SlideShare a Scribd company logo
1 of 34
Download to read offline
8-1
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Application DeliveryApplication Delivery
NetworkingNetworking
Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
Jain@cse.wustl.edu
These slides and audio/video recordings of this class lecture are at:
http://www.cse.wustl.edu/~jain/cse570-13/
.
8-2
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
OverviewOverview
1. Application Delivery Controllers (ADCs)
2. Load Balancing Concepts and Modes
3. Network Address Translation (NAT)
4. Other ADCs
5. Virtual ADCs
8-3
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Application Delivery in a Data CenterApplication Delivery in a Data Center
 Replication: Performance and Fault Tolerance
 If Load on S1 >0.5, send to S2
 If link to US broken, send to UK
 Content-Based Partitioning:
 Video messages to Server S1
 Accounting to Server S2
 Context Based Partitioning:
 Application Context: Different API calls
 Reads to S1, Writes to S2
 User Context:
 If Windows Phone user, send to S1
 If laptop user, send to HD, send to S2
 Multi-Segment: User-ISP Proxy-Load Balancer-Firewall-
Server
Servers
Middle Boxes
Proxies
ADCs
Users
Mobile
Video
Data
Reads
Data
Writes
Desktop
Video
8-4
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Application Delivery Controllers (ADCs)Application Delivery Controllers (ADCs)
 Networking Service: Tasks that apply to multiple applications,
e.g., security, monitoring, acceleration, offload etc.
 Several applications can share a service
 ADC: Appliance that provide network services, e.g., load
balancing, firewall, proxy, SSL offload,
 Load balancer is an example of ADC and also the basic
component of most ADCs.
 Other ADCs: Firewalls, Reverse Proxies, SSL Offload, TCP
Multiplexing, HTTP Compression
8-5
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Load Balancing ConceptsLoad Balancing Concepts
 Load Balancer: Allows adding servers as needed.
 Server Cluster: A centrally managed set of servers working
together on one application. Appear as one server.
 Server Farm: A set of independent servers.
Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
8-6
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Load Balancing Concepts (Cont)Load Balancing Concepts (Cont)
 Probes: Synthetic requests sent by load balancer to see if a
server and application is up. E.g., HTTP get request.
 Virtual IP (VIP): Client facing IP address of the load balancer
 Stickiness Table: Lists which server a client has been mapped
to.
 Predictor: Load balancing rules, e.g., round-robin, least
connections, hashing, least loaded
 Round-robin DNS load balancing does not know whether a
server is down, overloaded, or appropriate for different types
of application traffic (video, voice, data, …)
8-7
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Load Balancing Concepts (Cont)Load Balancing Concepts (Cont)
 Layer 4 Switching: L2-L4 fields are used to assign a server.
Server can be assigned at TCP Syn.
 Layer 7 Switching: L5-L7 fields such as data type or
application request type is used.
Load balancer accepts all TCP connections but assigns
servers only when the client sends an application request.
Delayed Binding
 Symmetric Connection Management: Traffic in both
direction passes through the load balancer. LB changes the
source IP in the requests to server.
 Asymmetric Connection Management: Client-to-Server
traffic passes through the load balancer. Server-to-Client traffic
goes directly. Good for video servers. Used rarely.
8-8
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Load Balancing Using DNSLoad Balancing Using DNS
 Domain Name System (DNS) allows multiple IP addresses for
a name
 On query, DNS returns a list of addresses. The order of entries
is rotated on each subsequent query. For example, abc.com
1st Time: 74.25.21.201, 74.25.21.202, 74.25.21.203
2nd Time: 74.25.21.202, 74.25.21.203, 74.25.21.201
3rd Time: 74.25.21.203, 74.25.21.201, 74.25.21.202
 Rotating DNS is used for load balancing
 Problems:
 DNS does not know geo-location of servers
 DNS does not know whether a server is loaded
 DNS does not whether a server is up
 Adding or removing a server is too slow
8-9
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Global Server Load Balancing (GSLB)Global Server Load Balancing (GSLB)
 Specialized DNS servers that keep track of server locations and
states
 Good only for intra-company use.
Not able to change caches at external servers.
GSLB
Internet
Client 1 Client 3
Probes
DNS Request
DNS Response
VIP2
DNS Request
DNS Response
VIP1
Server Server
Load Balancer
Server Server
Load Balancer
Server Server
Load Balancer
VIP1 VIP3 VIP3
8-10
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Load Balancing ModesLoad Balancing Modes
What changes are made to client requests so that the request is
routed to the correct server?
1. Dual NAT (One-Arm mode)
2. Server NAT (Routed Mode)
3. Transparent Mode (Direct Routed Mode)
Type Change
Source
IP Address?
Change
Source
TCP Port?
Dual NAT Y Y
Server NAT N Y
Transparent N N
8-11
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Network Address Translation (NAT)Network Address Translation (NAT)
 Private IP addresses 192.168.x.x cannot be used on the public
Internet
 NAT overwrites source addresses and port on all outgoing
packets. Makes a note. Writes corresponding destination
addresses and port on all incoming packets
 Only outgoing connections are possible
NAT Internet
192.168.0.201 192.168.0.203
192.168.0.204 192.168.0.205
128.252.73.216
8-12
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
NAT ExampleNAT Example
Destination
Dst: 74.125.224.210
Src: 192.168.0.201
IP
TCP Dst: 80
Src: 8001
Dst: 74.125.224.210
Src: 128.252.73.216
IP
TCP Dst: 80
Src: 3001
Dst: 192.168.0.201
Src: 74.125.224.210
IP
TCP Dst: 8001
Src: 80
Dst: 128.252.73.216
Src: 74.125.224.210
IP
TCP Dst: 3001
Src: 80
NATSource
Outgoing
Source
Address
Outgoing
Source
Port
New
Source
Port
192.168.0.201 8001 3001
192.168.0.201 3002 3002
192.168.0.202 8001 3003
NAT Internet
192.168.0.201 192.168.0.202
128.252.73.216
Public Address
New Port #
8-13
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
NAT64 and NAT46NAT64 and NAT46
 NAT described so far is called NAT44 (both internal and
external addresses are IPv4).
 A NAT allows internal addresses to be IPv6 even if the
external Internet is still IPv4 and vice-versa.
 This allows organizations and/or carriers to transition to IPv6
now.
Ref: http://en.wikipedia.org/wiki/NAT64
8-14
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Carrier Grade NATCarrier Grade NAT
