FIGURE 1-1 Web Services Infrastructure Impact on Data Center Network Architectures 2
FIGURE 1-2 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (a) 5
FIGURE 1-3 High-Level Overview of Networks Spanning Clients, Data Center, Vendors, and Partners (b) 6
FIGURE 1-4 Influence of Multi-Tier Software Architectures on Network Architecture 8
FIGURE 1-5 Transport Layer Traffic Flows Tuned According to Client Links 10
FIGURE 1-6 Data Center Edge IP Services 11
FIGURE 1-7 Data Center Networking Considerations on the Server 12
FIGURE 1-8 Availability Strategies in the Data Center 14
FIGURE 1-9 Example Implementation of an Enterprise Muli-Tier Data Center 15
FIGURE 2-1 Main Components of Multi-Tier Architecture 19
FIGURE 2-2 Logical View of Multi-Tier Service on Demand Architecture 20
FIGURE 2-3 Network Inter-tier Traffic Flows of a Web-based Transaction 22
FIGURE 2-4 Model of Presentation/Web Tier Components and Interfacing Elements 24
FIGURE 2-5 High-Level Survey of EJB Availability Mechanisms 27
FIGURE 2-6 Decoupled Web Tier and Application Server Tier—Vertically Scaled 31
FIGURE 2-7 Tightly Coupled Web Tier and Application Server Tier—Vertically Scaled 32
FIGURE 2-8 Decoupled Web Tier and Application Server Tier—Horizontally Scaled 33
FIGURE 2-9 Tested and Implemented Architecture Solution 35
FIGURE 3-1 Overview of Overlapping Tuning Domains 39
FIGURE 3-2 Closed-Loop TCP System Model 40
FIGURE 3-3 Perfectly Tuned TCP/IP System 42
FIGURE 3-4 Tuning Required to Compensate for Faster Links 43
FIGURE 3-5 Tuning Required to Compensate for Slower Links 44
FIGURE 3-6 Complete TCP/IP Stack on Computing Nodes 45
FIGURE 3-7 TCP and STREAM Head Data Structures Tunable Parameters 47
FIGURE 3-8 TCP State Engine Server and Client Node 49
FIGURE 3-9 TCP Startup Phase 52
FIGURE 3-10 TCP Tuning for ACK Control 55
FIGURE 3-11 Comparison between Normal LAN and WAN Packet Traffic 57
FIGURE 3-12 Tuning Required to Compensate for Optical WAN 59
FIGURE 3-13 Comparison between Normal LAN and WAN Packet Traffic—Long Low Bandwidth Pipe 60
FIGURE 3-14 Increased Performance of InfiniBand/RDMA Stack 63
FIGURE 4-1 Internal Architecture of a Multi-Layer Switch 68
FIGURE 4-2 High-Level Model of Server Load Balancing 73
FIGURE 4-3 High-Level Model of the Shortest Queue First Technique 75
FIGURE 4-4 Round-Robin and Weighted Round-Robin 76
FIGURE 4-5 Server Load Balanced System Modeled as N - M/M/1 Queues 77
FIGURE 4-6 System Model of One Queue 78
FIGURE 4-7 Server Load Balance—Packet Flow: Proxy Mode 79
FIGURE 4-8 Direct Server Return Packet Flow 81
FIGURE 4-9 Content Switching Functional Model 90
FIGURE 4-10 Overview of End-to-End Network and Systems Architecture 97
FIGURE 4-11 One-Way End-to-End Packet Data Path Transversal 100
FIGURE 4-12 QoS Functional Components 104
FIGURE 4-13 Traffic Burst Graphic 106
FIGURE 4-14 Congestion Control: RED, WRED Packet Discard Algorithms 108
FIGURE 4-15 High-Level Condensed Protocol Overview 111
FIGURE 4-16 Packet Flow for Software-based Approach to SSL Processing 113
FIGURE 4-17 PCI Accelerator Card Approach to SSL Processing—Partial Offload 114
FIGURE 4-18 SSL Appliance Offloads Frontend Client SSL Processing 116
FIGURE 4-19 SSL Test Setup with No Offload 117
FIGURE 4-20 Throughput Increases Linearly with More Processors 119
FIGURE 4-21 SSL Test Setup for SSL Software Libraries 119
FIGURE 4-22 SSL Test Setup for an SSL Accelerator Appliance 120
FIGURE 4-23 Effect of Number of Threads on SSL Performance 120
FIGURE 4-24 Effect of File Size on SSL Performance 121
FIGURE 5-1 Token Ring Network 124
FIGURE 5-2 Typical FDDI Dual Counter-Rotating Ring 132
FIGURE 5-3 SAS Showing Primary Output and Input 133
FIGURE 5-4 DAS Showing Primary Input and Output 134
