Download - Title Line 1 Title Line 2
![Page 1: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/1.jpg)
1
Web 2.0 in a Virtualized World: Building an Architecture for Growth
Web 2.0 in a Virtualized World: Building an Architecture for Growth
Presented by: Lori MacVittie Technical Marketing Manager, Application Services
![Page 2: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/2.jpg)
2
THE WEB 2.0 STACK
FORUMS
WIKIS
COLLABORATION
VIDEO
SYNDICATION
PODCASTS
INTERACTION
LIVE CHAT
C O M M U N I T Y
ajax
rssrdf
rtsp
siphttp xmlsoa
![Page 3: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/3.jpg)
3
XMLSOAP
AJAX
JSON
SIP
RTSP
HTTP
RSSRDF
Oracle
OWA
IMAP
SMTP
MAPI
OFFICE 2007
SAP
POP3
XAML
FTP
![Page 4: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/4.jpg)
4
A set of technologies most often associated with AJAX but also including other XML-based dynamic data exchanges– RSS / RDF– Mashups– Tag clouds
DOM
APPLICATION
FRAMEWORK REST
POXHTTP
WCFJSONHTTP
SOAP
XMLHTTPRequest
Web 2.0 Technologies
![Page 5: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/5.jpg)
5
One-to-one relationship between a “FORM” and a server-side script or application
One-to-one relationship between many components and server-side scripts or applications
Web 2.0
Traditional Web
101010101010101010101010101010101010101010101010101010101010101010101010101010
1010101010101010101010101010101010101010101010101010101010
1010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101101010
1010101010101010101010101010101010101010101010101010101010101010101001010101010101010101010101010101010101010101010101010101010101010
1010101010101010101010101010101010101010101010101010101010101010101010101010101001101010101010101010110101010101010101010101010101010101010101010101010101010
![Page 6: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/6.jpg)
6
WWW-URL-ENCODED WWW-URL-ENCODED WWW-URL-ENCODED WWW-URL-ENCODED
JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON
XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML
HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML
SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP
XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML
Web 2.0 Challenge: More Scripts, More Formats
![Page 7: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/7.jpg)
7
Web 2.0 Challenge: Browser Limitations
Connection #1. OK
Connection #2. OK
Connection #3. TIME OUT.
…slows down applications…leads to unresponsive applications
![Page 8: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/8.jpg)
8
Web 2.0 Challenge: Longer Sessions, More Connections, More Requests
…supports fewer concurrent users…consumes more server resources
ServerResources
Please try again later
![Page 9: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/9.jpg)
9
Server sends back response that tricks client into modifying existing behavior of client
Client makes a request to load a page
Client sends data to server
Client is tricked into sending same data to another server
ATTACK SUCCESSFUL!
Web 2.0 Challenge: JavaScript Execution
![Page 10: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/10.jpg)
10
The Application Delivery Challenge
Keeping up with a rapidly evolving set of applications, protocols, and security risks while maintaining existing application availability and security
And you can’t make the day longer than 24 hours although you can have an extra day every 4 years*
*Disclaimer: Offer prohibited at the turn of the century except when evenly divisible by 4. Some restrictions apply.
![Page 11: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/11.jpg)
11
CRM CRM
SFAERP
ERPERP
SFACRM
SFA
SSL Acceleration
Network Point Solutions
ApplicationsUsers
Server Load Balancer
Rate Shaping
DoS Protection
ApplicationFirewall
ContentAcceleration
TrafficCompression
Connection Optimization Custom
Application
Mobile Phone
PDA
Laptop
Desktop
Co-location
A Growing Network Problem
![Page 12: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/12.jpg)
12
ROUTERS
SWITCHES
FIREWALLS
Intelligent ApplicationsIntelligent Client Network Plumbing
ApplicationDeliveryNetwork
![Page 13: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/13.jpg)
13
A New Level of Intelligence
React to a Single Communication, One Direction
Packet
Based
React to a Real Time, Two-Way Conversation
Translate Between Parties
Flow
Based
Legacy Approach
ADN
![Page 14: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/14.jpg)
14
Web 2.0: Secure. Fast. Available.
