throbber
UNITED STATES 
`
`Apps switches boost availability
`By Erik Giesa, special to Network World
`Network World |
`JUL 21, 2003 12:00 AM PST
`
`Layer 7 load balancing devices , also known as Web or application switches, can drill down into URLs or HTTP headers
`to direct requests. An emerging technology, deep packet inspection, allows these switches to gain an even better view
`of content.
`
`Layer 7 load balancing devices, also known as Web or application switches, can drill down into URLs or HTTP
`headers to direct requests. An emerging technology, deep packet inspection, allows these(cid:272)switches(cid:272)to gain an even
`better view of content.
`
`Web switches act as proxies for Web applications and servers sitting behind them. Users can virtualize an unlimited
`number of back-end Web applications and servers, providing better availability, scaling and performance. If an
`application or switch goes down, the switch directs client sessions to fail over to other available applications and
`servers without interrupting the client.
`
`6 simple tricks for protecting your passwords
`
`Non-HTTP-based applications or transactions would benefit from the same horizontal-scaling model. Many
`applications never use HTTP, and others might use HTTP only as the transport, such as Web services. Traditional
`Web or application switches can't do the job because HTTP is the only type of tra(cid:119)ic they can act upon.
`
`To extend the benefits of horizontal scaling to all IP applications, the load-balancing device needs to inspect deeper
`than the URL or HTTP header and into the IP datagram. Now companies can use the same architecture for non-HTTP
`back-o(cid:119)ice applications to provide the same economies of scale and operational e(cid:119)iciencies that traditional load-
`balancing devices have provided.
`
`Deep packet inspection addresses this problem. This technology directs, persists, filters and logs IP-based
`applications and Web services tra(cid:119)ic based on content encapsulated in a packet's header or payload, regardless of
`the protocol or application type. With deep packet inspection in place through a single intelligent network device,
`companies can boost performance without buying expensive servers or additional security products.
`
`Complete view
`
`VMWARE 1017
`
`1
`
`

`

`Deep packet inspection lets the application tra(cid:119)ic management device delve into the content of a TCP or User
`Datagram Protocol (UDP) flow for a complete view. This is accomplished by reassembling IP datagrams, TCP
`datastreams and UDP packets as they flow through the device to view the entire application content and then act on
`it according to a company's defined policies.
`
`Through standard TCP/IP networking, messages are broken down into small packets so they can quickly traverse the
`network. The application tra(cid:119)ic management device or load balancer intercepts the data on its way to the final
`destination, reassembles it into its original sequence and bu(cid:119)ers it into memory.
`
`By acting as a partial proxy for specific application data flows, the tra(cid:119)ic management device continues to build the
`message so that more content can be seen, while searching for defined variables on which to act. Users configure
`these variables in a rules or policy engine that enforces those polices based on the application type, its source or its
`final destination.
`
`Optimum transit
`
`Once the tra(cid:119)ic management device locates the information in the payload, it sends the data to the application or
`resource that can best process the client's request. The application tra(cid:119)ic management device then can virtualize or
`horizontally scale any IP-based application. Deep packet inspection also can be used to inspect transactions for
`correct application or service variables. If these variables aren't present, the request is discarded, the event is logged
`and an alert is sent to an administrator.
`
`Because deep packet inspection can recognize any element of a packet, it can be used to manage tra(cid:119)ic for any type
`of IP-based application, including enterprise applications such as(cid:272)CRM, databases, mobile and(cid:272)wireless(cid:272)applications,
`and Web services. At a large company, for example, a tra(cid:119)ic manager with deep packet inspection capabilities could
`be used to distinguish between read and write tra(cid:119)ic to database servers. The company could save money by
`purchasing less-expensive servers to handle the read tra(cid:119)ic.
`
`Deep packet inspection provides detailed control of all IP tra(cid:119)ic, letting businesses meet complex(cid:272)security(cid:272)and high-
`availability requirements while gaining operational e(cid:119)iciencies. How it works: Deep packet inspection
`
`SponsoredPost Sponsored by Cisco
`Cisco data center and cloud networking recognitions
`
`Giesa is senior director of product management for F5 Networks. He can be reached e.giesa@f5.com.
`
`Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
`Copyright © 2003 IDG Communications, Inc.
`
`2
`
`

`

`▻ IT Salary Survey: The results are in
`
`YOU MAY ALSO LIKE
`
`Recommended by
`
`How sensors, ambient
`intelligence could revolutionize
`healthcare
`
`Backing up databases is critical
`and complex
`
`What 5G promises for IoT
`
`IBM set to spin-off managed
`service business to focus on
`hybrid cloud
`
`Verizon deals with Microsoft,
`Nokia aim at making private 5G
`easier
`
`IBM grows automation, data
`features for hybrid cloud control
`
`Who’s selling SASE and what do
`you get?
`
`What are data centers, and how
`are they changing?
`
`Cisco fortifies and simplifies its
`security portfolio with eye
`
`3
`
`

`

`VMware plan disaggregates servers, offloads
`network virtualization and security
`
`Forrester: Get ready for IoT networking chaos
`
`(cid:272)(cid:272)
`
`SPONSORED LINKS
`Join the IDG TECH(talk) Community, an exclusive online network where IT experts find resources to enhance their
`knowledge and career.
`
`This is no time for a vulnerable network. Find the DDoS threat before it’s too late. Protect Your Customers. - Protect
`Availability 3
`
`Digital Transformation wasn’t supposed to happen this way. You need visibility to gain control. Take control with
`NETSCOUT – Business Continuity
`
`So(cid:120)ware defines your networks. NETSCOUT defines your visibility. See it all. – SDN
`
`OpenText Voyager Awards: Celebrating Success in a Changed World
`
`dtSearch® instantly searches terabytes of files, emails, databases, web data. See site for hundreds of reviews; enterprise
`& developer evaluations
`
`Copyright © 2020 IDG Communications, Inc.
`
`4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket