PEGASUS: Competitive load balancing using inetd
|
|
|
- Reginald Elliott
- 10 years ago
- Views:
Transcription
1 PEGASUS: Competitive load balancing using inetd George Oikonomou 1 Vassilios Karakoidas 2 Theodoros Apostolopoulos 1 1 Department of Informatics Athens University of Economics and Business {g.oikonomou,tca}@aueb.gr 2 Department of Management Science and Technology Athens University of Economics and Business [email protected] 1 Introduction As it is proven by practice, load balancing techniques are the only tool that network service provider have, in order to support and handle scalable network load. This paper presents PEGASUS, a novel framework that provides load balancing in network services transparently, using a competitive scheduling algorithm. PEGASUS is designed upon the INETD superserver, thus providing a easy to configure, yet efficient infrastructure. The paper is structured as follows. In section 2 we provide an overview of the current frameworks and popular implementations both open source and commercial. Then we describe our system architecture and the basic axioms that it is designed. The paper concludes with a comparison of PEGASUS with other popular load balancing frameworks. 2 Related Work In the past few years, many load balancing techniques were developed to address the problem of distributing incoming service requests in a fair fashion to server clusters. In this section we will describe the most typical solutions used in production environments. 2.1 Round Robin DNS One the most widely used load balancing techniques is the Round Robin DNS [4]. The nodes offering content are mapped to the Name Server using the same domain name. The name server responds with a different IP address for each DNS request referring to the same name. This happens in a simple round robin manner. This scheme provides high flexibility and full transparency to the end user. On the other hand, RRDNS is problematic when dealing with node failures. When a node fails, the name server will not cease to direct clients to it, so without being reconfigured and thus a percentage of requests will reach a server that is down. Furthermore, due to the caching nature of DNS resolvers (clients) and the hierarchical approach of DNS, the RRDNS system can lead to load imbalance. This can be avoided by the correct selection of the Time To Live (TTL) value of DNS records. In practice, the correct choice of TTL is not trivial. A low value will result in many requests to the Name Server, therefore making it the bottleneck. In contrast, a high value will fail to resolve the load imbalance issue.
2 2.2 The Linux Virtual Server Project The Linux Virtual Server (LVS) [11, 9] project aims to help create a scalable, highly available and robust virtual server. The architecture is based on a set of nodes that actually offering services and a load balancer node. The load balancer accepts all incoming requests from users. Based on a variety of load balancing schemes, it selects a server that will actually handle the request and forwards the request. The LVS architecture is fully transparent from the end user perspective. No modifications are required on the client side of the applications and users interact with the cluster in the same manner as if it were comprised of a single server. A heartbeat scheme is implemented in order to detect daemon failures and provide for transparent reconfiguration of the system. The LVS load balancer uses a variety of scheduling algorithms to select the node that will serve the requests like Round-Robin Scheduling, Weighted Round-Robin Scheduling, Least-Connection Scheduling among others [11]. A detailed analysis of each of those scheduling algorithms is out of scope of this paper. The LVS uses three load balancing techniques. These are: 1. LVS via NAT (LVS/NAT) 2. LVS via IP Tunneling (LVS/TUN) 3. LVS via Direct Routing (LVS/DR) In order for these techniques to be supported, a modified TCP/IP stack is required. Furthermore, these techniques are all based on the assumption that all real servers offer identical services, having identical content. The latter is achieved either by replicating the content on the local storage of the real servers or by giving them access to a shared or distributed file system. Finally, the LVS load balancer and the real servers need specific configuration in order to become part of the system. The biggest advantage of LVS is that it operates purely on kernel space, making the overhead the smallest possible. It s biggest disadvantage is that it requires Linux operating system to execute. 