1. Trang chủ
  2. » Công Nghệ Thông Tin

ASP Configuration Handbook phần 10 potx

63 179 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 63
Dung lượng 604,78 KB

Nội dung

560 Appendix B • ASP Configuration Handbook Fast Track ; Five nines means that in a year’s time, a system will be “down” or offline for no longer than five minutes. ; Clustering is the combination of multiple servers that will allow for failover and data reclamation from storage in case of a catastrophic occurrence. Problems That Could Arise from a Conversion ; ISPs that are converting to ASPs face an assortment of hurdles in trying to break into their chosen markets. Perhaps the greatest obstacle is the acquisi- tion, training, and retention of intellectual property, all of which will allow an ASP to offer stellar implementation, service, and support. Major Issues in the Implementation of an ASP Model ; The contractual assurances that an ASP must make to its clients is usually some form of negotiated contract that specifies acceptable levels of service, availability, security, and performance collectively called a service level agree- ment (SLA). ; The software applications must conform to a company’s business guidelines by being able to discriminate between customers, partners, and suppliers and provide the best business value, and return on a company’s investments (ROI) in time and resources. What Is Needed to Sell Your Services ; An ASP must draw together resources that traditionally have operated independently of one another. ; To successfully deploy a dynamic and interactive application, you will need to integrate several components, while providing access to other network resources. www.syngress.com Chapter 1 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 560 ASP Configuration Handbook Fast Track • Appendix B 561 ❖ Chapter 2: The Business Case ISP Market Conditions ; Internet access reached 50-percent market penetration in less than eight years of existence.The growth rate in the United States is projected to be anywhere from 40 to 110 percent for at least the next few years. ; According to Boardwatch Magazine, there are currently more than 7700 ISPs (early 2001) that are doing business in the United States alone. ; The reality of the DSL market is that providers must rely on the Incumbent Local Exchange Carrier (ILEC) for the all-important connection to the cus- tomer.That forces ISPs into the position of commodity resellers in direct competition with their suppliers. ; While broadband connections seem to be following the same economic pat- tern as their slower counterparts, their significance should not be overlooked. Increasing broadband access speeds will be the foundation for the value-added services that will allow ISPs to differentiate their offerings. Service Provider Business Requirements ; In order to break out of the current cycle, many service providers and ISPs in particular will have to address these factors: commoditized offering, signif- icant pricing pressure, high customer churn, drastically reduced valuations, restricted access to capital. ; The current demands of the financial community once again include tradi- tional terms such as differentiation, barriers to entry, and profitability.The easy money is gone. The Evolving ISP ; The evolving ISP must overcome the issues that are facing its core business, the demands of its customers, and the demands of the investor community. ; Among the first required steps to migrate to value-added offerings is to develop a highly reliable service model. www.syngress.com 130_ASP_AppB 6/19/01 2:54 PM Page 561 562 Appendix B • ASP Configuration Handbook Fast Track ; Current implementations of hosted applications and Web sites are accessed across existing connections, sometimes with significant delay, but saturated links and latency will not be tolerated in the future. The Service Provider of the Future ; ISPs must ask themselves what type of services they will need to have available in two, three, and five years in order to remain competitive and profitable. ; Businesses and consumers will not purchase services from a provider that cannot include all required data, voice, and entertainment offerings. Over the next few years, providers who have not embraced new offerings and developed methods for continuously developing new offerings will not be facing commoditization, but extinction. The Case for Application Service Provider Conversion ; The ASP offering is a revolutionary response to the inefficiencies in our current distributed computing environment. ; Application hosting presents enormous potential for ISPs. It addresses many of the market realities that are currently plaguing the segment. Application hosting provides the opportunity to differentiate Internet connections and create additional high-margin revenue streams. ; International Data Corporation (IDC) placed worldwide ASP spending at $300 million for 1999 and estimated spending of $7.8 billion by 2003 based on 92-percent compound annual growth. Many other companies have projected much higher figures. Critical Success Factors ; Application infrastructure provider (AIP) is a term used to describe a provider that offers ASPs wholesale network and data center services. ; Leveraging channel partners with complementary offerings can be very effective, but these channels must be managed differently from direct sales methods. www.syngress.com Chapter 2 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 562 ASP Configuration Handbook Fast Track • Appendix B 563 ; Current Analysis published the results of their survey of ASP customers that ranked the major decision criteria they used to choose an ASP provider. Major factors included support, expertise, price, and reputation. ❖ Chapter 3: Server Level Considerations Implementation,Where to Begin ; At the heart of an ISP/ASP are the server