Static Load Balancers Implemented with Filters



Similar documents
Dynamic Load Balancing with Director Pro

WHITE PAPER. Static Load Balancers Implemented with Filters

Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

Configuring Network Address Translation (NAT)

domain is known as the high side, and the less secure domain is the low side. Depending on the application, the

WHITE PAPER. Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

Internet Packets. Forwarding Datagrams

Network Virtualization Based on Flows

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET

Configuring a Load-Balancing Scheme

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VOIP Guide Using ZyXEL Switch

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Efficient Network Monitoring Access

Net Optics xbalancer and McAfee Network Security Platform Integration

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

+ iptables. packet filtering && firewall

Voice over IP: RTP/RTCP The transport layer

Are Second Generation Firewalls Good for Industrial Control Systems?

Configuring a Load-Balancing Scheme

VLANs. Application Note

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Avaya IP Office SIP Trunk Configuration Guide

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Chapter 2 Quality of Service (QoS)

Configuring a Load-Balancing Scheme

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Network Configuration Example

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

How Network Transparency Affects Application Acceleration Deployment

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007

What is VLAN Routing?

Net Optics and Cisco NAM

SYMETRIX SOLUTIONS: TECH TIP April 2014

Transport and Network Layer

Exhibit n.2: The layers of a hierarchical network

Encapsulating Voice in IP Packets

Voice Over IP Performance Assurance

Configuring RADIUS Server Support for Switch Services

Chapter 11 Network Address Translation

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date Issue: v1.

Load Balancing ContentKeeper With RadWare

SSVP SIP School VoIP Professional Certification

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Networking Devices. Lesson 6

IP Routing Between VLANs

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0

Network layer: Overview. Network layer functions IP Routing and forwarding

Stateful Firewalls. Hank and Foo

Multi Stage Filtering

LANs and VLANs A Simplified Tutorial

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Virtual LANs. or Raj Jain

Configuring NetFlow-lite

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V p13 Configuration Guide

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

Lab IP Addressing Overview

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

hp ProLiant network adapter teaming

Interconnecting Cisco Network Devices 1 Course, Class Outline

Avaya ExpertNet Lite Assessment Tool

Load Balancing SIP Quick Reference Guide v1.3.1

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

How To Understand The Power Of The Internet

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Hosted Voice. Best Practice Recommendations for VoIP Deployments

COMPSCI 314: SDN: Software Defined Networking

Based on Computer Networking, 4 th Edition by Kurose and Ross

Requirements of Voice in an IP Internetwork

Communication Networks. MAP-TELE 2011/12 José Ruela

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Load Balance Mechanism

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4

Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering

OpenFlow Based Load Balancing

OpenFlow and Software Defined Networking presented by Greg Ferro. OpenFlow Functions and Flow Tables

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation

Computer Networking. Definitions. Introduction

Network Simulation Traffic, Paths and Impairment

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches

Configuring an efficient QoS Map

6.40A AudioCodes Mediant 800 MSBG

Unit 23. RTP, VoIP. Shyam Parekh

Broadband Phone Gateway BPG510 Technical Users Guide

Local-Area Network -LAN

Advanced Topics: IP Subnetting A WHITE PAPER PREPARED FOR ASPE TECHNOLOGY. toll-free:

Transcription:

www.netoptics.com 2 1 This application note explains the concept of static load balancing and illustrates how to create them using filters. ackground The purpose of load balancing in a network traffic monitoring context is to distribute traffic evenly among a number of monitoring tools in order to process more traffic than a single tool can support. Static load balancing refers to load balancing algorithms that distributes the traffic based strictly on a fixed set of rules relating to characteristics of the input traffic. It does not feed back information about which tools are receiving more or less traffic in order to ensure that the balance is even. Static load balancing algorithms the specific packet characteristics used to distribute the traffic are chosen to generate a random distribution of flows in order to produce a balance that is even on average. Flow Coherency word about flows: In most monitoring load balancing application, a requirement is to keep each flow of traffic together on a single tool. This behavior is called flow coherence. For example, in a call center VoIP call recording application, it is desirable to keep the entire telephone call, including both directions of traffic, confined to single traffic recorder so that it is not necessary to piece together segments from several recorders in order to play back a call. In terms of the packets on the wire, flows can be defined by packets having the same value in given sets of header fields such as source IP address (SIP), destination IP address (DIP), source UDP/TCP port (SPORT), and destination UDP/TCP port (DPORT). For the purposes of this paper, we will define flows in terms of SIP and DIP only. However, the concepts are easily extended to other header fields as the application demands. asic Static Load alancing very simple two-way static load balancer (load balancing to two tools) could use the rule, Send all of the packets with even-numbered IP source addresses to tool 1, and all of the packets with odd-numbered IP source addresses to tool 2. Tool 1 Packet with even source IP address Packet with odd source IP address Tool 2 Figure 1: Two-way static load balancing using a simple even/odd rule With this simple load balancer, traffic is fairly evenly distributed between the two tools as long as the distribution of source IP addresses is random in respect to even and odd addresses. If even and odd addresses do not give an even balance in a particular application, any other bit position in the IP address can be used. June 2011-1 -

