Авторизация
Поиск по указателям
Wesseles D. — Web Caching
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Web Caching
Автор: Wesseles D.
Аннотация: On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web pages, while network administrators want to make the most of their available bandwidth. A properly designed web cache reduces network traffic and improves access times to popular web sites—a boon to network administrators and web users alike.
Web Caching hands you all the technical information you need to design, deploy, and operate an effective web caching service. It starts with the basics of how web caching works, from the HTTP headers that govern cachability to cache validation and replacement algorithms.
Topics covered in this book include:
# Designing an effective cache solution
# Configuring web browsers to use a cache
# Setting up a collection of caches that can talk to each other
# Configuring an interception cache or proxy
# Monitoring and fine-tuning the performance of a cache
# Configuring web servers to cooperate with web caches
# Benchmarking cache products
The book also covers the important political aspects of web caching, including privacy, intellectual property, and security issues.
Internet service providers, large corporations, or educational institutions—in short, any network that provides connectivity to a wide variety of users—can reap enormous benefit from running a well-tuned web caching service. Web Caching shows you how to do it right.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2001
Количество страниц: 318
Добавлена в каталог: 19.08.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
ICP_OP_INVALIDATE experimental opcode
ICP_OP_MISS opcode
ICP_OP_MISS_NOFETCH opcode
ICP_OP_MISS_POINTER experimental opcode
ICP_OP_PURGE experimental opcode
ICP_OP_QUERY opcode
ICP_OP_SECHO opcode
ICP_OP_UNADVERTISE experimental opcode
ICP_OP_WIRETAP experimental opcode
ICS (Internet Caching System) software
IDENTITY data type (HTCP)
Images, data analysis of
IMimic DataReactor product
InfoLibria products
Inktomi Traffic Server product
Inline caching proxies
Intercache protocols
Intercache protocols, which to use
Interception caching (or proxying), 2nd
Interception caching (or proxying), 2nd, advantages/disadvantages of
Interception caching (or proxying), 2nd, at application layer
Interception caching (or proxying), 2nd, at IP layer
Interception caching (or proxying), 2nd, at TCP layer
Interception caching (or proxying), 2nd, configuring
Interception caching (or proxying), 2nd, configuring, with Linux
Interception caching (or proxying), 2nd, controversies surrounding
Interception caching (or proxying), 2nd, debugging
Interception caching (or proxying), 2nd, designing a caching system and
Interception caching (or proxying), 2nd, using policy routing
Internet See : ICP Internet Cache Protocol
Internet Caching System (ICS) software
Internet Explorer, configuring
Internet Explorer, configuring, automatically, with PAC script
Internet Explorer, configuring, manually
INVALIDATE opcode (ICP)
IP Filter package, configuring for interception caching
IP multicast
IP network layer, interception caching and
IP security, interoperation problems and
ipchains
iptables
Java programming language, dynamic content and
L-M factor
Last-modified factor
Last-modified header
Last-modified timestamps
latency
Latency, reduced through caching
Layer four redirection
Layer four switches
Least connections technique, layer four switches and
Least recently used (LRU)
LFU (least frequently used)
Lifecycles (of objects), simulating with Web Polygraph
Linux, configuring for interception caching
Load balancing, layer four switches and
Load reduction for servers
load sharing
Load sharing, designing a caching system and
locality of reference See : entries at access.log file log files 2nd
Loops, in request forwarding
LRU (least recently used)
Lucent imminet WebCache product
Lynx
Mailing lists about caching
MASK_SIZE field (Cache Digests)
Max-age directive, 2nd, 3rd
MD5 hash function, 2nd
Memory
Memory, caching and
Memory, designing a caching system and
Memory, performance bottlenecks and
Memory, usage, monitoring
Meshes, 2nd
Message format of ICP
Messages (HTTP), parts of
Metrics for performance See : Internet Explorer configuring
Microsoft Internet Security and Acceleration Server software
Min-fresh directive
MISS opcode (ICP)
Misses, validated
MISS_NOFETCH opcode (ICP)
MISS_POINTER opcode (ICP)
MON opcode (HTCP)
Monitor opcode (HTCP)
MRTG utility
MSL value (ICP), 2nd
Multicast ICP
Must-revalidate directive, 2nd
Napster, 2nd
NCSA Mosaic for X
Neighbors
Netscape Navigator, configuring
Netscape Navigator, configuring, automatically, with PAC script
Netscape Navigator, configuring, manually
Netscape Proxy Server software
Network Appliance Netcache product
Network interfaces, designing a caching system and
Network layer, interception caching and
Network state, performance bottlenecks and See : NTP Network Time Protocol
networks
Networks, failures of, isolating clients from
Networks, probing, ICP and
Networks, testing/benchmarking
NIC bandwidth
NIC duplex mode
No-cache directive, 2nd, 3rd
