Foreword | p. xix |
Acknowledgments | p. xxi |
Introduction | p. xxiii |
Introduction to Content Networking | p. 1 |
Objectives | p. 2 |
User Expectations | p. 2 |
Performance | p. 3 |
Availability | p. 3 |
Security | p. 3 |
Anonymity | p. 4 |
Personalization/Relevancy | p. 4 |
Privacy | p. 4 |
Content Provider Expectations | p. 5 |
Security | p. 5 |
Control | p. 5 |
Manageability | p. 6 |
Scalability | p. 6 |
Flexibility | p. 6 |
Diversity (Users and Devices) | p. 6 |
Customer Demographics/Data | p. 6 |
Differentiation | p. 7 |
Profitability | p. 7 |
Conflicting Expectations | p. 7 |
Structure of the Internet | p. 8 |
Problems of IP | p. 8 |
What Is Content Networking? | p. 9 |
Living on the Edge | p. 9 |
Content Edge Networking (CEN)--The Data Center | p. 10 |
CEN Evolution | p. 10 |
Subscriber Edge Networking--Networking on the Edge | p. 24 |
SEN IP Services | p. 24 |
CDNs and "Overlay" Networks | p. 25 |
Who Needs a Content Networking Solution? | p. 32 |
Enterprises | p. 32 |
Service Providers | p. 33 |
The Future of Content Networking | p. 34 |
Review Questions | p. 34 |
End Notes | p. 36 |
Ethernet | p. 37 |
Objectives | p. 38 |
DIX and IEEE 802.3 | p. 38 |
Frame Formats | p. 39 |
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) | p. 42 |
Collision Domains and Broadcast Domains | p. 43 |
Duplexing | p. 45 |
Flow Control | p. 46 |
Link Integrity Test and the Ethernet Heartbeat | p. 46 |
Fast Ethernet | p. 47 |
Auto-Negotiation | p. 48 |
Gigabit Ethernet | p. 50 |
Deploying Ethernet | p. 51 |
Summary | p. 56 |
Review Questions | p. 56 |
Advanced Ethernet Topics | p. 57 |
Objectives | p. 58 |
Spanning-Tree Protocol | p. 59 |
Spanning-Tree Protocol Port States | p. 59 |
Election of the Root Switch | p. 60 |
Bridge Protocol Data Units | p. 60 |
How the STP Algorithm Works | p. 62 |
Implications of STP in a LAN Environment | p. 63 |
Virtual Local Area Networks--VLANs | p. 64 |
Benefits of VLANs | p. 64 |
VLAN Trunk Protocol | p. 67 |
How VTP Works | p. 68 |
VLAN Trunking | p. 68 |
Inter-Switch Link (ISL) Encapsulation | p. 69 |
IEEE 802.1q TRUNKING | p. 71 |
The Role of VLANs in Modern Data Centers | p. 72 |
EtherChannel | p. 72 |
EtherChannel and VLANs | p. 74 |
Summary | p. 74 |
Review Questions | p. 74 |
HTTP and the World Wide Web | p. 77 |
Objectives | p. 78 |
History | p. 78 |
How It Works | p. 79 |
HTTP/0.9 | p. 80 |
HTTP/1.0 | p. 80 |
HTTP/1.1 | p. 81 |
Request Methods | p. 85 |
Response Status Code Definitions | p. 86 |
Message Headers | p. 89 |
HTTP Security | p. 95 |
HTTP Protocol Analysis | p. 98 |
Summary | p. 109 |
Review Questions | p. 109 |
Suggested Reading | p. 109 |
SSL | p. 111 |
Objectives | p. 112 |
Crypto 101 | p. 113 |
Secret Key Cryptography | p. 113 |
Key Size | p. 114 |
Public Key Cryptography | p. 115 |
Putting It Together: Hybrid Encryption Schemes | p. 115 |
Certificates | p. 116 |
Configuring and Installing Your Own SSL Server | p. 120 |
Unpacking the Packages | p. 121 |
Compiling OpenSSL | p. 121 |
Configuring and Compiling Apache with mod_ssl | p. 122 |
Creating the Certificate and Installing Apache | p. 122 |
Using Apache with SSL Support | p. 125 |
Generating New CSRs | p. 125 |
SSL: The Protocol | p. 126 |
SSL Messages | p. 127 |
Accelerating SSL | p. 136 |
How SSL Acceleration Works | p. 136 |
Summary | p. 141 |
Review Questions | p. 142 |
DNS and Content Networking | p. 145 |
Objectives | p. 146 |
History | p. 146 |
How DNS Works | p. 148 |
General Operational Overview | p. 148 |
Detailed Operational Overview | p. 149 |
Basic DNS Configuration | p. 154 |
Basic DNS Auditing | p. 159 |
Advanced DNS Configuration | p. 163 |
RTT Measurements | p. 163 |
Wildcard DNS | p. 167 |
RR Sets | p. 168 |
Subdomain Delegation | p. 170 |
DNS Thrashing | p. 171 |
Registering Domain Names | p. 172 |
General Process | p. 173 |
Contacts | p. 174 |
WHOIS Databases | p. 175 |
Problems with DNS | p. 177 |
The Future | p. 178 |
Summary | p. 179 |
Review Questions | p. 179 |
Internet Structure and Function | p. 183 |
Objectives | p. 184 |
Global Structure | p. 185 |
Hierarchical Organization | p. 185 |
Internet Routing with BGP | p. 198 |
Summary | p. 206 |
Review Questions | p. 207 |
Web Servers, Cookies, and Web Caches | p. 209 |
Objectives | p. 210 |
The Process of Fetching Content | p. 210 |