 Internet Addressing and Naming Authority (IANA)
has recorded 100.64.0.0/10 as shared address range
Like private address space but reserved for use by carriers
 Carriers can allocate an address from this range to their
subscriber and then use a small number of public IPv4 or IPV6
addresses using a “Carrier Grade NAT (CGNAT)”
Also known as NAT444, Large Scale NAT (LSN)
 These addresses can be used inside a carrier’s own network but
not on public internet. These addresses can be re-used inside
other carrier’s network  Shared.
Subscriber A’s
Home network
192.168.0.0/24
128.25.67.89
Router
100.64.1.2
NAT
Subscriber B’s
Home network
192.168.0.0/24
100.64.1.3
NAT
CGNAT
8-15
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Dual NATDual NAT
 Also known as “One Arm Mode”
 Load balancer changes both source and destination
addresses and destination port numbers on client requests.
Like a regular NAT.
 Server sends the response to load balancer,
Load balancer uses the port # to find the client address and
forwards it to clients
 Client and servers can be on the same subnet.
Servers can not see real client addresses.
Server
192.168.0.2
Dst: 74.125.224.210
Src: 128.252.73.216
IP
TCP Dst: 80
Src: 8001
Dst: 192.168.0.2
Src: 192.168.0.1
IP
TCP Dst: 80
Src: 3001
Dst: 128.252.73.216
Src: 74.125.224.210
IP
TCP Dst: 8001
Src: 80
Dst: 192.168.0.1
Src: 192.168.0.2
IP
TCP Dst: 3001
Src: 80
Load Balancer
74.125.224.210
192.168.0.1
Client
128.252.73.216
Server
192.168.0.3
Server
192.168.0.4
Ref: P. Srisuresh and D. Gan, “Load Sharing using IP NAT (LSNAT),” RFC 2391, Aug 1998, http://tools.ietf.org/html/rfc2391
8-16
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Server NATServer NAT
 Also known as “Routed Mode”
 Load balancer changes destination IP on client requests
No changes to port numbers.
 Server sends the response directly to client
 Load balancer is made the default gateway.
All server responses go through the load balancer
Load balancer changes the source IP addresses on responses.
 Works only if clients and servers are on different subnets.
Servers can see the real client addresses (Good for security).
Server
192.168.0.2
Dst: 74.125.224.210
Src: 128.252.73.216
IP
TCP Dst: 80
Src: 8001
Dst: 192.168.0.2
Src: 128.252.73.216
IP
TCP Dst: 80
Src: 8001
Dst: 128.252.73.216
Src: 74.125.224.210
IP
TCP Dst: 8001
Src: 80
Dst: 128.252.73.216
Src: 192.168.0.2
IP
TCP Dst: 8001
Src: 80
Load Balancer
74.125.224.210
192.168.0.1
Client
128.252.73.216
Server
192.168.0.3
Server
192.168.0.4
8-17
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Transparent ModeTransparent Mode
 Also known as “Direct Routing Mode”
 All servers are programmed to respond to the same Virtual IP
adr but not respond to ARP for that VIP. They have different
real IP adrs for other purposes and respond to ARP for that RIP.
 Load balancer is the sole layer 2 switch to server subnet.
It does not changes anything at L3 or L4  Transparent
It simply changes the MAC address and directs the frame to the
selected server.
Dst: 74.125.224.210
Src: 128.252.73.216
IP
TCP Dst: 80
Src: 8001
IP
TCP
Dst: 128.252.73.216
Src: 74.125.224.210
IP
TCP Dst: 8001
Src: 80
IP
TCP
Dst: 74.125.224.210
Src: 128.252.73.216
Dst: 80
Src: 8001
Dst: 128.252.73.216
Src: 74.125.224.210
Dst: 8001
Src: 80
Load
Balancer
Client
128.252.73.216
Server
74.125.224.210
Server
74.125.224.210
Server
74.125.224.210
8-18
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Firewall Load BalancingFirewall Load Balancing
 They need to see real IP addresses of clients
 Transparent mode (balance via MAC addresses)
 Firewalls are stateful  Return traffic through the same firewall
 Solution: Complementary hashing using return load balancer.
LB1 hashes source IP and/or Port to select firewall instance
LB2 hashes destination IP and/or Port to select firewall instance.
This is also known as a “Firewall Sandwich”
LB1 LB2
Server
Server
ServerServerServerClient
Client
Client Firewall
Firewall
Firewall
… … …
8-19
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Reverse Proxy Load BalancingReverse Proxy Load Balancing
 Proxies used for security, caching, application acceleration
 Proxies are usually used for outgoing requests
 Reverse proxies are used for incoming requests
 Usually transparent mode is used
 Load balancing using predictors such as hashing or round robin
Client
Load Balancer
Reverse ProxyReverse Proxy Server
Server
Reverse Proxy
Reverse Proxy
Client
Client
Client
…
……
8-20
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
SSL OffloadSSL Offload
 Secure Socket Layer (SSL) and Transport Layer Security (TLS)
are used for secure connections, e.g., https://
 Secure  Application data is encrypted.
 Some load balancer provide SSL offload
1. SSL Termination: Client to LB is secure. LB to Servers is clear.
LB can select servers based on application data.
2. SSL Initiation: Client to LB is clear. LB to servers is secure.
 Used when the client is local but the server is remote.
 Helps clients by SSL offload.
 One certificate can be used for all clients Save cost
3. End-to-end SSL: Client-to-LB, LB-to-servers both secure.
Internal encryption can be simpler. One Certificate for all servers.
Client LB Server
8-21
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
TCP Multiplexing ADCTCP Multiplexing ADC
 TCP connections require 3-way handshake, ack for segments,
sliding window flow control, congestion control, and
termination for each connection
 A ADC can be used to reduce the number of TCP connections.
 Also, helps reduce total latency since LB to server connection
runs at high window levels.
Client
TCP
Multiplexing
ADC
Server
Client
Client
Client
…
Multiple short-term
TCP connections
from clients
Single long-term
TCP connection
to server
8-22
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
HTTP CompressionHTTP Compression
 Most http responses are compressed to reduce bandwidth usage
 A load balancer can offer this service and relieve the servers
 This is just one example of numerous other application
acceleration techniques
8-23
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
ADC Proliferation in Data CentersADC Proliferation in Data Centers
 Application logic in servers
 Security (firewall, intrusion detection,
SSL offload) in middle boxes
 Performance optimization (WAN
optimizers, content caches)
middleboxes
 Application-level policy routing
(APR): Partitioning and replication
middleboxes SSL SSL SSL SSL
ALG
CBR
ALG
CBR
ALG
CBR
ALG
CBR
Application 
Servers
L2 Switches
Application Level 
Gateways (ALG)
& Content‐Based 