www.netoptics.com 2 1 This load balancing algorithm can be extended to support more tools by examining more address bits. For example, traffic can be distributed to four tools by filtering on the two least significant bits of the source IP addresses and sending packets matching 00 to one tool, 01 to another, 10 to another, and 11 to another. gain, any two bits in the IP address could be used as the filter criteria, in order to arrive at an even load distribution. Tool 1 Tool 3 Packet with source IP address ending in 00 Packet with source IP address ending in 01 Packet with source IP address ending in 10 Packet with source IP address ending in 11 Tool 2 Tool 4 Figure 2: Four-way static load balancing based on source IP address two least significant bits Set Up Filters to Implement Static Load alancers Now we will look at actually setting up filters to implement static load balancers, and extend our algorithms to more complex cases. We will use a Net Optics Director data monitoring switch in the examples. The simple even/odd static load balancer is set up by creating two filters: filter add in_ports=n2.1,n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.1 filter add in_ports=n2.1,n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.1 Figure 3: Two-way load balancer based on source IP addresses only In both filters, ip4_src_mask=0.0.0.1 makes only the least significant bit in the ip4_src address affect the filter. The 1 in the third octet of the ip4_src addresses does not affect the filter. However, it is included because ip4_ src=0.0.0.0 is not a valid value; it is interpreted in Director as meaning there is no ip4_src filter qualifier. This simple static load balancer is flow coherent, where a flow is identified as all traffic with the same source IP address. However, most applications require that flows include traffic travelling in both directions of a conversation, traffic flowing from to ND traffic flowing from to. So a more common definition of flow included an IP address pair, where either address can be the SIP as long as the other address of the pair is the DIP. June 2011-2 -

www.netoptics.com 2 1 To make the load balancer flow coherent for flows defined by conversation or SIP/DIP address pair, filter on both the source and destination IP addresses as follows. Packets that have both source and destination address odd, or both even, are sent to m.1. Packets that have one odd address and one even address are sent to m.2: filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.1 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.1 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.1 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.1 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.1 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.1 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.1 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.1 Figure 4: Two-way load balancer based on conversation (source-destination IP address pair) Tool 1 Packet with even SIP and even DIP Packet with even SIP and odd DIP Packet with odd SIP and even DIP Packet with odd SIP and odd DIP Tool 2 Figure 5: Two-way static load balancing that keeps two-way conversations coherent Note that for these four filters to stay flow-by-conversation coherent, the last two filters must be assigned to the same output, because they capture both directions of a conversation. The first two filters could be sent to different outputs and remain flow coherent, but they should be assigned to a single port to capture the same number of conversations as are captured by the final two filters (assuming a large number of randomly distributed conversations). June 2011-3 -

This structure can be extended to a four-way load balancer (load balancing to four tools) by filtering on the two least significant bits of the addresses: First the four filters for like source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Now the conversation pairs with unlike source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Figure 6: Four-way load balancer based on conversation (source-destination IP address pair) June 2011-4 -

The same filter set can be used for an eight-way (load balancing to eight tools) load balancer as well: First the four filters for like source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Now the conversation pairs with unlike source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.4 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.5 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.5 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.6 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.6 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.7 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.7 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.8 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.8 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Figure 7: Eight-way load balancer based on conversation (source-destination IP address pair) June 2011-5 -

The filters of the four/eight-way load balancer can be used to implement a three-way load balancer, but it is slightly unbalanced, with m.1 receiving 20 percent more traffic than m.2 or m.3: First the four filters for like source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Now the conversation pairs with unlike source and destination IPs filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.1 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.2 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.3 filter add in_ports=n2.1-n2.2 action=redir redir_ports=m.3 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.3 Figure 8: Three-way load balancer based on conversation (source-destination IP address pair) June 2011-6 -

