The document introduces the Internet Content Adaptation Protocol (iCAP) which was created to standardize and modularize how content is manipulated on the internet. It discusses how iCAP aims to offload resource-intensive services from web servers to dedicated iCAP servers in order to improve scalability and performance. Examples of iCAP services that could be offloaded include virus scanning, language translation, and advertising insertion. The Network Appliance NetCache product is presented as being well-suited for deploying iCAP services through its proxy and caching capabilities.
Covers the following topics:
- Build "Single Page Applications” with the following JS MVC frameworks: Angular.js, Ember.js, BackBone.js
- Node.js
- Trends in Web Application Development
- Architectural patterns
Silver Peak & Innovation Network Technologies (InNet)
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-WAN is Created Equal eBook
JAGUAR7000, a mobile caching system.
JAGUAR7000 does chunk caching to save the bandwidth of mobile backhaul and object caching to decrease latency.
from partner link: http://www.ngt-tech.com/jaguar-7000/
This document provides an overview and analysis of network evolution and market outlook trends from March 2017. It discusses how digital transformation is driving the need for greater network scale to support cloud applications and services. Public cloud datacenter networks are growing significantly, with spending on Ethernet switching for cloud providers reaching nearly $5 billion by 2020. Telecom networks are evolving to support new virtualized and software-defined network services. Enterprise networks are adopting SD-WAN and migrating more applications to the cloud. The document analyzes trends in datacenter networking, software-defined networking, network disaggregation, and the priorities and investments of telecommunications service providers.
FatPipe Networks is an established provider of SD-WAN and hybrid-WAN solutions, having developed the concept over 15 years ago with numerous patents. Headquartered in Salt Lake City, it has offices worldwide and over 600 reseller partners. Its stable products are deployed in thousands of organizations across industries and can be implemented on-premises, in the cloud, or as a managed service. FatPipe offers centralized management and policy control, application-aware routing, security features like encryption, and sub-second failover of voice and video sessions. It provides a competitive advantage through experience, product maturity, and intellectual property protections over newer startups in the space.
CloudGenix provides a software-defined wide-area network (SD-WAN) solution that can deliver 10x or more bandwidth at 50% or greater cost savings compared to traditional MPLS networks. The solution replaces proprietary hardware routers with software that runs on commercial off-the-shelf equipment and defines the network by applications rather than IP addresses. This allows customers to build secure, application-specific networks with simplified operations and visibility into application performance.
This document summarizes a webinar presented by Coevolve on building a roadmap for the next-generation WAN. The webinar covered limitations of traditional WAN solutions, how SD-WAN provides a new approach as the foundation for the next-generation WAN, addressing the vendor management challenge that SD-WAN creates, and how to build a roadmap to transition to an SD-WAN. Key points included the cost savings and network agility benefits of SD-WAN, the application visibility and performance monitoring it provides, and Coevolve's approach to managing the increased number of third-party vendors involved in an SD-WAN solution.
Covers the following topics:
- Build "Single Page Applications” with the following JS MVC frameworks: Angular.js, Ember.js, BackBone.js
- Node.js
- Trends in Web Application Development
- Architectural patterns
Silver Peak & Innovation Network Technologies (InNet)
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-WAN is Created Equal eBook
JAGUAR7000, a mobile caching system.
JAGUAR7000 does chunk caching to save the bandwidth of mobile backhaul and object caching to decrease latency.
from partner link: http://www.ngt-tech.com/jaguar-7000/
This document provides an overview and analysis of network evolution and market outlook trends from March 2017. It discusses how digital transformation is driving the need for greater network scale to support cloud applications and services. Public cloud datacenter networks are growing significantly, with spending on Ethernet switching for cloud providers reaching nearly $5 billion by 2020. Telecom networks are evolving to support new virtualized and software-defined network services. Enterprise networks are adopting SD-WAN and migrating more applications to the cloud. The document analyzes trends in datacenter networking, software-defined networking, network disaggregation, and the priorities and investments of telecommunications service providers.
FatPipe Networks is an established provider of SD-WAN and hybrid-WAN solutions, having developed the concept over 15 years ago with numerous patents. Headquartered in Salt Lake City, it has offices worldwide and over 600 reseller partners. Its stable products are deployed in thousands of organizations across industries and can be implemented on-premises, in the cloud, or as a managed service. FatPipe offers centralized management and policy control, application-aware routing, security features like encryption, and sub-second failover of voice and video sessions. It provides a competitive advantage through experience, product maturity, and intellectual property protections over newer startups in the space.
CloudGenix provides a software-defined wide-area network (SD-WAN) solution that can deliver 10x or more bandwidth at 50% or greater cost savings compared to traditional MPLS networks. The solution replaces proprietary hardware routers with software that runs on commercial off-the-shelf equipment and defines the network by applications rather than IP addresses. This allows customers to build secure, application-specific networks with simplified operations and visibility into application performance.
This document summarizes a webinar presented by Coevolve on building a roadmap for the next-generation WAN. The webinar covered limitations of traditional WAN solutions, how SD-WAN provides a new approach as the foundation for the next-generation WAN, addressing the vendor management challenge that SD-WAN creates, and how to build a roadmap to transition to an SD-WAN. Key points included the cost savings and network agility benefits of SD-WAN, the application visibility and performance monitoring it provides, and Coevolve's approach to managing the increased number of third-party vendors involved in an SD-WAN solution.
Tech Talk by Tim Van Herck: SDN & NFV for WANnvirters
Extending SDN & NFV to WAN
This session will walk through the evolution in branch networking and how SDN & NFV principles can be applied to the enterprise WAN to achieve increased reliability and flexibility. It will also cover how to lower the associated operational expense of running a classic enterprise WAN and what industry trends are pressuring changes on the design of such networks.When applying SDN & NFV principles to the WAN, there will be a natural reduction in complexity of managing services and guaranteeing uptime of network connectivity.
About Tim Van Herck
Tim is the Director of Technology and founding member at VeloCloud Networks.He is responsible for building out a global network of Points of Presence to deliver virtual last mile service to enterprise branches. Prior to joining VeloCloud, Tim was a founding member of Aryaka Networks, which offers WAN Optimization as a service. Tim has been passionately following the leading edge of network virtualization and security solutions for the past 15 years. He holds a master's degree in Industrial Engineering from the University of Antwerp, and is based in VeloCloud's headquarters in Los Altos, CA
More info @ http://meetup.com/openvswitch
Follow us on twitter @nvirters
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
The Broadband Forum is an industry standards organization that addresses various networking topics including NFV, SDN, access networks, virtualization, cloud infrastructure, and more. Almost all of the Forum's projects relate to NFV and/or SDN in some way. Recent projects include work on 5G convergence, virtual gateway functions, SDN controllers, multi-tenant access networks, performance metrics, and a new initiative called Open Broadband for open source integration and testing. The presentation provided updates on these initiatives and discussed their importance for the industry's transition to virtualized and software-defined broadband networks.