Requesting Static Content | p. 211 |
Requesting Dynamic Content | p. 213 |
Caching | p. 214 |
The Basics | p. 214 |
Transparent vs. Nontransparent Caching | p. 217 |
Forward vs. Reverse Proxy Caching | p. 218 |
Edge Caching and Content Delivery Networks | p. 221 |
Cache Interception | p. 223 |
Caching Products | p. 228 |
Adding State: HTTP Cookies | p. 231 |
Understanding "State" | p. 231 |
Cookies | p. 232 |
Summary | p. 233 |
Review Questions | p. 233 |
Server Load Balancing | p. 235 |
Objectives | p. 236 |
Scaling the Internet | p. 236 |
Single Server Approach | p. 236 |
Server Farm Approach | p. 237 |
What Is Server Load Balancing? | p. 237 |
Virtual Server Group and Virtual IP | p. 238 |
Technical Benefits | p. 238 |
Business Benefits | p. 240 |
Applications | p. 241 |
Server Load Balancing Operations | p. 242 |
Solutions | p. 242 |
The Cisco Solutions--Local Director | p. 243 |
The Cisco ArrowPoint Load Balancers | p. 247 |
The Nortel Web Switch | p. 248 |
Summary | p. 263 |
Review Questions | p. 264 |
VRRP and HSRP | p. 267 |
Objectives | p. 268 |
Virtual Router Redundancy Protocol | p. 269 |
Operations | p. 271 |
Protocol | p. 272 |
Case studies | p. 274 |
VRRPe | p. 279 |
HSRP | p. 279 |
Protocol | p. 280 |
Case Studies | p. 283 |
Summary | p. 286 |
Review Questions | p. 287 |
Global Server Load Balancing | p. 289 |
Objectives | p. 290 |
Solutions | p. 291 |
Simple Failover | p. 291 |
High Availability | p. 292 |
Geographic Load Balancing | p. 292 |
How It Works | p. 293 |
Dynamic Site Selection | p. 293 |
Backup Servers | p. 294 |
DNS Based | p. 294 |
Routing Protocol Based | p. 296 |
Packet Loss--An Aside | p. 298 |
Caveats | p. 300 |
Globalization Techniques | p. 301 |
Passive Techniques | p. 302 |
Footrace Techniques | p. 307 |
Active Techniques | p. 309 |
Case Studies | p. 312 |
Directory Services for J. Magellan and Sons | p. 312 |
Your News Corp | p. 314 |
Products | p. 316 |
Summary | p. 318 |
Review Questions | p. 319 |
Content Networking and Security | p. 321 |
Objectives | p. 322 |
Security | p. 322 |
Mitigating Denial of Service | p. 323 |
Filters and Firewalls | p. 326 |
Filters and Filtering | p. 331 |
Firewalls and Fire Walling | p. 336 |
High-Availability Content Security Solutions | p. 340 |
State Updates and Clustering | p. 347 |
Firewall Load Balancing | p. 349 |
Firewall Load Balancing Basics | p. 351 |
Summary | p. 358 |
Review Questions | p. 360 |
Application Redirection | p. 361 |
Objectives | p. 362 |
Web Caching | p. 363 |
Web Caching Applications | p. 364 |
Web Cache Redirection (WCR) | p. 365 |
WCCP and WCR | p. 371 |
DNS Redirection | p. 372 |
Operation and Benefits | p. 373 |
DNS Server Health Monitoring | p. 379 |
Overflow and Backup DNS | p. 380 |
High Availability DNS | p. 381 |
SSL Offloading | p. 384 |
Caveats to SSL Redirection / Offload | p. 386 |
Other Applications | p. 388 |
Combinations | p. 388 |
Summary | p. 388 |
Review Questions | p. 389 |
Bandwidth Management | p. 391 |
Objectives | p. 392 |
SLA and the Business Case for Managing Bandwidth | p. 393 |
Before the Bandwidth Management Era | p. 393 |
PointCast Floods Networks | p. 393 |
Push Technology Solutions | p. 394 |
Practical Applications of Bandwidth Management in E-Commerce | p. 395 |
ISP Environment | p. 395 |
ASP Environment | p. 395 |
Enabling Service Providers to Aggregate Profitably | p. 395 |
Increasing Security and Preventing DoS Attacks | p. 396 |
Solutions | p. 396 |
Dedicated Bandwidth Management Appliances | p. 396 |
Integration with Routers and LAN Switches | p. 400 |
Integration with Web Switches | p. 402 |
Integration with Firewall | p. 404 |
How Bandwidth Management Works--Case Study of the Nortel Solution | p. 406 |
Overview | p. 406 |
Traffic Classification and Control | p. 406 |
Bandwidth Policies | p. 407 |
Classification Policies | p. 407 |
Restricting Bandwidth Usage | p. 409 |
Bandwidth Statistics and History | p. 409 |
Packet Coloring | p. 410 |
Configuring Bandwidth Management | p. 411 |
Standards | p. 414 |
IETF Diff-Serv Working Group | p. 414 |
Summary | p. 417 |
Pros and Cons | p. 417 |
Standardization Roadmap | p. 418 |
Future Applications | p. 418 |
Review Questions | p. 418 |
Index | p. 421 |
Table of Contents provided by Syndetics. All Rights Reserved. |