32-Way Static Load alancer Extending the filter model to use three least significant bits creates a 32-way load balancer (load balancing to 32 tools). It produces 64 filters: 8 conversation groups with like source and destination addresses, and 28 groups of unlike addresses. Remembering that like groups contain half as many conversations as unlike groups, this filter set can evenly balance 32, 16, 8, 4, and 2 outputs, and fairly even balances other numbers of outputs from 3 to 31. The following 64 filters create 36 conversation groups that can be allocated to implement even or nearly even load balances for any number of outputs from 2 to 32 outputs, as shown in the table following the filters. The filters are written for a five-way load balancer configuration (load balancing to five tools). Note that source of the traffic is taken from the 10 Gigabit port t1.1 rather than n2.1-n2.2 as it was in the previous examples. First the eight filters for like source and dest IPs filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 Now the conversation pairs with unlike source and dest IP categories filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.1 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.0 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.0 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.2 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 June 2011-7 -

filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.1 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.1 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.3 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.2 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.2 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.3 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.4 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.3 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.4 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.4 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.5 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.5 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.6 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.7 ip4_dst_mask=0.0.0.7 filter add in_ports=t1.1 action=redir redir_ports=m.5 ip4_src=0.0.1.7 ip4_src_mask=0.0.0.7 ip4_dst=0.0.1.6 ip4_dst_mask=0.0.0.7 End The table on the following page shows port assignments to use these filters to balance different numbers of outputs. Each column represents a different configuration (number of outputs). Each row represents one of the conversation groups, where the first eight rows are the like conversation groups that are created by a single filter each (the first eight filters in the filter listing). They each carry half the number of conversations as the remaining 24 groups, which are the unlike conversation groups that are created by a pair of filters each. The number in each interior cell of the table is an output port number. Green numbers highlight slight unbalances in the conversation distributions. June 2011-8 -

Number of Outputs Like groups 32 16 10 9 8 7 6 5 4 1 1 1 1 1 1 1 1 1 1 2 1 1 2 2 1 2 2 2 1 3 2 1 3 3 1 3 3 3 1 4 2 1 4 4 1 4 4 4 1 5 3 2 1 5 1 5 1 1 1 6 3 2 1 6 1 6 1 1 1 7 4 2 1 7 1 7 1 1 1 8 4 2 1 8 1 7 1 1 1 Unlike groups 1 5 3 1 9 2 1 1 1 1 2 6 3 2 1 2 1 1 1 1 3 7 4 2 1 2 1 1 1 1 4 8 4 2 1 2 1 2 1 1 5 9 5 3 2 3 2 2 2 2 6 10 5 3 2 3 2 2 2 2 7 11 6 3 2 3 2 2 2 2 8 12 6 4 3 3 2 2 2 2 9 13 7 4 3 4 3 3 2 2 10 14 7 4 3 4 3 3 2 2 11 15 8 5 4 4 3 3 3 2 12 16 8 5 4 4 3 3 3 2 13 17 9 5 4 5 4 3 3 3 14 18 9 6 5 5 4 4 3 3 15 19 10 6 5 5 4 4 3 3 16 20 10 6 5 5 4 4 3 3 17 21 11 7 6 6 5 4 4 3 18 22 11 7 6 6 5 4 4 3 19 23 12 7 6 6 5 5 4 3 20 24 12 8 7 6 5 5 4 3 21 25 13 8 7 7 6 5 4 4 22 26 13 8 7 7 6 5 4 4 23 27 14 9 8 7 6 5 5 4 24 28 14 9 8 7 6 6 5 4 25 29 15 9 8 8 7 6 5 4 26 30 15 10 9 8 7 6 5 4 27 31 16 10 9 8 7 6 5 4 28 32 16 10 9 8 7 6 5 4 Figure 9: Port assignments for various numbers of load balanced outputs using 64 filters June 2011-9 -

