Sun N-Tire
Sun N-Tire
Sun N-Tire
http://www.sun.com/blueprints
Sun Microsystems, Inc.
4150 Network Circle
Santa Clara, CA 95045 U.S.A.
650 960-1300
Part No. 817-3997-10
Revision 1.0, 10/9/03
Edition: October 2003
Copyright 2003 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, California 95045 U.S.A. All rights reserved.
Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In
particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://
www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries.
This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation.
No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors,
if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers.
Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in
the United States and other countries, exclusively licensed through X/Open Company, Ltd.
Sun, Sun Microsystems, the Sun logo, Sun BluePrints, Sun ONE, Sun StorEdge, Sun Fire, SunDocs, Jump Start, iPlanet, Enterprise Java Beans,
Java Database Connectivity, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other
countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the US
and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.
The OPEN LOOK and Sun Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges
the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun
holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Suns licensees who implement OPEN
LOOK GUIs and otherwise comply with Suns written license agreements.
U.S. Government RightsCommercial use. Government users are subject to the Sun Microsystems, Inc. standard license agreement and
applicable provisions of the Far and its supplements.
DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Copyright 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, Californie 95045 Etats-Unis. Tous droits rservs.
Sun Microsystems, Inc. a les droits de proprit intellectuels relatants la technologie incorpore dans le produit qui est dcrit dans ce
document. En particulier, et sans la limitation, ces droits de proprit intellectuels peuvent inclure un ou plus des brevets amricains numrs
http://www.sun.com/patents et un ou les brevets plus supplmentaires ou les applications de brevet en attente dans les Etats-Unis et dans
les autres pays.
Ce produit ou document est protg par un copyright et distribu avec des licences qui en restreignent lutilisation, la copie, la distribution, et la
dcompilation. Aucune partie de ce produit ou document ne peut tre reproduite sous aucune forme, par quelque moyen que ce soit, sans
lautorisation pralable et crite de Sun et de ses bailleurs de licence, sil y en a. Le logiciel dtenu par des tiers, et qui comprend la technologie
relative aux polices de caractres, est protg par un copyright et licenci par des fournisseurs de Sun.
Des parties de ce produit pourront tre drives des systmes Berkeley BSD licencis par lUniversit de Californie. UNIX est une marque
enregistree aux Etats-Unis et dans dautres pays et licencie exclusivement par X/Open Company Ltd.
Sun, Sun Microsystems, le logo Sun, Sun BluePrints, Sun ONE, Sun StorEdge, Sun Fire, SunDocs, Jump Start, iPlanet, Enterprise Java Beans,
Java Database Connectivity, et Solaris sont des marques de fabrique ou des marques dposes, ou marques de service, de Sun Microsystems,
Inc. aux Etats-Unis et dans dautres pays. Toutes les marques SPARC sont utilises sous licence et sont des marques de fabrique ou des marques
dposes de SPARC International, Inc. aux Etats-Unis et dans dautres pays. Les produits portant les marques SPARC sont bass sur une
architecture dveloppe par Sun Microsystems, Inc.
Linterface dutilisation graphique OPEN LOOK et Sun a t dveloppe par Sun Microsystems, Inc. pour ses utilisateurs et licencis. Sun
reconnat les efforts de pionniers de Xerox pour la recherche et le dveloppement du concept des interfaces dutilisation visuelle ou graphique
pour lindustrie de linformatique. Sun dtient une licence non exclusive de Xerox sur linterface dutilisation graphique Xerox, cette licence
couvrant galement les licencis de Sun qui mettent en place linterface dutilisation graphique OPEN LOOK et qui en outre se conforment aux
licences crites de Sun.
LA DOCUMENTATION EST FOURNIE "EN LTAT" ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A LAPTITUDE A UNE UTILISATION PARTICULIERE OU A
LABSENCE DE CONTREFAON.
Please
Recycle
The recommended network design patterns and reasons behind these designs
Actual implementations that have been tested, tuned and proven in actual
deployments
This article also describes two popular approaches to network architectures, each
with its own merits and limitations.
This article addresses the following topics:
The focus of this article is limited to data flow. Systems and network management is
a topic in itself and is not discussed in this paper. Readers should have sufficiently
detailed information to extend and modify this discussion to their particular needs.
