever-richer content, this technology is fast becoming a standard in enterprise and ISP networks. Inside you'll find: Full explanations of TCP/IP, HTTP, DNS, and other network fundamentals Vendor-independent coverage of the key content switching applications--server load balancing, Web cache redirection, application redirection, firewall load balancing, and more! Detailed diagrams that illustrate clearly the deployments and topologies for all applications and variations covered in the book A running fictional case study that translates theory into practice, with all applications demonstrated in example implementations Advanced topics including TCP/IP flows and sessions, delayed binding, URL parsing, cookie persistence, server health checking, and load balancing metrics The advanced topics in Optimizing Network Performance with Content Switching are tailored for engineers with layer 2 and layer 3 experience looking for a comprehensive explanation of the inner workings of content switching. This book is also ideal for managers, application developers, security administrators, sales people, and other professionals who require a firm understanding of the basics of the technology.

Author Biography

Matthew Syme is a product specialist for the Alteon portfolio of Nortel Networks. After exposure to content switching in early 2000, he joined Alteon WebSystems. Matthew has over a decade of experience in networking, working on major infrastructure projects in South Africa, the United Kingdom, and Australia Philip Goldie is a Product Specialist for the Alteon portfolio within Nortel Networks. Previously he was a systems engineer for Alteon WebSystems, one of the pioneers of content switching. In nearly a decade working in the networking industry, Philip has been a customer, a reseller, and a vendor

Table of Contents

Prefacep. xvii
Introduction to Content Switchingp. 1
The Evolution of Layer 2 and Layer 3 Networksp. 1
The Bigger, Faster Internetp. 2
The Drive for Richer Contentp. 3
Solving the Problems with Content Switchingp. 4
The Pioneersp. 7
Current Market Landscapep. 10
Summaryp. 10
Understanding Layer 2, 3, and 4 Protocolsp. 13
The OSI Seven Layer Model--What Is a Layer?p. 13
The Application Layer (Layer 7)p. 14
The Presentation Layer (Layer 6)p. 14
The Session Layer (Layer 5)p. 15
The Transport Layer (Layer 4)p. 15
The Network Layer (Layer 3)p. 15
The Data Link Layer (Layer 2)p. 16
The Physical Layer (Layer 1)p. 16
Putting All the Layers Togetherp. 16
Switching at Different Layersp. 19
Layer 2 Switchingp. 20
Layer 3 Switching and Routingp. 20
Understanding Layer 4 Protocolsp. 21
Transport Control Protocol (TCP)p. 23
The Lifecycle of a TCP Sessionp. 24
User Datagram Protocol (UDP)p. 29
A Simple UDP Data Flowp. 30
Virtual Router Redundancy Protocol (VRRP)p. 31
Layer 2 and 3 Redundancyp. 32
The Components of VRRPp. 33
VRRP Addressingp. 34
VRRP Operationp. 35
Summaryp. 36
Understanding Application Layer Protocolsp. 37
HyperText Transfer Protocol (HTTP)p. 37
Basic HTTP Page Retrievalp. 38
HTTP Methodsp. 39
The HTTP URLp. 40
Persistent Connections in HTTPp. 40
Other HTTP Headersp. 41
Cookies--The HTTP State Management Mechanismp. 44
HTTP--Further Readingp. 47
File Transfer Protocol (FTP)p. 47
FTP Basicsp. 47
Active Mode FTPp. 48
Passive Mode FTPp. 48
FTP--Further Readingp. 50
Real Time Streaming Protocol (RTSP)p. 51
The Components of RTSP Deliveryp. 51
RTSP Operationp. 52
Other Options for Data Deliveryp. 55
RTSP and RTP--Further Readingp. 58
Secure Sockets Layer (SSL)p. 58
The Need for Application Securityp. 58
Fitting SSL into the Seven Layer Modelp. 60
Encryption and Cryptographyp. 60
SSL in Actionp. 68
SSL Summaryp. 70
Summaryp. 70
The Concepts of Content Switchingp. 71
Virtual Services and Application Redirectionp. 71
Virtual Services and Virtual IP Addressesp. 72
Application Redirectionp. 73
Resources and Real Serversp. 74
Frames, Packets, and Sessionsp. 74
Deep Packet Inspectionp. 76
Summaryp. 76
Basic Server Load Balancingp. 77
Why Load Balance Servers?p. 77
The Alternatives to Server Load Balancingp. 78
Topologies of Server Load Balancingp. 79
Layer 2 (Bridging) Server Load Balancingp. 79
Layer 3 (Routing) Server Load Balancingp. 82
Single Arm Server Load Balancingp. 85
Implementing High Availability for SLBp. 88
Layer 4 Load Balancing Metricsp. 96
Least Connectionsp. 97
Round Robinp. 97
IP Address Hashingp. 98
Response Time and Server Agentp. 100
Bandwidthp. 100
Weighting and Maximum Connectionsp. 101
Server Health Checkingp. 101
Link-Based Health Checksp. 102
ARP Health Checksp. 102
ICMP Health Checksp. 103
TCP Health Checksp. 103
Application Health Checksp. 104
Health Check Scriptingp. 104
Summaryp. 104
Case Study: Layer 4 Server Load Balancingp. 105
Content-Aware Server Load Balancingp. 109
What is Layer 7 Server Load Balancing?p. 109
Why Use Layer 7 Server Load Balancing?p. 110
All Servers Are Not Built Equallyp. 110
All Content Must Be Available Everywherep. 111
You Get What You Pay Forp. 111
Future Proofingp. 111
Dealing with Layer 7 Trafficp. 112
Immediate vs. Delayed Binding of Sessionsp. 113
Using Delayed Binding as a Security Mechanismp. 115
Layer 7 Parsing and the Connection: Keep-Alive Headerp. 116
HTTP URL Parsing and Load Balancingp. 118
Examples of URL Parsingp. 119
HTTP Header Load Balancingp. 119
Applications of HTTP Header Load Balancingp. 121
HTTP Cookie Load Balancingp. 127
Applications of Cookie Load Balancingp. 128
Load Balancing FTPp. 132
Load Balancing FTP in Active Modep. 132
Load Balancing FTP in Passive Modep. 135
Load Balancing DNS at Layer 7p. 138
Applications of Layer 7 DNS Load Balancingp. 139
Load Balancing RTSP Streaming Mediap. 141
Load Balancing RTSP at Layer 4 Onlyp. 142
Applications of Layer 7 RTSP Load Balancingp. 144
Summaryp. 147
Case Study: Content-Aware Server Load Balancingp. 148
Persistence, Security, and the Internetp. 151
Internet Service Providers--Proxying and Traffic Volumesp. 152
Proxiesp. 153
IP Address Hashingp. 156
Cookie-Based Persistencep. 157
Cookiesp. 157
Cookie Typesp. 159
Cookies in Actionp. 160
SSLp. 162
SSL Session ID Persistencep. 162
Fixing the Model with SSL Offloadp. 163
Summaryp. 170
Case Study: Persistencep. 171
Deploying Persistencep. 171
Application Redirectionp. 175
The Requirement for Application Redirectionp. 176
VIP-Based SLB vs. Application Redirectionp. 177
Web Cache Redirection (WCR)p. 178
How Caching Worksp. 179
Cache Typesp. 184
WCRp. 191
IP Spoofingp. 192
Layer 4 Web Cache Redirectionp. 192
Layer 7 WCRp. 198
Vendor Issuesp. 203
Security Redirectionp. 205
Router/Link Load Balancingp. 205
Summaryp. 209
Case Study: Application Redirectionp. 210
Deploying Application Redirectionp. 210
Firewall and VPN Load Balancingp. 213
Why Load Balance Firewalls and VPN Switches?p. 214
Firewall Overviewp. 215
Stateful Firewallp. 215
Firewall Synchronizationp. 216
Layer 2 Firewallsp. 217
Deploying Firewall Load Balancingp. 218
Using VRRPp. 218
Using Software-Based Solutionsp. 219
Using Content Switchesp. 219
Creating the Pathsp. 220
Health Checking Firewallsp. 222
Traffic Flow through a Firewall Load Balanced Sandwichp. 222
NATing Firewallsp. 225
Policy-Based Firewall Load Balancingp. 228
Topology Examplesp. 229
Layer 2 Firewallsp. 232
Layering Firewalls for Greater Securityp. 233
Using the Content Switch for Additional Protectionp. 235
Adding Demilitarized Zones (DMZs)p. 236
VPN and MAC Persistencep. 238
VPN in Actionp. 238
Load Balancing VPNsp. 239
Failure Scenariosp. 241
Summaryp. 243
Case Study: Firewall and VPN Load Balancingp. 244
Deploying Firewall and VPN Load Balancingp. 244
The Architecture of a Content Switchp. 247
Typical Layer 2 and Layer 3 Architecture Considerationsp. 247
Why Content Switching is Differentp. 248
Packets vs. Sessionsp. 249
Breaking the Rulesp. 249
What Makes a Good Content Switch?p. 250
Session Setup vs. Simultaneous Sessionsp. 250
Layer 4-7 Handlingp. 252
Different Approachesp. 253
PC Architecturesp. 253
ASIC-Based Architecturesp. 255
Where To Next?p. 256
Associated Hardwarep. 256
Summaryp. 257
Indexp. 259
Table of Contents provided by Ingram. All Rights Reserved.

