| | | Copyright |
| | | Prentice Hall PTR Series in Computer Networking and Distributed Systems |
| | | About Prentice Hall Professional Technical Reference |
| | | Preface |
| | | | The Audience and Purpose of This Book |
| | | | Case Studies |
| | | | Explanation of Artwork |
| | | | About the Technical Reviewers |
| | | | Acknowledgments |
| | | | Summary |
| |
| | | Chapter 1. Introduction to Content Switching |
| | | | The Evolution of Layer 2 and Layer 3 Networks |
| | | | Summary |
| |
| | | Chapter 2. Understanding Layer 2, 3, and 4 Protocols |
| | | | The OSI Seven Layer ModelWhat Is a Layer? |
| | | | Switching at Different Layers |
| | | | Understanding Layer 4 Protocols |
| | | | Transport Control Protocol (TCP) |
| | | | User Datagram Protocol (UDP) |
| | | | Virtual Router Redundancy Protocol (VRRP) |
| | | | Summary |
| |
| | | Chapter 3. Understanding Application Layer Protocols |
| | | | HyperText Transfer Protocol (HTTP) |
| | | | File Transfer Protocol (FTP) |
| | | | Real Time Streaming Protocol (RTSP) |
| | | | Secure Sockets Layer (SSL) |
| | | | Summary |
| |
| | | Chapter 4. The Concepts of Content Switching |
| | | | Virtual Services and Application Redirection |
| | | | Resources and Real Servers |
| | | | Frames, Packets, and Sessions |
| | | | Deep Packet Inspection |
| | | | Summary |
| |
| | | Chapter 5. Basic Server Load Balancing |
| | | | Why Load Balance Servers? |
| | | | Topologies of Server Load Balancing |
| | | | Layer 4 Load Balancing Metrics |
| | | | Server Health Checking |
| | | | Summary |
| |
| | | Chapter 6. Content-Aware Server Load Balancing |
| | | | What Is Layer 7 Server Load Balancing? |
| | | | Why Use Layer 7 Server Load Balancing? |
| | | | Dealing with Layer 7 Traffic |
| | | | HTTP URL Parsing and Load Balancing |
| | | | HTTP Header Load Balancing |
| | | | HTTP Cookie Load Balancing |
| | | | Load Balancing FTP |
| | | | Load Balancing DNS at Layer 7 |
| | | | Load Balancing RTSP Streaming Media |
| | | | Summary |
| | | | Case Study: Content-Aware Server Load Balancing |
| |
| | | Chapter 7. Persistence, Security, and the Internet |
| | | | Internet Service ProvidersProxying and Traffic Volumes |
| | | | IP Address Hashing |
| | | | Cookie-Based Persistence |
| | | | SSL |
| | | | Summary |
| | | | Case Study: Persistence |
| |
| | | Chapter 8. Application Redirection |
| | | | The Requirement for Application Redirection |
| | | | VIP-Based SLB vs. Application Redirection |
| | | | Web Cache Redirection (WCR) |
| | | | WCR |
| | | | Security Redirection |
| | | | Router/Link Load Balancing |
| | | | Summary |
| | | | Case Study: Application Redirection |
| |
| | | Chapter 9. Firewall and VPN Load Balancing |
| | | | Why Load Balance Firewalls and VPN Switches? |
| | | | Firewall Overview |
| | | | Deploying Firewall Load Balancing |
| | | | Policy-Based Firewall Load Balancing |
| | | | VPN and MAC Persistence |
| | | | Summary |
| |
| | | Chapter 10. The Architecture of a Content Switch |
| | | | Typical Layer 2 and Layer 3 Architecture Considerations |
| | | | Why Content Switching Is Different |
| | | | What Makes a Good Content Switch? |
| | | | Different Approaches |
| | | | Where To Next? |
| | | | Associated Hardware |
| | | | Summary |
| |