Routers CBR)
Load Balancers
Load Balancers
Load Balancers
Load Balancers
L2 Switches
Application 
Firewalls
Intrusion 
Detection
and Prevention 
Systems
SSL 
Offloaders
Public Internet
Data Center
8-24
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
ADC Proliferation (Cont)ADC Proliferation (Cont)
 Number of middleboxes (Application
Delivery Controllers) is comparable to
the number of routers
 Market size of optimization ADCs will
grow from 1.5B in 2009 to $2.24B in
2013
 Security appliances will grow from
$1.5B in 2010 to $10B in 2016
Ref: Technavio, “Global Application Delivery Controllers Market in Datacenters 2009-2013,” March, 2010,
http://www.technavio.com/content/global-application-delivery-controllersmarket-datacenters-2009-2013
Ref: Vyas Sekar, et. al., “The Middlebox Manifesto: Enabling Innovation in Middlebox Deployments,” ACM HotNets 2011.
Appliance Type Number
Firewalls 166
NIDS 127
Conferencing/Media Gateways 110
Load Balancers 67
Proxy Caches 66
VPN devices 45
WAN optimizers 44
Voice Gateways 11
Middleboxes total 636
Routers ~ 900
8-25
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Virtual ADCsVirtual ADCs
 Hardware Based vADCs:
 A single physical ADC presents multiple virtual contexts
 Each virtual ADC can be used by a different tenant or
different application
 Software Based vADCs: Inside or outside a physical server.
 Run on standard processors
(pADCs generally run on
monolithic hardware)
vServer vServer vServer
vLoad Balancer
Hypervisor
vADC1 vADC2 vADCn
ADC
8-26
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
MultiMulti--Function ADCsFunction ADCs
 Combine in one ADC:
 Protocol optimization
 Location based DNS
 Load balancing
 Security
 Data compression
8-27
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
SummarySummary
1. Application delivery involves partitioning an application based
on server context, user context, application context
2. Load balancer was the first application delivery controller.
Now ADCs are used for many common services such as
firewalls, TCP multiplexing, proxy, etc.
3. Many different flavors of NAT are used by ADCs.
4. ADCs are becoming virtual and multi-function.
8-28
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Reading ListReading List
 G. Santana, “Datacenter Virtualization Fundamentals,” Cisco
Press, 2014, pp. 110-139, ISBN: 1587143240 (Safari Book)
(Must Read)
8-29
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Wikipedia LinksWikipedia Links
 http://en.wikipedia.org/wiki/Address_Resolution_Protocol
 http://en.wikipedia.org/wiki/Application_delivery_controller
 http://en.wikipedia.org/wiki/Application_delivery_network
 http://en.wikipedia.org/wiki/Carrier-grade_NAT
 http://en.wikipedia.org/wiki/Delayed_binding
 http://en.wikipedia.org/wiki/Domain_Name_System
 http://en.wikipedia.org/wiki/HTTP_compression
 http://en.wikipedia.org/wiki/Load_balancing_(computing)
 http://en.wikipedia.org/wiki/Middlebox
 http://en.wikipedia.org/wiki/Network_address_translation
 http://en.wikipedia.org/wiki/Proxy_server
 http://en.wikipedia.org/wiki/Reverse_proxy
 http://en.wikipedia.org/wiki/Round-robin_DNS
 http://en.wikipedia.org/wiki/Secure_Socket_Layer
 http://en.wikipedia.org/wiki/SSL_acceleration
 http://en.wikipedia.org/wiki/Virtual_IP_address
8-30
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
AcronymsAcronyms
 ADC Application Delivery Controller
 ALG Application Level Gateways
 API Application Programming Interface
 APR Application-level Policy Routing
 ARP Address Resolution Protocol
 CBR Content Based Router
 CGNAT Carrier Grade Network Address Translation
 DNS Domain Name System
 GSLB Global Service Load Balancer
 HTTP Hypertext Transfer Protocol
 IANA Internet Addressing and Naming Authority
 IP Internet Protocol
8-31
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Acronyms (Cont)Acronyms (Cont)
 IPv4 Internet Protocol version 4
 IPv6 Internet Protocol version 6
 ISP Internet Service Provider
 LB Load Balancing
 MAC Media Access Control
 NAT Network Address Translation
 NAT44 NAT IPv4 private to IPv4 public
 NAT444 NAT IPv4 private to IPv4 public via IPv4 Carrier
 NAT46 NAT IPv4 private to IPv6 public
 NAT64 NAT IPv6 private to IPv4 public
 NIDS Network Intrusion Detection Systems
8-32
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Acronyms (Cont)Acronyms (Cont)
 pADC Physical Application Delivery Controller
 RIP Real IP Address
 SSL Secure Socket Layer
 TCP Transmission Control Protocol
 TLS Transport Layer Security
 vADCs Virtual Application Delivery Controller
 VIP Virtual IP address
 VPN Virtual Private Network
 vServer Virtual Server
 WAN Wide Area Network
8-34
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Quiz 8Quiz 8
1. Video messages going to one server group while accounting to another is an
example of ________________-based partitioning
2. Windows users being served by a different server group than iphone user is an
example of ________________-context based partitioning.
3. A centrally managed set of servers working together on one application is called
server ________________
4. ________________ are synthetic request sent by load balancer to see if a server is
up.
5. Load balancing rules are called ________________
6. Layer ________________ switching requires delayed binding.
7. One problem with load balancing using ________________ is that it does not
know whether a server is up.
8. Global server load balancing is good mostly for ________________ use.
9. In a NAT64 system, the private network is ________________ and the public
network is ________________.
10. 100.64.0.0/10 has been allocated as ________________ address range.
8-35
©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis
Solution to Quiz 8Solution to Quiz 8
1. Video messages going to one server group while accounting to another is an
example of *content*-based partitioning
2. Windows users being served by a different server group than iphone user is
an example of *user*-context based partitioning.
3. A centrally managed set of servers working together on one application is
called server *Cluster*
4. *Probes* are synthetic request sent by load balancer to see if a server is up.
5. Load balancing rules are called *Predictor*
6. Layer *7* switching requires delayed binding.
7. One problem with load balancing using *rotating DNS* is that it does not
know whether a server is up.
8. Global server load balancing is good mostly for *intra-company* use.
9. In a NAT64 system, the private network is *IPv6* and the public network
is *IPv4*.
10. 100.64.0.0/10 has been allocated as *shared* address range.