2.3 mod backhand The mod backhand project [8] is an attempt to provide a load balancing mechanism, that features request redirection for the HTTP protocol. It is implemented as an APACHE web server module and it is written in C++. Its architecture is quite simple, the balancer consists of a classic APACHE server, where the mod backhand module is initialized. The information for the actual servers is gathered on the mod backhand information manager, where the statistics are processed by the scheduler. The main benefit of mod backhand is that it provides redirections on HTTP sessions, preserving client information about access and authentication. The main drawback of mod backhand is that is a balancing mechanism only for HTTP. Mod backhand is available for numerous operating systems, such as Linux, Microsoft Windows, FreeBSD and Solaris. 2.4 Other Approaches A few other approaches have been proposed as a solution to the load balancing problem. Among them, those we consider to be most significant are NETDISPATCHER [1], REVERSE PROXY [6], SWEB [2] and EDDIE [7]. Another significant solution is the Cisco Local Director [5], which is a commercial, hardware based solution. All these approaches have their pros and cons,
3 3 Competitive Loab Balancing Our proposal is the PEGASUS architecture, an approach that provides a simple, yet efficient, service-transparent competitive load balancing scheme. 3.1 Architecture The PEGASUS system architecture is illustrated in Figure 1. The system is comprised of two distinct entities, typical for load balancing frameworks. Balancer The balancer is responsible for the request redirection to the service providers. Each balancer has a FIFO queue that holds tickets. Tickets are service availability notifications that the service providers sent, in order to notify the balancer about their presence, and their service capacity. The ticket queue is maintained by a daemon, named PEGASUS redirector. In our prototype the balancer software is built using the INETD superserver, so that all requests are tunneled through the balancers. Service Provider Service providers do the actual work. The overhead that out architecture requires is a daemon, the PEGASUS monitor, that observes the servers workload and send tickets to a number of balancers. At this point we have to note that each service provider can have one or more balancers, and divide its service capacity among them. Each service provider has a limited capacity, known also to the balancer. Consequently a specified number of requests can be redirected to each Service Provider, in order to ensure that we will not have bottlenecks. The capacity is updated with each ticket update of the Service Provider, as we will see later on. req resp inetd PEGASUS redirector req resp service PEGASUS monitor.... service PEGASUS monitor Tickets Balancer Ticket queue Service cluster Figure 1: The PEGASUS Architecture The scheduling that our system proposes is competitive. Most implementations rely on the existence of a delegator that holds all the information about the network capacity and thus performing the scheduling accordingly. In our case, we base our algorithm on two basic principles: 1. Each service provider wants to maximise its activity, thus it monitors the workload itself and demands more requests from the balancers in a competitive way to the other providers.
4 2. The balancer receives tickets from the service provider in an ad-hoc manner and stores them in a FIFO queue. On request, the balancer pops the first ticket form the queue and redirects the data to the appropriate service provider. Figure 2: The PEGASUS Protocol Stack The pegasus protocol stack is illustrated on Figure 2. The PEGASUS protocol is in the application layer and uses TCP for transport. The communication between the components is done through requests. There are three available messages, (1) a ticket registration (TICKET SP), a (2) next available service provider (NEXT SP) and (3) Service Balancer failure (FAILURE SP). The requests are expressed through specified URLs [3]. For example the TICKET SP command, requests from the redirector to add in its ticket queue, 100 tickets with maximum capacity 100 for the Service Provider with IP address The request also states the service provider with its ip address, in this case The NEXT SP command is listed below. pegasus:// /next The above command requests the next available Service Provider in the load balancing cluster. The response to this command is the IP address of the Service Provider or the message error, that indicates that this balancer cannot server the request. Table 1 summarizes the available protocol commands. Message TICKET SP NEXT SP FAILURE SP Description Advertise availability by registration of tickets Get next available Service Provider Informs the ticket queue that a Service Provider is unavailable Table 1: PEGASUS protocol commands Figure 3 depicts the internal workings of the PEGASUS load balancing system. Each request is received by the inetd superdaemon. Afterwards, it is redirected to the balancer, which communicates with the ticket queue using the protocol message NEXT SP in order to get the next available Service Provider. Then the request is redirected to the Service provider that finally accept and address it.
5 Figure 3: Internal PEGASUS Request Handling 3.2 Basic Characteristics Our proposed architecture is the result of studying the advantages and drawbacks of previous open and commercial attempts. We have tried to provide a solution to various issues, while at the same time keeping the architecture as simple as possible. Our implementation offers competitive performance and functional characteristics in the following aspects Multiple Points of Entry By the term Multiple points of entry we are referring to the fact that, in contrast to most available solutions, there is no single node that accepts all incoming requests. On the contrary, the number of nodes that accept incoming requests is left to the discretion of the system administrator, and the decision can be based upon performance or high availability considerations. It can be as many as all the nodes that provide content or as few as one Scheduling The scheduling algorithms used are implemented in library files and communicate with the core of the system via a well defined application programming interface (API). Therefore, it is easy to add new scheduling algorithms plug-ins. The algorithm to be used can be defined in the PEGASUS configuration file. In our prototype we implemented a round robin algorithm using the ticket queue. For each request the available tickets for the selected Service Provider are decreased by one. If the balancer tries to redirect a request to a Service Provider that is unavailable, then the ticket queue is notified for the failure and all tickets for this Service Provider are discarded Service Transparency The system has been designed to be service transparent in a sense that the pool of nodes may offer a variety of services with only a simple restriction. It will not handle persistent connection applications correctly. We have assumed that each connection is independent of all others and may be assigned to a different node. This is not true in the case of some well known applications, such as FTP and HTTP over SSL. The aforementioned applications are based on a number of different connections with the same end point. Furthermore, similar issues arise in the case of UDP-based services that remember the state of the datagram exchange and are based on that to function correctly. Such an example is the well known Trivial FTP service. In our design each UDP request will be forwarded, in the typical scenario, to a different node. Therefore a TFTP transfer should fail.
6 We have refrained from considering service-specific solutions to the issue of connection affinity, such as those proposed and used by LVS [10]. We are planning to design a generic scheme that will automatically detect such cases and handle them correctly, without any modification to the configuration. For example, we are considering to detect UDP streams. Each UDP datagram that is a potential part of such a stream will be forwarded to the same back-end node bypassing a scheduling decision. This is rather similar to the way that NAT handles UDP datagram exchange Sparse Distribution of Nodes Our proposed architecture is designed in a way that will allow for a sparse distribution of nodes, in network topology terms. This is in contrast to NAT-based solutions which generally require all server nodes to reside on the same network, in a sense that they must share tinetdhe same gateway to the internet Ad-hoc The PEGASUS system should allow a sparse physical network topology. The balancer nodes should not be statically aware of their service providers. Each content provider should be able to establish its presence dynamically and withdraw without notification and other configuration change. It is PEGASUS system main goal, that each node will load-balance itself and notify a number of balancers about its availability. In our prototype we gather information about each node availability using the getloadavg function call of stdlib.h. More specifically we process CPU load at fixed time intervals. Furthermore, many available load balancing solutions require that all nodes offer an identical set of services and have access to the same content. This is not necessarily the case with PEGASUS. The same infrastructure can be used to perform balancing for multiple distinct services at the same time. Therefore not all services will be necessarily offered by all nodes. Rather, a service will be provided only by a subset of content providers Simple Installation and Configuration Our proposed architecture is based on well known user space tools. The prototype implementation is using INETD as the basis application. Using INETD we provide a simple scheme for service categorization, using TCP/IP network ports. The rest of the system, is written in C using BSD socket API. These decisions where made in order to make the system portable and with minimal overhead. The prototype is not using any DBMS or other storage method. Therefore, installing the suite of tools is a trivial task. No modification to the kernel is required. Downloading the binaries and performing trivial modifications to text configuration files are all the tasks needed in order to get the system up and running. Each participating service provider requires also to run a daemon that will notify the load balancer about their availability. 3.3 Comparison In order to compare our prototype system with other load balancing frameworks, we should define a set a functional and non-functional characteristics. These are: Participation policy: The policy in which the Service Providers are participating into the load balancing cluster. For example, in PEGASUS, each service provider registers and de-registers itself according to its availability. On the other hand, in order to configure mod backhand, the configuration files of the apache web server must be modified for each service provider.
7 PEGASUS LVS mod backhand RRDNS Participation policy ad-hoc fixed fixed fixed Network Topology sparse sparse dense sparse OS Dependence no Linux only no no Services TCP, UDP based TCP, UDP based HTTP any Scheduling round robin varies varies round robin Redirection Overhead small minimal small none Installation Complexity minimal complex simple simple Table 2: Comparison of Popular Load Balancing Frameworks Network Topology: Most frameworks are dependent of the IP configuration of the load balancing cluster. The categorization sparse denotes a cluster that includes Service Providers alienated with each other. Dense indicates a cluster of Service Providers in the same or neighboring subnets. Therefore, a sparse topology means that service providers can be geographically spread over a wide region. OS Dependence: Dependencies on one or many operating systems. For example, LVS works only on Linux based machines. Services: The type of services that can be balanced. For example, TCP denotes all services that use it as transmission protocol. HTTP refers only to Hyper Text Transfer Protocol. It is all an issue of the layer that the balancer operates on. mod backhand is essentially an application (layer 7) redirection mechanism, whereas PEGASUS operates on layer 4 and lvs, depending on the configuration, can perform request redirections on layer 4 or lower. Scheduling: The scheduling algorithms that a load balancing system uses to distribute the request among the Service Providers. Redirection Overhead: The actual overhead of request redirection. It is categorized in small, minimal and none. Installation Complexity: The complexity of the installation procedure. Each installation dependency increases the complexity. For example, LVS requires kernel recompilation on both Balancers and Service Providers and it is labeled complex under this characteristic. Aside from that, depending on the choice of configuration (lvs/nat, lvs/tun etc), it may require manually tweaking the kernel routing table and setting virtual, spoofed IP adresses on the node interfaces. Table 2 summarizes the main characteristics of some popular load balancing frameworks. As depicted, all frameworks have their advantages and disadvantages. Generally LVS is a very good solution which covers all major protocols, but it is available only on Linux boxes. mod backhand its one of the most well implemented and featured frameworks, but it supports only HTTP. We compared PEGASUS with these frameworks having in mind the current implementation and not the final distribution. This is the reason that the scheduling characteristic has only implemented the round robin algorithm, instead of a variety that will be available when it reaches maturity. 3.4 Prototype Implementation PEGASUS is implemented purely in C. It is compiled under Microsoft Windows and various UNIX variants using GCC. To work properly on Microsoft Windows PEGASUS uses the cygwin ex-
8 ecution environment. The PEGASUS distribution includes three executables, a ticket queue, a pegasus inetd redirection and a monitor module. The first two are running on the Balancer and the monitor module on the Service Provider. The prototype was compiled with version of GCC and the request were redirected on an apache web server. The initial testing of the prototype was promising, but it is still on alpha version and no conclusive benchmarks could be conducted. 4 Conclusions and Further Work In the near future we are planning to conduct extensive benchmarks. Furthermore, we are considering to test PEGASUS on a large-scale, real-world installation. This will, most likely include many Server Provider nodes in a sparse topology. We will implement four distinct benchmarking scenarios: Single Service Provider: In this scenario a single node will act as the Service Provider. Multiple Service Providers with mod backhand: Many Service Providers are used. Apache and mod backhand will be used to balance requests. Multiple Service Providers with LVS: Many Service Providers are used. Apache and LVS will be used to provide load balancing. PEGASUS: The same Service Providers will be used but requests will be balanced with PEGA- SUS. For our benchmarks we will use the infrastructures of the Computer & Communication Systems Laboratory (CCSLAB) and the Information Systems Technology Laboratory (ISTLAB) of the Athens University of Economics and Business. All nodes will be Intel-based, single-cpu PCs. Security is also an issue worth considering. With the current design of PEGASUS, the message exchange is unencrypted and the nodes that communicate do not authenticate the originator of the message. Imagine a scenario where a malicious node pretends to be a Service Provider, issuing ticket requests to a Ticket Server. The fact that the latter trusts that ticket requests are issued by valid hosts would result is a number of serve requests getting redirected to the malicious host. This could eventually lead to possible Denial of Service attacks. In order to counter this, we are planning to use methods that will help authenticate the nodes exchanging load information messages. Those are most likely to be combined with encrypting the content of the messages. A typical approach to the issue could be the usage of Secure Shell (SSH) tunnels or the use of an SSL/TLS based solution. However, this has not been decided at the time of writing. As stated previously, the goal we had when designing the prototype application was not to out-perform existing open or commercial solutions. Instead, we wished to offer proof of concept regarding the various advantages PEGASUS has to offer. However, high performance is the quintessence of Load Balancing schemes. Therefore, in the near future, once the prototype is stable, we will start fine-tuning the code in order to optimise performance. References [1] Germ an Goldszmidt and Guerney Hunt. NetDispatcher: A TCP Connection Router. Technical report, [2] D. Andresen, T. Yang, V. Holmedahl, and O. Ibarra. Sweb: Towards a scalable world wide web server on multicomputers. In Proc. of 10th IEEE International Symp. on Parallel Processing (IPPS 96), pages pp , April 1996.