VLN-based Staiic Load alancing If the monitored link carries a known set of VLNs, distributing the load based on VLN may be a good approach. For example, a VLN-based static load balancer could be set up as follows (this filter is preloaded in Director under the name teng2oneg ): filter add in_ports=t1.01 ip4_dst=1.1.1.0-1.1.1.7 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.01 filter add in_ports=t1.01 ip4_dst=1.1.1.8-1.1.1.15 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.02 filter add in_ports=t1.01 ip4_dst=1.1.1.16-1.1.1.23 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.03 filter add in_ports=t1.01 ip4_dst=1.1.1.24-1.1.1.31 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.04 filter add in_ports=t1.01 ip4_dst=1.1.1.32-1.1.1.39 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.05 filter add in_ports=t1.01 ip4_dst=1.1.1.40-1.1.1.47 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.06 filter add in_ports=t1.01 ip4_dst=1.1.1.48-1.1.1.55 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.07 filter add in_ports=t1.01 ip4_dst=1.1.1.56-1.1.1.63 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.08 filter add in_ports=t1.01 ip4_dst=1.1.1.64-1.1.1.71 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.09 filter add in_ports=t1.01 ip4_dst=1.1.1.72-1.1.1.79 ip4_dst_mask=255.255.255.248 action=redir redir_ports=m.10 filter add in_ports=t1.01 ip4_src=1.1.1.0-1.1.1.7 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.01 filter add in_ports=t1.01 ip4_src=1.1.1.8-1.1.1.15 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.02 filter add in_ports=t1.01 ip4_src=1.1.1.16-1.1.1.23 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.03 filter add in_ports=t1.01 ip4_src=1.1.1.24-1.1.1.31 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.04 filter add in_ports=t1.01 ip4_src=1.1.1.32-1.1.1.39 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.05 filter add in_ports=t1.01 ip4_src=1.1.1.40-1.1.1.47 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.06 filter add in_ports=t1.01 ip4_src=1.1.1.48-1.1.1.55 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.07 filter add in_ports=t1.01 ip4_src=1.1.1.56-1.1.1.63 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.08 filter add in_ports=t1.01 ip4_src=1.1.1.64-1.1.1.71 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.09 filter add in_ports=t1.01 ip4_src=1.1.1.72-1.1.1.79 ip4_src_mask=255.255.255.248 action=redir redir_ports=m.10 Figure 10: Load balancer based on VLNs defined by IP address ranges In this static load balancer, traffic from the 10 Gigabit port t1.1 is distributed by VLN to the 10 monitor ports. The VLNs cover the range 1.1.1.0 to 1.1.1.79, with eight contiguous address going to each output. Note that two filters are define for each output port, so that traffic both from and to the given VLN addresses are directed to the appropriate outputs. If a conversation occurs between two endpoints within the VLN space, the conversation is routed based on the destination address because the destination filters are higher priority than the source filters. In the previous example, VLNs were separated by IP addresses. If VLN tagging is being used, then the tag field could be the basis of the static load balancing filters, as in the following example: filter add in_ports=t1.01 action=redir redir_ports=m.1 vlan=64 vlan_mask=7 filter add in_ports=t1.01 action=redir redir_ports=m.2 vlan=72 vlan_mask=7 filter add in_ports=t1.01 action=redir redir_ports=m.3 vlan=80 vlan_mask=7 filter add in_ports=t1.01 action=redir redir_ports=m.4 vlan=88-92 pro=y Figure 11: Load balancer based on VLN tags In this example, a mask is used to define a block of eight VLN numbers for each of the first three filters. For example, the first filter includes VLNs 64 through 71. The last filter uses the exact range capability of the Pro engine (a feature of Director Pro models) to define a block of exactly five VLN numbers. Some types of traffic may be best distributed by examining different fields altogether. For example, traffic could be sorted based on protocols or Layer 4 ports. Director s User Defined Filter (UDF) function can be used to distribute traffic based on higher-level information; for example, VoIP data carried in RTP protocol might achieve a good load balance if it distributed based on RTP SSRC ID field. June 2011-10 -

Summary This application note has shown how static load balancers can b -way, ow coherent ensuring that complete two-way Net Optics devices that support static load balancing are: Director Director Pro Director xstream Director xstream Pro xalancer ts of any application. Net Optics engineers are happy to work with you to develop static load balancers and other load balancing solutions to keep your monitoring infrastructure up to speed with your latest network upgrades. Distributed by: Network Performance Channel GmbH Ohmstr. 12 63225 Langen Germany T: +49 6103 906 722 netoptics@np-channel.com www.network-taps.eu For further information about monitoring load balancing solutions: www.netoptics.com Net Optics, Inc. 5303 etsy Ross Drive Santa Clara, C 95054 (408) 737-7777 info@netoptics.com June 2011-11 -