More Related Content

What's hot

PLNOG 9: Adam Obszyński - DNS Caching
PLNOG 9: Adam Obszyński - DNS Caching PLNOG 9: Adam Obszyński - DNS Caching
PLNOG 9: Adam Obszyński - DNS Caching PROIDEA
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)maamir farooq
 
Red hat enterprise_linux-7-load_balancer_administration-en-us
Red hat enterprise_linux-7-load_balancer_administration-en-usRed hat enterprise_linux-7-load_balancer_administration-en-us
Red hat enterprise_linux-7-load_balancer_administration-en-uschakrikolla
 
A Measurement Study of Open Resolvers and DNS Server Version
A Measurement Study of Open Resolvers and DNS Server VersionA Measurement Study of Open Resolvers and DNS Server Version
A Measurement Study of Open Resolvers and DNS Server VersionYuuki Takano
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate TransportsPerforce
 

What's hot (12)

PLNOG 9: Adam Obszyński - DNS Caching
PLNOG 9: Adam Obszyński - DNS Caching PLNOG 9: Adam Obszyński - DNS Caching
PLNOG 9: Adam Obszyński - DNS Caching
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Red hat enterprise_linux-7-load_balancer_administration-en-us
Red hat enterprise_linux-7-load_balancer_administration-en-usRed hat enterprise_linux-7-load_balancer_administration-en-us
Red hat enterprise_linux-7-load_balancer_administration-en-us
 
A Measurement Study of Open Resolvers and DNS Server Version
A Measurement Study of Open Resolvers and DNS Server VersionA Measurement Study of Open Resolvers and DNS Server Version
A Measurement Study of Open Resolvers and DNS Server Version
 
Application layer
Application layerApplication layer
Application layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
main
mainmain
main
 
Internet without Internet Protocol
Internet without Internet ProtocolInternet without Internet Protocol
Internet without Internet Protocol
 

Viewers also liked

Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010Dac Sah
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Carsten Rhod Gregersen
 
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.it
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.itRisoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.it
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.itValerio Como
 
Architettura Geografica Dei Server Linked In
Architettura Geografica Dei Server Linked InArchitettura Geografica Dei Server Linked In
Architettura Geografica Dei Server Linked InLuca Papandrea
 
Annunci Di Escort A Milano
Annunci Di Escort A Milano
Annunci Di Escort A Milano
Annunci Di Escort A Milano vanessalarson1
 
Rootkit: teoria e pratica. Michele BOLOGNA
Rootkit: teoria e pratica. Michele BOLOGNARootkit: teoria e pratica. Michele BOLOGNA
Rootkit: teoria e pratica. Michele BOLOGNAMichele Bologna
 
Amazon Day - Terza parte
Amazon Day - Terza parteAmazon Day - Terza parte
Amazon Day - Terza parteMaxpho™
 
Web frameworks don't matter
Web frameworks don't matterWeb frameworks don't matter
Web frameworks don't matterTomas Doran
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksJames Salter
 
Sarti Davide - Manga
Sarti Davide - MangaSarti Davide - Manga
Sarti Davide - MangaKakashikun
 
AnyMQ, Hippie, and the real-time web
AnyMQ, Hippie, and the real-time webAnyMQ, Hippie, and the real-time web
AnyMQ, Hippie, and the real-time webclkao
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionImperva Incapsula
 
Lezione 04 2015-2016 Nomi di dominio
Lezione 04 2015-2016 Nomi di dominioLezione 04 2015-2016 Nomi di dominio
Lezione 04 2015-2016 Nomi di dominioFederico Costantini
 
Inside Out Hacking - Bypassing Firewall
Inside Out Hacking - Bypassing FirewallInside Out Hacking - Bypassing Firewall
Inside Out Hacking - Bypassing Firewallamiable_indian
 
Fetishism & Sexual Variance: A brief review
Fetishism & Sexual Variance: A brief reviewFetishism & Sexual Variance: A brief review
Fetishism & Sexual Variance: A brief reviewCameron Kippen
 

Viewers also liked (20)

Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.it
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.itRisoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.it
Risoluzione DNS per IPv6: sperimentazione nella rete del dominio uniba.it
 
Architettura Geografica Dei Server Linked In
Architettura Geografica Dei Server Linked InArchitettura Geografica Dei Server Linked In
Architettura Geografica Dei Server Linked In
 
Annunci Di Escort A Milano
Annunci Di Escort A Milano
Annunci Di Escort A Milano
Annunci Di Escort A Milano
 
Wps 04
Wps 04Wps 04
Wps 04
 
Rootkit: teoria e pratica. Michele BOLOGNA
Rootkit: teoria e pratica. Michele BOLOGNARootkit: teoria e pratica. Michele BOLOGNA
Rootkit: teoria e pratica. Michele BOLOGNA
 
Amazon Day - Terza parte
Amazon Day - Terza parteAmazon Day - Terza parte
Amazon Day - Terza parte
 
Web frameworks don't matter
Web frameworks don't matterWeb frameworks don't matter
Web frameworks don't matter
 
Devious
DeviousDevious
Devious
 
6 Dns Parte1
6 Dns Parte16 Dns Parte1
6 Dns Parte1
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Sarti Davide - Manga
Sarti Davide - MangaSarti Davide - Manga
Sarti Davide - Manga
 
AnyMQ, Hippie, and the real-time web
AnyMQ, Hippie, and the real-time webAnyMQ, Hippie, and the real-time web
AnyMQ, Hippie, and the real-time web
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
Business+ DDoS Protection
Business+ DDoS ProtectionBusiness+ DDoS Protection
Business+ DDoS Protection
 
Lezione 04 2015-2016 Nomi di dominio
Lezione 04 2015-2016 Nomi di dominioLezione 04 2015-2016 Nomi di dominio
Lezione 04 2015-2016 Nomi di dominio
 
Inside Out Hacking - Bypassing Firewall
Inside Out Hacking - Bypassing FirewallInside Out Hacking - Bypassing Firewall
Inside Out Hacking - Bypassing Firewall
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Fetishism & Sexual Variance: A brief review
Fetishism & Sexual Variance: A brief reviewFetishism & Sexual Variance: A brief review
Fetishism & Sexual Variance: A brief review
 

Similar to Application Delivery Networking

LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...rjain51
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologiesrjain51
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowrjain51
 
Network Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data CentersNetwork Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data Centersrjain51
 
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017Network Performance: Making Every Packet Count - NET401 - re:Invent 2017
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017Amazon Web Services
 
Data Center Ethernet
Data Center EthernetData Center Ethernet
Data Center Ethernetrjain51
 
Data Locality, Latency and Caching: JSR-107 and the new Java JCACHE Standard
Data Locality, Latency and Caching:  JSR-107 and the new Java JCACHE StandardData Locality, Latency and Caching:  JSR-107 and the new Java JCACHE Standard
Data Locality, Latency and Caching: JSR-107 and the new Java JCACHE StandardBen Cotton
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideChristian Petrou
 
MySQL Connectors 8.0.19 & DNS SRV
MySQL Connectors 8.0.19 & DNS SRVMySQL Connectors 8.0.19 & DNS SRV
MySQL Connectors 8.0.19 & DNS SRVKenny Gryp
 
Crossfire DDoS Protection
Crossfire DDoS ProtectionCrossfire DDoS Protection
Crossfire DDoS ProtectionFarjad Noor
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7Chaing Ravuth
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectureswebhostingguy
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectureswebhostingguy
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt omalreda
 
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure WebLinux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure WebAll Things Open
 
Office Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterOffice Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterPaulo Freitas
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft TechNet
 

Similar to Application Delivery Networking (20)

LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologies
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Network Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data CentersNetwork Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data Centers
 
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017Network Performance: Making Every Packet Count - NET401 - re:Invent 2017
Network Performance: Making Every Packet Count - NET401 - re:Invent 2017
 
Data Center Ethernet
Data Center EthernetData Center Ethernet
Data Center Ethernet
 
Data Locality, Latency and Caching: JSR-107 and the new Java JCACHE Standard
Data Locality, Latency and Caching:  JSR-107 and the new Java JCACHE StandardData Locality, Latency and Caching:  JSR-107 and the new Java JCACHE Standard
Data Locality, Latency and Caching: JSR-107 and the new Java JCACHE Standard
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup Guide
 
MySQL Connectors 8.0.19 & DNS SRV
MySQL Connectors 8.0.19 & DNS SRVMySQL Connectors 8.0.19 & DNS SRV
MySQL Connectors 8.0.19 & DNS SRV
 
Crossfire DDoS Protection
Crossfire DDoS ProtectionCrossfire DDoS Protection
Crossfire DDoS Protection
 
M 14ofl
M 14oflM 14ofl
M 14ofl
 
CCNP Switching Chapter 7
CCNP Switching Chapter 7CCNP Switching Chapter 7
CCNP Switching Chapter 7
 
net work iTM3
net work iTM3net work iTM3
net work iTM3
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectures
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectures
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt
 
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure WebLinux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
 
Office Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterOffice Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 Poster
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
 
Azure webinar kolkata
Azure webinar kolkata Azure webinar kolkata
Azure webinar kolkata
 

More from rjain51

Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunitiesrjain51
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Thingsrjain51
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)rjain51
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Toolsrjain51
 
Networking Issues For Big Data
Networking Issues For Big DataNetworking Issues For Big Data
Networking Issues For Big Datarjain51
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentalsrjain51
 
Data Center Networks:Virtual Bridging
Data Center Networks:Virtual BridgingData Center Networks:Virtual Bridging
Data Center Networks:Virtual Bridgingrjain51
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetrjain51
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualizationrjain51
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Thingsrjain51
 

More from rjain51 (13)

Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunities
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Tools
 
Networking Issues For Big Data
Networking Issues For Big DataNetworking Issues For Big Data
Networking Issues For Big Data
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Data Center Networks:Virtual Bridging
Data Center Networks:Virtual BridgingData Center Networks:Virtual Bridging
Data Center Networks:Virtual Bridging
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Networking Protocols for Internet of Things
Networking Protocols for Internet of ThingsNetworking Protocols for Internet of Things
Networking Protocols for Internet of Things
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Application Delivery Networking

  • 1. 8-1 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Application DeliveryApplication Delivery NetworkingNetworking Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/ .
  • 2. 8-2 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis OverviewOverview 1. Application Delivery Controllers (ADCs) 2. Load Balancing Concepts and Modes 3. Network Address Translation (NAT) 4. Other ADCs 5. Virtual ADCs
  • 3. 8-3 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Application Delivery in a Data CenterApplication Delivery in a Data Center  Replication: Performance and Fault Tolerance  If Load on S1 >0.5, send to S2  If link to US broken, send to UK  Content-Based Partitioning:  Video messages to Server S1  Accounting to Server S2  Context Based Partitioning:  Application Context: Different API calls  Reads to S1, Writes to S2  User Context:  If Windows Phone user, send to S1  If laptop user, send to HD, send to S2  Multi-Segment: User-ISP Proxy-Load Balancer-Firewall- Server Servers Middle Boxes Proxies ADCs Users Mobile Video Data Reads Data Writes Desktop Video
  • 4. 8-4 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Application Delivery Controllers (ADCs)Application Delivery Controllers (ADCs)  Networking Service: Tasks that apply to multiple applications, e.g., security, monitoring, acceleration, offload etc.  Several applications can share a service  ADC: Appliance that provide network services, e.g., load balancing, firewall, proxy, SSL offload,  Load balancer is an example of ADC and also the basic component of most ADCs.  Other ADCs: Firewalls, Reverse Proxies, SSL Offload, TCP Multiplexing, HTTP Compression
  • 5. 8-5 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Load Balancing ConceptsLoad Balancing Concepts  Load Balancer: Allows adding servers as needed.  Server Cluster: A centrally managed set of servers working together on one application. Appear as one server.  Server Farm: A set of independent servers. Ref: G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, ISBN: 1587143240
  • 6. 8-6 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Load Balancing Concepts (Cont)Load Balancing Concepts (Cont)  Probes: Synthetic requests sent by load balancer to see if a server and application is up. E.g., HTTP get request.  Virtual IP (VIP): Client facing IP address of the load balancer  Stickiness Table: Lists which server a client has been mapped to.  Predictor: Load balancing rules, e.g., round-robin, least connections, hashing, least loaded  Round-robin DNS load balancing does not know whether a server is down, overloaded, or appropriate for different types of application traffic (video, voice, data, …)
  • 7. 8-7 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Load Balancing Concepts (Cont)Load Balancing Concepts (Cont)  Layer 4 Switching: L2-L4 fields are used to assign a server. Server can be assigned at TCP Syn.  Layer 7 Switching: L5-L7 fields such as data type or application request type is used. Load balancer accepts all TCP connections but assigns servers only when the client sends an application request. Delayed Binding  Symmetric Connection Management: Traffic in both direction passes through the load balancer. LB changes the source IP in the requests to server.  Asymmetric Connection Management: Client-to-Server traffic passes through the load balancer. Server-to-Client traffic goes directly. Good for video servers. Used rarely.
  • 8. 8-8 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Load Balancing Using DNSLoad Balancing Using DNS  Domain Name System (DNS) allows multiple IP addresses for a name  On query, DNS returns a list of addresses. The order of entries is rotated on each subsequent query. For example, abc.com 1st Time: 74.25.21.201, 74.25.21.202, 74.25.21.203 2nd Time: 74.25.21.202, 74.25.21.203, 74.25.21.201 3rd Time: 74.25.21.203, 74.25.21.201, 74.25.21.202  Rotating DNS is used for load balancing  Problems:  DNS does not know geo-location of servers  DNS does not know whether a server is loaded  DNS does not whether a server is up  Adding or removing a server is too slow
  • 9. 8-9 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Global Server Load Balancing (GSLB)Global Server Load Balancing (GSLB)  Specialized DNS servers that keep track of server locations and states  Good only for intra-company use. Not able to change caches at external servers. GSLB Internet Client 1 Client 3 Probes DNS Request DNS Response VIP2 DNS Request DNS Response VIP1 Server Server Load Balancer Server Server Load Balancer Server Server Load Balancer VIP1 VIP3 VIP3
  • 10. 8-10 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Load Balancing ModesLoad Balancing Modes What changes are made to client requests so that the request is routed to the correct server? 1. Dual NAT (One-Arm mode) 2. Server NAT (Routed Mode) 3. Transparent Mode (Direct Routed Mode) Type Change Source IP Address? Change Source TCP Port? Dual NAT Y Y Server NAT N Y Transparent N N
  • 11. 8-11 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Network Address Translation (NAT)Network Address Translation (NAT)  Private IP addresses 192.168.x.x cannot be used on the public Internet  NAT overwrites source addresses and port on all outgoing packets. Makes a note. Writes corresponding destination addresses and port on all incoming packets  Only outgoing connections are possible NAT Internet 192.168.0.201 192.168.0.203 192.168.0.204 192.168.0.205 128.252.73.216
  • 12. 8-12 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis NAT ExampleNAT Example Destination Dst: 74.125.224.210 Src: 192.168.0.201 IP TCP Dst: 80 Src: 8001 Dst: 74.125.224.210 Src: 128.252.73.216 IP TCP Dst: 80 Src: 3001 Dst: 192.168.0.201 Src: 74.125.224.210 IP TCP Dst: 8001 Src: 80 Dst: 128.252.73.216 Src: 74.125.224.210 IP TCP Dst: 3001 Src: 80 NATSource Outgoing Source Address Outgoing Source Port New Source Port 192.168.0.201 8001 3001 192.168.0.201 3002 3002 192.168.0.202 8001 3003 NAT Internet 192.168.0.201 192.168.0.202 128.252.73.216 Public Address New Port #
  • 13. 8-13 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis NAT64 and NAT46NAT64 and NAT46  NAT described so far is called NAT44 (both internal and external addresses are IPv4).  A NAT allows internal addresses to be IPv6 even if the external Internet is still IPv4 and vice-versa.  This allows organizations and/or carriers to transition to IPv6 now. Ref: http://en.wikipedia.org/wiki/NAT64
