Managing Distributed Applications : Troubleshooting in a Heterogeneous Environment
This is a Distributed Applications trouble shooting book. The methodology will be outlined in the introduction and then the author will go into detail how each application operates, detailing its dependences and then the author will go into detail how each application operates, detailing its dependences and then identify the result of various parts of this process, how they manifest themselves and the outcome of such a failure.
- Mixed media product | 336 pages
- 175.26 x 233.68 x 20.32mm | 680.39g
- 02 Nov 2000
- Pearson Education (US)
- Prentice Hall
- Upper Saddle River, United States
Table of contents
Preface. Acknowledgements. 1. Introduction an Overview. Why Distributed Applications? Current Business Considerations. Managing the Application. Tools of the Trade. Tool Selection. Methodology. Step 1-Define the Problem. Step 2-Gather the Facts. Step 3-Assess the Data. Step 4-Make a Plan. Step 5-Implement the Plan. Step 6-Observe the Results. Summary.2. Basic Communications. Terminology. Local Area Network (LAN). Hub. Bridges and LAN Switches. Router. Wide Area Network (WAN). The Server. Three-tier Architecture. Network Classifications. LAN. WAN. Circuit-switched. Packet-switched. Architectural Configurations. Protocol Types. Layer 1-Physical Layer. Layer 2-Data Link. Layer 3-Network. Layer 4-Transport. Layer 5-Session. Layer 6-Presentation. Protocol Functions. Communications Protocols. Routing Protocols. Routed Protocols. Auxiliary Protocols. Dependencies. Address Resolution Protocol (ARP). Windows Internet Service (WINS). Internet Control Message Protocol (ICMP). Client Configuration. Server Configuration. Security and Authentication. Summary. Distance Vector Protocols. Link State Protocols.3. File and Print. Overview. Application Basics. Application Operation. Dependencies. Summary.4. Directory Services. Overview. Protocol Types. Protocol Functions. SNMP. Authentication Services. Policy Management. Policy Framework and Architecture. Infrastructure Interaction. Summary.5. Security and Authentication. Overview. Policy. What Is to be Protected? Technical Considerations. Trusted Networks. Untrusted Networks. Unknown Networks. Gateway Functions. User Authentication. Host-to-Host Authentication. Performance. Ports and Sockets. Summary.6. Web Systems. Overview. Application Basics. Protocols. Hypertext Transfer Protocol (HTTP). File Transfer Protocol (FTP). Internet Message Access Protocol (IMAP4). Lightweight Directory Access Protocol (LDAP). T.120. H.323. Push and Pull Services. Browsers. Architecture. Middleware. Summary.7. Messaging Systems. Overview. Protocol Types. Server-side Protocols. Client-side Protocols. Protocol Functions. Message Delivery. Architecture. Client-to-Client Communications. Client-to-Server Communications. Server-to-Server Communication. Fax Servers. Summary.8. Electronic Commerce Systems. Overview. Architecture. Protocol Types. Protocol Functions. Security and Authentication. Client Communications. Server Communications. Dependencies. Summary.9. Mainframe Connectivity. Overview. Legacy Connections. Terminal Emulation. Gateway Functions. System Architecture. Protocol Types. Protocol Functions. Transaction Service Layer. Dependencies. Summary.10. Case Studies. Overview. Case Study One-Connectivity issues. Summary. Case Study Two-Failure to Connect to Application. Make Observations. Summary. Case Study Three-Application Slowdown (partial elements). Gather the Facts. Fact Gathering, Part Two. Summary. Case Study Four-Application Slowdown (Whole Application). Define the Problem. Gather the Information. Assess the Data. Make the Plan. Implement the Plan. Is the Problem Solved? Summary. Case Study Five-Intermittent Application Performance Degradation. Gather the Facts. Making Changes. Digging Deeper. Summary.Appendix A: Glossary. Appendix B: Guide to RFCs. Appendix C: Guide to Standards. Standards Organizations.Appendix D: Guide to Sockets and Ports (RFC 1700). Microsoft Environment. Ports Used by WLBS and Convoy for Cluster Control. Ports Used by Microsoft Exchange Server Version 5.0.Appendix E: Guide to Organizationally Unique Identifiers (OUIs). What standards are involved with OUI?Index.
About Mike Hicks
MIKE HICKS is the principal consultant for advanced networking at Compuware in Australia. He has enjoyed a successful career providing support to complex corporate networks throughout Europe and Australia, including the Ford Motor Company and the European Space Agency.