FIGURE 5-5 SAC Showing Multiple M-ports with Single-Attached Stations 135
FIGURE 5-6 DAC Showing Multiple M-ports with Single-Attached Stations 136
FIGURE 5-7 Communication Process between the NIC Software and Hardware 140
FIGURE 5-8 Transmit Architecture 141
FIGURE 5-9 Basic Receive Architecture 145
FIGURE 5-10 Hardware Transmit Checksum 147
FIGURE 5-11 Hardware Receive Checksum 148
FIGURE 5-12 Software Load Balancing 149
FIGURE 5-13 Hardware Load Balancing 150
FIGURE 5-14 Basic Mode Control Register 153
FIGURE 5-15 Basic Mode Status Register 154
FIGURE 5-16 Link Partner Auto-negotiation Advertisement 155
FIGURE 5-17 Link Partner Priority for Hardware Decision Process 156
FIGURE 5-18 Auto-negotiation Expansion Register 157
FIGURE 5-19 Extended Basic Mode Control Register 158
FIGURE 5-20 Basic Mode Status Register 158
FIGURE 5-21 Gigabit Extended Status Register 159
FIGURE 5-22 Gigabit Control Status 159
FIGURE 5-23 Gigabit Status Register 160
FIGURE 5-24 GMII Mode Link Partner Priority 161
FIGURE 5-25 Flow Control Pause Frame Format 161
FIGURE 5-26 Link Partner Auto-negotiation Advertisement Register 162
FIGURE 5-27 Rx/Tx Flow Control in Action 163
FIGURE 5-28 Typical hme External Connectors 166
FIGURE 5-29 Typical qfe External Connectors 175
FIGURE 5-30 Typical vge and ge MMF External Connectors 196
FIGURE 5-31 Sun GigaSwift Ethernet MMF Adapter Connectors 209
FIGURE 5-32 Sun GigaSwift Ethernet UTP Adapter Connectors 209
FIGURE 5-33 Example of Servers Supporting Multiple VLANs with Tagging Adapters 229
FIGURE 6-1 Network Topologies and Impact on Availability 263
FIGURE 6-2 Trunking Software Architecture 265
FIGURE 6-3 Trunking Failover Test Setup 266
FIGURE 6-4 Correct Trunking Policy on Switch 268
FIGURE 6-5 Incorrect Trunking Policy on Switch 268
FIGURE 6-6 Correct Trunking Policy on Server 269
FIGURE 6-7 Incorrect Trunking Policy on a Server 270
FIGURE 6-8 Incorrect Trunking Policy on a Server 271
FIGURE 6-9 Layer 2 High-Availability Design Using SMLT 272
FIGURE 6-10 Layer 2 High-Availability Design Using DMLT 273
FIGURE 6-11 Spanning Tree Network Setup 275
FIGURE 6-12 High-Availability Network Interface Cards on Sun Servers 280
FIGURE 6-13 Design Pattern—IPMP and VRRP Integrated Availability Solution 281
FIGURE 6-14 Design Pattern—OSPF Network 282
FIGURE 6-15 RIP Network Setup 289
FIGURE 7-1 Logical Network Architecture Overview 297
FIGURE 7-2 IP Services—Switch Functions Operate on Incoming Packets 299
FIGURE 7-3 Application Redirection Functional Model 300
FIGURE 7-4 Content Switching Functional Model 301
FIGURE 7-5 Network Switch with Persistence Based on SSL Session ID 303
FIGURE 7-6 Tested SSL Accelerator Configuration—RSA Handshake and Bulk Encryption 304
FIGURE 7-7 Network Availability Strategies 305
FIGURE 7-8 Logical Network Architecture—Design Details 306
FIGURE 7-9 Traditional Availability Network Design Using Separate Layer 2 Switches 308
FIGURE 7-10 Availability Network Design Using Large Chassis-Based Switches 309
FIGURE 7-11 Logical Network Architecture with Virtual Routers, VLANs, and Networks 310
FIGURE 7-12 Logical Network 313
FIGURE 7-13 Secure Multi-Tier 315
FIGURE 7-14 Multi-Tier Data Center Architecture Using Many Small Switches 316
FIGURE 7-15 Network Configuration with Extreme Networks Equipment 318
FIGURE 7-16 Sun ONE Network Configuration with Foundry Networks Equipment 319
FIGURE 7-17 Physical Network Connections and Addressing 321
FIGURE 7-18 Collapsed Design Without Layer 2 Switches 322
FIGURE 7-19 Foundry Networks Implementation 325
FIGURE 7-20 Firewalls between Service Modules 331
FIGURE 7-21 Virtual Firewall Architecture Using Netscreen and Foundry Networks Products 332