  • 14. 8-14 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Carrier Grade NATCarrier Grade NAT  Internet Addressing and Naming Authority (IANA) has recorded 100.64.0.0/10 as shared address range Like private address space but reserved for use by carriers  Carriers can allocate an address from this range to their subscriber and then use a small number of public IPv4 or IPV6 addresses using a “Carrier Grade NAT (CGNAT)” Also known as NAT444, Large Scale NAT (LSN)  These addresses can be used inside a carrier’s own network but not on public internet. These addresses can be re-used inside other carrier’s network  Shared. Subscriber A’s Home network 192.168.0.0/24 128.25.67.89 Router 100.64.1.2 NAT Subscriber B’s Home network 192.168.0.0/24 100.64.1.3 NAT CGNAT
  • 15. 8-15 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Dual NATDual NAT  Also known as “One Arm Mode”  Load balancer changes both source and destination addresses and destination port numbers on client requests. Like a regular NAT.  Server sends the response to load balancer, Load balancer uses the port # to find the client address and forwards it to clients  Client and servers can be on the same subnet. Servers can not see real client addresses. Server 192.168.0.2 Dst: 74.125.224.210 Src: 128.252.73.216 IP TCP Dst: 80 Src: 8001 Dst: 192.168.0.2 Src: 192.168.0.1 IP TCP Dst: 80 Src: 3001 Dst: 128.252.73.216 Src: 74.125.224.210 IP TCP Dst: 8001 Src: 80 Dst: 192.168.0.1 Src: 192.168.0.2 IP TCP Dst: 3001 Src: 80 Load Balancer 74.125.224.210 192.168.0.1 Client 128.252.73.216 Server 192.168.0.3 Server 192.168.0.4 Ref: P. Srisuresh and D. Gan, “Load Sharing using IP NAT (LSNAT),” RFC 2391, Aug 1998, http://tools.ietf.org/html/rfc2391
  • 16. 8-16 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Server NATServer NAT  Also known as “Routed Mode”  Load balancer changes destination IP on client requests No changes to port numbers.  Server sends the response directly to client  Load balancer is made the default gateway. All server responses go through the load balancer Load balancer changes the source IP addresses on responses.  Works only if clients and servers are on different subnets. Servers can see the real client addresses (Good for security). Server 192.168.0.2 Dst: 74.125.224.210 Src: 128.252.73.216 IP TCP Dst: 80 Src: 8001 Dst: 192.168.0.2 Src: 128.252.73.216 IP TCP Dst: 80 Src: 8001 Dst: 128.252.73.216 Src: 74.125.224.210 IP TCP Dst: 8001 Src: 80 Dst: 128.252.73.216 Src: 192.168.0.2 IP TCP Dst: 8001 Src: 80 Load Balancer 74.125.224.210 192.168.0.1 Client 128.252.73.216 Server 192.168.0.3 Server 192.168.0.4
  • 17. 8-17 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Transparent ModeTransparent Mode  Also known as “Direct Routing Mode”  All servers are programmed to respond to the same Virtual IP adr but not respond to ARP for that VIP. They have different real IP adrs for other purposes and respond to ARP for that RIP.  Load balancer is the sole layer 2 switch to server subnet. It does not changes anything at L3 or L4  Transparent It simply changes the MAC address and directs the frame to the selected server. Dst: 74.125.224.210 Src: 128.252.73.216 IP TCP Dst: 80 Src: 8001 IP TCP Dst: 128.252.73.216 Src: 74.125.224.210 IP TCP Dst: 8001 Src: 80 IP TCP Dst: 74.125.224.210 Src: 128.252.73.216 Dst: 80 Src: 8001 Dst: 128.252.73.216 Src: 74.125.224.210 Dst: 8001 Src: 80 Load Balancer Client 128.252.73.216 Server 74.125.224.210 Server 74.125.224.210 Server 74.125.224.210
  • 18. 8-18 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Firewall Load BalancingFirewall Load Balancing  They need to see real IP addresses of clients  Transparent mode (balance via MAC addresses)  Firewalls are stateful  Return traffic through the same firewall  Solution: Complementary hashing using return load balancer. LB1 hashes source IP and/or Port to select firewall instance LB2 hashes destination IP and/or Port to select firewall instance. This is also known as a “Firewall Sandwich” LB1 LB2 Server Server ServerServerServerClient Client Client Firewall Firewall Firewall … … …
  • 19. 8-19 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Reverse Proxy Load BalancingReverse Proxy Load Balancing  Proxies used for security, caching, application acceleration  Proxies are usually used for outgoing requests  Reverse proxies are used for incoming requests  Usually transparent mode is used  Load balancing using predictors such as hashing or round robin Client Load Balancer Reverse ProxyReverse Proxy Server Server Reverse Proxy Reverse Proxy Client Client Client … ……
  • 20. 8-20 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis SSL OffloadSSL Offload  Secure Socket Layer (SSL) and Transport Layer Security (TLS) are used for secure connections, e.g., https://  Secure  Application data is encrypted.  Some load balancer provide SSL offload 1. SSL Termination: Client to LB is secure. LB to Servers is clear. LB can select servers based on application data. 2. SSL Initiation: Client to LB is clear. LB to servers is secure.  Used when the client is local but the server is remote.  Helps clients by SSL offload.  One certificate can be used for all clients Save cost 3. End-to-end SSL: Client-to-LB, LB-to-servers both secure. Internal encryption can be simpler. One Certificate for all servers. Client LB Server
  • 21. 8-21 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis TCP Multiplexing ADCTCP Multiplexing ADC  TCP connections require 3-way handshake, ack for segments, sliding window flow control, congestion control, and termination for each connection  A ADC can be used to reduce the number of TCP connections.  Also, helps reduce total latency since LB to server connection runs at high window levels. Client TCP Multiplexing ADC Server Client Client Client … Multiple short-term TCP connections from clients Single long-term TCP connection to server
  • 22. 8-22 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis HTTP CompressionHTTP Compression  Most http responses are compressed to reduce bandwidth usage  A load balancer can offer this service and relieve the servers  This is just one example of numerous other application acceleration techniques
  • 23. 8-23 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis ADC Proliferation in Data CentersADC Proliferation in Data Centers  Application logic in servers  Security (firewall, intrusion detection, SSL offload) in middle boxes  Performance optimization (WAN optimizers, content caches) middleboxes  Application-level policy routing (APR): Partitioning and replication middleboxes SSL SSL SSL SSL ALG CBR ALG CBR ALG CBR ALG CBR Application  Servers L2 Switches Application Level  Gateways (ALG) & Content‐Based  Routers CBR) Load Balancers Load Balancers Load Balancers Load Balancers L2 Switches Application  Firewalls Intrusion  Detection and Prevention  Systems SSL  Offloaders Public Internet Data Center