Excerpts

PrefaceThere are not many books written about content switching and all the associated applications that make up this exciting technology. The reason for this we believe is twofold. First, content networking is a huge discipline with many different areas ranging from switching to caching and content routing, and this can often be seen as confusing. Second, there is a perceived shortage of skills in the marketplace.While content networking does cover many areas, they are all still inextricably linked with the existing technologies of today. They might have dedicated hardware, more feature-rich software, and allow for unconventional configurations, but ultimately they come back to existing technology with which we are all familiar.On the skills and understanding front there is no shortage or lack of knowledge. Content networking is merely an extension to those existing skills we have developed. Taking the time to dig deeper into the workings of a content switch and understanding how the applications work provides the foundation on which we can build our knowledge. Using our existing knowledge, however, is key to content networking.This book does not try to explain every aspect associated with content networking as a whole, but rather it covers what is called content switching and discusses the associated applications. The Audience and Purpose of This BookThe purpose of this book is to eliminate the confusion and conflicting views about this expanding topic and ensure that the fundamental theory and technologies are presented in a clear and concise manner. This is done in a two-tier approach.Managers, sales personnel, and executive-level individuals who require an overall understanding of this new breed of networking will be able to get an introductory overview of the topics involved. This will provide them with insight into the benefits and pitfalls of each application; why the need for such things as Secure Sockets Layer (SSL) offload, firewall load balancing, Web cache redirection, and so forth is a definite requirement for technology scaling; and the ability to understand the concepts of a technology that is continually changing. In short, this book will provide the individual with the basics of content switching, allowing them to make informed decisions in their day-to-day tasks and allow the sales and marketing personnel the ability to better position and sell these products.For the engineering force, this book will provide a comprehensive explanation of the inner workings of content switching, allowing them to build on their Layer 2 and Layer 3 skills. A good understanding of Layer 2 and Layer 3 functionality will ensure that the individual benefits from the advanced topics in this book. These include TCP/IP flows and sessions, delayed binding, URL/URI parsing, cookie persistence, server health checking, and load-balancing metrics, among others. Any engineers exposed to these technologies will find that the material allows them to fully understand the core concepts and functionality behind the applications discussed, giving them a better understanding of what is happening "under the hood." Case StudiesAs we progress through this book we will discuss fictitious case studies that revolve around a company called Foocorp, Inc. Foocorp, Inc. is a typical large company. They have thousands of employees, located in the head office and also in remote branches. The employees need access to internal applications and systems. Foocorp has also extended its network to include access from its partners and customers over an extranet. Foocorp also has an online presence for e-commerce.We will explain the benefits, the design, and the issues faced by Foocorp Inc.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.