base and the application software packages. If they do not function efficiently, the ASP will not run effectively. ; Today, there are only two basic types of microprocessors available for com- puters: Complex Instruction Set Computers (CISC), and Reduced Instruction Set Computers (RISC). ; SMP is an architecture that provides better performance by using multiple processors in the same server. ; Fibre Channel has been introduced as a replacement for the SCSI architec- ture. Fibre Channel provides a method for transmitting data between com- puters at a rate of 100 Mbps, and scales up to 1 Gigabit per second (Gbps). ; Link aggregation allows a single server to use two or more installed network interface cards (NICs) to aggregate bandwidth across several links. Software Solutions for Your ASP ; System software describes software packages that provide the basis for all other applications that are run on a computer. ; Unix is not a proprietary operating system, and the source code has been available to the public since its inception. Currently, the leading Unix envi- ronment is Solaris from Sun Microsystems. ; Windows 2000 Advanced Server offers all of the features available in the standard version, but includes more reliability and scalability, as well as addi- tional features for applications that require a higher level of scalability. ; Novell offers a powerful network operating system called NetWare.This operating system was originally designed for use in small to enterprise busi- nesses and networks, and typically used a protocol stack called Internet Packet eXchange (IPX). www.syngress.com Chapter 2 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 563 564 Appendix B • ASP Configuration Handbook Fast Track Application Software Types ; Applications is the term used to describe a group of programs or code designed to perform a specific function directly for users or other application packages. ; Internet Information Server (IIS) is a scalable Web server offering from Microsoft Corporation that runs under the Windows family of operating systems. ; Apache HTTP Server is an open-source software package that is organized by the Apache Software Foundation. ; A database can be defined as a collection of data that is organized for management and access. ; Middleware can be considered the “glue” that holds applications together. It is a general term for any computer application whose purpose is to combine or mediate between two applications in order to allow them to share data between them. Network Service Considerations ; Network storage defines the ability to store information on a remote system connected over a network. ; NFS was first released in 1984 by Sun Microsystems Corporation. ; Today, many systems use NFS to connect servers to centralized storage. Since NFS was designed on the Unix platform, it has remained a Unix tool, for the most part. It is possible to find NFS servers and clients that run under other operating systems, such as Windows, but they are not very desirable since they are not native to the particular operating system. Data Backups and How They Can Affect You ; Although hardware platforms have become more reliable over the years, the fact still remains that your data is stored on what is essentially a mechanical device; a disk that rotates at very high speeds with another bit of metal called a head that floats left and right across the surface of the disk many times a second. www.syngress.com Chapter 3 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 564 ASP Configuration Handbook Fast Track • Appendix B 565 ; You will most likely use a third-party backup program as opposed to the generic ones that sometimes come with your operating system, or storage devices. Some of the products that you will run across such as ARCserve, Veritas Backup Exec, UltraBac, or NovaStor, will allow advanced scheduling with various levels of flexibility. ; One of the defining factors between backup systems is how tapes are rotated and what files get backed up to which tape. Each rotation method has dif- ferent advantages that can applied to systems and provide for different results. Virus Scanning Suggestions ; A virus can halt your servers, and can even remove data from your hard disks.What’s worse is that it can spread to incorporate the computers throughout your entire network and into your client’s networks, infecting every server along the way and leaving mass data destruction in its wake. ; When using an Internet Gateway product, make sure that you have a system that will allow you to queue incoming e-mail messages. If mail is received faster than it can be processed by an Internet gateway, it could start dropping or bouncing messages unless you have software that allows incoming mes- sages to be queued. Thin Client Solutions ; One of the primary focuses for an ASP is to ensure the delivery of its prod- ucts or services to each client’s desktop. ; Independent Computing Architecture (ICA) allows the delivery of an appli- cation from a centralized server to any end-user desktop, regardless of the operating system or platform. Maintenance and Support Issues ; Eventually, every piece of hardware and software operated by your company will need an upgrade of some sort. www.syngress.com Chapter 3 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 565 566 Appendix B • ASP Configuration Handbook Fast Track ; When you consider that you might be performing hardware upgrades as well as software upgrades, and that one upgrade might cause another, it just does not make sense to even attempt to upgrade the servers all at once. ; Whenever performing an upgrade, always incorporate a back-out plan. In some cases, it may even be necessary to provide several back-out plans at every stage of a complicated upgrade. ; In order to catch problems before they arise, you will need to perform