  • 24. 8-24 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis ADC Proliferation (Cont)ADC Proliferation (Cont)  Number of middleboxes (Application Delivery Controllers) is comparable to the number of routers  Market size of optimization ADCs will grow from 1.5B in 2009 to $2.24B in 2013  Security appliances will grow from $1.5B in 2010 to $10B in 2016 Ref: Technavio, “Global Application Delivery Controllers Market in Datacenters 2009-2013,” March, 2010, http://www.technavio.com/content/global-application-delivery-controllersmarket-datacenters-2009-2013 Ref: Vyas Sekar, et. al., “The Middlebox Manifesto: Enabling Innovation in Middlebox Deployments,” ACM HotNets 2011. Appliance Type Number Firewalls 166 NIDS 127 Conferencing/Media Gateways 110 Load Balancers 67 Proxy Caches 66 VPN devices 45 WAN optimizers 44 Voice Gateways 11 Middleboxes total 636 Routers ~ 900
  • 25. 8-25 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Virtual ADCsVirtual ADCs  Hardware Based vADCs:  A single physical ADC presents multiple virtual contexts  Each virtual ADC can be used by a different tenant or different application  Software Based vADCs: Inside or outside a physical server.  Run on standard processors (pADCs generally run on monolithic hardware) vServer vServer vServer vLoad Balancer Hypervisor vADC1 vADC2 vADCn ADC
  • 26. 8-26 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis MultiMulti--Function ADCsFunction ADCs  Combine in one ADC:  Protocol optimization  Location based DNS  Load balancing  Security  Data compression
  • 27. 8-27 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis SummarySummary 1. Application delivery involves partitioning an application based on server context, user context, application context 2. Load balancer was the first application delivery controller. Now ADCs are used for many common services such as firewalls, TCP multiplexing, proxy, etc. 3. Many different flavors of NAT are used by ADCs. 4. ADCs are becoming virtual and multi-function.
  • 28. 8-28 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Reading ListReading List  G. Santana, “Datacenter Virtualization Fundamentals,” Cisco Press, 2014, pp. 110-139, ISBN: 1587143240 (Safari Book) (Must Read)
  • 29. 8-29 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Wikipedia LinksWikipedia Links  http://en.wikipedia.org/wiki/Address_Resolution_Protocol  http://en.wikipedia.org/wiki/Application_delivery_controller  http://en.wikipedia.org/wiki/Application_delivery_network  http://en.wikipedia.org/wiki/Carrier-grade_NAT  http://en.wikipedia.org/wiki/Delayed_binding  http://en.wikipedia.org/wiki/Domain_Name_System  http://en.wikipedia.org/wiki/HTTP_compression  http://en.wikipedia.org/wiki/Load_balancing_(computing)  http://en.wikipedia.org/wiki/Middlebox  http://en.wikipedia.org/wiki/Network_address_translation  http://en.wikipedia.org/wiki/Proxy_server  http://en.wikipedia.org/wiki/Reverse_proxy  http://en.wikipedia.org/wiki/Round-robin_DNS  http://en.wikipedia.org/wiki/Secure_Socket_Layer  http://en.wikipedia.org/wiki/SSL_acceleration  http://en.wikipedia.org/wiki/Virtual_IP_address
  • 30. 8-30 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis AcronymsAcronyms  ADC Application Delivery Controller  ALG Application Level Gateways  API Application Programming Interface  APR Application-level Policy Routing  ARP Address Resolution Protocol  CBR Content Based Router  CGNAT Carrier Grade Network Address Translation  DNS Domain Name System  GSLB Global Service Load Balancer  HTTP Hypertext Transfer Protocol  IANA Internet Addressing and Naming Authority  IP Internet Protocol
  • 31. 8-31 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Acronyms (Cont)Acronyms (Cont)  IPv4 Internet Protocol version 4  IPv6 Internet Protocol version 6  ISP Internet Service Provider  LB Load Balancing  MAC Media Access Control  NAT Network Address Translation  NAT44 NAT IPv4 private to IPv4 public  NAT444 NAT IPv4 private to IPv4 public via IPv4 Carrier  NAT46 NAT IPv4 private to IPv6 public  NAT64 NAT IPv6 private to IPv4 public  NIDS Network Intrusion Detection Systems
  • 32. 8-32 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Acronyms (Cont)Acronyms (Cont)  pADC Physical Application Delivery Controller  RIP Real IP Address  SSL Secure Socket Layer  TCP Transmission Control Protocol  TLS Transport Layer Security  vADCs Virtual Application Delivery Controller  VIP Virtual IP address  VPN Virtual Private Network  vServer Virtual Server  WAN Wide Area Network
  • 33. 8-34 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Quiz 8Quiz 8 1. Video messages going to one server group while accounting to another is an example of ________________-based partitioning 2. Windows users being served by a different server group than iphone user is an example of ________________-context based partitioning. 3. A centrally managed set of servers working together on one application is called server ________________ 4. ________________ are synthetic request sent by load balancer to see if a server is up. 5. Load balancing rules are called ________________ 6. Layer ________________ switching requires delayed binding. 7. One problem with load balancing using ________________ is that it does not know whether a server is up. 8. Global server load balancing is good mostly for ________________ use. 9. In a NAT64 system, the private network is ________________ and the public network is ________________. 10. 100.64.0.0/10 has been allocated as ________________ address range.
  • 34. 8-35 ©2013 Raj Jainhttp://www.cse.wustl.edu/~jain/cse570-13/Washington University in St. Louis Solution to Quiz 8Solution to Quiz 8 1. Video messages going to one server group while accounting to another is an example of *content*-based partitioning 2. Windows users being served by a different server group than iphone user is an example of *user*-context based partitioning. 3. A centrally managed set of servers working together on one application is called server *Cluster* 4. *Probes* are synthetic request sent by load balancer to see if a server is up. 5. Load balancing rules are called *Predictor* 6. Layer *7* switching requires delayed binding. 7. One problem with load balancing using *rotating DNS* is that it does not know whether a server is up. 8. Global server load balancing is good mostly for *intra-company* use. 9. In a NAT64 system, the private network is *IPv6* and the public network is *IPv4*. 10. 100.64.0.0/10 has been allocated as *shared* address range.