The document provides an overview of microservices and service meshes, and uses Istio as an example service mesh implementation. It discusses how Istio allows microservices to be developed independently while providing capabilities like discovery, load balancing, resilience, metrics and tracing through lightweight proxies. The document then demonstrates what happens at each step of a request's lifecycle as it travels through an application protected by Istio's service mesh. Specifically, it shows how Istio components like Pilot, Envoy, Mixer and Citadel work together to provide control, observability and security for microservices.
Amin Vahdat
Principal Engineer
Google
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Aryaka provides a network as a service that offers TCP optimization, quality of service controls, and a global private network to deliver consistent performance. Their SD-WAN technology enables link aggregation and reduced complexity at branch offices. The service integrates cloud/SaaS applications and provides network and application visibility through a customer portal. Customers experience faster branch office connectivity, cloud access, and deployments compared to MPLS or IP-VPN.
1. ONAP was evolving from a "SOA-like" architecture to a "pure microservices" architecture. MSB provided transparent service registration and communication for ONAP microservices.
2. Istio is an open source service mesh that provides reliability, security, observability and manageability for microservices. It introduces a centralized control plane to manage distributed sidecars.
3. Integrating Istio with ONAP would provide benefits like distributed tracing, metrics visibility and service graph for ONAP microservices. It is important to address challenges in supporting multiple network interfaces and coarse-grained services.
OAuth 2.0 is an open standard for authorization that allows third-party applications to securely access private user data from APIs, without requiring the user to share their username and password. It specifies a process for users to authorize applications to access their data on other servers, issuing access tokens that applications can use to make API requests on the user's behalf. OAuth addresses issues with passwords by allowing temporary, limited access without exposing user credentials.
MSB (Microservice Bus) provides solutions for common challenges in microservices architectures. It uses a service gateway for client access, service registration and discovery to dynamically find services, and centralized authentication for access control. The MSB architecture includes components like the service gateway, service registry, and plugins for additional functionality. It aims to provide high availability, separation of internal and external gateways, and extensibility through a plugin model. Example APIs and services are demonstrated for registration and requests.
The new trend of open source based hardware and software is disrupting the data center market unleashing unprecedented value to the customers. Come join us to see how the community based open source networking software OpenSwitch completes the all open sourced data center solution end to end, from the hardware layer to the cloud stack, and to see how HPE and its partners accelerating its adoption with the industry leading HPE Altoline, and OpenSwitch product line.”
In these slides you will be able to learn about:
1. Traditional Network Upgrades
2. Controller Upgrade CI/CD Toolsets
3. Data and Control Layer Separation
4. Challenges with OpenFlow Hitless Upgrade
5. Controller APP Change
6. Controller Infrastructure
7. No pipeline change
8. Node Upgrades
9. Controller & Application Upgrades
10. Multi Site Cluster/Controller groups
Javier Benitez's talk from the 2017 Open Networking Summit.
Colt is transforming the way they do business and offer network services to customers through the adoption of SDN & NFV as part of a company-wide transformation program called Novitas. Javier Benitez will focus in this presentation on active Colt’s Novitas developments, sharing with the audience their experience in deploying SDN & NFV solutions in production both for Ethernet and IP services, the learning associated as well as their future plans. In particular, Javier Benitez will cover Colt developments around Ethernet & IP on Demand, SD VPN, SDN controlled MPLS packet core and SDN/NFV NNI standardization.
The greatest SDWAN sales slidedeck ever createdRonald Bartels
This document discusses the opportunity for service providers and operators to leverage SDWAN. It notes that legacy networks are facing challenges keeping up with business needs to migrate to the cloud. SDWAN provides a solution by enabling greater network agility and resilience while improving application performance across multiple connection types. The majority of businesses will convert to SDWAN in the next few years, making it crucial for operators to develop an SDWAN strategy. SDWAN provides incremental improvements through technologies as well as processes, people, and maximizing automation.
Get an in-depth review of HPE's SDN applications and how best to take advantage of them to simplify network operations, increase network security and improve end user experience.
IBM Cloud Direct Link 2.0 is the NextGen offering on Direct Link. This presentation provide details on the new DL 2.0 offering and difference between DL 1.0 and 2.0
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Linux/Apache web servers provide flexibility and control over a web presence while delivering high performance and administrative control. They are an open source alternative to proprietary Microsoft web servers like BackOffice and IIS, which make publishing documents and information on the web easy using Windows 2000 Server. Analysis of server usage statistics show that Apache has the largest market share across domains according to surveys by Netcraft.
This document provides an introduction to accessing databases using JDBC and MySQL. It discusses how JDBC allows Java programs to connect to and query databases in a vendor-neutral way. It also describes how to install and start the MySQL database server and client programs. It provides examples of connecting to MySQL via JDBC, selecting databases, viewing table schemas, running queries, and creating, dropping, and manipulating tables.
Tech Talk by Tim Van Herck: SDN & NFV for WANnvirters
Extending SDN & NFV to WAN
This session will walk through the evolution in branch networking and how SDN & NFV principles can be applied to the enterprise WAN to achieve increased reliability and flexibility. It will also cover how to lower the associated operational expense of running a classic enterprise WAN and what industry trends are pressuring changes on the design of such networks.When applying SDN & NFV principles to the WAN, there will be a natural reduction in complexity of managing services and guaranteeing uptime of network connectivity.
About Tim Van Herck
Tim is the Director of Technology and founding member at VeloCloud Networks.He is responsible for building out a global network of Points of Presence to deliver virtual last mile service to enterprise branches. Prior to joining VeloCloud, Tim was a founding member of Aryaka Networks, which offers WAN Optimization as a service. Tim has been passionately following the leading edge of network virtualization and security solutions for the past 15 years. He holds a master's degree in Industrial Engineering from the University of Antwerp, and is based in VeloCloud's headquarters in Los Altos, CA
More info @ http://meetup.com/openvswitch
Follow us on twitter @nvirters
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
The Broadband Forum is an industry standards organization that addresses various networking topics including NFV, SDN, access networks, virtualization, cloud infrastructure, and more. Almost all of the Forum's projects relate to NFV and/or SDN in some way. Recent projects include work on 5G convergence, virtual gateway functions, SDN controllers, multi-tenant access networks, performance metrics, and a new initiative called Open Broadband for open source integration and testing. The presentation provided updates on these initiatives and discussed their importance for the industry's transition to virtualized and software-defined broadband networks.
The document provides an overview of microservices and service meshes, and uses Istio as an example service mesh implementation. It discusses how Istio allows microservices to be developed independently while providing capabilities like discovery, load balancing, resilience, metrics and tracing through lightweight proxies. The document then demonstrates what happens at each step of a request's lifecycle as it travels through an application protected by Istio's service mesh. Specifically, it shows how Istio components like Pilot, Envoy, Mixer and Citadel work together to provide control, observability and security for microservices.
Amin Vahdat
Principal Engineer
Google
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Aryaka provides a network as a service that offers TCP optimization, quality of service controls, and a global private network to deliver consistent performance. Their SD-WAN technology enables link aggregation and reduced complexity at branch offices. The service integrates cloud/SaaS applications and provides network and application visibility through a customer portal. Customers experience faster branch office connectivity, cloud access, and deployments compared to MPLS or IP-VPN.
