Describe the purpose of TCP optimization TCP tuning techniques adjust the network congestion avoidance parameters of TCP connections over high-bandwidth, high-latency networks. Well-tuned networks can perform up to 10 times faster in some cases. For enterprises delivering Internet and extranet applications, TCP/IP inefficiencies, coupled the effects of WAN latency and packet loss, all conspire to… Continue reading Objective 5.02 Describe the purpose of the various types of advance acceleration techniques.
Explain When a hardware based application deliver platform solution is appropriate (Explain the purpose, advantages, and challenges associated with hardware based application deliver platform solutions) BIG-IP 8950 & 11050 Hardware Helps Customers Meet Growing Throughput Demands The new platforms support high throughput levels to meet the application delivery needs of service providers and organizations that… Continue reading Objective 5.01 Describe the purpose, advantage, use cases, and challenges associated with hardware based application delivery platforms and virtual machines
Internet Protocol Security (IPsec) Is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec is… Continue reading Objective 4.04 Describe the purpose, advantages, and use cases of IPsec and SSL VPN
Explain the role authentication plays in AAA(authentication, authorization and accounting) Authentication Authentication refers to the process where an entity’s identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials. Examples of types of credentials are passwords, one-time tokens, digital certificates, digital signatures and… Continue reading Objective 4.03 Describe the purpose and advantages of authentication
Cryptographic Services Public networks such as the Internet do not provide a means of secure communication between entities. Communication over such networks is susceptible to being read or even modified by unauthorized third parties. Cryptography helps protect data from being viewed, provides ways to detect whether data has been modified, and helps provide a secure… Continue reading Objective 4.02 Explain the purpose of the cryptographic services
Positive Security Model The two approaches to security most often mentioned in the context of application security— positive and negative—are diametrically opposed in all of their characteristic behaviors, but they are structured very similarly. Both positive and negative security approaches operate according to an established set of rules. Access Control Lists (ACLs) and signatures are… Continue reading Objective 4.01 Compare and contrast positive and negative security models
Client–server model The client–server model is a distributed application structure in computing that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. The client–server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or… Continue reading Objective 3.02 Differentiate between a client and server
Distributing the load across multiple servers. Successful load balancing optimizes resource use, maximizes throughput, minimizes response time, and avoids overload. Using multiple components with load balancing instead of a single component may increase reliability through redundancy. Load Balancing Algorithms A variety of scheduling algorithms are used by load balancers to determine which backend server to… Continue reading Objective 3.01 Discuss the purpose of, use cases for, and key considerations related to load balancing.
High availability High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period. Users want their systems, for example hospitals, production computers, and the electrical grid to be ready to serve them at all times. Availability refers to the… Continue reading Objective 2.06 Explain the advantages and configurations of high availability
A. Describe a full proxy architecture. The Full-Proxy Data Center Architecture by Lori MacVittie Why a full-proxy architecture is important to both infrastructure and data centers. In the early days of load balancing and application delivery there was a lot of confusion about proxy-based architectures and in particular the definition of a full-proxy architecture. Understanding what a full-proxy is… Continue reading Objective 2.05 Explain the purpose and use cases for full proxy and packet forwarding / packet based architectures