SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Utroque Democritum Aeterno
Nostro Aperiam Usu
Prompta volumus denique eam ei, mel autem
Technical White Paper
by Lori MacVittie
White Paper
The F5 Application Services
Reference Architecture
Build elastic, flexible application delivery fabrics that are ready to
meet the challenges of optimizing and securing applications in a
constantly evolving environment.
2
White Paper
The F5 Application Services Reference Architecture
Contents
Introduction	3
Business Challenges 	 3
Architecture Solution 	 4
Core Functions	 4
Application Fluency	 5
Programmability 	 6
Scalability	6
The F5 Architecture Solution	 7
Comprehensive L3-7 Functionality 	 8
Application Fluency 	 8
A Programmable Platform for Innovation 	 9
F5 and DevOps 	 9
A Secure, Elastic Delivery Fabric	 10
Business Benefits	 10
Conclusion	11
3
White Paper
The F5 Application Services Reference Architecture
Introduction
In today’s fast-moving, on-demand culture, users expect their applications to always
work—and work fast—on any device. If organizations fail to meet these expectations,
it has never been easier for customers to find alternatives. For IT departments or
organizations to stay connected to their customers, they must meet user expectations
with responsive, omni-channel applications that deliver new features seamlessly.
In addition to traditional, linear application delivery from corporate data centers to
PC-based users, organizations can now deliver applications from a complex matrix of
locations—including SaaS providers—outside the data center. Increasingly mobile
users around the globe now demand this anywhere, any-device access.
At the same time, the pace of global innovation is always accelerating with faster release
cycles, the emergence of DevOps, and the move toward continuous delivery. Although
this paradigm shift better aligns IT and business, it also creates challenges for traditional
infrastructures. The Application Delivery Network must promote innovation—but not at
the expense of stability, security, or performance.
With F5, organizations can build elastic, flexible application delivery fabrics that are ready
to meet the challenges of optimizing and securing applications in a constantly evolving
environment.
Business Challenges
If the expectations of users are simple and the need to innovate is clear, the solutions to
these challenges are neither. Even today’s best-run organizations are challenged by the
rate at which IT is evolving, the growth of applications, and the complexities created by
mobility, cloud computing, and virtualization.
To be successful in delivering applications, IT organizations must:
•	 Optimize application performance from anywhere and to anyone and any
device—without increasing cost or complexity.
•	 Enable rapid deployment and innovation.
•	 Flex and scale on demand.	
3
“Good Enough” and “Lots
of Dumb”
“Good enough” application delivery
solutions are typified by Application
Delivery Controllers offering high-traffic
capacity and some layer 7 functions at
a low cost point. Lacking application
fluency, programmability, and true
scalability, these low-end solutions are
likely to constrain innovation, rather
than promote it.
The “lots of dumb” paradigm of
creating tens, hundreds, or thousands
of virtual load balancing instances
generally solves problems of scale
and deployment speed, but lacks the
functions or fluency of a true application
delivery fabric.
4
White Paper
The F5 Application Services Reference Architecture
How can IT fulfill these requirements for innovation and adaptability while maintaining
the reliability users demand? How can you drive revenue, service customers, comply
with regulations, and reduce costs if you can’t scale application services when you need
to? The inflexibility of traditional infrastructures is a significant obstacle on the path to an
agile, application-centric network. A programmable, scalable application delivery fabric
can provide a layer of application services to help bridge this gap.
Architecture Solution
To succeed in this dynamic environment, organizations must create networks that
combine core layer 4–7 functionality, programmability, and application fluency into a
scalable Application Delivery Network.
While these components all bring their individual benefits, the real, lasting value lies
in the resulting synergy of the combined solution. Failure to deliver even one of these
technology components greatly reduces the business value of the infrastructure.
Core Functions
One of the main benefits of adding application services to your network is the rich set
of functions you can leverage to improve the user experience, add security, or provide
analytic data when application traffic passes through your infrastructure. While the
core features of high availability and load balancing are required for most applications,
there is a large range of additional benefits that the application delivery network
should provide.
Application Delivery Controllers (ADCs) offer hundreds of functions, but they can be
broken down into broad categories:
5
White Paper
The F5 Application Services Reference Architecture
Protocol
Parsing, translating, and manipulating network and application protocols.
Examples: IPV4 to IPV6 translation, HTTP to SPDY gateway services, FIX
traffic parsing, SIP Call ID extraction.
Encryption
Encrypting and decrypting application traffic for security, inspection, and
server offload.
Examples: SSL decryption, SSL re-encryption, HTTP cookie encryption,
SSL traffic visibility, and key protection.
Context
Providing contextual information about the application traffic.
Examples: Device identification, location awareness, reputation aware-
ness, connection metrics, and application and server health monitoring.
Optimization
Altering some aspect of the application traffic or connection to improve
the performance of the application.
Examples: HTTP object compression, TCP connection multiplexing,
adaptive traffic distribution based on server health scores, and TCP
protocol optimization.
Traffic
Controlling and manipulating traffic.
Examples: Load balancing, high availability, connection limiting, content-
based routing, and rate shaping.
Content
Parsing and manipulating application content.
Examples: Stripping credit card numbers from server responses, and
reading and logging FIX transaction IDs.
Analytics
Providing statistics and logging for application traffic.
Examples: HTTP application page load times, logging application events,
and client-side latency.
However, a huge array of capabilities alone is not enough. With hundreds of features that
can be deployed in thousands of combinations, how can an organization best deliver an
application? Testing every feature combination and analyzing the results is impractical. The
technology must be equipped with built-in application knowledge. In other words,
application fluency is mandatory.
Application Fluency
In this complex application delivery environment, you must be able to customize delivery
policies based on application and device. A lean, agile policy designed for capacity and
availability management of a high-frequency financial trading application should be different
6
White Paper
The F5 Application Services Reference Architecture
from a more extensive, feature-rich policy for an application such as Microsoft Exchange.
Attempting to use the same policy for these very different applications would result in
neither application getting the services it needs.
The two different applications each demand a specific combination of the many functions
available from the ADC.
However, the labor-intensive process of handcrafting and testing customized application
delivery policies can cause operational costs to skyrocket. Customizing delivery policies
without adding complexity or administrative overhead requires a solution that has a broad
set of functions, as well as the knowledge to deploy them in the right configuration.
Repeatable, reliable templates for application delivery should be used to easily create
application-specific services. Using pre-defined templates removes the overhead of
managing complex configurations and generates tremendous payback in terms of saved
time and increased reliability in application deployments.
Programmability
In an environment where the only constant is change, the need to create new solutions
and then rapidly prototype, test, and deploy them demands an infrastructure that is
innovation-ready. Programmability of both the data plane (application traffic) and the control
plane (device configuration) allows you to create adaptable solutions that meet your needs
without waiting for new features to be developed by manufacturers—or to create novel
methods of traffic distribution for a new application. Full programmability makes it simple for
organizations to create software defined application services on top of any network
infrastructure.
Integrating with monitoring and orchestration systems enables task automation, such as
managing traffic for new application release cycles, deploying new services, or responding
to changes elsewhere in the infrastructure. It removes delays caused by manual processes
and provides an agile delivery environment where limited control of application traffic can
be delegated to application deployment teams.
Scalability
The fabric delivering the application services needs to be as rich, flexible, and extendable
as the services themselves. This means scaling not just locally in terms of capacity, but also
in terms of location and architecture—both across traditional infrastructures and into public
and private clouds. To achieve true scalability, platforms must be secure enough to be
connected pervasively throughout the network or into the cloud.
7
White Paper
The F5 Application Services Reference Architecture
The F5 Architecture Solution
The F5 architecture solution for application services allows organizations to create a robust
and scalable application delivery fabric. This architecture revolves around some simple
principles:
•	 Create a services fabric of scalable and interconnected devices.
•	 Pervasively connect the fabric to the application and client networks.
•	 Use repeatable templates to define policies that deliver application-fluent services to
optimize applications via application proxy points.
•	 Open up management and control of the fabric to orchestration and integration tools.
This creates a fabric that is able to deliver the right application services to the right
applications at the right point in the network, for any application and any network.
REFERENCE ARCHITECTURE: Application Services
CONTENT TYPE: Architecture Diagram
AUDIENCE: Enterprise
CUSTOMER SCENARIO: Application Fluency and Scalability
Application
Proxy
Front-End
Application
Servers
Application
Proxy
Back-End
Application
Servers
Overlay
Underlay
VXLANNVGRE
VLAN
Network
Scalable resource pool
delivers application
services, policies, and
programmable functions
High-Performance Fabric
F5
Native
Infrastructure
Management
DevOps
Tools
Management
Private Cloud, Data Center, or Public Cloud
Users
Strategic Point of Control
The F5 Application Services architecture
At the heart of this fabric is the F5®
BIG-IP®
platform, which is designed to supply
application security, acceleration, and availability services. Available in physical, virtual,
and cloud editions, the BIG-IP platform is easy to deploy into as many locations and
architectures as required, while maintaining consistency across environments.
8
White Paper
The F5 Application Services Reference Architecture
Comprehensive L3-7 Functionality
From fine-grained manipulation of TCP protocol settings through more than 10 high-level application-
specific proxies, the F5 BIG-IP platform provides a massive range of features and functions designed
to optimize and deliver applications to users. The range of functions across all categories gives you
the ability to create and use application services that are truly optimized for your applications, networks,
and clients.
Application Fluency
Creating optimized delivery policies tailored for particular applications requires significant time and
resources. With the BIG-IP platform, the work to build an application-fluent solution has already been
done. The result is a suite of implementation services, templates, and guides designed to build
best-practice configurations out of the box.
Application-specific proxies provide parsing and manipulation of protocols such as HTTP, SIP, and
FIX. The BIG-IP platform’s deep understanding of application protocols enables better traffic
management and reporting—and opens up opportunities to control and manage traffic more
effectively. Being able to route, drop, or manipulate traffic based on application values such as HTTP
cookies, FIX message type, or SIP header makes it easier to simplify application infrastructures and
build additional application capability into your delivery fabric. Having understanding and control of
application traffic at a strategic point in the network can speed and simplify application development
cycles. You can outsource application functions to the network, where they can be done more
efficiently at a strategic point of control within the delivery stack.
F5®
iApps®
Templates significantly cut deployment time and remove much of the potential for human
error by providing a simple interactive process to configure and update application deployments.
When you use an iApps Template, selection and configuration of all the required application functions
is collapsed into a single, simple application-focused interface. Once an application has been
deployed, the iApps system provides an application-focused view of the health and performance of
the components that make up the deployment, which makes operational management easier and
can provide feedback into the development or revision process for the next release. F5 maintains a
library of new and updated iApps Templates and maintains partnerships with leading software
vendors to ensure that templates closely follow new releases. No need to wait for software updates
to manage new applications; simply download an updated template. iApps Templates are also fully
customizable and designed to work in different deployment scenarios since your application delivery
network should enhance your application, not constrain it.
Where iApps Templates are not available or suitable, F5 offers more than 100 application or solution
deployment guides, which present detailed configuration information and best practices.
9
White Paper
The F5 Application Services Reference Architecture
With a platform that understands applications and comes equipped with the knowledge to deliver
them, organizations can save significant time and cost in deploying new applications and maximizing
the value from existing ones.
A Programmable Platform for Innovation
The F5 BIG-IP platform has a well-documented suite of programmable components across the
control, data, and management planes, with which organizations can build an adaptive and
automated application delivery fabric with real-time control over application traffic and device
configuration.
Data Plane Programming
The F5 iRules®
scripting language offers real-time control of application traffic as it passes through
your infrastructure. With the ability to route, reject, modify, and inspect traffic in any direction,
organizations can build or deploy solutions to meet just about any application traffic challenge, no
matter how unusual. iRules can use contextual application services such as IP reputation or location
to make traffic management decisions—or manipulate server responses to remove sensitive
information.
Control Plane Programming
The F5 iCall™ scripting framework allows the configuration of the BIG-IP platform to adjust based on
data plane events, such as DHCP requests from new server instances or altering traffic distribution
based on a change in monitoring data.
Management Plane Programming
The F5 iControl®
comprehensive management API enables integration with data center management
frameworks, orchestration tools, and third-party applications and scripts. iControl also supports
an event-based model, allowing applications and frameworks to subscribe to BIG-IP system events
such as the change in status from up to down for a given application node. These three planes of
programmability increase agility, reduce operational costs, and improve application deployments,
freeing your network to promote innovation instead of constraining it.
F5 and DevOps
To better align IT to business needs, organizations are moving to compressed application revision
schedules and “continuous delivery” methods. Innovative DevOps practices automate the testing
and deployment processes, driving consistency and faster times to production. The BIG-IP platform
provides the application traffic control and the programmability required to realize these benefits
within the production delivery network.
10
White Paper
The F5 Application Services Reference Architecture
A Secure, Elastic Delivery Fabric
Programmability, fluency, and functionality combine to create application-specific services that
improve end user experience, increase security, and drive innovation. This is true only if they can be
delivered at the right point in the network and at the scale required by the application. F5 provides a
secure, elastic fabric that can deliver application services anywhere they are required.
The secure BIG-IP platform enables devices (physical or virtual) to be connected to the core network
in a data center, or in a public cloud, to provide application services and managed control points
across all zones. Functionality and performance are no longer locked in silos of devices in particular
zones, but are available at all points in your infrastructure. This improves device utilization and
reduces implementation costs for new applications, as the services can be supplied from existing
resources no matter where the services are required.
The F5 ScaleN™ architecture creates clusters of up to 32 devices (physical, virtual, or mixed), which
form a highly available, elastic delivery fabric. Application workloads migrate between devices in the
event of failure and can be moved should more resources be required. Devices can be upgraded
physically or by license key to process more traffic or enable additional features. The ScaleN fabric
allows the incremental addition of capacity and services, enabling a smooth growth and cost curve
as traffic increases. Workloads can be managed to run on the most appropriate device, and additional
resources can be provisioned quickly via virtual editions, giving organizations fine-grained control of
resources and putting the administrator in control of applications.
Network virtualization support in the BIG-IP platform allows the unification of virtual infrastructures
and high-performance network hardware. Support for VXLAN and NVGRE (on virtual platforms only)
enables the delivery fabric to extend from physical devices into virtual networks, bringing the power
of specialized hardware for compression, encryption, and network processing into the virtual data center.
Business Benefits
By creating a flexible, scalable, application-fluent network, organizations can optimize applications
to a diverse user population and develop and deploy applications faster. To the IT organization, this
means greater user satisfaction, better alignment with the business (through more agile application
releases), and the ability to scale infrastructure in greater alignment with needs.
What are the benefits to the enterprise as a whole?
White Paper
The F5 Cloud Bursting Reference Architecture
Solutions for an application world.
F5 Networks, Inc.
Corporate Headquarters
info@f5.com
F5 Networks, Inc. 	401 Elliott Avenue West, Seattle, WA 98119 888-882-4447	 www.f5.com
F5 Networks
Asia-Pacific
apacinfo@f5.com
F5 Networks Ltd.
Europe/Middle-East/Africa
emeainfo@f5.com
F5 Networks
Japan K.K.
f5j-info@f5.com
©2013 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 10/13	
WP-AVAIL-10847-application-services 1013
A better user experience ensures that visitors become customers and employees become
more productive. Effective delivery to mobile platforms increases the reach and effectiveness of
applications, delivering more return on the acquisition or development investment.
Increasing the pace of application deployment cycles ensures that projects can make smaller
adjustments to functionality to react to the analytics of application use and functionality. Projects
that might otherwise fail to deliver can be corrected faster and with less cost. Using standard
functions from the application delivery fabric reduces coding and costs.
The scalable fabric allows CapEx to align with growth, improving cash flow and reducing risk.
This efficient application delivery fabric also removes islands of capacity, because services are
delivered from a pool of resources, reducing overall spend through better utilization.
Conclusion
A scalable, programmable, application-fluent fabric allows organizations to meet user expectations,
innovate, and scale in a cost-effective manner aligned with business goals.

Más contenido relacionado

La actualidad más candente

Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Andrew Hendry
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Scaling Integration
Scaling IntegrationScaling Integration
Scaling IntegrationKim Clark
 
The evolving story for Agile Integration Architecture in 2019
The evolving story for Agile Integration Architecture in 2019The evolving story for Agile Integration Architecture in 2019
The evolving story for Agile Integration Architecture in 2019Kim Clark
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
 
Private Cloud with Microsoft Technologies
Private Cloud with Microsoft TechnologiesPrivate Cloud with Microsoft Technologies
Private Cloud with Microsoft TechnologiesChris Avis
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4Duc Nguyen
 
Cloud native integration
Cloud native integrationCloud native integration
Cloud native integrationKim Clark
 
Agile Integration Architecture: A Containerized and Decentralized Approach to...
Agile Integration Architecture: A Containerized and Decentralized Approach to...Agile Integration Architecture: A Containerized and Decentralized Approach to...
Agile Integration Architecture: A Containerized and Decentralized Approach to...Kim Clark
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
The resurgence of event driven architecture
The resurgence of event driven architectureThe resurgence of event driven architecture
The resurgence of event driven architectureKim Clark
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentKim Clark
 
How to choose the right software
How to choose the right softwareHow to choose the right software
How to choose the right softwareRüdiger Gros
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experienceEric Cattoir
 
Interface characteristics - Kim Clark and Brian Petrini
Interface characteristics - Kim Clark and Brian PetriniInterface characteristics - Kim Clark and Brian Petrini
Interface characteristics - Kim Clark and Brian PetriniKim Clark
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 

La actualidad más candente (20)

Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Scaling Integration
Scaling IntegrationScaling Integration
Scaling Integration
 
The evolving story for Agile Integration Architecture in 2019
The evolving story for Agile Integration Architecture in 2019The evolving story for Agile Integration Architecture in 2019
The evolving story for Agile Integration Architecture in 2019
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
 
Private Cloud with Microsoft Technologies
Private Cloud with Microsoft TechnologiesPrivate Cloud with Microsoft Technologies
Private Cloud with Microsoft Technologies
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4
 
Cloud native integration
Cloud native integrationCloud native integration
Cloud native integration
 
Agile Integration Architecture: A Containerized and Decentralized Approach to...
Agile Integration Architecture: A Containerized and Decentralized Approach to...Agile Integration Architecture: A Containerized and Decentralized Approach to...
Agile Integration Architecture: A Containerized and Decentralized Approach to...
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
The resurgence of event driven architecture
The resurgence of event driven architectureThe resurgence of event driven architecture
The resurgence of event driven architecture
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environment
 
How to choose the right software
How to choose the right softwareHow to choose the right software
How to choose the right software
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
 
Interface characteristics - Kim Clark and Brian Petrini
Interface characteristics - Kim Clark and Brian PetriniInterface characteristics - Kim Clark and Brian Petrini
Interface characteristics - Kim Clark and Brian Petrini
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 

