| |
| |
Introduction | |
| |
| |
| |
An Introduction to Server Farms | |
| |
| |
| |
Overview of Data Centers | |
| |
| |
Data Centers Defined | |
| |
| |
Application Architecture Models | |
| |
| |
Data Center Architecture | |
| |
| |
Data Center Services | |
| |
| |
Summary | |
| |
| |
| |
Server Architecture Overview | |
| |
| |
Network Attachment | |
| |
| |
Client and Server Packet Processing | |
| |
| |
TCP and Server Applications | |
| |
| |
UDP and Server Applications | |
| |
| |
Server Availability | |
| |
| |
Configuring a Web Server | |
| |
| |
Network Architecture Design Options | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
Application Architectures Overview | |
| |
| |
Taxonomy of Applications and Hosted Servers | |
| |
| |
Integration of Applications | |
| |
| |
Multitier Applications | |
| |
| |
Network Architecture Considerations | |
| |
| |
Multitier Design Case Study | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
Data Center Design Overview | |
| |
| |
Types of Server Farms and Data Centers | |
| |
| |
Data Center Topologies | |
| |
| |
Fully Redundant Layer 2 and Layer 3 Designs | |
| |
| |
Fully Redundant Layer 2 and Layer 3 Designs with Services | |
| |
| |
Summary | |
| |
| |
| |
Data Center Security Overview | |
| |
| |
The Need for a Secure Data Center | |
| |
| |
Vulnerabilities and Common Attacks | |
| |
| |
Network Security Infrastructure | |
| |
| |
Security Fundamentals | |
| |
| |
Data Center Security Framework | |
| |
| |
Summary | |
| |
| |
| |
Server Load-Balancing Overview | |
| |
| |
Load Balancing Defined | |
| |
| |
Key Concepts of Load Balancing | |
| |
| |
High Availability Considerations | |
| |
| |
Generic Load Balancer Architecture | |
| |
| |
Summary | |
| |
| |
| |
Server Farm Protocols | |
| |
| |
| |
IP, TCP, and UDP | |
| |
| |
Layers and Protocols | |
| |
| |
IP | |
| |
| |
TCP | |
| |
| |
UDP | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
HTTP and Related Concepts | |
| |
| |
Resources and Messages | |
| |
| |
HTTP Overview | |
| |
| |
HTTP General Header | |
| |
| |
Request Header | |
| |
| |
Response Header | |
| |
| |
Entity Header | |
| |
| |
Summary | |
| |
| |
| |
SSL and TLS | |
| |
| |
SSL Overview | |
| |
| |
SSL Operations | |
| |
| |
Performance Implications of SSL | |
| |
| |
Authentication and Digital Certificates | |
| |
| |
SSL Ciphersuites | |
| |
| |
Analyzing SSL Traces | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
DNS Essentials and Site-Selection Considerations | |
| |
| |
DNS Architecture | |
| |
| |
DNS Components | |
| |
| |
DNS Resolution Process | |
| |
| |
Redundant Name Servers | |
| |
| |
Transport Protocols | |
| |
| |
DNS Caching | |
| |
| |
Distribution of Multiple Records | |
| |
| |
DNS Server Placement | |
| |
| |
Site-Selection Considerations | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
Streaming Protocols Overview | |
| |
| |
Download-and-Play, HTTP Streaming, and Real-Time Streaming | |
| |
| |
UDP Versus TCP | |
| |
| |
Analog and Digital Video | |
| |
| |
Codecs | |
| |
| |
Packetization | |
| |
| |
Transport Formats | |
| |
| |
Control Protocols | |
| |
| |
Unicast, Multicast, and Stream Splitting | |
| |
| |
Streaming Products | |
| |
| |
Summary | |
| |
| |
| |
Infrastructure Protocols | |
| |
| |
| |
Layer 2 Protocol Essentials | |
| |
| |
IEEE 802 | |
| |
| |
Ethernet | |
| |
| |
Ethernet Switching | |
| |
| |
Layer 2 Protocols | |
| |
| |
VLANs and Trunks | |
