1. Trang chủ
  2. » Công Nghệ Thông Tin

Cisco press optimizing applications on cisco networks nov 2004 ISBN 1587051532

702 145 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 702
Dung lượng 4,69 MB

Nội dung

Optimizing Applications on Cisco Networks By Mike Hicks Publisher : Cisco Press Pub Date : November 11, 2004 ISBN : 1-58705-153-2 Pages : 384 Maximize the performance and availability of network applications and the network infrastructure with application performance management Learn and understand the business case for application performance management Understand how to identify applications critical to your business model Identify basic application characteristics and how they can be optimized for transmission Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications Improve service delivery and outsourcing decisions by utilizing meaningful SLAs Table of • Contents • Index Identify and solve network application performance problems, saving valuable time and money Includes real-world case studies that cover design and performance issues The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers Yet networks remain congested, and applications continue to run slowly Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery The book also covers applications, delivery techniques, and QoS protocols Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish servicelevel criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers Optimizing Applications on Cisco Networks By Mike Hicks Publisher : Cisco Press Pub Date : November 11, 2004 Table of ISBN : 1-58705-153-2 • Contents Pages : 384 • Index Copyright About the Author About the Technical Reviewers Acknowledgments Icons Used in This Book Command Syntax Conventions Introduction Approach Who Should Read This Book How This Book Is Organized Part I: A Comprehensive Approach to Managing Networked Business Applications Chapter 1 The Case for Application Performance Management Why Application Performance Is Important A Life Cycle Approach to Managing Networked Applications The Benefits to the Enterprise Summary End Note Part II: Aligning the Network's Business and Technical Requirements Chapter 2 Understanding Your Business Defining Your Business-Critical Applications Determining Total Cost of Ownership Defining Your Requirements Prioritizing Your Applications Business and Technical Alignment Methodology Summary Chapter 3 Detailing the Business Transaction Understanding Profiling Terminology Classifying Applications Profiling Methodology Baseline Overview The New Application The Deployed Application Optimizing the Application Verifying Application Delivery Summary End Note References Used in This Chapter Chapter 4 Service Level Management Defining SLAs Assessing Your Requirements Profiling Case Study Defining What to Monitor Summary Chapter 5 QoS and MPLS: Tools to Manage Application Performance Background Allocating Network Resources Traffic-Handling Mechanisms Provisioning and Configuration Mechanisms MPLS Traffic Engineering Queuing Mechanisms Integrated Services Resource Reservation Protocol Differentiated Services Summary End Notes References Used in This Chapter Part III: Deploying and Monitoring Network Applications Chapter 6 Application Deployment Baselining Your Infrastructure Allocating Quality of Service Resources The Pilot Verification Process Predictive Modeling Big Bang vs Staged Rollout Building a Contingency Plan Reporting Summary End Note Reference Used in This Chapter Chapter 7 Beyond the Boundaries Business Requirements Overview Assessing Demarcation Points Recognizing Your Limits Meeting Service Needs Assigning the Correct QoS System Summary End Note References Used in This Chapter Chapter 8 Monitoring the Delivery The Pyramid Model Classifying Management Systems Operating Multiple Systems Defining Metrics Collecting Metrics Reporting Mechanism The Delivery Circle Summary End Note References Used in This Chapter Part IV: Planning and Troubleshooting Network Applications Chapter 9 Proactive Planning Baselining Performance Levels The Dynamic Enterprise Diagnosing Problems Validating Changes Enabling Technologies Scenario Modeling Capacity Planning Reviewing SLAs End-to-End Delivery Summary Reference Used in This Chapter Chapter 10 When Applications Fail QoS Troubleshooting Tools Diagnostic Tools Troubleshooting Methodology Identifying Responsibility Resolving Performance Problems Redefining Delivery Requirements Redefining Service Level Criteria Summary End Note References Used in This Chapter Part V: Practical Implementations Chapter 11 Business Aligning Case Studies Case Study 1: Profiling the Business Transaction Case Study 2: Defining SLAs Case Study 3: Optimizing the Business Transaction Case Study 4: Implementing QoS in a VoIP Environment Summary Reference Used in This Chapter Chapter 12 Optimizing Application Delivery in Storage-Based Networking, Wireless LANs, and an End-to-End Model Storage-Area Networks Wireless LANs Complete End-to-End Model Summary End Notes References Used in This Chapter Part VI: Appendixes Appendix A QoS-Related Requests For Comments Appendix B Guide to QoS Standards IETF QoS Standards ITU QoS Standards ETSI QoS Standards Glossary Index Copyright Optimizing Applications on Cisco Networks Mike Hicks Copyright © 2005 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing November 2004 Library of Congress Cataloging-in-Publication Number: 2003107989 Warning and Disclaimer This book is designed to provide information about optimizing applications on Cisco networks Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information is provided on an "as is" basis The author, Cisco Press, and Cisco Systems, Inc., shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers' feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through e-mail at feedback@ciscopress.com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419, corpsales@pearsontechgroup.com For sales outside the U.S please contact: International Sales international@pearsoned.com Publisher John Wait Editor-in-Chief John Kane Executive Editor Jim Schachterle Cisco Representative Anthony Wolfenden Cisco Press Program Manager Nannette M Noble Production Manager Patrick Kanouse Development Editor Julie Rentz Project Editor Sheila Schroeder Copy Editor Keith Cline Technical Editors Henry Benjamin, Venkat Kankipati, Joshua Saul, Peter Welcher Team Coordinator Tammi Barnett Composition Interactive Composition Corporation Indexer Larry Sweazy Cover and Book Designer Louisa Adair Proofreader Kathy Bidwell Corporate Headquarters Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100 Americas Headquarters Cisco Systems, Inc 170 West Tasman Drive Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] SAA (Service Assurance Agent) 2nd 3rd 4th SAA/RTR (Service Assurance Agent/Response Time Reporter) SACK (selective acknowledgement) SANs (storage-area networks) scaling infrastructure TCP windows scenario modeling schemes dropping queuing security management networks selection of deployments selective acknowledgment (SACK) serialization server message block (SMB) servers CNS delay reporting conversational maps optimization overloading processing time relocating Service Assurance Agent (SAA) 2nd 3rd 4th Service Assurance Agent/Response Time Reporter (SAA/RTR) service level agreements [See SLAs] service level management 2nd 3rd service provider (SP) networks services APM BSM customer IntServ management mapping meeting needs of NetFlow QoS troubleshooting validation sessions, RSPAN setsockopt shaping traffic 2nd sharing information, APM shortest path first (SPF) show commands show processes cpu command signaled mechanisms Simple Network Management Protocol (SNMP) simple transactions simulation DES hybrid models 2nd simulators, calculations single-point-of-failure notification single-transaction monetary functions site surveys, WLANs 2nd sizes, windows 2nd skills, limitations of SLAs (service level agreements) 2nd 3rd Cisco NetFlow compliance analysis defining 2nd delivery management monitoring penalties profiling requirements reviewing SLM (service level management) 2nd 3rd slow delivery, TCO SMB (server message block) Sniffer SNMP (Simple Network Management Protocol) agents data-collection methods get process MIB polling snmpwalk tool soft costs software baselining probes SP (service provider) networks SPAN (Switched Port Analyzer) specialized support SPF (shortest path first) staged deployments standards, QoS statements GET inquiries POST statistics error merging traffic types of status, applications storage-area networks (SANs) strategic connection points, demarcation points strategies, APM streaming video/voice streams, revenue stress, verifying functions under sub-branches, transactions support demarcation points future services peer specialized TCO suppression of events Switched Port Analyzer (SPAN) switched port connections switches, LSR switching, DLSW synthetic transactions syslog protocol systems administration BSM DBMS design EMS management multiple NFS NMS polling Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] tail drop 2nd 3rd targets, transactions tasks 2nd TCO (total cost of ownership) TCP (Transmission Control Protocol) ACKs retransmissions SAN turns 2nd windows scaling sizing TDM (time-division multiplexing) TE (traffic engineering) teams application-deployment application-development technical alignments technical baselines technical criteria category (SLAs) technical requirements technologies, enabling telecommunication costs Telnet 2nd testing [See also troubleshooting; verification] environments predeployment threads, applications thresholds analyzing capacity load metrics polling time processing RTT transactions time-division multiplexing (TDM) time-sensitive conditions, thresholds timing token buckets tools collection diagnostic CLI GUI disaster recovery management configuration DiffServ FIFO IntServ MPLS network resource allocation non-work-conserving queuing provisioning queuing RSVP TE traffic-handling mechanisms work-conserving queuing pyramid model snmpwalk troubleshooting application monitoring network monitoring toolsets, monitoring top-down (pushed) mechanisms topologies, building ToS (Type of Service) total cost of ownership (TCO) total traffic (etherStatsOctets) traces capturing 2nd files reviewing tracking metrics SLAs traffic capturing Cisco IO traffic-conditioning mechanisms defining delivery dropping emulation end-to-end models jitter network resource allocation packet-by-packet patterns QoS re-marking real-time troubleshooting RSPAN shaping 2nd simulation models simulators statistics voice (WLANs) webtraffic packets traffic engineering (TE) traffic-conditioning implementations traffic-handling mechanisms traffic-shaping mechanisms trailing data, deleting trances, cleaning transactions 2nd base capturing defining flow optimizing profiling synthetic targets timing transfers amount of data data transmissions delay paths traps triggers implementation transactions troubleshooting delivery dependency failures diagnostic tools CLI GUI disaster recovery end-to-end models fault-conditions flowcharts IT organizational jitter methodologies MTTR performance 2nd proactive real-time services tools transactions triggers WLANs tuning [See also optimization] tunneling, IP interfaces turns application TCP Type of Service (ToS) types of queuing of statistics Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] UBR (unspecified bit rate) UDP (User Datagram Protocol) unified views of networks UNIX, snmpwalk tool unspecified bit rate (UBR) updates, SLAs upgrades User Datagram Protocol (UDP) users management TCO transactions utilization Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] validation configuration services values, business variable bit rate (non-real time) variable bit rate (real time) (VBR) VC (virtual circuit) requests vendor specifications verification delivery deployment performance increase video interactive streaming videoconferencing viewing average bytes per frame profiling results virtual circuit (VC) requests virtual environments creating scenario modeling troubleshooting validating virtual models, creating virtual private networks (VPNs) 2nd virtual-environment modeling methods VLANs (virtual LANs) key data collection points RSPAN voice interactive streaming WLANs VoIP (Voice over IP) 2nd 3rd VPNs (virtual private networks) 2nd Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] WAN (wide-area network) jitter QoS SP clouds web-based applications webtraffic packets weighted fair queuing (WFQ) weighted random early detection (WRED) 2nd 3rd 4th WFQ (weighted fair queuing) wide-area network [See WAN] windowing, TCP windows sizing 2nd TCP wireless LANs WLANs (wireless LANs) work-conserving queuing workloads, applications WRED (weighted random early detection) 2nd 3rd 4th ... end-to-end application delivery model, by proactively identifying hotspots within an organization Optimizing Applications on Cisco Networks covers network-dependent application delivery, with an emphasis on optimizing the underlying infrastructure,... The book also covers applications, delivery techniques, and QoS protocols Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish servicelevel criteria, and ensure that these system configurations are... ETSI QoS Standards Glossary Index Copyright Optimizing Applications on Cisco Networks Mike Hicks Copyright © 2005 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA

Ngày đăng: 26/03/2019, 17:06

TỪ KHÓA LIÊN QUAN