1. ONAP was evolving from a "SOA-like" architecture to a "pure microservices" architecture. MSB provided transparent service registration and communication for ONAP microservices.
2. Istio is an open source service mesh that provides reliability, security, observability and manageability for microservices. It introduces a centralized control plane to manage distributed sidecars.
3. Integrating Istio with ONAP would provide benefits like distributed tracing, metrics visibility and service graph for ONAP microservices. It is important to address challenges in supporting multiple network interfaces and coarse-grained services.
OAuth 2.0 is an open standard for authorization that allows third-party applications to securely access private user data from APIs, without requiring the user to share their username and password. It specifies a process for users to authorize applications to access their data on other servers, issuing access tokens that applications can use to make API requests on the user's behalf. OAuth addresses issues with passwords by allowing temporary, limited access without exposing user credentials.
MSB (Microservice Bus) provides solutions for common challenges in microservices architectures. It uses a service gateway for client access, service registration and discovery to dynamically find services, and centralized authentication for access control. The MSB architecture includes components like the service gateway, service registry, and plugins for additional functionality. It aims to provide high availability, separation of internal and external gateways, and extensibility through a plugin model. Example APIs and services are demonstrated for registration and requests.
The new trend of open source based hardware and software is disrupting the data center market unleashing unprecedented value to the customers. Come join us to see how the community based open source networking software OpenSwitch completes the all open sourced data center solution end to end, from the hardware layer to the cloud stack, and to see how HPE and its partners accelerating its adoption with the industry leading HPE Altoline, and OpenSwitch product line.”
In these slides you will be able to learn about:
1. Traditional Network Upgrades
2. Controller Upgrade CI/CD Toolsets
3. Data and Control Layer Separation
4. Challenges with OpenFlow Hitless Upgrade
5. Controller APP Change
6. Controller Infrastructure
7. No pipeline change
8. Node Upgrades
9. Controller & Application Upgrades
10. Multi Site Cluster/Controller groups
Javier Benitez's talk from the 2017 Open Networking Summit.
Colt is transforming the way they do business and offer network services to customers through the adoption of SDN & NFV as part of a company-wide transformation program called Novitas. Javier Benitez will focus in this presentation on active Colt’s Novitas developments, sharing with the audience their experience in deploying SDN & NFV solutions in production both for Ethernet and IP services, the learning associated as well as their future plans. In particular, Javier Benitez will cover Colt developments around Ethernet & IP on Demand, SD VPN, SDN controlled MPLS packet core and SDN/NFV NNI standardization.
The greatest SDWAN sales slidedeck ever createdRonald Bartels
This document discusses the opportunity for service providers and operators to leverage SDWAN. It notes that legacy networks are facing challenges keeping up with business needs to migrate to the cloud. SDWAN provides a solution by enabling greater network agility and resilience while improving application performance across multiple connection types. The majority of businesses will convert to SDWAN in the next few years, making it crucial for operators to develop an SDWAN strategy. SDWAN provides incremental improvements through technologies as well as processes, people, and maximizing automation.
Get an in-depth review of HPE's SDN applications and how best to take advantage of them to simplify network operations, increase network security and improve end user experience.
IBM Cloud Direct Link 2.0 is the NextGen offering on Direct Link. This presentation provide details on the new DL 2.0 offering and difference between DL 1.0 and 2.0
Modern application architectures are embracing public clouds, microservices, and container schedulers like Kubernetes and Nomad. These bring complex service-to-service communication patterns, increased scale, dynamic IP addresses, ephemeral infrastructure, and higher failure rates. These changes require a new approach for service discovery, configuration, and segmentation. Service discovery enables services to find and communicate with each other. Service configuration allows us to dynamically configure applications at runtime. Service segmentations lets us secure our microservices architectures by limiting access. In this talk, we cover these challenges and how to solve them with Consul providing as a service mesh.
Linux/Apache web servers provide flexibility and control over a web presence while delivering high performance and administrative control. They are an open source alternative to proprietary Microsoft web servers like BackOffice and IIS, which make publishing documents and information on the web easy using Windows 2000 Server. Analysis of server usage statistics show that Apache has the largest market share across domains according to surveys by Netcraft.
This document provides an introduction to accessing databases using JDBC and MySQL. It discusses how JDBC allows Java programs to connect to and query databases in a vendor-neutral way. It also describes how to install and start the MySQL database server and client programs. It provides examples of connecting to MySQL via JDBC, selecting databases, viewing table schemas, running queries, and creating, dropping, and manipulating tables.
MySQL is an SQL-based relational database management system that is compatible with standard SQL. SQL is used for data definition and modification. Data definition statements like CREATE DATABASE and CREATE TABLE are used to define the schema. Data modification statements like INSERT, UPDATE, and DELETE are used to add, modify, and remove data from tables. Queries use SELECT statements to retrieve data from one or more tables, along with WHERE and JOIN clauses to filter rows and aggregate functions to perform calculations on groups of data.
Web servers – features, installation and configurationwebhostingguy
A web server is a computer program and server that allows for hosting of websites and web applications. It accepts requests from browsers and returns HTML documents and other content. Common technologies used on web servers include CGI scripts, SSL security, and ASP to provide dynamic content and server-side processing. Web servers work by accepting connections from browsers, retrieving content from disk, running local programs, and transmitting data back to clients as quickly as possible while supporting threads and processes.
This document discusses using AllegroCache with a multi-threaded web server application. It describes the challenges of using AllegroCache in a multi-threaded environment where multiple threads need to access the database simultaneously. It then provides code for a simple password database application using AllegroCache that can be accessed by multiple threads of a web server safely. The code defines functions for creating and opening the password database, getting and setting password values for a given user, and closing the database.
Linux and Windows in the Web Hosting Industrywebhostingguy
This document analyzes how switching operating systems affects costs for web hosting firms. It discusses costs related to maintenance, customer support, hardware/software lifespan, and licensing fees. A survey of web hosting firms that switched from Windows to Linux found maintenance costs decreased on average 30% due to lower upgrade and support costs, while licensing fees decreased 50% on average. Customer happiness increased due to better usability, availability, performance and software support. The results suggest Linux may optimize costs and efficiency for web hosting companies, particularly smaller firms.
This document provides step-by-step instructions for setting up an email account in Outlook Express or Microsoft Outlook to be used with a POP3 email server. The instructions include entering user information, server information including the POP3 and SMTP server addresses, login information including the username and password, and configuration of outgoing server authentication and other advanced settings.
IoT Physical Servers and Cloud Offerings.pdfGVNSK Sravya
This document provides an overview of cloud computing and its relevance to IoT. It discusses various cloud storage models and APIs that enable communication with cloud services. It introduces the WAMP protocol for building publish-subscribe and RPC-based distributed apps for IoT. The document also covers using the Xively cloud platform and Django web framework for developing IoT apps. Key topics include cloud computing concepts, types of cloud services, advantages of cloud, and getting started with Django projects, apps, databases and models.
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN AppsCisco DevNet
We've all heard about SDN and how SDN provides flexible networks to solve networks operation challenges. With respect to SDN Applications, the most obvious conversation is about network applications and services. But today we will discuss how we at Cisco are addressing business challenges and impact business outcomes directly by connecting two disparate worlds of Enterprise applications (EA) and Networking stack using Cisco Integration Platform (CIP).
Enterprise Application to Infrastructure Integration - SDN AppsMiftakhZein1
This document summarizes two SDN applications that Cisco is developing - Bandwidth on Demand with Calendaring and Intelligent Traffic Steering with Scheduling. It discusses how these applications integrate business applications with infrastructure through the Cisco Integration Platform and controllers. It provides use cases for how service providers can realize new revenue streams through dynamic bandwidth management and how customers can optimize traffic across hybrid networks. Screenshots of the applications' user interfaces are included.
Service Provider Architectures for Tomorrow by Chow Khay KidMyNOG
This document discusses challenges faced by service providers and proposes an evolved programmable network architecture to address them. It summarizes that service providers face a degraded business climate, diminished relevance as services are commoditized, and strained legacy infrastructure. A new architecture is proposed using virtualization, automation, and programming to simplify processes, optimize service delivery, and leverage secure hybrid clouds. This evolved approach aims to streamline costs, increase innovation rates, provide elastic scalable services, and optimize network delivery through automation.
MuleSoft London Community October 2017 - Hybrid and SAP IntegrationPace Integration
Our latest MuleSoft meetup in London covered both hybrid connectivity and SAP integration patterns. Real business scenarios for customer and sales order management - and how to turn these into a seamless API design.
Toyota Financial Services Digital Transformation - Think 2019Slobodan Sipcic
Toyota Financial Services (TFS) and IBM partnered to develop Data & Integration Platform (D&IP) to be the hub around which all current and future TFS data sources, services, and processes interact. To that end IBM have architected and deployed a FOAK event-based data stream processing and streaming integration platform. The main components of the architecture include: Kubernetes, Apache NiFi, Apache Kafka, Schema Registry, Jenkins, S3 and MongoDB. The platform is essential for realizing the TFS' strategic data stream processing and integration needs.
At 306 Case Study The Newest Shipping Systems Its All About Rapid Informa...oscarmurray
Oscar Murray presented on a new methodology for shipping systems that integrates web services to leverage the flexibility of home-grown systems and speed of third-party solutions. This allows decreasing deployment time, increasing carrier options and functionality. Murray described how a pharmaceutical company benefited from integrating their SAP system with a third-party shipping suite using web services to eliminate issues and save 4-7% on shipping costs. Murray emphasized the importance of thorough planning, documentation, and addressing all business requirements when developing shipping systems.
The Nortel Application Accelerator is a data center appliance that accelerates delivery of web applications over the internet and WANs. It improves end user experience and productivity by accelerating applications 5-20 times. It benefits organizations with critical web apps accessed over remote links. Features include SSL acceleration, load balancing, adaptive compression, and application profiles to optimize specific apps.
Both API Gateways and Service Meshes offer similar features and capabilities but are each implemented on a different axis in your application’s data plane. Draw those capabilities in a Venn diagram, you’ll see a lot of overlap between the API Gateways and Service Meshes. This is NOT a talk about the overlap. This is a talk about the things outside the overlap and why they matter (#HereBeDragons). The talk focuses on three questions around North/South & East/West Traffic. This talk is for a senior developer/architect on where to best inject cross-cutting concerns around security, observability and resiliency enabled by API Gateways and Service Meshes.
The Aruba Network Rightsizing Best Practices Guide provides an overview of network rightsizing. Network rightsizing is a network capacity planning and cost optimization strategy based on the principle that wired and wireless LANs should be sized and structured to meet current and future demand. After explaining the principles of network rightsizing and how it can benefit your organization, the methodology for analyzing and planning a rightsized network will be discussed. Finally, you will learn how to implement a rightsized yet scalable Aruba 802.11n network.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
Replify Accelerator is a software-based WAN optimization solution that provides protocol optimization, de-duplication, and compression to remove redundant data and improve application performance over wide area networks. It can be deployed as individual clients, virtual appliances in branch offices and data centers, or in hybrid scenarios. Replify Accelerator analyzes application traffic patterns and caches frequently used data to optimize protocols like CIFS, HTTP, and others. This significantly reduces the number of requests and amount of data transferred over latency-heavy WAN links. Reporting tools provide insights into optimization effectiveness and traffic patterns.
This document discusses API management and IBM's API management solution. It provides an overview of why companies implement APIs and the benefits of API management platforms. It then focuses on IBM's API management capabilities, including API development, security, analytics, and deployment options. The document also provides a case study of a retailer using IBM API Management to enable a new mobile shopping application.
Connect Ops and Security with Flexible Web App and API ProtectionDevOps.com
Organizations continue to adopt container orchestration to drive efficiencies in their CI/CD pipelines. Given the current business climate with more employees working from home and consumers transacting more online, how can development and operations teams release at increasing velocity with protection baked in?
Connecting operations and security teams have not always been a smooth process: developers and operations staff are charged with site reliability, availability, and uptime while security staff is held responsible for securing an organization’s always-moving perimeter and valuable web layer assets. But the lines have started to blur between DevOps teams and security: you can’t guarantee uptime without baking effective application security tooling into your processes and infrastructure configurations.
A true next-generation, holistic web application and API protection platform does just that: operations teams can integrate security into their workflows and ensure new infrastructure and app code released to production is both effective and secure. Join application security experts Aneel Dadani and Orlando Barerra II from Signal Sciences to learn how your team can deploy at scale safely while gaining layer 7 visibility in production environments. Attendees will learn:
How to inspect web traffic in containers, at the API gateway, or the ingress
How DevOps teams can scale their application footprint to meet demand while securing your codebase in production
How development teams can gain visibility into how their apps and APIs are being used in production and what vulnerabilities may exist that they overlooked
Demo these application security concepts with Ansible, a simple yet powerful IT automation engine that companies use to accelerate DevOps initiatives, including baking application security into their infrastructure.
This document provides an overview of cloud computing. It defines cloud computing, describes its key characteristics including on-demand self-service, broad network access, resource pooling, and rapid elasticity. It also discusses cloud service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Additionally, it covers cloud architecture, security concerns in cloud computing, and the future of Network as a Service (NaaS).
Web services allow software components to communicate over the internet using standard protocols like HTTP and XML. They provide reusable business logic that can be accessed remotely by other applications. Some key advantages of web services include being simple, loosely coupled, stateless, and firewall friendly. The core technologies that enable web services are SOAP, WSDL, UDDI, and DISCO which handle messaging, description, discovery, and integration of web services. The typical lifecycle of a web service involves implementing it using a .NET web service, testing the service, consuming or using the service in a client application, and potentially publishing the service for discovery.
Continuous Integration and Continuous Delivery to Facilitate Web Service TestingCognizant
Quality assurance (QA) organizations can dramatically upgrade web services testing by applying continuous integration and continuous delivery/deployment (CI/CD) techniques derived from DevOps and by deploying software such as Jenkins, LISA, Maven, Cucumber and Gherkin.
Building high performance microservices in finance with Apache ThriftRX-M Enterprises LLC
Apache Roadshow Chicago Talk on May 14, 2019
In this talk we’ll look at the ways Apache Thrift can solve performance problems commonly facing next generation applications deployed in performance sensitive capital markets and banking environments. The talk will include practical examples illustrating the construction, performance and resource utilization benefits of Apache Thrift. Apache Thrift is a high-performance cross platform RPC and serialization framework designed to make it possible for organizations to specify interfaces and application wide data structures suitable for serialization and transport over a wide variety of schemes. Due to the unparalleled set of languages supported by Apache Thrift, these interfaces and structs have similar interoperability to REST type services with an order of magnitude improvement in performance. Apache Thrift services are also a perfect fit for container technology, using considerably fewer resources than traditional application server style deployments. Decomposing applications into microservices, packaging them into containers and orchestrating them on systems like Kubernetes can bring great value to an organization; however, it can also take a very fast monolithic application and turn it into a high latency web of slow, resource hungry services. Apache Thrift is a perfect solution to the performance and resource ills of many microservice based endeavors.
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...CA Technologies
Take the guesswork out of your infrastructure environment by combining CA Unified Infrastructure Management, CA Network Flow Analysis and CA Application Delivery Analysis. Learn how to optimize your infrastructure by combining IT monitoring, network traffic monitoring and application response time monitoring solutions to give you enhanced end-to-end visibility into your infrastructure. This sessions will review the power of the three solutions and explain how you can easily combine them to give you the information you need.
For more information, please visit http://cainc.to/Nv2VOe
This document discusses web-based applications and cloud computing. It begins by explaining how web-based applications hosted in the cloud are cheaper and easier to manage than desktop software. It then discusses the benefits of cloud-enabled collaboration not possible with desktop apps. The document goes on to discuss essential aspects of creating web-based apps like database integration, deployment on intranets and extranets. It also covers types of cloud services like IaaS, PaaS and SaaS and provides examples. Finally, it discusses tools for cloud development like Amazon EC2 and Google App Engine.
1) File uploads in PHP require configuring php.ini settings like enabling file uploads and setting temporary storage directories with correct permissions.
2) Forms for file uploads need to use POST with multipart/form-data encoding and include file input fields and hidden fields.
3) PHP stores uploaded files in the $_FILES array, including the temporary filename, size, type, and original name, which can then be processed and moved to a permanent location.
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
The Apache::Test framework allows running and developing tests for Apache modules and products. Key features include:
- Running existing tests through the t/TEST program
- Setting up a new testing environment by installing Apache::Test and generating a Makefile
- Developing new tests by writing Perl scripts that use Apache::Test functions and assert results
- Options for running tests individually, repeatedly without restarts, or in parallel on different ports
This document provides instructions on installing and configuring memcached to improve the performance and scalability of MySQL. Memcached is installed using package managers or by compiling from source. It is configured to listen on ports and interfaces, allocate memory, and set thread counts. The typical usage involves applications loading data from MySQL into memcached for faster retrieval, with MySQL as the backing store if data is not found in the cache.
The document discusses Novell iChain, a solution for securing web applications and servers. It provides single sign-on, encrypts data as it passes through proxies, and removes direct access to web servers. It authenticates users through LDAP or certificates and authorizes access through rules stored in eDirectory. This simplifies management and security across multiple web server platforms and applications.
Load-balancing web servers Load-balancing web serverswebhostingguy
The document discusses different approaches to load balancing web servers to address issues like scaling performance, tolerating failures, and rolling upgrades. It describes three common solutions: redirecting requests through a front-end server; using round-robin DNS to distribute requests; and employing an intelligent load balancer switch that can distribute requests based on server load and detect failures. Each approach has advantages and disadvantages related to ease of implementation, visibility to users, and ability to handle session state. The document also discusses network designs and protocols involved in load balancing, including TCP connection setup and teardown.
The document compares three methods for consolidating SQL Server databases: 1) multiple databases on a single SQL Server instance, 2) a single database on multiple SQL Server instances, and 3) hypervisor-based virtualization. It finds that consolidating multiple databases onto a single instance has the lowest direct costs but reduces security and manageability. Using multiple instances improves security but has higher resource needs. Hypervisor-based virtualization maintains security while enabling features like high availability, but has higher licensing costs. The document aims to help decide which approach best balances these technical and business factors for a given environment.
Mod_perl brings together the Apache web server and Perl programming language. It allows Apache to be configured and extended using Perl, and significantly accelerates dynamic Perl content. Mod_perl supports Apache versions 1.3 and 2.x and integrates Perl at every stage of the request process to provide great flexibility and control over Apache functionality. The mod_perl community provides extensive documentation and quick support responses.
Mod_perl brings together the Apache web server and Perl programming language. It allows Apache to be configured and extended using Perl, and significantly accelerates dynamic Perl content. Mod_perl supports Apache versions 1.3 and 2.x and integrates Perl at every stage of the request process to provide great flexibility and control over Apache functionality. The mod_perl community provides extensive documentation and quick support responses.
The document discusses various aspects of designing an effective website, including analyzing content and target audiences, organizing site structure and navigation, and implementing design elements. The key steps outlined are to analyze content and audience needs, organize the site structure into main sections and subsections, and implement an intuitive navigation system to help users easily find relevant information. Maintaining and optimizing the site over time are also emphasized.
This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 with Microsoft Windows Server 2008 on Dell PowerEdge servers and Dell storage systems. It documents best practices for implementing SQL Server 2005 solutions using Dell hardware and software components that have been tested and validated to help ensure successful deployment and optimal performance. The white paper covers storage configuration, network configuration, operating system configuration, and SQL Server configuration recommendations.
1. The document discusses the evolution of business models for IT infrastructure from proprietary systems within individual companies to more open standards and shared infrastructure leveraging the internet.
2. It describes new service models like client-server computing, web services, and on-demand/utility computing which allow flexible provisioning of computing resources on a needs basis.
3. Managing diverse IT infrastructures requires considerations around outsourcing non-core functions, developing service level agreements, managing legacy systems, and aligning infrastructure capabilities to business strategy through appropriate investment.
The document discusses different types of websites that can be created for business purposes including traditional, blog-based, and group/network sites. It provides information on setting up each type of site for free or at low cost using online tools or designers, and how to add features like domains, payment systems, and linking domains to sites. Options for free and cheap site creation using tools like Google Sites are demonstrated.
This document outlines Saint Louis University's strategy for improving power management of IT equipment to reduce costs and environmental impact. Key points include:
1) SLU aims to standardize power-optimized default settings on all managed PCs and laptops through automated software and establish policies around exceptions and existing devices.
2) Potential savings are estimated from generational improvements in computer hardware and adopting lower-power modes like sleep versus screensavers.
3) The strategy also involves consolidating servers, enabling energy-efficient settings on printers and other electronics, and establishing institutional goals around student computer energy use.
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
This document provides instructions for using Microsoft SQL and Excel to extract data from a SmartSite SQL database, manipulate it in Excel using functions, and update the SQL tables with the modified data to streamline content work. It covers connecting to and querying SQL databases, common Excel functions for editing data, and steps for importing an Excel file into a SQL table to update information. Examples of specific SQL queries and Excel functions are provided along with a scenario walking through the full process.
The document discusses various topics related to virtualization including drivers for virtualization, practical applications, definitions of terms like virtualization and paravirtualization, and tools like Xen, VMWare, and Microsoft virtualization products. It provides information on installing and configuring Xen on SuSE Linux, discusses security and auditing considerations for Xen, and demonstrates Xen functionality.
The document discusses strategies for converting low-value hosting clients into high-value customers by marketing additional services. It recommends continuously marketing to clients through email, forums, blogs and surveys to promote add-on services like collaboration tools, applications, and infrastructure-as-a-service offerings which can significantly increase revenue per client. Measuring marketing campaigns and conversions is key to optimizing efforts to up-sell existing clients.
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
The document discusses WebMapping Solutions and their products and services. It summarizes their middleware and mapping tools like MapBroker, Generic GUI Builder, and MapOrganiser. MapBroker powers many of their applications. Their products allow users to build custom web mapping applications and manage both geographic and non-geographic data in a single view. Their services include publishing data online, application development, and strategic consulting. Some examples of government and organization clients are listed.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
1. Internet Content Adaptation Protocol (iCAP)
Network Appliance
Version 1.01
5/30/01
Contents
1. Scope/Executive Summary
2. Introduction
3. iCAP Architecture
4. NetCacheTM Deployment in Support of iCAP
5. Conclusion
Glossary
References
1. Scope/Executive Summary
This document provides a brief introduction to iCAP, explains what iCAP means to the future of
Internet content handling, and discusses how NetCache is ideally suited to handle these iCAP
enabled value-added services. The following section introduces iCAP, shows why it is needed,
and how it can be leveraged to standardize and modularize Internet content manipulation
(content vectoring).
2. Introduction
iCAP was formally introduced in December 1999 by the iCAP Forum ( www.i-cap.org ). The
iCAP Forum is a coalition of Internet businesses covering a wide array of services; including
hardware and software providers, content distribution providers, application service providers,
advertising institutions, hosting providers, broadband providers, etc. These members are
dedicated to making the future of the Internet accessible (and scalable) to the evolving value-
added services (services added onto plain old Internet access) business. This forum was co-
founded (and still co-chaired) by Network Appliance and Akamai Technologies. What are the
goals of the iCAP Forum?
Network Appliance iCAP Page 1 of 13
2. • Make content more flexible for end users.
• Provide a common, open standard for edge-based appliance communication to handle
these value-added services.
• Off-load resource-intensive APIs and other services from Web site servers to dedicated
servers.
The protocol needs to:
• Be simple.
• Be scalable.
• Use existing infrastructure.
• Be modular in its service. That is, services must be able to be added and subtracted
without affecting the intervening architecture or its performance.
• Use existing communication methods and standards.
• Provide resource savings by leveraging edge services.
iCAP is a protocol designed to off-load specific Internet-based content to dedicated servers,
thereby freeing up resources and standardizing the way in which features are implemented. For
example, a server that handles only language translation is inherently more efficient than any
standard Web server performing many additional tasks. iCAP concentrates on leveraging edge-
based devices (proxies and caches) to help deliver value-added services. At the core of this
process is a cache that will proxy all client transactions and will process them through
iCAP/Web servers. These iCAP servers are focused on a specific function, for example, ad
insertion, virus scanning, content translation, language translation, or content filtering. Off-
loading value-added services from Web servers to iCAP servers allows those same web servers
to be scaled according to raw HTTP throughput versus having to handle these extra tasks.
iCAP in its most basic form is a “lightweight” HTTP based remote procedure call protocol. In
other words, iCAP allows its clients to pass HTTP based (HTML) messages (Content) to iCAP
servers for adaptation. Adaptation refers to performing the particular value added service
(content manipulation) for the associated client request/response.
2.1 What Initiated iCAP?
The problem with the Internet, in its early stage of growth, is the ability to scale the traffic,
bandwidth, services, access, etc. If it’s possible to do something over the Internet, odds are it
won’t scale to meet the demand. This certainly is the case for value-added services. These
services provide real and necessary applications for clients. Unfortunately, these value-added
services consume resources such as bandwidth and server processing time, and therefore
Network Appliance iCAP Page 2 of 13
3. introduce more delay into the already “click and wait” process.
Today’s services almost exclusively run on proprietary APIs that are custom built for the
provider’s particular business application. These APIs are often unreliable because they aren’t
designed to scale with the hardware as the “e-commerce” companies’ Web business grows. In
addition, these APIs can be very costly to change and any new service would require an
additional API.
Over-Taxed Servers. Today’s laundry list of services that are offered can overload and slow
down a site’s access and transactions to a point of losing business. These value-added services
each tend to run through a separate software application, causing servers to bog down. The
servers are not appliances designed from the ground up to run these APIs, but they are asked to
handle these services on top of what they already are asked to do. Such services include access,
authentication, customer information database, e-commerce, language translation, content
filtering virus scanning, ad insertion, etc., all leading to higher latency and reduced reliability.
Too Much Overhead. In addition to bogging down servers, the value-added services cause
additional latency risks by clogging bandwidth and the network highways that must carry all this
traffic.
Wireless Device Support. Supporting many of the same Web services for wireless customers
that are available for the PC user, such as synchronizing e-mail between all your latest devices,
has become a necessary service. With the proliferation of wireless devices (expansion of the
wireless market), there exists too many communication varieties (standards) that must be adapted
for communication into and out of the Internet. Adding to this problem is the relatively narrow
transmission rate (9.6kbps on average). The solution has been a collection of network devices
that include transmission towers, wireless gateways, proxy servers, and additional applications
running on top of origin servers (content) that are adapted to scale down their content and
services for the small amount of data these devices can handle.
2.2 Solution
What is the answer to the above problems? iCAP solves the above problems with its open
architecture and ease of the modular development process.
2.2.1 Benefits of iCAP
• iCAP leverages existing equipment available today. In fact, if NetCache (a proxy
appliance) proxies are already installed, then no new equipment is necessary, with the
exception of the iCAP servers.
• iCAP is HTTP based, enabling access through security barriers that only allow port 80
traffic. Therefore, no security changes to the existing network are likely.
• iCAP is an open protocol and allows any server or application provider to implement it.
Network Appliance iCAP Page 3 of 13
4. iCAP is easy to implement since it leverages Apache code. ISPs and enterprises can then
choose the appropriate value-added application provider.
• iCAP can also collect client interest information for use in targeting more focused
advertising toward these individuals.
• iCAP off-loads these value-added services to iCAP servers, freeing up the resources of
the Web servers. This reduces the access times on these sites.
• iCAP simplifies the implementation, reliability, and scalability of value-added services.
iCAP leverages edge device and infrastructure to deliver edge-based value-added services
that require content adaptation.
2.2.2 What Do All These Benefits Give You?
• Able to implement services quickly
• Able to outsource a service completely
• Improve user satisfaction
• Target ads better and cheaper
• Improve management, security, and control of content
• Optimize site scalability, reliability, and performance
• Derive new revenue streams
2.3 Example iCAP Services
2.3.1 Virus Scanning
This is the ability to perform “on-the-fly” virus checks of new content and provide cached
content that was previously scanned.
