Networking Concepts and Technology: A Designers Resource
| < Day Day Up > |
FIGURE 1-1 Web Services Infrastructure Impact on Data Center Network Architectures 2 FIGURE 1-2 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (a) 5 FIGURE 1-3 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (b) 6 FIGURE 1-4 Influence of Multi-Tier Software Architectures on Network Architecture 8 FIGURE 1-5 Transport Layer Traffic Flows Tuned According to Client Links 10 FIGURE 1-6 Data Center Edge IP Services 11 FIGURE 1-7 Data Center Networking Considerations on the Server 12 FIGURE 1-8 Availability Strategies in the Data Center 14 FIGURE 1-9 Example Implementation of an Enterprise Muli-Tier Data Center 15 FIGURE 2-1 Main Components of Multi-Tier Architecture 19 FIGURE 2-2 Logical View of Multi-Tier Service on Demand Architecture 20 FIGURE 2-3 Network Inter-tier Traffic Flows of a Web-based Transaction 22 FIGURE 2-4 Model of Presentation/Web Tier Components and Interfacing Elements 24 FIGURE 2-5 High-Level Survey of EJB Availability Mechanisms 27 FIGURE 2-6 Decoupled Web Tier and Application Server Tier Vertically Scaled 31 FIGURE 2-7 Tightly Coupled Web Tier and Application Server Tier Vertically Scaled 32 FIGURE 2-8 Decoupled Web Tier and Application Server Tier Horizontally Scaled 33 FIGURE 2-9 Tested and Implemented Architecture Solution 35 FIGURE 3-1 Overview of Overlapping Tuning Domains 39 FIGURE 3-2 Closed-Loop TCP System Model 40 FIGURE 3-3 Perfectly Tuned TCP/IP System 42 FIGURE 3-4 Tuning Required to Compensate for Faster Links 43 FIGURE 3-5 Tuning Required to Compensate for Slower Links 44 FIGURE 3-6 Complete TCP/IP Stack on Computing Nodes 45 FIGURE 3-7 TCP and STREAM Head Data Structures Tunable Parameters 47 FIGURE 3-8 TCP State Engine Server and Client Node 49 FIGURE 3-9 TCP Startup Phase 52 FIGURE 3-10 TCP Tuning for ACK Control 55 FIGURE 3-11 Comparison between Normal LAN and WAN Packet Traffic 57 FIGURE 3-12 Tuning Required to Compensate for Optical WAN 59 FIGURE 3-13 Comparison between Normal LAN and WAN Packet Traffic Long Low Bandwidth Pipe 60 FIGURE 3-14 Increased Performance of InfiniBand/RDMA Stack 63 FIGURE 4-1 Internal Architecture of a Multi-Layer Switch 68 FIGURE 4-2 High-Level Model of Server Load Balancing 73 FIGURE 4-3 High-Level Model of the Shortest Queue First Technique 75 FIGURE 4-4 Round-Robin and Weighted Round-Robin 76 FIGURE 4-5 Server Load Balanced System Modeled as N - M/M/1 Queues 77 FIGURE 4-6 System Model of One Queue 78 FIGURE 4-7 Server Load Balance Packet Flow: Proxy Mode 79 FIGURE 4-8 Direct Server Return Packet Flow 81 FIGURE 4-9 Content Switching Functional Model 90 FIGURE 4-10 Overview of End-to-End Network and Systems Architecture 97 FIGURE 4-11 One-Way End-to-End Packet Data Path Transversal 100 FIGURE 4-12 QoS Functional Components 104 FIGURE 4-13 Traffic Burst Graphic 106 FIGURE 4-14 Congestion Control: RED, WRED Packet Discard Algorithms 108 FIGURE 4-15 High-Level Condensed Protocol Overview 111 FIGURE 4-16 Packet Flow for Software-based Approach to SSL Processing 113 FIGURE 4-17 PCI Accelerator Card Approach to SSL Processing Partial Offload 114 FIGURE 4-18 SSL Appliance Offloads Frontend Client SSL Processing 116 FIGURE 4-19 SSL Test Setup with No Offload 117 FIGURE 4-20 Throughput Increases Linearly with More Processors 119 FIGURE 4-21 SSL Test Setup for SSL Software Libraries 119 FIGURE 4-22 SSL Test Setup for an SSL Accelerator Appliance 120 FIGURE 4-23 Effect of Number of Threads on SSL Performance 120 FIGURE 4-24 Effect of File Size on SSL Performance 121 FIGURE 5-1 Token Ring Network 124 FIGURE 5-2 Typical FDDI Dual Counter-Rotating Ring 132 FIGURE 5-3 SAS Showing Primary Output and Input 133 FIGURE 5-4 DAS