| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
| |
Introduction: an Overview | |
| |
| |
| |
Why Distributed Applications? | |
| |
| |
| |
Current Business Considerations | |
| |
| |
| |
Managing the Application | |
| |
| |
| |
Tools of the Trade | |
| |
| |
Tool Selection | |
| |
| |
| |
Methodology | |
| |
| |
| |
Define the Problem | |
| |
| |
| |
Gather the Facts | |
| |
| |
| |
Assess the Data | |
| |
| |
| |
Make a Plan | |
| |
| |
| |
Implement the Plan | |
| |
| |
| |
Observe the Results | |
| |
| |
| |
Summary | |
| |
| |
| |
Basic Communications | |
| |
| |
| |
Terminology | |
| |
| |
Local Area Network (LAN) | |
| |
| |
Hub | |
| |
| |
Bridges and LAN Switches | |
| |
| |
Router | |
| |
| |
Wide Area Network (WAN) | |
| |
| |
The Server | |
| |
| |
Three-tier Architecture | |
| |
| |
| |
Network Classifications | |
| |
| |
LAN | |
| |
| |
WAN | |
| |
| |
Circuit-switched | |
| |
| |
Packet-switched | |
| |
| |
| |
Architectural Configurations | |
| |
| |
| |
Protocol Types | |
| |
| |
| |
Physical Layer | |
| |
| |
| |
Data Link | |
| |
| |
| |
Network | |
| |
| |
| |
Transport | |
| |
| |
| |
Session | |
| |
| |
| |
Presentation | |
| |
| |
| |
Protocol Functions | |
| |
| |
Communications Protocols | |
| |
| |
Routing Protocols | |
| |
| |
Routed Protocols | |
| |
| |
Auxiliary Protocols | |
| |
| |
| |
Dependencies | |
| |
| |
Address Resolution Protocol (ARP) | |
| |
| |
Windows Internet Service (WINS) | |
| |
| |
Internet Control Message Protocol (ICMP) | |
| |
| |
| |
Client Configuration | |
| |
| |
| |
Server Configuration | |
| |
| |
| |
Security and Authentication | |
| |
| |
| |
Summary | |
| |
| |
Distance Vector Protocols | |
| |
| |
Link State Protocols | |
| |
| |
| |
File and Print | |
| |
| |
| |
Overview | |
| |
| |
| |
Application Basics | |
| |
| |
| |
Application Operation | |
| |
| |
| |
Dependencies | |
| |
| |
| |
Summary | |
| |
| |
| |
Directory Services | |
| |
| |
| |
Overview | |
| |
| |
| |
Protocol Types | |
| |
| |
| |
Protocol Functions | |
| |
| |
SNMP | |
| |
| |
| |
Authentication Services | |
| |
| |
| |
Policy Management | |
| |
| |
| |
Policy Framework and Architecture | |
| |
| |
| |
Infrastructure Interaction | |
| |
| |
| |
Summary | |
| |
| |
| |
Security and Authentication | |
| |
| |
| |
Overview | |
| |
| |
| |
Policy | |
| |
| |
What Is to be Protected? | |
| |
| |
Technical Considerations | |
| |
| |
Trusted Networks | |
| |
| |
Untrusted Networks | |
| |
| |
Unknown Networks | |
| |
| |
| |
Gateway Functions | |
| |
| |
| |
User Authentication | |
| |
| |
| |
Host-to-Host Authentication | |
| |
| |
| |
Performance | |
| |
| |
| |
Ports and Sockets | |
| |
| |
| |
Summary | |
| |
| |
| |
Web Systems | |
| |
| |
| |
Overview | |
| |
| |
| |
Application Basics | |
| |
| |
| |
Protocols | |
| |
| |
Hypertext Transfer Protocol (HTTP) | |
| |
| |
File Transfer Protocol (FTP) | |
| |
| |
Internet Message Access Protocol (IMAP4) | |
| |
| |
Lightweight Directory Access Protocol (LDAP) | |
| |
| |
T.120 | |
| |
| |
H.323 | |
| |
| |
| |
Push and Pull Services | |
| |
| |
| |
Browsers | |
| |
| |
| |
Architecture | |
| |
| |
| |
Middleware | |
| |
| |
| |
Summary | |
| |
| |
| |
Messaging Systems | |
| |
| |
| |
Overview | |
| |
| |
| |
Protocol Types | |
| |
| |
Server-side Protocols | |
| |
| |
Client-side Protocols | |
| |
| |
| |
Protocol Functions | |
| |
| |
Message Delivery | |
| |
| |
| |
Architecture | |
| |
| |
| |
Client-to-Client Communications | |
| |
| |
| |
Client-to-Server Communications | |
| |
| |
| |
Server-to-Server Communication | |
| |
| |
| |
Fax Servers | |
| |
| |
| |
Summary | |
| |
| |
| |
Electronic Commerce Systems | |
| |
| |
| |
Overview | |
| |
| |
| |
Architecture | |
| |
| |
| |
Protocol Types | |
| |
| |
| |
Protocol Functions | |
| |
| |
| |
Security and Authentication | |
| |
| |
| |
Client Communications | |
| |
| |
| |
Server Communications | |
| |
| |
| |
Dependencies | |
| |
| |
| |
Summary | |
| |
| |
| |
Mainframe Connectivity | |
| |
| |
| |
Overview | |
| |
| |
| |
Legacy Connections | |
| |
| |
| |
Terminal Emulation | |
| |
| |
| |
Gateway Functions | |
| |
| |
| |
System Architecture | |
| |
| |
| |
Protocol Types | |
| |
| |
| |
Protocol Functions | |
| |
| |
Transaction Service Layer | |
| |
| |
| |
Dependencies | |
| |
| |
| |
Summary | |
| |
| |
| |
Case Studies | |
| |
| |
| |
Overview | |
| |
| |
| |
Case Study One--Connectivity issues | |
| |
| |
Summary | |
| |
| |
| |
Case Study Two--Failure to Connect to Application | |
| |
| |
Make Observations | |
| |
| |
Summary | |
| |
| |
| |
Case Study Three--Application Slowdown (partial elements) | |
| |
| |
Gather the Facts | |
| |
| |
Fact Gathering, Part Two | |
| |
| |
Summary | |
| |
| |
| |
Case Study Four--Application Slowdown (Whole Application) | |
| |
| |
Define the Problem | |
| |
| |
Gather the Information | |
| |
| |
Assess the Data | |
| |
| |
Make the Plan | |
| |
| |
Implement the Plan | |
| |
| |
Is the Problem Solved? | |
| |
| |
Summary | |
| |
| |
| |
Case Study Five--Intermittent Application Performance Degradation | |
| |
| |
Gather the Facts | |
| |
| |
Making Changes | |
| |
| |
Digging Deeper | |
| |
| |
Summary | |
| |
| |
| |
Glossary | |
| |
| |
| |
Guide to RFCs | |
| |
| |
| |
Guide to Standards | |
| |
| |
Standards Organizations | |
| |
| |
| |
Guide to Sockets and Ports (RFC 1700) | |
| |
| |
Microsoft Environment | |
| |
| |
Ports Used by WLBS and Convoy for Cluster Control | |
| |
| |
Ports Used by Microsoft Exchange Server Version 5.0 | |
| |
| |
| |
Guide to Organizationally Unique Identifiers (OUIs) | |
| |
| |
What standards are involved with OUI? | |
| |
| |
Index | |