O'Reilly logo

IBM WebSphere: Deployment and Advanced Configuration by Roland Barcia, Keys Botzum, Tom Alcott, Bill Hines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Topology Patterns on the Edge

Now that we have discussed the Load Balancer and Caching Proxy separately in simple scenarios, let's conclude by looking at a more typical configuration. Figure 23-16 shows Edge Components in the DMZ, with scalability and failover now at each tier, as opposed to the simple, non-Edge topology we saw at the start of this chapter. We have a pair of active/standby load balancers in the DMZ serving to a pair of proxy servers. The proxy servers then send requests through to the backend “secure” zone, to our HTTP servers. Those HTTP servers are using the WAS plug-in file, which has workload management features to balance load across a tier of WAS application servers. We have redundancy at each layer of the system. However, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required