| |
| |
EtherChannels | |
| |
| |
STP | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
Layer 3 Protocol Essentials | |
| |
| |
ARP Protocol and Tables | |
| |
| |
HSRP, VRRP, and GLBP | |
| |
| |
OSPF | |
| |
| |
EIGRP | |
| |
| |
NAT | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
IBM Data Center Technology | |
| |
| |
Mainframes | |
| |
| |
IBM Data Center Components | |
| |
| |
Mainframe Attachment Options | |
| |
| |
IBM Networking | |
| |
| |
SNA over TCP/IP | |
| |
| |
Sysplex and Parallel Sysplex | |
| |
| |
IBM Data Centers Today | |
| |
| |
Summary | |
| |
| |
| |
Security and Server Load Balancing | |
| |
| |
| |
Security Protocols and Technologies | |
| |
| |
Cryptography | |
| |
| |
U.S. Government and Cryptography | |
| |
| |
PKI | |
| |
| |
Transport Security | |
| |
| |
Authentication Protocols and Technologies | |
| |
| |
Network Management Security | |
| |
| |
Summary | |
| |
| |
| |
Load-Balancing Modes and Predictors | |
| |
| |
Modes of Operation | |
| |
| |
Load-Balancing Algorithms | |
| |
| |
Summary | |
| |
| |
| |
Server Health Management | |
| |
| |
Load-Balancing Terminology | |
| |
| |
Server Management | |
| |
| |
Server Management Interface | |
| |
| |
Server Failure Detection | |
| |
| |
Probe Types | |
| |
| |
Out-of-Band Probes | |
| |
| |
Case Study: Server Health for Virtual Hosting | |
| |
| |
Case Study: HTTP and HTTPS | |
| |
| |
Summary | |
| |
| |
| |
Session Tracking and Cookies | |
| |
| |
What a Session Is and Why It Matters | |
| |
| |
Cookies | |
| |
| |
How Servers Track User Sessions | |
| |
| |
Session Persistence for Server Clusters | |
| |
| |
Summary | |
| |
| |
For Further Reading | |
| |
| |
| |
Persistence Mechanisms on Load Balancers | |
| |
| |
The Concept of Session Persistence | |
| |
| |
Persistence Considerations for Clients Using Proxy Servers | |
| |
| |
Persistence Using Session Sharing Servers | |
| |
| |
Session Persistence Mechanisms | |
| |
| |
Source IP Sticky | |
| |
| |
Cookie Sticky | |
| |
| |
URL Sticky | |
| |
| |
HTTP Redirection Sticky | |
| |
| |
SSL Sticky | |
| |
| |
Case Study | |
| |
| |
Summary | |
| |
| |
| |
Data Center Design | |
| |
| |
| |
Designing the Data Center Infrastructure | |
| |
| |
Topology Overview | |
| |
| |
Switching Paths | |
| |
| |
Using VLANs to Virtualize the Physical Data Center Infrastructure | |
| |
| |
Link Redundancy and Load Distribution | |
| |
| |
Spanning-Tree Considerations | |
| |
| |
Internal Redundancy Considerations | |
| |
| |
Layer 2 Data Center Design | |
| |
| |
Layer 3 Data Center Design | |
| |
| |
Summary | |
| |
| |
| |
Integrating Security into the Infrastructure | |
| |
| |
Defining Security Zones | |
| |
| |
Internet Edge | |
| |
| |
Campus Core | |
| |
| |
Intranet Server Farms | |
| |
| |
Server-Farm Design Alternatives | |
| |
| |
Management Network | |
| |
| |
Summary | |
| |
| |
| |
Performance Metrics of Data Center Devices | |
| |
| |
Traffic Patterns Overview | |
| |
| |
Performance Metrics Overview | |
| |
| |
Load Balancer and SSL Offloader Metrics | |
| |
| |
Testing Performance Metrics | |
| |
| |
Summary | |
| |
| |
| |
Appendixes | |
| |
| |
| |
Character Sets | |
| |
| |
| |
HTTP Header Fields | |
| |
| |
| |
Video Encoding Mechanisms | |
| |
| |
| |
Loopback Interface Configuration Procedures | |
| |
| |
| |
Configuring Servers to Insert Cookies | |
| |
| |
| |
Client-Side and Server-Side Programming | |
| |
| |
Index | |