Defining Architectures
This section breaks architecture considerations into two sections:
Logical Architectures
A typical high-level functional overview of an N-Tier data center architecture is
shown in FIGURE 1. The tiers are logically segregated by functionality as follows:
1. Web service tierThe set of load-balanced, front-end web servers that handles the
initial ingress client HTTP web requests. Each web server typically includes a
servelet engine or JSP engine, and the capability to execute locally hosted cgi/bin
scripts which execute native code.
2. Application service tierThe set of application server instances that might span
one large multi-CPU server or several smaller multi-CPU servers. This tier provides
greater functionality and sophicated processing capabilities and services, such as EJB
containers, an ORB, or connector modules that integrate with legacy servers. The
application server usually interfaces with the web server. In recent years, the web
server has been included in the application server text image for increased
performance.
3. Naming service tierThe set of servers, possibly load balanced, that provides
secondary infrastructure support services for managing and maintaining naming
information for hosts addressing data, configuration data, and so on. This can
include services such as DNS and LDAP.
4. Data service tierThe set of highly available servers that provides persistent data
storage services for critical corporate data. Due to the the sensitive nature of the
data, this tier is usually highly protected in terms of security and availability. We
briefly describe new virtual tiered firewalling techniques that provide increased
security without sacrificing performance, using hardware-based firewalls.
t
ien
ss
ce
ac
Cl
ce
Re
arc
ier
et
vic
ser
We
rs
tie
es
tur
ec
hit
en
fer
ce
rvi
ier
et
tion
vic
ser
lica
p
Ap
ice
v
ser
min
tier
S
DN
Na
AP
ier
cle
Ora
et
LD
ta
Da
ic
erv
SA
FIGURE 1
Note Client access represents all the client systems that can access the reference
architecture (client systems, web browsers, and so forth). This access is not
considered part of the N-Tier architecture
The actual reference implementation described leveraged Sun ONE technology.
The Sun ONE software stack provides the software needed to deploy applications
using this reference implementation. The tiers of the N-Tier data center architecture,
shown in FIGURE 1, are mapped to the Sun ONE software as follows:
Web service tierSupported by Sun ONE Web Server, Enterprise Edition software
Defining Architectures
FIGURE 2 illustrates in greater detail how the logical N-Tier architecture is mapped to
the software systems architecture, and how Sun ONE and other software
components fit to create a complete system.
ta
Da ce
i
v
r
se r
tie
cle
Ora
n
atio
plicice
p
A rv
se r
tie
AP
LD
AP
LD
ute
Ro
Firewall
et
ern
Int r
o t
e
ran
Int
DN
b
Weer
v
r
se
ute
Ro
DN
FIGURE 2
Firewall
b
Weer
v
r
se
Firewall
b
We ce
vi
r
e
s r
tie
g
min
Na vice
ser r
tie
BC
JD
ns
ctio
ne
n
BC
Co ing
JD
s
m
tion
Na
g nnec
n
i
g Co
g
ssa
B
min
Me l
EJ ner
Na
i
i
a
a
ng
i
t
M
ag
t
con
B rity Mess
rvle r
J
e
E necru
S ine
il
ta
taSi e
Ma
on
t
A
con
c
e
l
D
rv
rity
JP
Se iner
tion Secu
a
a
r
t
t
is ing
con
DA
min itor
JP
Ad mon
B
tion
d
R
tra ing
n
O
s
a
i
n
mi itor
TP
Ad mon
HT er
B
d
R
v
n
O
a
ser
TP
s
HT er
nce
v
sta
n
i
ser
ver
ser
n
o
i
at
plic
t
ap
en
E
ON
oym
l
n
p
de
Su
nd
ly a
b
em
e
er
ass
rvic
n,
Se ation
tain
o
n
i
t
r
a
co
e integ
cre
ice
cor
ice
erv
v
s
S
r
n
Se
atio ces
plic rvi
Ap eb se
w
es
e
vic
rvic
ser
Se ery
b
licy
We
liv
po
de
nd
a
y
ntit
Ide atform
Pl
cy
ga
Le
Defining Architectures
Physical Architectures
This logical architecture is then mapped to a physical realization as shown in
FIGURE 3, which describes the physical architecture. This mapping is influenced
heavily at this point by non-functional requirements, such as performance and
availability. For example, redundant servers and redundant network connectivity are
a result of availability requirements and possibly performance requirements.
