LOAD BALANCING Dawid Królak. Intro  Problem  Model OSI  Layer 2  Layer 4-7  Reverse Proxy.

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
CSE 534 Fundamentals of Computer Networks Lecture 4: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised.
VLANs Virtual LANs CIS 278.
Distributed components
Database Software File Management Systems Database Management Systems.
1 A Comparison of Load Balancing Techniques for Scalable Web Servers Haakon Bryhni, University of Oslo Espen Klovning and Øivind Kure, Telenor Reserch.
Scaling Service Requests Linux: ipvsadm & iptoip.
Lesson 1: Configuring Network Load Balancing
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Load Sharing and Balancing - Saravanan Mathialagan Masters in Computer Science Georgia State University.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
CSIT 320 (Blum)1 Client-Server Interaction Based on Appendix 1 in Computer Networks and Internets, Comer.
Routing. A world without networks and routing  No connection between offices, people and applications  Worldwide chaos because of the lack of centralized.
Basic Concepts of Computer Networks
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Chapter 3 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain why protocols are necessary in communication.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
1 Distributed Systems : Server Load Balancing Dr. Sunny Jeong. Mr. Colin Zhang With Thanks to Prof. G. Coulouris,
Lector: Aliyev H.U. Lecture №14: Telecommun ication network software design for data bases and servers. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Mr. SACHIN KHANDELWAL (S.D.E.) Mr. N.S.NAG (D.E.) Mr. L.K.VERMA (PROJECT GUIDE)  Group Members- 1)Mohit Udani 2)Ranjith Kumar.M 3)Salma Siddique 4)Abhishek.
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Example: Sorting on Distributed Computing Environment Apr 20,
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Server Performance, Scaling, Reliability and Configuration Norman White.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Client-Server Model of Interaction Chapter 20. We have looked at the details of TCP/IP Protocols Protocols Router architecture Router architecture Now.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
Ethernet. Ethernet  Ethernet is the standard communications protocol embedded in software and hardware devices, intended for building a local area network.
Lecture-2: Idea of Network LAN - Local Area Network WAN - Wide Area Network.
Net 221D:Computer Networks Fundamentals
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
 LAN ADVANTAGE  Workstations can share peripherals devices like printers. Cheaper that providing a printer for each computer.  Workstations do not.
Section #7: Getting Data from Point A to Point B.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
The Difference Between Router and Switch Not everyone knows: ADVANTAGES OF SWITCH:  Switches offer higher performance than bridges and hubs.  Switches.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Fault – Tolerant Distributed Multimedia Streaming Web Application By Nirvan Sagar – Srishti Ganjoo – Syed Shahbaaz Safir
SERVERS. General Design Issues  Server Definition  Type of server organizing  Contacting to a server Iterative Concurrent Globally assign end points.
Network customization
Application Layer Functionality and Protocols Abdul Hadi Alaidi
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
Understanding Solutions
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Computer Data Security & Privacy
Network Load Balancing
Lec 2: Protocols.
Microsoft SharePoint Server 2016
CHAPTER 2 Application Layer.
Instructor: Mr. Malik Zaib
Computer Network.
Computing Over Distance
Computer Network.
Chapter 3 VLANs Chaffee County Academy
Network customization
Presentation transcript:

LOAD BALANCING Dawid Królak

Intro  Problem  Model OSI  Layer 2  Layer 4-7  Reverse Proxy

Problem How to maintain large amount of queries, requests? Buy a new faster, batter hardware? Buy faster links? Reduce service? Use load balancing methods!

Advantages  Use hardware that is available but unused at this time.  Use cheaper hardware.  First properly configured easier to upgrade, maintain.  Scalability.  It`s all about speed.

Disadvantages  Difficult to configure.  Need more IT knowledge.

Levels of Load Balancing  Layer 2 OSI Model (Link aggregation)  Layer 4 OSI Model (TCP/UDP)  Layer 7 OSI Model (Reverse Proxy)

Model OSI Application Presentation Session Transport Network Data Link Physical

Data link – link aggregation  Many physical links can be seen as one logical.  Defined by IEEE 802.3ad standard.

Caution! Standard IEEE 802.3ad is not defining Load Balancing! To load balancing we need to use algorithms! But without link aggregation we can`t talk about layer 2 load balancing.

Link Aggregation Features:  Load Sharing (using available links)  Automatic configuration  Deterministic (predictable, controllable)  Frame order (frame order is preserved)

Limiations  We need to use additional algorithms to use load balancing  Works only between two devices.  Same speed on links (should be).

Additional info Some algorhithms can be found at:  alancing+algorithms alancing+algorithms

Layer 4 load balancing  Layer-4 load balancing is to distribute requests to the servers at transport layer, such as TCP, UDP and SCTP transport protocol.  We know one address, load balancer is switching us to one of many servers.  Pure 4-layer load balancing is being displacing by layer4-7 load balancing.

Layer4-7 load balancing Problems:  One service can be run on multiple logical machines.  Logical machine can be built from many physical machines. Main role of load balancing is to distribute requests to multiple logic machines/services.

Layer 4-7 load balancing Advantages:  Scalability  We can scale that part of system that we need.  Nowadays many servers are supporting this. (database, www, webservices, dns)

Layer 4-7 load balancing

Reverse proxy  Reverse proxy is special server proxy type.  Typically set at front of web servers.  This proxy can distribute connections to a different address.  Fast and easy to configure in popular webservers (apache, lighttp)

Load Balancing layer  Load balancing 2 and 4-7 can be used at the same time.  Load balancer can distribute requests to other load balancer  Load balancing is used in cloud computing.  Load balancer and services can be runned at one physical and logical machine, like casual PC /but there is no sense to do it/  It`s better to set some load balancers instead of buying new better faster and more expensive hardware.

Bibliography

Finish. Any Questions? Thank you for your attention. Ďakujem za pozornosť. Dziękuję za uwagę.