1 / 25

Building an Architecture for Growth in a Virtualized Web 2.0 World

Learn how to overcome the challenges of the rapidly evolving Web 2.0 landscape by building a secure, fast, and available architecture in a virtualized environment.

andrean
Download Presentation

Building an Architecture for Growth in a Virtualized Web 2.0 World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Web 2.0 in a Virtualized World: Building an Architecture for Growth Presented by: Lori MacVittie Technical Marketing Manager, Application Services

  2. THE WEB 2.0 STACK C O M M U N I T Y FORUMS VIDEO LIVE CHAT PODCASTS COLLABORATION SYNDICATION INTERACTION WIKIS http ajax xml sip rdf soa rss rtsp

  3. SMTP HTTP SAP XML SOAP IMAP JSON MAPI OWA FTP AJAX RTSP POP3 RSS SIP RDF Oracle OFFICE 2007 XAML

  4. DOM APPLICATION FRAMEWORK SOAP POX HTTP REST JSON HTTP WCF XMLHTTPRequest Web 2.0 Technologies • A set of technologies most often associated with AJAX but also including other XML-based dynamic data exchanges • RSS / RDF • Mashups • Tag clouds

  5. Traditional Web One-to-one relationship between a “FORM” and a server-side script or application 101010101010101010101010101010101010101010101010101010101010101010101010101010 1010101010101010101010101010101010101010101010101010101010 Web 2.0 One-to-one relationship between many components and server-side scripts or applications 101010101010101010101010101010101010101010101010101010101010101010101010 1010101010101010101010101010101010101010101010101010101010101010101101010 101010101010101010101010101010101010101010101010101010101010101010100101010 1010101010101010101010101010101010101010101010101010101010 1010101010101010101010101010101010101010101010101010101010101010101010101010101001 101010101010101010110101010101010101010101010101010101010101010101010101010

  6. Web 2.0 Challenge: More Scripts, More Formats WWW-URL-ENCODED WWW-URL-ENCODED WWW-URL-ENCODED WWW-URL-ENCODED JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON JSON XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML HTML SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP SOAP XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML

  7. Web 2.0 Challenge: Browser Limitations …slows down applications …leads to unresponsive applications Connection #1. OK Connection #2. OK Connection #3. TIME OUT.

  8. Web 2.0 Challenge: Longer Sessions, More Connections, More Requests …supports fewer concurrent users …consumes more server resources Server Resources Please try again later

  9. Web 2.0 Challenge: JavaScript Execution Client makes a request to load a page Server sends back response that tricks client into modifying existing behavior of client Client sends data to server Client is tricked into sending same data to another server ATTACK SUCCESSFUL!

  10. The Application Delivery Challenge • Keeping up with a rapidly evolving set of applications, protocols, and security risks while maintaining existing application availability and security • And you can’t make the day longer than 24 hours although you can have an extra day every 4 years* *Disclaimer: Offer prohibited at the turn of the century except when evenly divisible by 4. Some restrictions apply.

  11. A Growing Network Problem Applications Users Network Point Solutions DoS Protection Mobile Phone SFA Rate Shaping SSL Acceleration CRM ERP CRM PDA Server Load Balancer ERP Laptop ERP CRM SFA ContentAcceleration ApplicationFirewall Desktop SFA Connection Optimization TrafficCompression CustomApplication Co-location

  12. Intelligent Applications Network Plumbing Intelligent Client ROUTERS SWITCHES FIREWALLS Application Delivery Network

  13. A New Level of Intelligence Flow Based React to a Real Time, Two-Way Conversation Translate Between Parties Legacy Approach Packet Based React to a Single Communication, One Direction ADN

  14. Web 2.0: Secure. Fast. Available. Web 2.0 Clients Web 2.0 Services Unified Network/Application Infrastructure Services AJAXRESTPOXJSONWS-*POSTGET Available Desktop Unified Architecture Fast Secure

  15. Web 2.0 Solution: Application Security Secure Available Optimized DoS and SYN Flood Protection Network Address/Port Translation Application Attack Filtering Certificate Management Resource Cloaking Advanced Client Authentication Application Security Module XSS & SQL Injection Evasion Firewall - Packet Filtering Selective Content Encryption Cookie Encryption AES Encryption Content Protection Protocol Sanitization Basic Firewalling XML Threat Prevention

  16. Web 2.0 Solution: Acceleration and Optimization Services Secure Available Optimize SSL Acceleration Quality of Service Connection Pooling Intelligent Compression L7 Rate Shaping Content Spooling Content Buffering TCP Optimization Stack Brokering Content Transformation Dynamic and Static Caching

  17. Secure Available Optimize Web 2.0 Solution: Availability Services Comprehensive Load Balancing Advanced Application Switching Customized Health Monitoring Intelligent NAT Intelligent Port Mirroring Universal Persistence Response Error Handling • Session / Flow Switching • Transformation / Content Rewriting • IPv6 Gateway • Advanced Routing • Connection Management • Session Management

  18. DOM APPLICATION FRAMEWORK SOAP POX HTTP REST JSON HTTP WCF Web 2.0: Secure, Fast, and Available But…

  19. …What about Virtualization? Unified architecture for physical and virtual resources? Dynamic provisioning? Center-less data centers? Reduced costs overall?

  20. The State of Virtualization Cell PC - Home Web Server Web Server Web Server Web Server Web Server Application and Server Virtualization Application and Server Virtualization Storage Virtualization Access Virtualization Data Center & Link Virtualization Remote - WAN App. Server App. Server App. Server App. Server PC - LAN Windows file storage Windows file storage WLAN NetApp EMC OS Virtualization OS Virtualization

  21. Imagine, If You Will . .

  22. The Sum of the Virtual Parts Service Policy Management Manage Delivery Unified Access Control Service Requests Data Center Orchestration Virtual Data Center

  23. Challenges Ahead! Bureaucratic IT Silos Single-Vendor Solutions No Integration No Management No Sum of the Parts Solution Lack of Focus

  24. The Next Steps Break the Barriers Understand the Value/Cost Integration and Management Focus on the End-Game

  25. Secure. Fast. Available.

More Related