9 [3] Berners-Lee, R. Fielding, and L. Masinter. Uniform resource identifier (uri): Generic syntax. Technical report, Network Information Center, January RFC [4] T. Brisco. DNS Support for Load Balancing. RFC 1794, April [5] Inc Cisco Systems. World Wide Web, January Available online at [6] Ralf S. Engelschall. Load balancing your web site. practical approaches for distributing http traffic. Website, May Available online at [7] Michael Rumsewicz. Web servers for commercial environments: The imperatives and the solution. Website, March Available online at html. [8] Theo Schlossnagle. The backhand project: load-balancing and monitoring apache web clusters. ApacheCon 2000, [9] Wensong Zhang. Linux virtual server for scalable network services. Ottawa Linux Symposium 2000, July [10] Wensong Zhang. Persistence handling in LVS. Website, Available online at [11] Wensong Zhang and Wenzhuo Zhang. Linux virtual server clusters: Build highly-scalable and highly-available network services at low cost. Linux Magazine, November 2003.
Introduction. Linux Virtual Server for Scalable Network Services. Linux Virtual Server. 3-tier architecture of LVS. Virtual Server via NAT
Linux Virtual Server for Scalable Network Services Wensong Zhang [email protected] Ottawa Linux Symposium 2000 July 22th, 2000 1 Introduction Explosive growth of the Internet The requirements for servers
Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability
Multicast-based Distributed LVS (MD-LVS) for improving scalability and availability Haesun Shin, Sook-Heon Lee, and Myong-Soon Park Internet Computing Lab. Department of Computer Science and Engineering,
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
Optimization of Cluster Web Server Scheduling from Site Access Statistics
Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Creating Web Farms with Linux (Linux High Availability and Scalability)
Creating Web Farms with Linux (Linux High Availability and Scalability) Horms (Simon Horman) [email protected] December 2001 For Presentation in Tokyo, Japan http://verge.net.au/linux/has/ http://ultramonkey.org/
Performance Assessment of High Availability Clustered Computing using LVS-NAT
Performance Assessment of High Availability Clustered Computing using LVS-NAT *Muhammad Kashif Shaikh, **Muzammil Ahmad Khan and ***Mumtaz-ul-Imam Abstract High availability cluster computing environment
Linux Virtual Server for Scalable Network Services
Linux Virtual Server for Scalable Network Services Wensong Zhang National Laboratory for Parallel & Distributed Processing Changsha, Hunan 410073, China [email protected], http://www.linuxvirtualserver.org/
How To Run A Web Farm On Linux (Ahem) On A Single Computer (For Free) On Your Computer (With A Freebie) On An Ipv4 (For Cheap) Or Ipv2 (For A Free) (For
Creating Web Farms with Linux (Linux High Availability and Scalability) Horms (Simon Horman) [email protected] October 2000 http://verge.net.au/linux/has/ http://ultramonkey.sourceforge.net/ Introduction:
S y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. [email protected] April 2008 Abstract Whether you are perusing mailing lists or reading
UNIVERSITY OF OSLO Department of Informatics. Performance Measurement of Web Services Linux Virtual Server. Muhammad Ashfaq Oslo University College
UNIVERSITY OF OSLO Department of Informatics Performance Measurement of Web Services Linux Virtual Server Muhammad Ashfaq Oslo University College May 19, 2009 Performance Measurement of Web Services Linux
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
VERITAS Cluster Server Traffic Director Option. Product Overview
VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Building a Highly Available and Scalable Web Farm
Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
CS312 Solutions #6. March 13, 2015
CS312 Solutions #6 March 13, 2015 Solutions 1. (1pt) Define in detail what a load balancer is and what problem it s trying to solve. Give at least two examples of where using a load balancer might be useful,
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