Showing Primary Input and Output 134 FIGURE 5-5 SAC Showing Multiple M-ports with Single-Attached Stations 135 FIGURE 5-6 DAC Showing Multiple M-ports with Single-Attached Stations 136 FIGURE 5-7 Communication Process between the NIC Software and Hardware 140 FIGURE 5-8 Transmit Architecture 141 FIGURE 5-9 Basic Receive Architecture 145 FIGURE 5-10 Hardware Transmit Checksum 147 FIGURE 5-11 Hardware Receive Checksum 148 FIGURE 5-12 Software Load Balancing 149 FIGURE 5-13 Hardware Load Balancing 150 FIGURE 5-14 Basic Mode Control Register 153 FIGURE 5-15 Basic Mode Status Register 154 FIGURE 5-16 Link Partner Auto-negotiation Advertisement 155 FIGURE 5-17 Link Partner Priority for Hardware Decision Process 156 FIGURE 5-18 Auto-negotiation Expansion Register 157 FIGURE 5-19 Extended Basic Mode Control Register 158 FIGURE 5-20 Basic Mode Status Register 158 FIGURE 5-21 Gigabit Extended Status Register 159 FIGURE 5-22 Gigabit Control Status 159 FIGURE 5-23 Gigabit Status Register 160 FIGURE 5-24 GMII Mode Link Partner Priority 161 FIGURE 5-25 Flow Control Pause Frame Format 161 FIGURE 5-26 Link Partner Auto-negotiation Advertisement Register 162 FIGURE 5-27 Rx/Tx Flow Control in Action 163 FIGURE 5-28 Typical hme External Connectors 166 FIGURE 5-29 Typical qfe External Connectors 175 FIGURE 5-30 Typical vge and ge MMF External Connectors 196 FIGURE 5-31 Sun GigaSwift Ethernet MMF Adapter Connectors 209 FIGURE 5-32 Sun GigaSwift Ethernet UTP Adapter Connectors 209 FIGURE 5-33 Example of Servers Supporting Multiple VLANs with Tagging Adapters 229 FIGURE 6-1 Network Topologies and Impact on Availability 263 FIGURE 6-2 Trunking Software Architecture 265 FIGURE 6-3 Trunking Failover Test Setup 266 FIGURE 6-4 Correct Trunking Policy on Switch 268 FIGURE 6-5 Incorrect Trunking Policy on Switch 268 FIGURE 6-6 Correct Trunking Policy on Server 269 FIGURE 6-7 Incorrect Trunking Policy on a Server 270 FIGURE 6-8 Incorrect Trunking Policy on a Server 271 FIGURE 6-9 Layer 2 High-Availability Design Using SMLT 272 FIGURE 6-10 Layer 2 High-Availability Design Using DMLT 273 FIGURE 6-11 Spanning Tree Network Setup 275 FIGURE 6-12 High-Availability Network Interface Cards on Sun Servers 280 FIGURE 6-13 Design Pattern IPMP and VRRP Integrated Availability Solution 281 FIGURE 6-14 Design Pattern OSPF Network 282 FIGURE 6-15 RIP Network Setup 289 FIGURE 7-1 Logical Network Architecture Overview 297 FIGURE 7-2 IP Services Switch Functions Operate on Incoming Packets 299 FIGURE 7-3 Application Redirection Functional Model 300 FIGURE 7-4 Content Switching Functional Model 301 FIGURE 7-5 Network Switch with Persistence Based on SSL Session ID 303 FIGURE 7-6 Tested SSL Accelerator Configuration RSA Handshake and Bulk Encryption 304 FIGURE 7-7 Network Availability Strategies 305 FIGURE 7-8 Logical Network Architecture Design Details 306 FIGURE 7-9 Traditional Availability Network Design Using Separate Layer 2 Switches 308 FIGURE 7-10 Availability Network Design Using Large Chassis-Based Switches 309 FIGURE 7-11 Logical Network Architecture with Virtual Routers, VLANs, and Networks 310 FIGURE 7-12 Logical Network 313 FIGURE 7-13 Secure Multi-Tier 315 FIGURE 7-14 Multi-Tier Data Center Architecture Using Many Small Switches 316 FIGURE 7-15 Network Configuration with Extreme Networks Equipment 318 FIGURE 7-16 Sun ONE Network Configuration with Foundry Networks Equipment 319 FIGURE 7-17 Physical Network Connections and Addressing 321 FIGURE 7-18 Collapsed Design Without Layer 2 Switches 322 FIGURE 7-19 Foundry Networks Implementation 325 FIGURE 7-20 Firewalls between Service Modules 331 FIGURE 7-21 Virtual Firewall Architecture Using Netscreen and Foundry Networks Products 332 |
| < Day Day Up > |