Wirespeed multilayer switches might satisfy performance requirements, provided
that the switch performs packet processing within timing constraints. Most Layer 2
and Layer 3 switches are implemented using ASICs, which are commonly available.
Higher layer packet service implementations differentiate vendors from each other.
Some vendors, such as Foundry in the ServerIron product line, implement Layer 7
using general purpose CPUs. This is much slower that an ASIC or an FPGA
implementation.
Client 1
Client 2
Client
access
L2-L3
Edge switch
Edge
network
Core switches
Web
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
Naming
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
Application
service
tier
Data
service
tier
FIGURE 3
Sun Fire
6800
Sun Fire
6800
T3
Sun Fire
6800
T3
Sun Fire
6800
Defining Architectures
TABLE 1 through TABLE 3 describe the actual tested hardware components and
TABLE 1
Memory
(RAM)
Storage
Capacity
Operating
Environment
2 GB
36 GB
Solaris 9 10/02
with patches
Sun ONE
Web Server
6.0, Service
Pack 5,
Enterprise
Edition
2 GB
36 GB
Solaris 9 10/02
with patches
n/a
Directory
server
4 GB
36 GB
Solaris 9 10/02
with patches
Sun ONE
Directory
Server 5.1
24 1-GHz
CPUs
64 GB
200 GB
Solaris 9 10/02
with patches
Sun ONE
Application
Server 7.0
24 1-GHz
CPUs
32 GB
36 GB
Solaris 9 10/02
with patches
VERITAS
Volume
Manager 3.5
software,
Oracle 9i
Release 2
software
n/a
200 GB
n/a
n/a
Service Tier
Function
Web
Naming
Application Application
servers
Data
Database
storage
Features
Software
TABLE 2
Function
Equipment
Features
Operating Environment
Edge switch
24 1-Gb ports
Core switch
TABLE 3
Function
Equipment
Features
Operating Environment
Edge switch
24 1-Gb ports
Core switch
Server loadbalancing
switch
(2) Foundry
ServerIron XL loadbalancing switches
Defining Architectures
Implementation Overview
Once the design and component selection is complete, follow these implementation
steps to set up your service tiers and their software:
10
IP Services
The following subsections provide a description of some of the more important
emerging IP services that are often important components of a complete network
design for a Sun ONE deployment. These IP services are divided into two categories:
11
Stateful Session Based - This class of IP services requires that the switch
maintain session state information, so that a particular clients session state is
maintained across all packets. We show that this requirement has severe
implications for highly available solutions, and limits scalabiity and performance.
Stateless Session Based - This class of IP services does not require that the switch
maintain any state information associated with a particular flow.
Later sections describe similar functions that are included in the Sun ONE integrated
stack.
Modern multilayer network switches perform many advanced Layer 3 IP services in
addition to basic routing. These services are implemented as functions that operate
on a packet by modifying the packet headers and controlling the rate at which they
are forwarded. IP services include functions such as Server Load Balancing, Quality
of Service, Application Redirection, Network Address Translation, and others. In this
section we start our discussion with Server Load Balancing, an important service for
data centers, and then describe adjacent services which can be cascaded.
12
Client
Packet A
srcIP:a.b.c.d srcPort: 123 dstIP:VIP1 http://www.a.com/index.html
VIP1 = a.b.c.d:123
URL
String
Match
HTTP
Header
Cookie
Cache
VIP2 = e.f.g.h:456
SSL
Session
ID
SLB
Custom
Algorithm
First Function rewrote srcIP and port, so that the real server
will reply to this switch, which is at srcIP e.f.g.h and port 456.
Dest is set to the SLB function
Round
Robin
Least
Connections
Packet A1
Packet A2
FIGURE 4
Real Dest. IP
[1,2,3,...n]
FIGURE 4 shows that a typical client request is destined for an external VIP, with IP
address a.b.c.d and port 123. The SLB algorithm eventually intercepts the packet,
and rewrites the destination IP address corresponding to the real server, which was
chosen by a particular algorithm. The packet is then returned as indicated by the
source IP address.
Reduces the load on one set of web servers and redirects it to another set, usually
cache servers for specific content
Intercepts client requests and redirects them to another destination for control of
certain types of traffic based on filtered criteria
13
Client
servergroup 1
DEST = A
Application Redirection
Filter has a defined destination IP
Client request meets filter criteria,
request is intercepted, IP dest is
rewritten to new destination IP addr
DEST = B
servergroup 2
DEST = B
srcIP:a.b.c.d srcPort: 123 dstIP:VIPB http://www.a.com/index.html
FIGURE 5
14
servergroup 1
stata
VIP
servergroup 2
dnsa
Layer 7 Switching Function
- terminate socket connection
- get URL
- check against rules
- forward to servergroup/slb function
- or get valid cookie, with server ID
and forward it to the same server
client http
request
http://www.a.com/SMA/stata/index.html servergroup1
servergroup 3
statb
servergroup 4
cacheb
http://www.a.com/SMA/dnsa/index.html servergroup2
http://www.a.com/SMB/statb/index.html servergroup3
http://www.a.com/SMB/CACHEB/index.html servergroup4
servergroup 5
dynab
http://www.a.com/SMB/DYNA/index.html servergroup1
FIGURE 6
Content Switching with full Network Address Translation (NAT) serves the
following purposes:
Allows reuse of a single IP address. For example, clients can send their web
requests to www.a.com or www.b.com, where DNS maps both a.com and b.com
domains to a single IP address. The proxy switch receives this request, with the
packet containing an HTTP header in the payload that contains the target domain
(a.com or b.com), and redirects this request to the appropriate group of servers.
Allows parallel fetching of different parts of web pages from servers optimized
and tuned for that type of data. For example, a complex web page may need GIFs,
dynamic content, and cached content. With Content Switching, one set of web
servers can hold the GIFs, and another can hold the dynamic content. The proxy
switch can make parallel fetches and retrieve the entire page at a faster rate than
would otherwise be possible.
Ensures requests with cookies or Secure Sockets Layer (SSL) session IDs are
redirected to the same server to take advantage of persistence.
FIGURE 6 shows that the clients socket connection is terminated by the proxy
function. The proxy retrieves as much of the URL as is needed to make a decision
based on the retrieved URL. In this example, various URLs map to various server
15
groups, which are virtual IP addresses. At this stage, the request may be forwarded
to the server, or passed off to the SLB function that is waiting for traffic destined for
the server group.
The proxy is configured with a virtual IP, so the switch forwards all client requests
destined for this virtual IP to the proxy function. The proxy function rewrites the IP
header, particularly the source IP and port, so that the server sends back the
requested data to the proxy instead of directly to the client.
NAT is configured with a set of filters, usually a quintuple Layer 3 rule. If the
incoming traffic matches a certain filter rule, the packet IP header is rewritten or
another socket connection is initiated to the target server, which itself can be
changed, depending on the rule.
16
newer SSL devices have an SSL accelerator integrated into the datapath of the
network switch. These are very advanced products, just starting to emerge from
startups such as Wincom Systems.
FIGURE 7 shows an example of switch activity. Once a client has made initial contact
with a particular server, which may have been selected based on SLB, the switch
ensures that subsequent requests are forwarded to the same SSL server based on the
SSL ID that the switch has stored during the initial SSL handshake. The switch keeps
state information based on the clients initial request for HTTPS on port 443, which
contains a hello message. This first request is then forwarded to the server selected
by the SLB algorithm or by another function. The server responds to the clients
hello message with an SSL session ID. The switch then intercepts this SSL session
and stores it in a table. The switch forwards all of the clients subsequent requests to
the same server, as long as each request contains the SSL session ID in the HTTP
header. There may be several different TCP socket connections that span the same
SSL session. State is maintained by the SSL Session ID in each HTTP request sent by
the same client.
Client
FIGURE 7
Network
Switch
SSL Server1
1
2
3
4
17
Sun ONE
Web Servers
Client
Internet
Multilayer
Switch
http
SSL
Session Persistence
Based on SSL Session ID
http
Session Persistence
Based on Cookie
https
18
Client Tier
External Network
Connectivity
FIGURE 9
Network Tier
Layer 3 redundancy
session based services
requires session sharing.
Other stateless services
failover with no problem.
Services Tier
Sun Servers with IPMPdual NICs
19
It is not sufficient to simply maximize the FAvailability function. The SPOF and
environmental factors also need to be considered. The networks designed in this
article describe a highly available architecture which conforms to these design
principles.