Historical Method: Virus scanning was always left to the receiving network (or PC) to
accomplish, and every object has the potential to be scanned many times, causing a waste of
resources. There is no historical “on-the-fly” method for virus scanning prior to delivery.
What are the benefits under iCAP? iCAP’s “on-the-fly” virus scanning allows previously
scanned (and unaffected) objects to be cached and provided virus free.
2.3.2 Markup Language Translation (PDAs/Cell Phones).
This is the ability to allow non-HTML devices (such as cellular phones) to talk to HTML devices
such as PCs and vice versa. This is essentially a WAP/XML/HTML translation bridge.
Network Appliance iCAP Page 4 of 13
5. Historical Method: Deploy gateways specific to translating the particular device’s language to
HTML and back. This method involves funneling all transmissions into a single set of gateways
as a point of presence to the Internet.
What are the benefits under iCAP? Under iCAP, point-of-presence entry can reside anywhere a
transmission point can tap into the network. A cache can handle all client requests through
redirects to translation iCAP servers and maintain cached copies of multiple formatted objects
for faster response to the client.
2.3.3 Advertising Insertion
This is the ability to insert ads into Web pages or to spawn new pages based on customer
preferences/history/location when a customer performs a request from a Web site such as a
search engine.
Historical Method: The historical method for ad insertion was based on either the origin Web
site’s ISP, the hosting provider, or the site itself signing up for direct advertising.
What are the benefits under iCAP? Ad insertion will be more focused to individuals based on
originating IP address of the proxy server, customer-entered keywords (for example, typing in
Star Wars may get the customer a direct ad from Amazon or a local bookshop), or customer
collected information (profiling). Profiling can be very specific. For example, an individual
browsing Scientific American may click on a car ad and later click on a car ad in National
Geographic. Based on what type of car ad was queried by the client, a specific ad could be
targeted at the client for a local car dealership that has that car for sale and it’s current price.
• Geography (IP address/zip code)
• Search engine
• Keyword adaptation
• Customer profiling
2.3.4 Human Language Translation
This is the ability to translate formatted HTML-tagged content from one language to another (for
example, English to Japanese).
Historical Method: Expansive and resource-hungry APIs running typically on client machines or
Web servers. Most of these services are manual and limited.
What are the benefits under iCAP? Under iCAP, certain originating requests will by geography
or direct input be translated by iCAP servers via redirection from proxy servers.
2.3.5 Content Filtering
Network Appliance iCAP Page 5 of 13
6. This is the ability to redirect an unauthorized or restricted request to another site/page.
Historical Method: Performed by the proxy server via manually entered information or
downloaded (subscribed database) from a site-list filtering reseller (for example, smart filter).
What are the benefits under iCAP? Under iCAP, the content filtering is more extensible from a
customer perspective. Now dynamic content can be filtered and both content filtering and the
management of the service can be out-sourced. In addition, the filtering (iCAP) servers can be
located remotely from a customer’s site.
2.3.6 Data Compression
This is the ability to Compress HTML pages or objects from an origin server.
Historical Method: No HTML compression and compression accomplished manually for
embedded objects.
What are the benefits under iCAP? Under iCAP, origin server responses can be compressed
allowing bandwidth to be saved.
2.4 iCAP Policies
Generally, iCAP does not specify the when, who, or why for content manipulation, but only how
to make content available to an application server that will perform the adaptation. For example,
if iCAP is the tool to allow content translation/adaptation, you will still need an adaptation
engine (iCAP server) to decide when, who, or why.
3. iCAP Architecture
How is iCAP architected? Since many services are expected to leverage this protocol, a modular,
simple, and “easy to implement” schema is needed. This protocol must also communicate using
existing methods and therefore be completely compatible with the installed base of standard
network devices and existing standard applications.
Commercial Web sites are sets of Web, e-commerce, file, and FTP servers and databases.
Although communication is not restricted to just HTTP, the vast majority of layer 7 traffic is
HTTP based. ICAP proxies simply use an HTTP post in which “client request” and “propose
origin server response” are encapsulated within the first part of the HTML body.
Through the use of the following four adaptation techniques, iCAP is able to facilitate all the
necessary content adaptation. In each case a cache (forward proxy) acts as the central point in
iCAP rout processing (page parsing) and initial capture and final response to the client. The
cache is able to cache portions of the iCAP for future provision without the need to secure a new
copy or reprocess the request.
Network Appliance iCAP Page 6 of 13
7. 3.1 Request Modification
Summary: The client’s request is redirected to an iCAP server that modifies the request prior to
being fulfilled by the origin server.
Details: In this model, a client sends a request to an origin server. This request is redirected to an
iCAP server by the intervening proxy server (cache). The iCAP server modifies the message and
sends it back to the proxy server. The proxy server parses the modified message and forwards it
to the origin server to fulfill the client’s request. The request is then executed by the origin server
and the response delivered to the client.
iCAP Server
2 3 iCAP "Switch Box"
1 4
6 5
Client NetCache
Origin/Content
Server
Figure 1: Request Modification
Example: Content Filtering. The client sends out a request for a Web page and the proxy server
redirects that request to the iCAP server. The iCAP server parses the HTML request and
performs URL-based filtering by comparing the request URL to a list of “banned” URLs. If the
URL is on the “banned” list, then the client’s request is modified to request an error message
from the origin server or, more likely, from the proxy server (cache). This error message is then
supplied to the client. If the origin server URL was not banned, the iCAP server would forward
the request to the origin server via the proxy server and the request would be fulfilled.
3.2 Request Satisfaction
Summary: The client’s request is redirected to an iCAP server that modifies the request prior to
being fulfilled by the origin server. The modified request is sent directly to the origin server
without returning it to the proxy server first (as is done in Request Modification).
Details: In this mode, a client sends a request to an origin server. This request is redirected to an
iCAP server by the intervening proxy server (cache). The iCAP server modifies the message and
sends it straight to the origin server for fulfillment. After processing the request, the origin server
Network Appliance iCAP Page 7 of 13
8. sends it back to the client via the iCAP server and proxy server.
1 2 3
6 5 4
Client NetCache
iCAP Server Origin/Content
Server
Figure 2: Request Satisfaction
Example: Using the same content filtering example above, the process changes with request
modification. The client’s request is still examined by the iCAP server, but if the content is not
authorized, the iCAP server will send back an error response through the proxy server and ignore
the origin server. If the client is authorized to access the origin server, then the iCAP server will
fetch the objects from the origin server and provide them to the client.
3.3 Response Modification
Summary: The client’s request is processed by the origin server, but the ensuing response is
redirected to the iCAP server for modification prior to delivery to the client.
Details: In this mode, a client sends a request to an origin server. The request is fulfilled as
would be expected by the origin server. The response, however, is redirected by the proxy server
to the iCAP server. The iCAP server modifies the response message and delivers it to the client
via the proxy server.
1 2
6 3
Client NetCache
Origin/Content
iCAP "Switch Box" 5 4
Server
iCAP Server
Figure 3: Response Modification
Example: Gateway Translation (HTML Formatting). A request is made by cellular phone for a
company’s stock profile. The request is forwarded to the origin server, which, fulfills the request.
The response by the origin server, however, is redirected to an iCAP server which modifies the
response to allow the cell phone to display the response properly. Note that the incoming request
may have to be modified to begin with (request modification).
Network Appliance iCAP Page 8 of 13
9. 3.4 Result Modification
Summary: The client’s request is processed by the origin server, and the ensuing response is
redirected to the iCAP server for modification. This differs from Response Modification in that
the iCAP server is downstream of the proxy cache.
Details: In this mode, a client sends a request to an origin server. The request is fulfilled as
would be expected by the origin server. The response, however, is redirected downstream of the
proxy server to the iCAP server. The iCAP server modifies the response message and delivers it
to the client via the proxy server. The advantage of this method over response modification is
that since the iCAP server is down-stream of the proxy, the proxy can cache objects that would
be delivered to the client.
1 2
4 3
Client NetCache
Origin/Content
6 5 iCAP "Switch Box" Server
iCAP Server
Figure 4: Result Modification
Example: Ad insertion. The client sends out a request for a Web page and the proxy server
directs that request to the origin server. The origin server fulfills the request and delivers objects
to the proxy. The proxy caches the objects and directs the response to an iCAP ad server. The
iCAP server parses the HTML response and performs profiling of the client. The iCAP server
inserts appropriate targeted adds and sends response to client.
Network Appliance iCAP Page 9 of 13
10. The following table summarizes the services available through each architecture form.
Service Architecture
Request Request Response Result
Modification Satisfaction Modification Modification
Content Yes Yes Yes Yes
Filtering
Gateway Yes Yes
Translation
Language Yes Yes Yes
Translation
Virus Scanning Yes
Ad Insertion Yes Yes Yes Yes
Data Yes Yes
Compression
Table 1: Service Architecture Summary
3.5 Protocol Details
3.5.1 Communication
iCAP communicates via TCP sessions. The iCAP server is passively listening for any redirected
requests as would be expected from any normal Web server. All iCAP message formats conform
to RFC 822.
3.5.2 Vectoring Points
The three architecture descriptions mentioned above cover the initial applications that will be
deployed for iCAP, but the actual iCAP process can be thought of as vectoring points (potential
modification nodes). A node will be referred to as a network device that processes HTML
messages. For future implementations of iCAP, these vectoring points will be the basis for the
appropriate iCAP-developed process.
• Modification of requests coming into a proxy server (cache)
• Modification of responses coming into to a proxy server (cache)
• Modification of requests coming into an iCAP server
Network Appliance iCAP Page 10 of 13
11. • Modification of responses coming into an iCAP server
4. NetCache Deployment in Support of iCAP
NetCache is a proxy appliance that reduces bandwidth load and latency. Such a device is
necessary as the center device in any iCAP implementation. The deployment of NetCache as an
iCAP gateway enables iCAP to function. In addition, NetCache is a content caching appliance
that is scalable, supports all communications protocols, and is transparent to the end user if used
with a layer 4 or 7 switch or a WCCP-enabled router.
Using NetCache for iCAP:
• NetCache is an appliance built from the ground up to serve data, not an application
running on a separate OS. This makes NetCache far more reliable and much faster in
performance than software-based proxies.
• NetCache is an edge-based device close to the user. This reduces latency time and saves
bandwidth.
• NetCache caches iCAP information and HTML objects, and can also cache virtually
anything that is a file. Adaptations of content can be performed near the edge of a
network instead of requiring an updated copy of an object from an origin server or even
an iCAP server. Previous manipulation of objects need not be repeated, as NetCache can
provide the objects quickly at the edge.
• What impact does iCAP have on the performance of the cache? Since NetCache is just a
proxy/cache, there is very little performance impact.
4.1 Why Choose NetCache?
NetCache provides the following functionality and value-added resources in addition to iCAP:
• NetCache is far more reliable than a Windows NTâ or UNIXâ server – 99.99+% up-time.
• NetCache is an appliance designed from the ground up to be a cache and not a software
package running on top of another operating system.
• NetCache eliminates stale content across geographically distributed caches.
• NetCache can handle thousands of simultaneous connections.
• NetCache can handle hundreds of megabits/sec of data throughput.
• NetCache offers outstanding proxy-based security.
• NetCache can control content of Web servers through its Eject/Pre-fetch feature.
Network Appliance iCAP Page 11 of 13
12. • NetCache works seamlessly with firewalls and can distribute traffic over multiple
firewalls.
• NetCache deploys and works seamlessly with other network components.
• NetCache frees up resources of the Web server it’s accelerating.
• NetCache supports LDAP/Radius Authentication.
• NetCache can filter out non-work-related Internet content.
• NetCache can split live streaming media to thousands of clients using all major protocols.
• NetCache can cache video/audio on-demand streams for all major media protocols
5. Conclusion
NetCache provides a high-performance, iCAP-enabled cache proxy appliance. NetCache is
99.99+% reliable, easy to install, highly scalable, and ideal for distributing load at the edge of the
network. NetCache handles many more client connections and has a much higher data
throughput than conventional network devices. Therefore, the NetCache line of products is fully
capable of handling all iCAP and caching needs of application service providers, data centers,
content providers, and hosting companies.
Glossary
HTTP
Hypertext Transport Protocol [RFC-1945,RFC-2616], the protocol most often used to
transport Web pages.
IP
Internet Protocol, the lowest-level protocol used across all portions of the Internet.
ISP
Internet Service Provider.
L4 switch
A network device that switches packets based on information from layer 4 of the ISO 7-layer
model.
LAN
Local Area Network, a high-speed network used within a building or campus. Compare to
Network Appliance iCAP Page 12 of 13
13. WAN.
POP
Point-of-Presence, a location where a customer may connect to an ISP.
Response
An HTTP response message.
Request
An HTTP request message.
TCP
Transmission Control Protocol, a connection-oriented protocol layered on top of IP.
URL
Uniform Resource Locator [RFC-1738], a concise notation used to specify the location of a
resource or object on the Internet.
WAN
Wide-Area Network, a network connecting multiple LANs, often over a large geographic
area.
WCCP
Web Cache Control Protocol.
References
[RFC-1738]
T. Berners-Lee, L. Masinter, M. McCahill, Uniform Resource Locators (URL), December
1994.
[RFC-1945]
T. Berners-Lee, R. Fielding, H. Frystyk Hypertext Transfer Protocol -- HTTP/1.0, May 1996.
[RFC-2616]
R. Fielding et al., Hypertext Transfer Protocol -- HTTP/1.1, June 1999.
RFC-draft
Network Appliance iCAP Page 13 of 13
14. iCAP Forum, iCAP Draft.
ã Network Appliance, Inc. All rights reserved. Specification subject to change without notice.
NetApp and the Network Appliance logo are registered trademarks and Network Appliance and
NetCache are trademarks of Network Appliance Inc., in the United States and other countries.
UNIX is a registered trademark in the United States and other countries, licensed exclusively
through X/Open Company Limited. All other brands or products are trademarks or registered
trademarks of their respective holders and should be treated as such.
Network Appliance iCAP Page 14 of 13