No-intercept lists
No-proxy test
No-store directive
No-transform directive
Non-default routing
Non-HTTP proxy requests
NOP opcode (HTCP)
NOTIFY opcode (ICP)
NTP (Network Time Protocol), synchronizing clocks and
Null operation opcode (HTCP)
Object lifecycles, simulating with Web Polygraph
Object sizes, data analysis of
Objects
Objects, cachability analysis and
Objects, Cache Digests and
Objects, embedded, modeling with Web Polygraph
Objects, life cycle, data analysis of
Offensive content
Online Copyright Infringement Liability Limitation Act
opcodes
Opcodes for HTCP
Opcodes of ICP
Operating systems, designing a caching system and
Option flags (ICP)
Origin server requests
Origin servers
PAC (proxy auto-configuration) script setting
Packet loads, layer four switches and
Packet transport service
Pages vs. objects
parents
Peer-to-peer applications
peers
Performance
Performance, bottlenecks
Performance, hierarchies and
Persistent connections, measuring with Web Polygraph See : URNs persistent names
Policy routing See : Web Polygraph Polygraph
Popularity
Popularity, data analysis of
Popularity, simulating with Web Polygraph
pornography
Port 80 traffic
Port number exhaustion
Port numbers, data analysis of
Ports, network state and
POST method, using GET method instead of
prefetching
Privacy
Privacy Foundation (The)
Private directive, 2nd, 3rd
Products for caching (software or appliances), 2nd
Protocols
Protocols, data analysis of
Protocols, intercache
Protocols, intercache, which to use
Protocols, transport
Proxies
Proxies, configuring
Proxies, configuring, manually
Proxies, effects of
Proximity
proxy addresses See : PAC proxy auto-configuration
Proxy HTTP requests
Proxy requests
Proxy-revalidate directive, 2nd
Public directive
PURGE opcode (ICP)
QUERY opcode (ICP)
Query terms, in URLs
Question mark (?) in URLs
RAM, designing a caching system and
Recurrence, simulating with Web Polygraph
Referer header
Reply directives
Reply sizes
Reply sizes, data analysis of
Reply sizes, measuring with Web Polygraph
Request filtering
Request line, 2nd
Request methods, 2nd
Request methods, 2nd, data analysis of
Request methods, 2nd, ICP and
Request submission, measuring with Web Polygraph
Request traffic
Requests
Requests, abnormal, monitoring
Requests, blocking
Requests, conditional
Requests, data analysis of
Requests, HTTP
Requests, HTTP header data analysis and
Requests, making anonymous
Requests, service times for, data analysis of
REQUIRED field (Cache Digests)
Resource Update Protocol (RUP)
Resources
resources for further information See : status codes response codes
Resources for further information, bibliography
Resources for further information, caching
Response filtering
Response time
Response time, layer four switches
Response time, sample benchmarking results for
Responses
Responses, authenticated
Responses, cachable
Responses, dynamic
Responses, fresh vs. stale, 2nd
Responses, HTTP header data analysis and
Responses, uncachable
Responses, uncachable, measuring with Web Polygraph
RFC 2186
RFC 2186, opcodes/option flags and
RFC 2187
RFC 2616
Round-robin technique, layer four switches and
Routing
Routing, changes in, interception caching and
Routing, hierarchies and
Routing, non-default
RRDtool
RUP (Resource Update Protocol)
S-maxage directive, 2nd
SECHO opcode (ICP)
Secure Sockets Layer (SSL) See : surrogates server accelerators
Server busting
Server delays, simulating with Web Polygraph
server load
Server-Side Includes (SSI)
Server-side includes (SSI), avoiding
Server-side response time, monitoring
Servers
Servers, configuring to work with caches
Servers, load reduction for
Servers, origin
Service denials
Services times for requests, data analysis of
SET opcode (HTCP)
Siblings
Size, cache replacement algorithm based on
SNMP, layer four switches and See : products for caching software
Source Echo opcode (ICP)
Source RTT measurements (ICP)
Specific vs. unspecified end-to-end validation
SPECIFIER data type (HTCP)
SPECweb99 benchmarking tool
Squid software See : server-side includes SSI
Squid software, Cache Digests implemented in
SSL transport protocol
Stale responses, 2nd, 3rd
Static content, mixed with dynamic content
Static resources
Statistics
Statistics, access logs and
Statistics, advertising and
Statistics, DMCA and
Statistics, monitoring
Statistics, utilities for monitoring
Status codes, 2nd
Status codes, 2nd, data analysis of
Status codes, 2nd, list of
Status-line
Store.log files
Store.log files, cachability and
Store.log files, object life cycle and
Strong validators
Surrogates, 2nd
System clocks, synchronizing, 2nd
TCP connections
TCP connections, layer four switches and
TCP connections, states of, monitoring
TCP delayed ACKs
TCP network layer, interception caching and
Test opcode (HTCP)
Throughput
Throughput, disk
Throughput, improving with cache clusters
Throughput, sample benchmarking results for
Timestamps
TIME_WAIT state, 2nd
TLS transport protocol
traceroute utility
Traffic
Traffic shaping
Traffic, large families and
Traffic, port 80
Traffic, request
Transcoding
Translation
transparent proxies
Transport Layer Security (TLS)
Transport protocols, 2nd
Реклама