FIGURE 10 provides an overview of the logical network architecture. This shows how
the tiers map to the different networks, which are also mapped to segregate VLANs.
This segregation allows inter-tier traffic to be controlled by filters on the switch, or
possibly a firewall (which is the only bridge point between VLANs).
20
Client
network
172.16.0.0/24
External
network
External
network
192.168.10.0/24
Load
balancer
Load
balancer
Web service
network
10.10.0.0/24
Application
services network
10.30.0.0/24
Naming
services network
10.20.0.0/24
Management
network
10.100.0.0/24
Management
network
FIGURE 10
Production
network
Access
to all
networks
Backup
network
10.110.0.0/24
Database
service network
10.100.0.0/24
Device
network
10.0.0.0/24
21
22
Backup networkA dedicated service network that provides backup and restore
operations. This network is pivotal to minimizing disturbances to other
production service networks during backup and other network bandwidthintensive operations.
particular VLAN spans the six segments, which gives each interface access to the
VLAN on failover.
Client network
Edge switch
Master
switch
(layer 3)
Standby
switch
(layer 3)
Layer 2
switch
Layer 2
switch
Network
interface 1
Network
interface 0
FIGURE 11
Sun server
The design shown in FIGURE 12 results in the same network functionality, but
eliminates the need for two Layer 2 devices. This is accomplished using a tagged
VLAN interconnect between the two core switches. Collapsing the Layer 2
functionality reduces the number of network devices. This provides a reduced risk
of unit failure, lower cost, and reduced manageability issues.
23
Client network
Edge
switch
Network
interface 1
Network
interface 0
FIGURE 12
Sun server
25
Sun server
thd
pa
in.m
atio
plic
Ap
ea
mh
a
tre
TC
.1
97
.6.
10
VIP
TIP
.1
97
.
0.6
ha
:b1
9b
:ff:
t2
20
:
8:0
t3
or
or
C
MA
ce0
Y
PH
or
2
R
3
t2
or
P
t3
or
or
or
t2
or
t1
or
et
t2
or
La
ye
or
t1
or
t2
La
GID
TIP
:b2
9b
:ff:
0
0:2
8:
C
MA
ce1
Y
PH
.53
97
.6.
10
ha
GID
ye
VIP
.54
97
.6.
10
P
R
t2
or
P
or
t3
P
P
or
t1
et
or
t2
or
La
ye
or
t
or
t1
or
t2
La
ye
or
t3
or
Network switch
Network switch
FIGURE 13
IPMP Internals
Further, IP has the ability to loadbalance across all physical interfaces that have a
common GID. As can be seen, each physical interface has a unique MAC and a
unique test IP address (TIP). The Virtual IP address associated with each physical
interface that belongs to the same GID has two modes of operation:
26
1. Active Active The VIP must be specified using the addif command for each
active interface. Only active interfaces are load balanced for outgoing packets.
2. Active StandbyThe VIP is not specified on a particular interface, and the
standby command is issued for the standby interface. In this case, the standby
interface does not participate in outbound load balancing. It associates with the VIP
only in the event that an active interface fails and remains down.
It is important to configure the network switch carefully when using IPMP. As
shown in FIGURE 13, there are two types of forwarding tables: Layer 3 for IP-based
forwarding, and Layer 2 forwarding. It is important that the MAC addresses are
different: the switch must have a unique port associated with each MAC address.
Otherwise the switch may get confused, depending on the network forwarding
implementation. Also, if a standby interface has just failed over, the VIP will be
associated with the old, failed MAC and the switch may incorrectly forward to the
failed NIC. It is important to use tested network switches that know, when a link
fails, to remove the appropriate entries from the forwarding table are re-ARPed for
an updated entry.
IPMP detects failures using two methods:
Link levelThe NIC knows when the link is physically down. The driver issues a
message to IP to perform failure detection operations based on the configurations.
IP levelThe daemon in.mpathd detects Layer 3 failures with the default router.
Periodically in.mpathd tests the connectivity between the TIP and the default
router, ensuring correct Layer 3 connectivity. In the event of a failure, a message is
sent to IP to to perform failure detection operations, based on the configurations.
27
traffic follows the P1 path. If the ge0 interface fails, the ge1 interface takes over and
associates the virtual IP address, and then data traffic follows the P2 path. Failures
can be detected within two seconds, depending on the configuration.
.
HCS
HCS
P2
P1
VLAN
IPMP-dual NIC
ge0:a.b.c.d
w.x.y.z
ge1:e.f.g.h
FIGURE 14
particular service is up and running. If the router detects that the service has failed,
the VRRP can be configured on some switches to consider this failure as part of the
election algorithm and tie the failure to the priority of the VRRP router.
Simultaneously, the server is also monitoring links. Currently, IPMP consists of a
daemon, in.mpathd, that constantly pings the default router. As long as the default
router can be pinged, the master interface (ge0) assumes ownership of the IP
address. If the in.mpathd daemon detects that the default router is not reachable,
automatic failover occurs, which brings down the link and floats over the IP address
of the server to the surviving interface (ge1).
In the lab, we were able to tune IPMP and VRRP to achieve failure detection and
recovery within one second. There is a trade-off, however. Because the control
packets are on the same network as the production network, and because VRRP is a
CPU-intensive task, false failures are possible if the switches, networks, or servers
become overloaded. This is because the device might take longer than the strict
timeout to respond to the peers heartbeat.
VRRP
2
VRRP
6
4
ge1
ge0
FIGURE 15
in.mpathd
29
Clients
172.16.0.1
192.168.0.1
Edge switch
Master
Slave
192.168.0.2
192.168.0.2
10.50.0.1
10.10.0.1
10.40.0.1
10.10.0.1
10.50.0.1
10.20.0.1
10.20.0.1
10.40.0.1
10.30.0.1
10.30.0.1
Servers
FIGURE 16
30
TABLE 4
Name
Network
Default Router
VLAN
Purpose
client
172.16.0.0
172.16.0.1
client
edge
192.16.0.0
192.16.0.1
edge
web
10.10.0.0
10.10.0.1
web
Web services
ds
10.20.0.0
10.20.0.1
ds
Directory services
db
10.30.0.0
10.30.0.1
db
Database services
app
10.40.0.0
10.40.0.1
app
Application services
dns
10.50.0.0
10.50.0.1
dns
DNS services
mgt
10.100.0.0
10.100.0.1
mgt
san
10.0.0.0
10.0.0.1
san
Devices network
Note If you have multiple NICs, make sure each NIC uses its unique MAC
address.
Each switch is configured with the identical networks and associated VLANS that
are shown in TABLE 4. An interconnect between the switches extends each VLAN, but
is tagged to allow multiple VLANs to share a physical link. (This requires a network
interface, such as cards that use the ce driver, that supports tagged VLANS.) The
Sun servers connect to both switches in the appropriate slots, where only one of the
two interfaces will be active.
Most switches support Routing Information Protocol (RIP and RIPv2), Open Shortest
Path First (OSPF), and Border Gateway Protocol v4 (BGP4). However, static routes
provide a more secure environment. A redundancy protocol based on Virtual Router
Redundancy Protocol (VRRP, RFC 2338) runs between the virtual routers. The MAC
address of the virtual routers floats among the active virtual routers, so that the ARP
caches on the servers do not need any updates when a failover occurs.
31
32
Clients
12
Switching
services
Load
balancer
11
Web services
Static content
NFS server
5
4
Directory
services
10
Application
services
8
9
7
6
Database
services
FIGURE 17
33
TABLE 5
34
Item
Interface1
Interface2
Protocol
Description
Client
Switch
HTTP/
HTTPS
Switch
Web server
HTTP/
HTTPS
Web Server
Application
server
Application
server web
connector
over TCP
Application
server
Directory
server
LDAP
Directory
server
Application
server
LDAP
Application
server
Database
server
JDBC
Database
server
Application
server
JDBC
TABLE 5
Item
Interface1
Interface2
Protocol
Description
Application
server
Web server
Application
server Web
connector
over TCP
Web server
Switch
HTTP/
HTTPS
10
Switch
Client
HTTP/
HTTPS
There are several approaches to realize a network that functionally satisfies the
logical architectural requirements.
