| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
Introduction to Content Networking | |
| |
| |
Objectives | |
| |
| |
User Expectations | |
| |
| |
Performance | |
| |
| |
Availability | |
| |
| |
Security | |
| |
| |
Anonymity | |
| |
| |
Personalization/Relevancy | |
| |
| |
Privacy | |
| |
| |
Content Provider Expectations | |
| |
| |
Security | |
| |
| |
Control | |
| |
| |
Manageability | |
| |
| |
Scalability | |
| |
| |
Flexibility | |
| |
| |
Diversity (Users and Devices) | |
| |
| |
Customer Demographics/Data | |
| |
| |
Differentiation | |
| |
| |
Profitability | |
| |
| |
Conflicting Expectations | |
| |
| |
Structure of the Internet | |
| |
| |
Problems of IP | |
| |
| |
What Is Content Networking? | |
| |
| |
Living on the Edge | |
| |
| |
Content Edge Networking (CEN)--The Data Center | |
| |
| |
CEN Evolution | |
| |
| |
Subscriber Edge Networking--Networking on the Edge | |
| |
| |
SEN IP Services | |
| |
| |
CDNs and "Overlay" Networks | |
| |
| |
Who Needs a Content Networking Solution? | |
| |
| |
Enterprises | |
| |
| |
Service Providers | |
| |
| |
The Future of Content Networking | |
| |
| |
Review Questions | |
| |
| |
End Notes | |
| |
| |
Ethernet | |
| |
| |
Objectives | |
| |
| |
DIX and IEEE 802.3 | |
| |
| |
Frame Formats | |
| |
| |
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) | |
| |
| |
Collision Domains and Broadcast Domains | |
| |
| |
Duplexing | |
| |
| |
Flow Control | |
| |
| |
Link Integrity Test and the Ethernet Heartbeat | |
| |
| |
Fast Ethernet | |
| |
| |
Auto-Negotiation | |
| |
| |
Gigabit Ethernet | |
| |
| |
Deploying Ethernet | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Advanced Ethernet Topics | |
| |
| |
Objectives | |
| |
| |
Spanning-Tree Protocol | |
| |
| |
Spanning-Tree Protocol Port States | |
| |
| |
Election of the Root Switch | |
| |
| |
Bridge Protocol Data Units | |
| |
| |
How the STP Algorithm Works | |
| |
| |
Implications of STP in a LAN Environment | |
| |
| |
Virtual Local Area Networks--VLANs | |
| |
| |
Benefits of VLANs | |
| |
| |
VLAN Trunk Protocol | |
| |
| |
How VTP Works | |
| |
| |
VLAN Trunking | |
| |
| |
Inter-Switch Link (ISL) Encapsulation | |
| |
| |
IEEE 802.1q TRUNKING | |
| |
| |
The Role of VLANs in Modern Data Centers | |
| |
| |
EtherChannel | |
| |
| |
EtherChannel and VLANs | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
HTTP and the World Wide Web | |
| |
| |
Objectives | |
| |
| |
History | |
| |
| |
How It Works | |
| |
| |
HTTP/0.9 | |
| |
| |
HTTP/1.0 | |
| |
| |
HTTP/1.1 | |
| |
| |
Request Methods | |
| |
| |
Response Status Code Definitions | |
| |
| |
Message Headers | |
| |
| |
HTTP Security | |
| |
| |
HTTP Protocol Analysis | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Suggested Reading | |
| |
| |
SSL | |
| |
| |
Objectives | |
| |
| |
Crypto 101 | |
| |
| |
Secret Key Cryptography | |
| |
| |
Key Size | |
| |
| |
Public Key Cryptography | |
| |
| |
Putting It Together: Hybrid Encryption Schemes | |
| |
| |
Certificates | |
| |
| |
Configuring and Installing Your Own SSL Server | |
| |
| |
Unpacking the Packages | |
| |
| |
Compiling OpenSSL | |
| |
| |
Configuring and Compiling Apache with mod_ssl | |
| |
| |
Creating the Certificate and Installing Apache | |
| |
| |
Using Apache with SSL Support | |
| |
| |
Generating New CSRs | |
| |
| |
SSL: The Protocol | |
| |
| |
SSL Messages | |
| |
| |
Accelerating SSL | |
| |
| |
How SSL Acceleration Works | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
DNS and Content Networking | |
| |
| |
Objectives | |
| |
| |
History | |
| |
| |
How DNS Works | |
| |
| |
General Operational Overview | |
| |
| |
Detailed Operational Overview | |
| |
| |
Basic DNS Configuration | |
| |
| |
Basic DNS Auditing | |
| |
| |
Advanced DNS Configuration | |
| |
| |
RTT Measurements | |
| |
| |
Wildcard DNS | |
| |
| |
RR Sets | |
| |
| |
Subdomain Delegation | |
| |
| |
DNS Thrashing | |
| |
| |
Registering Domain Names | |
| |
| |
General Process | |
| |
| |
Contacts | |
| |
| |
WHOIS Databases | |
| |
| |
Problems with DNS | |
| |
| |
The Future | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Internet Structure and Function | |
| |
| |
Objectives | |
| |
| |
Global Structure | |
| |
| |
Hierarchical Organization | |
| |
| |
Internet Routing with BGP | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Web Servers, Cookies, and Web Caches | |
| |
| |
Objectives | |
| |
| |
The Process of Fetching Content | |
| |
| |
Requesting Static Content | |
| |
| |
Requesting Dynamic Content | |
| |
| |
Caching | |
| |
| |
The Basics | |
| |
| |
Transparent vs. Nontransparent Caching | |
| |
| |
Forward vs. Reverse Proxy Caching | |
| |
| |
Edge Caching and Content Delivery Networks | |
| |
| |
Cache Interception | |
| |
| |
Caching Products | |
| |
| |
Adding State: HTTP Cookies | |
| |
| |
Understanding "State" | |
| |
| |
Cookies | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Server Load Balancing | |
| |
| |
Objectives | |
| |
| |
Scaling the Internet | |
| |
| |
Single Server Approach | |
| |
| |
Server Farm Approach | |
| |
| |
What Is Server Load Balancing? | |
| |
| |
Virtual Server Group and Virtual IP | |
| |
| |
Technical Benefits | |
| |
| |
Business Benefits | |
| |
| |
Applications | |
| |
| |
Server Load Balancing Operations | |
| |
| |
Solutions | |
| |
| |
The Cisco Solutions--Local Director | |
| |
| |
The Cisco ArrowPoint Load Balancers | |
| |
| |
The Nortel Web Switch | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
VRRP and HSRP | |
| |
| |
Objectives | |
| |
| |
Virtual Router Redundancy Protocol | |
| |
| |
Operations | |
| |
| |
Protocol | |
| |
| |
Case studies | |
| |
| |
VRRPe | |
| |
| |
HSRP | |
| |
| |
Protocol | |
| |
| |
Case Studies | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Global Server Load Balancing | |
| |
| |
Objectives | |
| |
| |
Solutions | |
| |
| |
Simple Failover | |
| |
| |
High Availability | |
| |
| |
Geographic Load Balancing | |
| |
| |
How It Works | |
| |
| |
Dynamic Site Selection | |
| |
| |
Backup Servers | |
| |
| |
DNS Based | |
| |
| |
Routing Protocol Based | |
| |
| |
Packet Loss--An Aside | |
| |
| |
Caveats | |
| |
| |
Globalization Techniques | |
| |
| |
Passive Techniques | |
| |
| |
Footrace Techniques | |
| |
| |
Active Techniques | |
| |
| |
Case Studies | |
| |
| |
Directory Services for J. Magellan and Sons | |
| |
| |
Your News Corp | |
| |
| |
Products | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Content Networking and Security | |
| |
| |
Objectives | |
| |
| |
Security | |
| |
| |
Mitigating Denial of Service | |
| |
| |
Filters and Firewalls | |
| |
| |
Filters and Filtering | |
| |
| |
Firewalls and Fire Walling | |
| |
| |
High-Availability Content Security Solutions | |
| |
| |
State Updates and Clustering | |
| |
| |
Firewall Load Balancing | |
| |
| |
Firewall Load Balancing Basics | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Application Redirection | |
| |
| |
Objectives | |
| |
| |
Web Caching | |
| |
| |
Web Caching Applications | |
| |
| |
Web Cache Redirection (WCR) | |
| |
| |
WCCP and WCR | |
| |
| |
DNS Redirection | |
| |
| |
Operation and Benefits | |
| |
| |
DNS Server Health Monitoring | |
| |
| |
Overflow and Backup DNS | |
| |
| |
High Availability DNS | |
| |
| |
SSL Offloading | |
| |
| |
Caveats to SSL Redirection / Offload | |
| |
| |
Other Applications | |
| |
| |
Combinations | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Bandwidth Management | |
| |
| |
Objectives | |
| |
| |
SLA and the Business Case for Managing Bandwidth | |
| |
| |
Before the Bandwidth Management Era | |
| |
| |
PointCast Floods Networks | |
| |
| |
Push Technology Solutions | |
| |
| |
Practical Applications of Bandwidth Management in E-Commerce | |
| |
| |
ISP Environment | |
| |
| |
ASP Environment | |
| |
| |
Enabling Service Providers to Aggregate Profitably | |
| |
| |
Increasing Security and Preventing DoS Attacks | |
| |
| |
Solutions | |
| |
| |
Dedicated Bandwidth Management Appliances | |
| |
| |
Integration with Routers and LAN Switches | |
| |
| |
Integration with Web Switches | |
| |
| |
Integration with Firewall | |
| |
| |
How Bandwidth Management Works--Case Study of the Nortel Solution | |
| |
| |
Overview | |
| |
| |
Traffic Classification and Control | |
| |
| |
Bandwidth Policies | |
| |
| |
Classification Policies | |
| |
| |
Restricting Bandwidth Usage | |
| |
| |
Bandwidth Statistics and History | |
| |
| |
Packet Coloring | |
| |
| |
Configuring Bandwidth Management | |
| |
| |
Standards | |
| |
| |
IETF Diff-Serv Working Group | |
| |
| |
Summary | |
| |
| |
Pros and Cons | |
| |
| |
Standardization Roadmap | |
| |
| |
Future Applications | |
| |
| |
Review Questions | |
| |
| |
Index | |