Similar a The F5 Networks Application Services Reference Architecture (White Paper)

Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfApplication Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfbasilmph
 
Information on Cloud-native Applications
Information on Cloud-native ApplicationsInformation on Cloud-native Applications
Information on Cloud-native ApplicationsHTS Hosting
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?Cygnet Infotech
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processEric Saraceno
 
Cloud Native Application Development Guide – 2023
Cloud Native Application Development Guide – 2023Cloud Native Application Development Guide – 2023
Cloud Native Application Development Guide – 2023Lucy Zeniffer
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfAnil
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
Modern productivity solutions for a modern government
Modern productivity solutions for a modern governmentModern productivity solutions for a modern government
Modern productivity solutions for a modern governmentDeneys Minne
 
PCF_Soln_Brief-New
PCF_Soln_Brief-NewPCF_Soln_Brief-New
PCF_Soln_Brief-Newkarunbakshi
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
Exploring Cloud Native Architecture: Its Benefits And Key Components
Exploring Cloud Native Architecture: Its Benefits And Key ComponentsExploring Cloud Native Architecture: Its Benefits And Key Components
Exploring Cloud Native Architecture: Its Benefits And Key ComponentsLucy Zeniffer
 
unit 5 cloud.pptx
unit 5 cloud.pptxunit 5 cloud.pptx
unit 5 cloud.pptxMrPrathapG
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
Cisco vmd cwithf5_big-ip_ltm_whitepaper
Cisco vmd cwithf5_big-ip_ltm_whitepaperCisco vmd cwithf5_big-ip_ltm_whitepaper
Cisco vmd cwithf5_big-ip_ltm_whitepapershankar Psschiatanya
 

Similar a The F5 Networks Application Services Reference Architecture (White Paper) (20)

Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdfApplication Modernization With Cloud Native Approach_ An in-depth Guide.pdf
Application Modernization With Cloud Native Approach_ An in-depth Guide.pdf
 
Information on Cloud-native Applications
Information on Cloud-native ApplicationsInformation on Cloud-native Applications
Information on Cloud-native Applications
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?How to modernize legacy application infrastructure?
How to modernize legacy application infrastructure?
 
whitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_processwhitepaper_workday_technology_platform_devt_process
whitepaper_workday_technology_platform_devt_process
 
Cloud Native Application Development Guide – 2023
Cloud Native Application Development Guide – 2023Cloud Native Application Development Guide – 2023
Cloud Native Application Development Guide – 2023
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdf
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
Api enablement-mainframe
Api enablement-mainframeApi enablement-mainframe
Api enablement-mainframe
 
Modern productivity solutions for a modern government
Modern productivity solutions for a modern governmentModern productivity solutions for a modern government
Modern productivity solutions for a modern government
 
PCF_Soln_Brief-New
PCF_Soln_Brief-NewPCF_Soln_Brief-New
PCF_Soln_Brief-New
 
Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?Q&A: Why cloud-native apps are better?
Q&A: Why cloud-native apps are better?
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Exploring Cloud Native Architecture: Its Benefits And Key Components
Exploring Cloud Native Architecture: Its Benefits And Key ComponentsExploring Cloud Native Architecture: Its Benefits And Key Components
Exploring Cloud Native Architecture: Its Benefits And Key Components
 
unit 5 cloud.pptx
unit 5 cloud.pptxunit 5 cloud.pptx
unit 5 cloud.pptx
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Microservices and Enterprise App Development
Microservices and Enterprise App DevelopmentMicroservices and Enterprise App Development
Microservices and Enterprise App Development
 
Microservices and Enterprise App Development.pdf
Microservices and Enterprise App Development.pdfMicroservices and Enterprise App Development.pdf
Microservices and Enterprise App Development.pdf
 
Cisco vmd cwithf5_big-ip_ltm_whitepaper
Cisco vmd cwithf5_big-ip_ltm_whitepaperCisco vmd cwithf5_big-ip_ltm_whitepaper
Cisco vmd cwithf5_big-ip_ltm_whitepaper
 

Más de F5 Networks

F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)F5 Networks
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network ThingsF5 Networks
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the NetworkF5 Networks
 

Más de F5 Networks (20)

F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the Network
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

The F5 Networks Application Services Reference Architecture (White Paper)

  • 1. Utroque Democritum Aeterno Nostro Aperiam Usu Prompta volumus denique eam ei, mel autem Technical White Paper by Lori MacVittie White Paper The F5 Application Services Reference Architecture Build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving environment.
  • 2. 2 White Paper The F5 Application Services Reference Architecture Contents Introduction 3 Business Challenges 3 Architecture Solution 4 Core Functions 4 Application Fluency 5 Programmability 6 Scalability 6 The F5 Architecture Solution 7 Comprehensive L3-7 Functionality 8 Application Fluency 8 A Programmable Platform for Innovation 9 F5 and DevOps 9 A Secure, Elastic Delivery Fabric 10 Business Benefits 10 Conclusion 11
  • 3. 3 White Paper The F5 Application Services Reference Architecture Introduction In today’s fast-moving, on-demand culture, users expect their applications to always work—and work fast—on any device. If organizations fail to meet these expectations, it has never been easier for customers to find alternatives. For IT departments or organizations to stay connected to their customers, they must meet user expectations with responsive, omni-channel applications that deliver new features seamlessly. In addition to traditional, linear application delivery from corporate data centers to PC-based users, organizations can now deliver applications from a complex matrix of locations—including SaaS providers—outside the data center. Increasingly mobile users around the globe now demand this anywhere, any-device access. At the same time, the pace of global innovation is always accelerating with faster release cycles, the emergence of DevOps, and the move toward continuous delivery. Although this paradigm shift better aligns IT and business, it also creates challenges for traditional infrastructures. The Application Delivery Network must promote innovation—but not at the expense of stability, security, or performance. With F5, organizations can build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving environment. Business Challenges If the expectations of users are simple and the need to innovate is clear, the solutions to these challenges are neither. Even today’s best-run organizations are challenged by the rate at which IT is evolving, the growth of applications, and the complexities created by mobility, cloud computing, and virtualization. To be successful in delivering applications, IT organizations must: • Optimize application performance from anywhere and to anyone and any device—without increasing cost or complexity. • Enable rapid deployment and innovation. • Flex and scale on demand. 3 “Good Enough” and “Lots of Dumb” “Good enough” application delivery solutions are typified by Application Delivery Controllers offering high-traffic capacity and some layer 7 functions at a low cost point. Lacking application fluency, programmability, and true scalability, these low-end solutions are likely to constrain innovation, rather than promote it. The “lots of dumb” paradigm of creating tens, hundreds, or thousands of virtual load balancing instances generally solves problems of scale and deployment speed, but lacks the functions or fluency of a true application delivery fabric.
  • 4. 4 White Paper The F5 Application Services Reference Architecture How can IT fulfill these requirements for innovation and adaptability while maintaining the reliability users demand? How can you drive revenue, service customers, comply with regulations, and reduce costs if you can’t scale application services when you need to? The inflexibility of traditional infrastructures is a significant obstacle on the path to an agile, application-centric network. A programmable, scalable application delivery fabric can provide a layer of application services to help bridge this gap. Architecture Solution To succeed in this dynamic environment, organizations must create networks that combine core layer 4–7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real, lasting value lies in the resulting synergy of the combined solution. Failure to deliver even one of these technology components greatly reduces the business value of the infrastructure. Core Functions One of the main benefits of adding application services to your network is the rich set of functions you can leverage to improve the user experience, add security, or provide analytic data when application traffic passes through your infrastructure. While the core features of high availability and load balancing are required for most applications, there is a large range of additional benefits that the application delivery network should provide. Application Delivery Controllers (ADCs) offer hundreds of functions, but they can be broken down into broad categories:
  • 5. 5 White Paper The F5 Application Services Reference Architecture Protocol Parsing, translating, and manipulating network and application protocols. Examples: IPV4 to IPV6 translation, HTTP to SPDY gateway services, FIX traffic parsing, SIP Call ID extraction. Encryption Encrypting and decrypting application traffic for security, inspection, and server offload. Examples: SSL decryption, SSL re-encryption, HTTP cookie encryption, SSL traffic visibility, and key protection. Context Providing contextual information about the application traffic. Examples: Device identification, location awareness, reputation aware- ness, connection metrics, and application and server health monitoring. Optimization Altering some aspect of the application traffic or connection to improve the performance of the application. Examples: HTTP object compression, TCP connection multiplexing, adaptive traffic distribution based on server health scores, and TCP protocol optimization. Traffic Controlling and manipulating traffic. Examples: Load balancing, high availability, connection limiting, content- based routing, and rate shaping. Content Parsing and manipulating application content. Examples: Stripping credit card numbers from server responses, and reading and logging FIX transaction IDs. Analytics Providing statistics and logging for application traffic. Examples: HTTP application page load times, logging application events, and client-side latency. However, a huge array of capabilities alone is not enough. With hundreds of features that can be deployed in thousands of combinations, how can an organization best deliver an application? Testing every feature combination and analyzing the results is impractical. The technology must be equipped with built-in application knowledge. In other words, application fluency is mandatory. Application Fluency In this complex application delivery environment, you must be able to customize delivery policies based on application and device. A lean, agile policy designed for capacity and availability management of a high-frequency financial trading application should be different
  • 6. 6 White Paper The F5 Application Services Reference Architecture from a more extensive, feature-rich policy for an application such as Microsoft Exchange. Attempting to use the same policy for these very different applications would result in neither application getting the services it needs. The two different applications each demand a specific combination of the many functions available from the ADC. However, the labor-intensive process of handcrafting and testing customized application delivery policies can cause operational costs to skyrocket. Customizing delivery policies without adding complexity or administrative overhead requires a solution that has a broad set of functions, as well as the knowledge to deploy them in the right configuration. Repeatable, reliable templates for application delivery should be used to easily create application-specific services. Using pre-defined templates removes the overhead of managing complex configurations and generates tremendous payback in terms of saved time and increased reliability in application deployments. Programmability In an environment where the only constant is change, the need to create new solutions and then rapidly prototype, test, and deploy them demands an infrastructure that is innovation-ready. Programmability of both the data plane (application traffic) and the control plane (device configuration) allows you to create adaptable solutions that meet your needs without waiting for new features to be developed by manufacturers—or to create novel methods of traffic distribution for a new application. Full programmability makes it simple for organizations to create software defined application services on top of any network infrastructure. Integrating with monitoring and orchestration systems enables task automation, such as managing traffic for new application release cycles, deploying new services, or responding to changes elsewhere in the infrastructure. It removes delays caused by manual processes and provides an agile delivery environment where limited control of application traffic can be delegated to application deployment teams. Scalability The fabric delivering the application services needs to be as rich, flexible, and extendable as the services themselves. This means scaling not just locally in terms of capacity, but also in terms of location and architecture—both across traditional infrastructures and into public and private clouds. To achieve true scalability, platforms must be secure enough to be connected pervasively throughout the network or into the cloud.
  • 7. 7 White Paper The F5 Application Services Reference Architecture The F5 Architecture Solution The F5 architecture solution for application services allows organizations to create a robust and scalable application delivery fabric. This architecture revolves around some simple principles: • Create a services fabric of scalable and interconnected devices. • Pervasively connect the fabric to the application and client networks. • Use repeatable templates to define policies that deliver application-fluent services to optimize applications via application proxy points. • Open up management and control of the fabric to orchestration and integration tools. This creates a fabric that is able to deliver the right application services to the right applications at the right point in the network, for any application and any network. REFERENCE ARCHITECTURE: Application Services CONTENT TYPE: Architecture Diagram AUDIENCE: Enterprise CUSTOMER SCENARIO: Application Fluency and Scalability Application Proxy Front-End Application Servers Application Proxy Back-End Application Servers Overlay Underlay VXLANNVGRE VLAN Network Scalable resource pool delivers application services, policies, and programmable functions High-Performance Fabric F5 Native Infrastructure Management DevOps Tools Management Private Cloud, Data Center, or Public Cloud Users Strategic Point of Control The F5 Application Services architecture At the heart of this fabric is the F5® BIG-IP® platform, which is designed to supply application security, acceleration, and availability services. Available in physical, virtual, and cloud editions, the BIG-IP platform is easy to deploy into as many locations and architectures as required, while maintaining consistency across environments.
  • 8. 8 White Paper The F5 Application Services Reference Architecture Comprehensive L3-7 Functionality From fine-grained manipulation of TCP protocol settings through more than 10 high-level application- specific proxies, the F5 BIG-IP platform provides a massive range of features and functions designed to optimize and deliver applications to users. The range of functions across all categories gives you the ability to create and use application services that are truly optimized for your applications, networks, and clients. Application Fluency Creating optimized delivery policies tailored for particular applications requires significant time and resources. With the BIG-IP platform, the work to build an application-fluent solution has already been done. The result is a suite of implementation services, templates, and guides designed to build best-practice configurations out of the box. Application-specific proxies provide parsing and manipulation of protocols such as HTTP, SIP, and FIX. The BIG-IP platform’s deep understanding of application protocols enables better traffic management and reporting—and opens up opportunities to control and manage traffic more effectively. Being able to route, drop, or manipulate traffic based on application values such as HTTP cookies, FIX message type, or SIP header makes it easier to simplify application infrastructures and build additional application capability into your delivery fabric. Having understanding and control of application traffic at a strategic point in the network can speed and simplify application development cycles. You can outsource application functions to the network, where they can be done more efficiently at a strategic point of control within the delivery stack. F5® iApps® Templates significantly cut deployment time and remove much of the potential for human error by providing a simple interactive process to configure and update application deployments. When you use an iApps Template, selection and configuration of all the required application functions is collapsed into a single, simple application-focused interface. Once an application has been deployed, the iApps system provides an application-focused view of the health and performance of the components that make up the deployment, which makes operational management easier and can provide feedback into the development or revision process for the next release. F5 maintains a library of new and updated iApps Templates and maintains partnerships with leading software vendors to ensure that templates closely follow new releases. No need to wait for software updates to manage new applications; simply download an updated template. iApps Templates are also fully customizable and designed to work in different deployment scenarios since your application delivery network should enhance your application, not constrain it. Where iApps Templates are not available or suitable, F5 offers more than 100 application or solution deployment guides, which present detailed configuration information and best practices.
  • 9. 9 White Paper The F5 Application Services Reference Architecture With a platform that understands applications and comes equipped with the knowledge to deliver them, organizations can save significant time and cost in deploying new applications and maximizing the value from existing ones. A Programmable Platform for Innovation The F5 BIG-IP platform has a well-documented suite of programmable components across the control, data, and management planes, with which organizations can build an adaptive and automated application delivery fabric with real-time control over application traffic and device configuration. Data Plane Programming The F5 iRules® scripting language offers real-time control of application traffic as it passes through your infrastructure. With the ability to route, reject, modify, and inspect traffic in any direction, organizations can build or deploy solutions to meet just about any application traffic challenge, no matter how unusual. iRules can use contextual application services such as IP reputation or location to make traffic management decisions—or manipulate server responses to remove sensitive information. Control Plane Programming The F5 iCall™ scripting framework allows the configuration of the BIG-IP platform to adjust based on data plane events, such as DHCP requests from new server instances or altering traffic distribution based on a change in monitoring data. Management Plane Programming The F5 iControl® comprehensive management API enables integration with data center management frameworks, orchestration tools, and third-party applications and scripts. iControl also supports an event-based model, allowing applications and frameworks to subscribe to BIG-IP system events such as the change in status from up to down for a given application node. These three planes of programmability increase agility, reduce operational costs, and improve application deployments, freeing your network to promote innovation instead of constraining it. F5 and DevOps To better align IT to business needs, organizations are moving to compressed application revision schedules and “continuous delivery” methods. Innovative DevOps practices automate the testing and deployment processes, driving consistency and faster times to production. The BIG-IP platform provides the application traffic control and the programmability required to realize these benefits within the production delivery network.
  • 10. 10 White Paper The F5 Application Services Reference Architecture A Secure, Elastic Delivery Fabric Programmability, fluency, and functionality combine to create application-specific services that improve end user experience, increase security, and drive innovation. This is true only if they can be delivered at the right point in the network and at the scale required by the application. F5 provides a secure, elastic fabric that can deliver application services anywhere they are required. The secure BIG-IP platform enables devices (physical or virtual) to be connected to the core network in a data center, or in a public cloud, to provide application services and managed control points across all zones. Functionality and performance are no longer locked in silos of devices in particular zones, but are available at all points in your infrastructure. This improves device utilization and reduces implementation costs for new applications, as the services can be supplied from existing resources no matter where the services are required. The F5 ScaleN™ architecture creates clusters of up to 32 devices (physical, virtual, or mixed), which form a highly available, elastic delivery fabric. Application workloads migrate between devices in the event of failure and can be moved should more resources be required. Devices can be upgraded physically or by license key to process more traffic or enable additional features. The ScaleN fabric allows the incremental addition of capacity and services, enabling a smooth growth and cost curve as traffic increases. Workloads can be managed to run on the most appropriate device, and additional resources can be provisioned quickly via virtual editions, giving organizations fine-grained control of resources and putting the administrator in control of applications. Network virtualization support in the BIG-IP platform allows the unification of virtual infrastructures and high-performance network hardware. Support for VXLAN and NVGRE (on virtual platforms only) enables the delivery fabric to extend from physical devices into virtual networks, bringing the power of specialized hardware for compression, encryption, and network processing into the virtual data center. Business Benefits By creating a flexible, scalable, application-fluent network, organizations can optimize applications to a diverse user population and develop and deploy applications faster. To the IT organization, this means greater user satisfaction, better alignment with the business (through more agile application releases), and the ability to scale infrastructure in greater alignment with needs. What are the benefits to the enterprise as a whole?
  • 11. White Paper The F5 Cloud Bursting Reference Architecture Solutions for an application world. F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com ©2013 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 10/13 WP-AVAIL-10847-application-services 1013 A better user experience ensures that visitors become customers and employees become more productive. Effective delivery to mobile platforms increases the reach and effectiveness of applications, delivering more return on the acquisition or development investment. Increasing the pace of application deployment cycles ensures that projects can make smaller adjustments to functionality to react to the analytics of application use and functionality. Projects that might otherwise fail to deliver can be corrected faster and with less cost. Using standard functions from the application delivery fabric reduces coding and costs. The scalable fabric allows CapEx to align with growth, improving cash flow and reducing risk. This efficient application delivery fabric also removes islands of capacity, because services are delivered from a pool of resources, reducing overall spend through better utilization. Conclusion A scalable, programmable, application-fluent fabric allows organizations to meet user expectations, innovate, and scale in a cost-effective manner aligned with business goals.