The Sun ONE N-Tier Data Center is vendor independent, so you can use the
network equipment that best suits your environment. In the lab, we built two
different network configurations. One configuration uses Extreme Networks Black
Diamond 6800 Core Switches, (FIGURE 18), and the other uses Foundry Networks Big
Iron Core Switch and Server Iron XL Load Balancer (FIGURE 19). The Extreme
Networks switch that we used has built-in load balancing, so there is no need for an
external load-balancing device. The Foundry Networks products required a separate
load-balancing switch.
Similar implementations could be realized using products from Cisco or Nortel.
35
Client 1
Client 2
Client
access
L2-L3
edge switch
192.168.10.1
10.50.0.1
Extreme
switches
Extreme switch
192.168.10.2
Core
Core
Extreme switch
192.168.10.3
10.30.0.1
10.40.0.1
10.20.0.1
10.10.0.1
Web
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
10.10.0.100 10.10.0.101 10.10.0.102 10.10.0.103
Naming
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
10.20.0.100 10.20.0.101 10.20.0.102 10.20.0.103
Application
service
tier
Data
service
tier
FIGURE 18
36
Sun Fire
6800
10.40.0.100
Sun Fire
6800
10.40.0.101
T3
Sun Fire
6800
10.30.0.100
T3
Sun Fire
6800
10.30.0.101
Client 1
Client 2
Client
access
192.168.10.1
10.50.0.1
Master core
192.168.10.2
Standby core
192.168.10.3
Foundry
switches
10.30.0.1
10.40.0.1
10.20.0.1
10.10.0.1
Server load-balancer switches
Web
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
10.10.0.100 10.10.0.101 10.10.0.102 10.10.0.103
Naming
service
tier
Sun Fire 280R Sun Fire 280R Sun Fire 280R Sun Fire 280R
10.20.0.100 10.20.0.101 10.20.0.102 10.20.0.103
Application
service
tier
Data
service
tier
FIGURE 19
Sun Fire
6800
10.40.0.100
Sun Fire
6800
10.40.0.101
T3
Sun Fire
6800
10.30.0.100
T3
Sun Fire
6800
10.30.0.101
37
The Extreme Networks configuration would be mapped directly to mls1 and mls2,
because these switches incorporate SLB functionality. Foundry, however, requires
additional load-balancing appliances.
FIGURE 20 elements are described further in TABLE 6.
38
ge0:172.16.0.102/24
ge0:172.16.0.101/24
Client2
Client1
172.16.0.1/24
Edge
hme0:10.100.16.102
10.100.16.1
192.168.0.1/24
6
hme0:10.100.16.101
10.100.168.2
10.100.168.2
mls1
192.168.0.101/24
192.168.0.102/24
mls2
10.30.0.1/24
192.168.0.2/24
192.168.0.2/24
10.30.0.1/24
10.20.0.1/24
10.10.0.1/24
10.10.0.1/24
10.20.0.1/24
192.168.0.2/24
192.168.0.2/24
web1
web1
web1
ge0:10.40.0.101/24
ge1:10.40.0.102/24
ge1:10.40.0.106/24
ge0:10.40.0.105/24
app1
app1
app2
app2
ge0:10.40.0.103/24
ge1:10.40.0.104/24
ge1:10.40.0.108/24
hme0:10.100.10.105
ge0:10.10.0.107/24
hme010.100.10.101
ge0:10.20.0.103/24
ge0:10.20.0.101/24
ds2
ds1
hme0:10.100.20.101
ge1:10.20.0.102/24
ge0:10.30.0.101/24
ge0:10.30.0.103/24
db1
hme0:10.100.30.101
FIGURE 20
ge1:10.20.0.104/24
hme0:10.100.20.103
db2
ge1:10.30.0.102/24
hme0:10.100.30.103
ge1:10.30.0.104/24
39
TABLE 6
Switch
Description
Port
Speed (Mb/s)
Base
Address
Netmask
edge
1,2,3,4
1000
172.16.0.1
255.255.255.0
edge
5,6
1000
192.168.10.1
255.255.255.0
mls1
External network
1000
192.168.10.2
255.255.255.0
mls1
Web/application service
router
3,4,5,6
1000
10.10.0.1
255.255.255.0
mls1
7,8
1000
10.20.0.1
255.255.255.0
mls1
9,10
1000
10.30.0.1
255.255.255.0
mls2
External network
1000
192.168.10.2
255.255.255.0
mls2
Web/application service
router
3,4,5,6
1000
10.10.0.1
255.255.255.0
mls2
7,8
1000
10.20.0.1
255.255.255.0
mls2
9,10
1000
10.30.0.1
255.255.255.0
Configuring Switches
A high-level overview of the switch configuration is shown in FIGURE 21.