Load Balancing using Pramati Web Load Balancer
Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Using Dynamic Feedback to Optimise Load Balancing Decisions
Using Dynamic Feedback to Optimise Load Balancing Decisions Jeremy Kerr [email protected] Abstract The goal of a network load balancer is to distribute a workload evenly amongst a cluster of
InterWorx Clustering Guide. by InterWorx LLC
InterWorx Clustering Guide by InterWorx LLC Contents 1 What Is Clustering? 3 1.1 What Does Clustering Do? What Doesn t It Do?............................ 3 1.2 Why Cluster?...............................................
Developing Higher Density Solutions with Dialogic Host Media Processing Software
Telecom Dialogic HMP Media Server Developing Higher Density Solutions with Dialogic Host Media Processing Software A Strategy for Load Balancing and Fault Handling Developing Higher Density Solutions with
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
PolyServe Understudy QuickStart Guide
PolyServe Understudy QuickStart Guide PolyServe Understudy QuickStart Guide POLYSERVE UNDERSTUDY QUICKSTART GUIDE... 3 UNDERSTUDY SOFTWARE DISTRIBUTION & REGISTRATION... 3 Downloading an Evaluation Copy
The Three-level Approaches for Differentiated Service in Clustering Web Server
The Three-level Approaches for Differentiated Service in Clustering Web Server Myung-Sub Lee and Chang-Hyeon Park School of Computer Science and Electrical Engineering, Yeungnam University Kyungsan, Kyungbuk
Overview: Load Balancing with the MNLB Feature Set for LocalDirector
CHAPTER 1 Overview: Load Balancing with the MNLB Feature Set for LocalDirector This chapter provides a conceptual overview of load balancing and introduces Cisco s MultiNode Load Balancing (MNLB) Feature
Dante a BSD licensed SOCKS implementation. Inferno Nettverk A/S. Bergen Linux User Group 2005-11-24
Dante a BSD licensed SOCKS implementation Inferno Nettverk A/S Bergen Linux User Group 2005-11-24 1 / 21 Background (1) Inferno Nettverk A/S started as security consulting company goal: sell OpenBSD based
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control (Load-Balance across multiple servers) Event: Partner Exchange Conference Date: October 10, 1999 Revision 1.0 Author:
Building a Systems Infrastructure to Support e- Business
Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Load Balancing a Cluster of Web Servers
Load Balancing a Cluster of Web Servers Using Distributed Packet Rewriting Luis Aversa [email protected] Azer Bestavros [email protected] Computer Science Department Boston University Abstract We present
PES. High Availability Load Balancing in the Agile Infrastructure. Platform & Engineering Services. HEPiX Bologna, April 2013
PES Platform & Engineering Services High Availability Load Balancing in the Agile Infrastructure HEPiX Bologna, April 2013 Vaggelis Atlidakis, -PES/PS Ignacio Reguero, -PES/PS PES Outline Core Concepts
Configuring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
IERG 4080 Building Scalable Internet-based Services
Department of Information Engineering, CUHK Term 1, 2015/16 IERG 4080 Building Scalable Internet-based Services Lecture 4 Load Balancing Lecturer: Albert C. M. Au Yeung 30 th September, 2015 Web Server
LinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Implementation, Simulation of Linux Virtual Server in ns-2
Implementation, Simulation of Linux Virtual Server in ns-2 CMPT 885 Special Topics: High Performance Networks Project Final Report Yuzhuang Hu [email protected] ABSTRACT LVS(Linux Virtual Server) provides
Load Balancing Web Applications
Mon Jan 26 2004 18:14:15 America/New_York Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2001/09/26/load.html See this if you're having trouble printing
3/21/2011. Topics. What is load balancing? Load Balancing
Load Balancing Topics 1. What is load balancing? 2. Load balancing techniques 3. Load balancing strategies 4. Sessions 5. Elastic load balancing What is load balancing? load balancing is a technique to
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
How To Use The Cisco Ace Module For A Load Balancing System
