Data Center Networking –Server Load Balancing –Server Offload (SSL/HTTP Compression) WAN Optimization –Caching –Compression –TCP Optimization Global Data.

Slides:



Advertisements
Similar presentations
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Advertisements

Sikker adgang fra alle devices edgemo summit CPH maj 2014.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Content Switch. Introduction of content web switch.. Some content switch products in the market.. Design of a content switch.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Putting the Network to Work
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Network Diagram with International Standard
Unified Services Router Sales Guide Apr, Content Unified Services Router Introduction Product Introduction and Market Status Performance Overview.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Chapter 5 Link Layer and LANs
1 © 2001 Cisco Systems, Inc. All rights reserved. Cisco Content Delivery Solutions Fabrice Serey Zagreb 23/09/02.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
Network Fundamentals. Network Devices Routers (Layer 3)
Packet Protocols University of Sunderland CSEM02 Harry R. Erwin, PhD.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
PVN Overview IP-VPN : IP over Virtual Private Network IP-VPN over Frame Relay IP-VPN over ATM MPLS IP-VPN over Gigabit Network IP-VPN over TDM.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1 MPLS Lab Physical Connection Diagram.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Inter-AS Option C between NVO3 and BGP/MPLS IP VPN network draft-hao-bess-inter-nvo3-vpn-optionc-00 Weiguo Hao Lucy Yong Susan Hares Nov, 2014 Honolulu.
K. Salah1 Security Protocols in the Internet IPSec.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Presented by: Philippe Bogaerts Sr. Channel Field Systems Engineer Benelux Building an agile IPv6 infrastructure.
1 MTU Extended Community for BGP-4 Q. Zeng, J. Dong (Huawei Technologies) IETF81 IDR July 2011 Quebec draft-zeng-idr-bgp-mtu-extension-00.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Web page – Html –base file – Objects (first DNS) First get html file Then browser reads the html and gets the objects.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
MPLS Virtual Private Networks (VPNs)
Networks – Network Fundamentals
Virtualization of networks
Network Security Solution
NET 536 Network Security Firewalls and VPN
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
A Typical Connection Scenario
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
Chapter 6 The Data Link layer
Chapters 1~5 Overview Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley Prof. Hong Liu for ECE369 Adapted from.
Ron Carovano Manager, Business Development F5 Networks
TCP Protocol Analysis Access UMKC Home Page.
Synthesis A day in the life of a web request
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Data Center Networking –Server Load Balancing –Server Offload (SSL/HTTP Compression) WAN Optimization –Caching –Compression –TCP Optimization Global Data Center Networking Virtual Private Networks –TDM Circuit –MPLS LSP –IPSec –SSL

Networking Segments Service Provider (L3 Routing) Telcos Cable Enterprise (L2 Switching) Business University Evolved into Data Center Networking

Basic HTTP Request Client Server Local Name Server Intermediate Name Server Authoritative Name Server

Single Data Center HTTP Requests Clients Server Farm Server Load Balancer Intermediate Name Server Local Name Server Authoritative Name Server HTTPS + Compression

Basic HTTP Transaction LANWANDC SYN SYN/ACK ACK HTTP GET Response

WAN Optimized HTTP Requests Clients Server Farm Server Load Balancer Intermediate Name Server Authoritative Name Server Local Name Server Cache Prefetch TCP Connection HTTPS + Compression

WAN Optimization LANWANDCLANWANDC Prefectch Cached Responses SYN SYN/ACK ACK HTTP GET Response

Multi-Data Center HTTP Request Clients Local Name Server Intermediate Name Server Authoritative Name Server Global Server Load Balancer Intermediate Name Server Authoritative Name Server Global Server Load Balancer Server Load Balancer Server Farm Server Load Balancer Server Farm Local Name Server

Data Center Load Balancing Web Servers ISP-1ISP-2 Database Servers PIX ™ Firewall Secure Content Accelerator Content Switch Secure Content Accelerator

Virtual Private Networks Address Privacy (i.e. Virtual Network) ATM Frame Relay MPLS Data Privacy (i.e. Encryption) IPSec SSL

Single Service Provider Network Global Server Load Balancer Server Load Balancer Server Farm Global Server Load Balancer Server Load Balancer Server Farm Global Server Load Balancer Server Load Balancer Server Farm Client A Client B Client C DataCenter D DataCenter E DataCenter F

AS 2 CE PE Single Service Provider Scenario P OSPF w/ MPLSRIP SRC IP DST IP SRC IP DST IP LDP Label SRC IP DST IP LDP Label SRC IP DST IP IPSec/SSL IPSec or ATM/FR/PW SRC IP DST IP DLCI VPI/VCI PW Label SRC IP DST IP DLCI VPI/VCI PW Label SRC IP DST IP DLCI VPI/VCI PW Label SRC IP DST IP

AS 1AS 3 CE PE ASBR Inter-AS Scenario PP RIP EBGP w/ MPLS ? SRC IP DST IP SRC IP DST IP SRC IP DST IP VPN Label LDP Label SRC IP DST IP VPN Label LDP Label SRC IP DST IP VPN Label IPSec/SSL IPSec or ATM/FR/PW OSPF w/ MPLS

LDP Label LDP Label AS 1 AS 2 AS 3 CE PE CSC-CE CSC-PE CSC-CE CSC-PE Carrier-Serving-Carrier Scenario P PP SRC IP DST IP SRC IP DST IP VPN Label LDP Label SRC IP DST IP SRC IP DST IP VPN Label SRC IP DST IP VPN Label VPN Label RIP EBGP w/ MPLS OSPF w/ MPLS ?

LDP Label LDP Label AS 1 AS 2 AS 3 CE PE CSC-CE CSC-PE CSC-CE CSC-PE Carrier-Serving-Carrier Scenario P PP SRC IP DST IP SRC IP DST IP VPN Label LDP Label SRC IP DST IP SRC IP DST IP VPN Label SRC IP DST IP VPN Label LDP Label IPSec/SSL IPSec or ATM/FR/PW