Figures

FIGURE 1-1 Web Services Infrastructure Impact on Data Center Network Architectures 2

FIGURE 1-2 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (a) 5

FIGURE 1-3 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (b) 6

FIGURE 1-4 Influence of Multi-Tier Software Architectures on Network Architecture 8

FIGURE 1-5 Transport Layer Traffic Flows Tuned According to Client Links 10

FIGURE 1-6 Data Center Edge IP Services 11

FIGURE 1-7 Data Center Networking Considerations on the Server 12

FIGURE 1-8 Availability Strategies in the Data Center 14

FIGURE 1-9 Example Implementation of an Enterprise Muli-Tier Data Center 15

FIGURE 2-1 Main Components of Multi-Tier Architecture 19

FIGURE 2-2 Logical View of Multi-Tier Service on Demand Architecture 20

FIGURE 2-3 Network Inter-tier Traffic Flows of a Web-based Transaction 22

FIGURE 2-4 Model of Presentation/Web Tier Components and Interfacing Elements 24

FIGURE 2-5 High-Level Survey of EJB Availability Mechanisms 27

FIGURE 2-6 Decoupled Web Tier and Application Server Tier—Vertically Scaled 31

FIGURE 2-7 Tightly Coupled Web Tier and Application Server Tier—Vertically Scaled 32

FIGURE 2-8 Decoupled Web Tier and Application Server Tier—Horizontally Scaled 33

FIGURE 2-9 Tested and Implemented Architecture Solution 35

FIGURE 3-1 Overview of Overlapping Tuning Domains 39

FIGURE 3-2 Closed-Loop TCP System Model 40

FIGURE 3-3 Perfectly Tuned TCP/IP System 42

FIGURE 3-4 Tuning Required to Compensate for Faster Links 43

FIGURE 3-5 Tuning Required to Compensate for Slower Links 44

FIGURE 3-6 Complete TCP/IP Stack on Computing Nodes 45

FIGURE 3-7 TCP and STREAM Head Data Structures Tunable Parameters 47

FIGURE 3-8 TCP State Engine Server and Client Node 49

FIGURE 3-9 TCP Startup Phase 52

FIGURE 3-10 TCP Tuning for ACK Control 55

FIGURE 3-11 Comparison between Normal LAN and WAN Packet Traffic 57

FIGURE 3-12 Tuning Required to Compensate for Optical WAN 59

FIGURE 3-13 Comparison between Normal LAN and WAN Packet Traffic—Long Low Bandwidth Pipe 60