AvailableAvailable
FastFast SecureSecure
Unified Network/Application Infrastructure Services
Web 2.0 Clients
AJAX
REST
POX
JSON
WS-*
POST
GET
Web 2.0 Services
Desktop
Unified
Architecture
![Page 15: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/15.jpg)
15
Web 2.0 Solution: Application SecurityDoS and SYN Flood ProtectionNetwork Address/Port Translation Application Attack FilteringCertificate ManagementResource Cloaking Advanced Client AuthenticationApplication Security ModuleXSS & SQL Injection Evasion
Secure
OptimizedAvailable
Firewall - Packet FilteringSelective Content EncryptionCookie EncryptionAES EncryptionContent ProtectionProtocol SanitizationBasic FirewallingXML Threat Prevention
![Page 16: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/16.jpg)
16
Web 2.0 Solution: Acceleration and Optimization Services
SSL AccelerationQuality of ServiceConnection PoolingIntelligent CompressionL7 Rate ShapingContent Spooling
Secure
OptimizeAvailable
Content BufferingTCP OptimizationStack BrokeringContent TransformationDynamic and Static Caching
![Page 17: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/17.jpg)
17
Web 2.0 Solution: Availability Services
Comprehensive Load BalancingAdvanced Application SwitchingCustomized Health MonitoringIntelligent NATIntelligent Port MirroringUniversal PersistenceResponse Error Handling
Secure
OptimizeAvailable
Session / Flow SwitchingTransformation / Content RewritingIPv6 Gateway Advanced RoutingConnection ManagementSession Management
![Page 18: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/18.jpg)
18
Web 2.0: Secure, Fast, and Available
DOM
APPLICATION
FRAMEWORKREST
POXHTTP
WCFJSONHTTP
SOAP
But…
![Page 19: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/19.jpg)
19
…What about Virtualization?
Unified architecture for physical and virtual resources?
Dynamic provisioning?
Center-less data centers?
Reduced costs overall?
![Page 20: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/20.jpg)
20
Acc
ess
Vir
tual
izat
ion
The State of Virtualization
EMC
PC - Home
App. Server
App. Server
App. Server
App. Server
PC - LAN
WLAN
Windows file storage
Windows file storage
Ap
plic
atio
n a
nd
Ser
ver
Vir
tual
izat
ion
Sto
rag
e V
irtu
aliz
atio
n
NetApp
Cell
Remote - WAN
Ap
plic
atio
n a
nd
Ser
ver
Vir
tual
izat
ion
Dat
a C
ente
r &
Lin
k V
irtu
aliz
atio
n
Web Server
OS Virtualization
OS Virtualization
Web Server
Web Server
Web Server
Web Server
![Page 21: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/21.jpg)
21
Imagine, If You Will . .
EMC
App. Server
App. Server
App. Server
App. Server
Windows file storage
Windows file storage
NetApp
Web Server
OS Virtualization
OS Virtualization
Web Server
Web Server
Web Server
Web Server
EMC
App. Server
App. Server
App. Server
App. Server
Windows file storage
Windows file storage
NetApp
Web Server
OS Virtualization
OS Virtualization
Web Server
Web Server
Web Server
Web Server
EMC
App. Server
App. Server
App. Server
App. Server
Windows file storage
Windows file storage
NetApp
Web Server
OS Virtualization
OS Virtualization
Web Server
Web Server
Web Server
Web Server
![Page 22: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/22.jpg)
22
The Sum of the Virtual Parts
Virtual Data Center
Data Center Orchestration
Unified Access Control
Service Policy ManagementManage Delivery
Service Requests
![Page 23: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/23.jpg)
23
Challenges Ahead!
Bureaucratic IT Silos
Single-Vendor Solutions
No Integration
No Management
No Sum of the Parts Solution
Lack of Focus
![Page 24: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/24.jpg)
24
The Next Steps
Break the Barriers
Understand the Value/Cost
Integration and Management
Focus on the End-Game
![Page 25: Title Line 1 Title Line 2](https://reader033.vdocuments.net/reader033/viewer/2022052601/55931e3d1a28ab935c8b47b4/html5/thumbnails/25.jpg)
25
Secure. Fast. Available.