Course: Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: (ACESM) is a four-day, instructor-led, lecture and lab course that teaches learners
How To Understand A Firewall
Module II. Internet Security Chapter 6 Firewall Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 6.1 Introduction to Firewall What Is a Firewall Types of Firewall
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Load Balancing using MS-Redirect Mechanism
Load Balancing using MS-Redirect Mechanism G. Naveen Kumar 1, T. Ram Kumar 2 and B.Phijik 3 Vignan s Institute of Technology and Aeronautical Engineering Deshmukhi(v), Pochampalli(M), Nalgonda, Hyderabad
Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory
Implementing Parameterized Dynamic Balancing Algorithm Using CPU and Memory Pradip Wawge 1, Pritish Tijare 2 Master of Engineering, Information Technology, Sipna college of Engineering, Amravati, Maharashtra,
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
LOAD BALANCING AS A STRATEGY LEARNING TASK
LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Oracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Web Switching (Draft)
Web Switching (Draft) Giuseppe Attardi, Università di Pisa Angelo Raffaele Meo, Politecnico di Torino January 2003 1. The Problem Web servers are becoming the primary interface to a number of services,
Linux Virtual Server Administration. RHEL5: Linux Virtual Server (LVS)
Linux Virtual Server Administration RHEL5: Linux Virtual Server (LVS) Linux Virtual Server Administration: RHEL5: Linux Virtual Server (LVS) Copyright 2007 Red Hat, Inc. Building a Linux Virtual Server
CNS-200-1I Basic Administration for Citrix NetScaler 9.0
CNS-200-1I Basic Administration for Citrix NetScaler 9.0 This course covers the initial configuration and administration of Citrix NetScaler 9.0. Learners gain an understanding of NetScaler features such
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
ExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
Load Balancing a Cluster of Web Servers
Load Balancing a Cluster of Web Servers Using Distributed Packet Rewriting Luis Aversa [email protected] Azer Bestavros [email protected] Computer Science Department Boston University Abstract In this
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
Brocade Virtual Traffic Manager and Microsoft Skype for Business 2015 Deployment Guide
January 2016 Brocade Virtual Traffic Manager and Microsoft Skype for Business 2015 Deployment Guide 2016 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, Brocade Assurance, the B-wing
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Deployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap
Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load
SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router
Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router Product Overview The Cisco Content Switching Module (CSM) is a Catalyst 6500 line card that balances client traffic to farms
Virtual Private Network Using Peer-to-Peer Techniques
Virtual Private Network Using Peer-to-Peer Techniques Peer-to-Peer VPN Daniel Kasza Massachusetts Academy of Math and Science Abstract The low performance of traditional, client-server model based, virtual
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Scalability of web applications. CSCI 470: Web Science Keith Vertanen
Scalability of web applications CSCI 470: Web Science Keith Vertanen Scalability questions Overview What's important in order to build scalable web sites? High availability vs. load balancing Approaches
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software
ENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY
CSS HARDWARE LOAD BALANCING POLICY Version 2.5 Date: 04/11/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
Introduction to Firewalls
Introduction to Firewalls Today s Topics: Types of firewalls Packet Filtering Firewalls Application Level Firewalls Firewall Hardware/Software IPChains/IPFilter/Cisco Router ACLs Firewall Security Enumeration
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