FIGURE 3-14 Increased Performance of InfiniBand/RDMA Stack 63

FIGURE 4-1 Internal Architecture of a Multi-Layer Switch 68

FIGURE 4-2 High-Level Model of Server Load Balancing 73

FIGURE 4-3 High-Level Model of the Shortest Queue First Technique 75

FIGURE 4-4 Round-Robin and Weighted Round-Robin 76

FIGURE 4-5 Server Load Balanced System Modeled as N - M/M/1 Queues 77

FIGURE 4-6 System Model of One Queue 78

FIGURE 4-7 Server Load Balance—Packet Flow: Proxy Mode 79

FIGURE 4-8 Direct Server Return Packet Flow 81

FIGURE 4-9 Content Switching Functional Model 90

FIGURE 4-10 Overview of End-to-End Network and Systems Architecture 97

FIGURE 4-11 One-Way End-to-End Packet Data Path Transversal 100

FIGURE 4-12 QoS Functional Components 104

FIGURE 4-13 Traffic Burst Graphic 106

FIGURE 4-14 Congestion Control: RED, WRED Packet Discard Algorithms 108

FIGURE 4-15 High-Level Condensed Protocol Overview 111

FIGURE 4-16 Packet Flow for Software-based Approach to SSL Processing 113

FIGURE 4-17 PCI Accelerator Card Approach to SSL Processing—Partial Offload 114

FIGURE 4-18 SSL Appliance Offloads Frontend Client SSL Processing 116

FIGURE 4-19 SSL Test Setup with No Offload 117

FIGURE 4-20 Throughput Increases Linearly with More Processors 119

FIGURE 4-21 SSL Test Setup for SSL Software Libraries 119

FIGURE 4-22 SSL Test Setup for an SSL Accelerator Appliance 120

FIGURE 4-23 Effect of Number of Threads on SSL Performance 120

FIGURE 4-24 Effect of File Size on SSL Performance 121

FIGURE 5-1 Token Ring Network 124

FIGURE 5-2 Typical FDDI Dual Counter-Rotating Ring 132

FIGURE 5-3 SAS Showing Primary Output and Input 133

FIGURE 5-4 DAS Showing Primary Input and Output 134

FIGURE 5-5 SAC Showing Multiple M-ports with Single-Attached Stations 135

FIGURE 5-6 DAC Showing Multiple M-ports with Single-Attached Stations 136

FIGURE 5-7 Communication Process between the NIC Software and Hardware 140

FIGURE 5-8 Transmit Architecture 141

FIGURE 5-9 Basic Receive Architecture 145

FIGURE 5-10 Hardware Transmit Checksum 147

FIGURE 5-11 Hardware Receive Checksum 148

FIGURE 5-12 Software Load Balancing 149

FIGURE 5-13 Hardware Load Balancing 150

FIGURE 5-14 Basic Mode Control Register 153

FIGURE 5-15 Basic Mode Status Register 154

FIGURE 5-16 Link Partner Auto-negotiation Advertisement 155

FIGURE 5-17 Link Partner Priority for Hardware Decision Process 156

FIGURE 5-18 Auto-negotiation Expansion Register 157

FIGURE 5-19 Extended Basic Mode Control Register 158

FIGURE 5-20 Basic Mode Status Register 158

FIGURE 5-21 Gigabit Extended Status Register 159

FIGURE 5-22 Gigabit Control Status 159

FIGURE 5-23 Gigabit Status Register 160

FIGURE 5-24 GMII Mode Link Partner Priority 161

FIGURE 5-25 Flow Control Pause Frame Format 161

FIGURE 5-26 Link Partner Auto-negotiation Advertisement Register 162

FIGURE 5-27 Rx/Tx Flow Control in Action 163

FIGURE 5-28 Typical hme External Connectors 166

FIGURE 5-29 Typical qfe External Connectors 175

FIGURE 5-30 Typical vge and ge MMF External Connectors 196

FIGURE 5-31 Sun GigaSwift Ethernet MMF Adapter Connectors 209

FIGURE 5-32 Sun GigaSwift Ethernet UTP Adapter Connectors 209

FIGURE 5-33 Example of Servers Supporting Multiple VLANs with Tagging Adapters 229

FIGURE 6-1 Network Topologies and Impact on Availability 263

FIGURE 6-2 Trunking Software Architecture 265

FIGURE 6-3 Trunking Failover Test Setup 266

FIGURE 6-4 Correct Trunking Policy on Switch 268

FIGURE 6-5 Incorrect Trunking Policy on Switch 268

FIGURE 6-6 Correct Trunking Policy on Server 269

FIGURE 6-7 Incorrect Trunking Policy on a Server 270

FIGURE 6-8 Incorrect Trunking Policy on a Server 271

FIGURE 6-9 Layer 2 High-Availability Design Using SMLT 272

FIGURE 6-10 Layer 2 High-Availability Design Using DMLT 273

FIGURE 6-11 Spanning Tree Network Setup 275

FIGURE 6-12 High-Availability Network Interface Cards on Sun Servers 280

FIGURE 6-13 Design Pattern—IPMP and VRRP Integrated Availability Solution 281

FIGURE 6-14 Design Pattern—OSPF Network 282

FIGURE 6-15 RIP Network Setup 289

FIGURE 7-1 Logical Network Architecture Overview 297

FIGURE 7-2 IP Services—Switch Functions Operate on Incoming Packets 299

FIGURE 7-3 Application Redirection Functional Model 300

FIGURE 7-4 Content Switching Functional Model 301

FIGURE 7-5 Network Switch with Persistence Based on SSL Session ID 303

FIGURE 7-6 Tested SSL Accelerator Configuration—RSA Handshake and Bulk Encryption 304

FIGURE 7-7 Network Availability Strategies 305

FIGURE 7-8 Logical Network Architecture—Design Details 306

FIGURE 7-9 Traditional Availability Network Design Using Separate Layer 2 Switches 308

FIGURE 7-10 Availability Network Design Using Large Chassis-Based Switches 309

FIGURE 7-11 Logical Network Architecture with Virtual Routers, VLANs, and Networks 310

FIGURE 7-12 Logical Network 313

FIGURE 7-13 Secure Multi-Tier 315

FIGURE 7-14 Multi-Tier Data Center Architecture Using Many Small Switches 316

FIGURE 7-15 Network Configuration with Extreme Networks Equipment 318

FIGURE 7-16 Sun ONE Network Configuration with Foundry Networks Equipment 319

FIGURE 7-17 Physical Network Connections and Addressing 321

FIGURE 7-18 Collapsed Design Without Layer 2 Switches 322

FIGURE 7-19 Foundry Networks Implementation 325

FIGURE 7-20 Firewalls between Service Modules 331

FIGURE 7-21 Virtual Firewall Architecture Using Netscreen and Foundry Networks Products 332

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset