T a b l e o f C o n t e n t s :
Section 1:
Introduction
Section 2:
Application 1 — Server Load Balancing
Section 3:
Application 2 — Firewall Load Balancing
Application 3 — Application Redirection
Section 4:
Section 5:
Application 4 — Policy-Based Load Balancing
Communication without boundaries