40
t7
i
mm
ks
or
Su
etw
N
me
tre
t
en .1
cli 6.0
2.1
Ex
ge .2
ed68.0
.1
92
ge .2
ed68.0
.1
92
1
b
we .0.1
0
1
.
0
ge .2
ed68.0
.1
92
1
b
we .0.1
0
0.1
ot
ot
ot
ot
ot
ot
ot
ot
Sl
Sl
Sl
Sl
Sl
Sl
Sl
Sl
ds.0.1
0
2
.
10 b
1
d .0.1
0
3
.
10 p
ap .0.1
.40
NS
0
1
,D
S
p
1
p
DN
.0.
,a
.50
db
0
,
1
ds
b,
e
w
tec
n
n
08
rco
68
e
t
d
in
t 1
on
rp
mg0.0.
am
es
i
.10
kD
10 Blac
rks
o
tw
Ne
e
m
tre
Ex
FIGURE 21
ot
ot
ot
ot
ot
ot
ot
ot
Sl
17
ds.0.1
0
2
.
10 b
1
d .0.1
0
3
.
10 p
ap .0.1
40
NS
.
,D
10 S
p
.1
ap
DN
b,
0.0
d
5
.
,
10
ds
b,
e
w
tec
n
n
8
co
80
er
6
t
n
d
i
t 1
on
rp
mg0.0.
es
am
i
.10
kD
10 Blac
rks
o
tw
Ne
e
m
tre
Ex
Sl
Sl
Sl
Sl
Sl
Sl
Sl
41
Note Network equipment from Foundry Networks can be used instead. Refer to
Configuring the Foundry Networks Switches on page 43.
42
43
Client
Client
NS5200
Netscreen
firewall
SLB0
Server load
balancer
FIGURE 22
44
Client
S7i
Extreme Networks
Summit 7i
MLS0
BigIron
layer 2/3 switch
MLS1
BigIron
layer 2/3 switch
Servers
Servers
Web
service
tier
Servers
Servers
Directory
service
tier
Servers
Servers
Application
service
tier
Servers
Servers
Database
service
tier
Servers
Servers
Client
NS5200
Netscreen
firewall
SLB1
Server load
balancer
45
46
47
Network Security
For the N-Tier network design, firewalls were configured between each service tier to
provide network security. FIGURE 23 shows the relationship between the firewalls
and the service tiers.
48
Client
Client
Intranet/Internet
Edge
switch
Firewall
Web service
tier
Firewall
Application service
tier
Firewall
Database service
tier
FIGURE 23
In the lab, one physical firewall device was used to create multiple virtual firewalls.
Network traffic was directed to pass through the firewalls between the service tiers,
as shown in FIGURE 24.
The core switch is only configured for Layer 2 with separate port-based VLANs. The
connection between the Netscreen device and the core switch uses tagged VLANS.
Trust zones are created on the Netscreen device, and they map directly to the tagged
VLANs. The Netscreen firewall device performs the Layer 3 routing. This
configuration directs all traffic through the firewall, resulting in firewall protection
between each service tier.
Network Security
49
Client
Client
Intranet/Internet
Edge
switch
Netscreen
device
VLAN*
Core
switch
Core
switch
VLAN* Netscreen
device
Database VLAN
Database VLAN
Application VLAN
Application VLAN
Web VLAN
Web VLAN
Web service
tier
Application service
tier
Traffic
Database service
tier
50
Netscreen Firewall
The following code box shows a partial example of a configuration file used to
configure the Netscreen device.
Network Security
51
52
53
Acknowledgements
Sincere thanks to Bill Sprouse, Kemer Thomson, Brad Carlile, and many others who
provided tremendous support, guidance, and direction to this article.
Related Resources
Sun ONE Directory Server 5.1 documentation collection
Note: This product was formerly known as the iPlanet Directory Server
software. You can locate the documentation collection at:
http://docs.sun.com
Search for the phrase directory server 5.1. Start with the iPlanet Directory
Server 5.1 Deployment Guide.
54