some type of system monitoring. ❖ Chapter 4: Performance Enhancement Technologies Web Caching and How It Works ; The intent of caching is to move Web content as close to the end users or the edge of the network as possible for quick access to improve the customers’ satisfaction levels, and gives your ASP the competitive advantage. ; Hardware devices will cache frequently used data and instructions in order to speed tasks. ; Caching as much Web content as possible within the boundaries of an ISP while using modest amounts of upstream bandwidth is a way to grant clients what they require without creating a “black hole” for bandwidth investment on the part of the service provider. Deployment Models for Caching ; In the forward proxy cache configuration, a client’s requests go through the cache on the way to the destination Web server. ; A transparent cache resides in the flow of the network and is invisible to a client’s browser. Clients realize the benefits of caching without reconfiguring the browsers. ; Reverse cache servers can be deployed throughout the network to create a distributed site of hosted content; this model is commonly referred to as site replication. www.syngress.com Chapter 3 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 566 ASP Configuration Handbook Fast Track • Appendix B 567 ; A cache appliance (this can also be called a thin server) can be defined as a device that offers a limited number of dedicated functions, and is able to deliver those functions more effectively than a multipurpose device can. Load Balancing in Your Infrastructure ; Load balancing, also called Layer 4–7 switching, occurs when cluster of Web servers are created to handle massive amounts of requests. ; Localized load balancing occurs when the load balancer determines which server should receive new requests. ; Distributed load balancing sends packets across dispersed networks, which can be located in geographically separate areas from the local server. Load Balancing Solutions from F5 ; As more servers are added to the DNS round-robin rotation, traffic will be unevenly distributed.The older servers will tend to receive more traffic than newer servers, as the IP addresses of older servers are usually cached by more users than the addresses of newer servers are. ; When you implement a network device that is capable of high availability, you want it to guarantee that it can deliver IP-based services, which are always available.To do this, you must remember that it is imperative that both “quality of service” based high availability and load balancing are addressed so that your client has a good usability experience. Cisco Systems’ LocalDirector ; There are generally two approaches for scaling a server farm-based system. The first approach is to continuously upgrade the size and processing power of individual servers in the farm.The second approach is to add more servers as you require more capacity. ; Load-balancing technology does not normally consider variables such as bandwidth, server performance, and job size for optimizing the traffic loads among your server farms. Load balancing can allow you to incrementally scale the capacity of servers in your server farms in a more efficient manner. www.syngress.com Chapter 4 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 567 568 Appendix B • ASP Configuration Handbook Fast Track ; LocalDirector is considered a transparent device, as it is able to work with any TCP-based service or application.There is no special software required on the server, as these are external devices. ; The LocalDirector is considered a stateful device, as it is able to monitors and can track all TCP connections that are occurring between clients and servers. Foundry Networks’ ServerIron ; Foundry’s ServerIron Web switches provide high-performance content and application-aware traffic and server load balancing. ServerIron has the func- tionality of a traditional Layer 2 and Layer 3 switch built in, and is able to examining the content at Layer 4 and above through the packet header. ; ServerIron load-balancing characteristic is based on Layer 4 traffic such as HTTP, FTP, SSL, and email.This creates the ability to transparently dis- tribute data traffic among multiple servers. Content Delivery Networks ; The networking industry’s focus from Layer 3 connectivity issues is shifting to the creation of intelligent, Layer 4–7 networks that can support the rig- orous response-time requirements of these new types of content.The emphasis is now turning to content delivery networks (CDN). ; CDNs are able to provide QoS to the Internet’s IP-based backbone, which helps to eliminate or minimize delay. ; Content provider organizations build content for the Web, and are faced with delivering content that has dynamic characteristics to customers who require high levels of service. CDN Solutions from Various Vendors ; Content Distributor uses the agent/manager design and a proprietary com- munications protocol that can replicate content updates to a community of servers over any TCP/IP-based network. www.syngress.com Chapter 4 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 568 ASP Configuration Handbook Fast Track • Appendix B 569 ; Cisco Systems’ Content Delivery Network (CDN) system was developed to help service providers to deploy content delivery services so that they could realize new profit opportunities. ❖ Chapter 5: Storage Solutions Upfront Concerns and Selection Criteria ; Currently, there are many differing manufacturers of storage-based equip- ment, and several methods of delivering storage solutions to your servers and clients. ; With mass-storage products, some of the major manufacturers may only offer proprietary equipment, while others may standardize their equipment, using a technology such as fiber channel to ensure that their product will work with a similar offering from another manufacturer. ; Security should always be a concern, but it is especially important given the high visibility of ISPs and ASPs. ; Outboard security is any type of security feature that is located on the host. It might be an external authentication scheme that is provided by a firewall. ; You may already own storage devices that use interfaces other than fiber channel, such as small system computer interface (SCSI) or enhanced inte- grated drive electronics (EIDE) for host connections. It can sometimes prove difficult to port older hardware to some newer storage solutions. Directly Attached Storage in Your Infrastructure ; Server-to-storage access, or directly attached storage, has been in use in much of the history of computing, and still exists in over 90 percent of implementations today. ; In directly attached implementations, storage devices are directly connected to a server using either interfaces and/or bus architecture such as EIDE or SCSI. www.syngress.com Chapter 4 Continued 130_ASP_AppB 6/19/01 2:54 PM Page 569 [...]... you can isolate and fix the issues www.syngress.com 583 130 _ASP_ AppB 6/19/01 2:54 PM Page 584 130 _ASP_ index 6/19/01 2:58 PM Page 585 Index 3Com See Dynamic Access 3-DNS controllers, 208 95th percentile measurement, 404 100 BaseFX, 119 100 BaseT, 119 286Gigabit Ethernet, interface 404 Object Not Found error, 212–213 100 0BaseCX, 120 100 0BaseLX, 119 100 0BaseSX, 119 A AboveNet Communications, 234 ABR See Area... solutions will be used www.syngress.com 571 130 _ASP_ AppB 572 6/19/01 2:54 PM Page 572 Appendix B • ASP Configuration Handbook Fast Track Chapter 6 Continued An extension of the security policy is the privacy policy.The privacy policy should state what data the ASP considers to be confidential, and how that data can and cannot be used Security Components As an ASP, to validate both the security policy and... your network Site Considerations When you are building a new physical plant for your ASP, make sure that there is adequate space available and sufficient resources (power and cabling, as well as security) to suit your needs www.syngress.com 579 130 _ASP_ AppB 580 6/19/01 2:54 PM Page 580 Appendix B • ASP Configuration Handbook Fast Track Chapter 8 Continued Routers are Layer 3 network devices that connect... Application-Aware Networking ASPs who want to deploy their applications need to realize that their success of mission-critical applications over both the internal LAN and clientele WAN is achieved by defining network policies, which assist in the apportioning of network resources with business objectives www.syngress.com 581 130 _ASP_ AppB 582 6/19/01 2:54 PM Page 582 Appendix B • ASP Configuration Handbook Fast Track... Distributed denial of service (DDoS) is one of the newest and most troubling types of attack an ASP must face.This type of attack is perpetrated to cause the same undesired effects offered by DoS attacks, but on an even larger scale www.syngress.com 130 _ASP_ AppB 6/19/01 2:54 PM Page 573 ASP Configuration Handbook Fast Track • Appendix B Chapter 6 Continued Prevention Techniques As IP networking and... APIs functionality/gateways, 383–384 Application Service Provider (ASP) , 6, 91–94, 188 See also Pure ASP; Pure-play ASP business model barriers, 37–40 predictability, 43 strategies, 38–40 conversion business drivers, 34–45, 55 case, 82–94, 105 customer value proposition, 86–88 firms, types, 13–16, 53–54 host services, 12 implementation, 10 11 time, reduction, 87 Industry Consortium, 34 infrastructure... likely want to know if you will proactively fix issues, or wait for them to call and inform you.They will also wonder if you have the resources to meet the www.syngress.com 130 _ASP_ AppB 6/19/01 2:54 PM Page 575 ASP Configuration Handbook Fast Track • Appendix B Chapter 7 Continued demand of the time to resolution or repair that is included within their SLA In the customer’s mind, compensation for downtime... electronic mail (e-mail), messaging, scheduling, desktop support, operating systems, remote access, security, and other miscellaneous company needs www.syngress.com 575 130 _ASP_ AppB 576 6/19/01 2:54 PM Page 576 Appendix B • ASP Configuration Handbook Fast Track Chapter 7 Continued How Service Providers Have Responded With all of the mission-critical applications that are available, many service providers are... difficult to maintain and upgrade your infrastructure if you are unable to see your current copper allocation (for the local loop) and resource availability www.syngress.com 130 _ASP_ AppB 6/19/01 2:54 PM Page 577 ASP Configuration Handbook Fast Track • Appendix B Chapter 7 Continued One of the ways that a central office (CO) can handle these issues is to have an up-to-date, dynamic inventory of provisioning... tasks and communications across networks.TMN allows you to distribute the appropriate levels for growth, efficiency, and communication performance www.syngress.com 577 130 _ASP_ AppB 578 6/19/01 2:54 PM Page 578 Appendix B • ASP Configuration Handbook Fast Track Chapter 7 Continued What Tools Do You Need to Automate TMN? A multitude of tools are available to automate the task of building TMN agent or manager . sales methods. www.syngress.com Chapter 2 Continued 130 _ASP_ AppB 6/19/01 2:54 PM Page 562 ASP Configuration Handbook Fast Track • Appendix B 563 ; Current Analysis published the results of their survey of ASP customers that ranked. to develop a highly reliable service model. www.syngress.com 130 _ASP_ AppB 6/19/01 2:54 PM Page 561 562 Appendix B • ASP Configuration Handbook Fast Track ; Current implementations of hosted applications. access to other network resources. www.syngress.com Chapter 1 Continued 130 _ASP_ AppB 6/19/01 2:54 PM Page 560 ASP Configuration Handbook Fast Track • Appendix B 561 ❖ Chapter 2: The Business Case ISP

Ngày đăng: 14/08/2014, 04:21