between nodes to take advantage of the best resources, similar to symmetric multiprocessor systems that can switch applications between processors. Because Mosix implements clustering by modifying the kernel, there are compatibility issues and some system-level applications will not function properly.
Load balancing/High availability clusters
3, LVS (Linux Vir
1. OverviewThe first two times in this article, we have been talking about the construction of Nginx + keepalived. At the beginning of this article, we are going to honor the promise of the previous article, the following two articles we will introduce the Nginx + keepalived and LVS + keepalived to build a highly available load layer system. If you do not know about Nginx and LVS, see my previous two articles, "Architecture Design:
command: nginx-t
Of course Nginx load Balancing function is also very strong, and it is generally as a seven-tier load balancing (Application protocol layer). Here is a description of the four common settings that are supported by its upstream:
Code highlighting produced by Actipro CodeHighlighter (freeware)
done first. For more information, see "Linux kernel SMP load Balancing", here are just a few brief generalizations.Plainly, kernel load balance do one thing: let the system in the running state of the process as far as possible to be allocated, in each of the dispatch field to see is balance. How do you understand it? Now the CPU structure generally has: physica
The difference between four and seven layers of load balancing
four layersThe so-called four layer is the fourth layer in the ISO reference model. Four-layer load balancing is also called four-layer switch, it is mainly through the analysis of IP layer and TCP/UDP layer of t
Not long ago I was in charge of a well-known national manufacturing group's load balancing project. I was deeply touched by the project's application of gslb in a specific environment and learned a lot of related Load Balancing knowledge. Today, let's calm down and think about how to learn a lot through the project. du
There are many ways to load balance php, here, I will introduce you to PHP load balancing, if not much to say, we will take a direct look at the implementation of PHP load balancing.
1. php files
The first question is, if you have a large number of small servers, how do yo
balancer, but also through a number of proprietary software and protocols to achieve. In the OSI seven layer protocol model, the second (data link layer), third (network layer), fourth (transport layer), layer seventh (application layer) have corresponding load Balancing strategy (algorithm), the principle of load balancing
1. OverviewThe first two times in this article, we have been talking about the construction of Nginx + keepalived. At the beginning of this article, we are going to honor the promise of the previous article, the following two articles we will introduce the Nginx + keepalived and LVS + keepalived to build a highly available load layer system. If you do not know about Nginx and LVS, see my previous two articles, "Architecture Design:
Load BalancerIt can be a dedicated device or an application that runs on a common server. Distribute requests to servers that have the same content or provide the same services. Special purpose devices are generally only Ethernet interfaces, which can be said to be a multi-layer switch. The load balancer is typically assigned a virtual IP address, and all request
bandwidth.
4 to 7 layers of load balancing are now frequently used.
Layer fourth load balance maps a legally registered IP address on the Internet to the IP address of multiple internal servers and dynamically uses one of the internal IP addresses for each TCP connection request to achieve load
address translation gateway can evenly convert each connection to a different internal server address, then the computers in the external network will communicate with the server on the address they have obtained, this achieves load balancing.
Address translation can be implemented through software or hardware. Hardware-based operations are generally called exchanges. When the exchange must save TCP connec
can set the full Internet name of the cluster and determine its operating mode. A little explanation is needed here:
3.6.1 Unicast modeRefers to the host nodes to point to the same virtual MAC address, in this case, communication between the nodes can not be implemented.
3.6.2 multicast modemeans that each host node retains the original MAC address, in addition to the special for NLB communication MAC address, so that the normal communication between the nodes. However, not all routers or swi
As developers of back-end applications, we often develop, debug, test and publish our applications to the production environment, and users have direct access to our applications. But for Internet applications, there is a low profile or thick or thin layer of load balancing software between your application and users, and they do not show the dew silently playing an important role, so much so that we often
here:3.6.1 Unicast modeRefers to the host node to the same virtual MAC address, in which case communication between the nodes is not possible.3.6.2 multicast modemeans that each host node retains its original MAC address, plus the communication MAC address that is dedicated to NLB, so that communication between nodes can be achieved normally. However, not all routers or switches support multicast mode and need to be handled with care.3.6.3 IGMP multicast modeBased on the multicast mode feature,
requirements.
Requirements for switches and routers
When you plan to use VLANs to prevent the exchange of data floods, you must ensure that the switch supports VLAN settings; When using multicast, some routers do not support the mapping of a unicast IP address to a multicast MAC address and need to be set manually.
Requirements for communication protocols
network adapters that are bound to the cluster can only install the TCP/IP protocol, and you
requirements.
Requirements for switches and routers
When you plan to use VLANs to prevent the exchange of data floods, you must ensure that the switch supports VLAN settings; When using multicast, some routers do not support the mapping of a unicast IP address to a multicast MAC address and need to be set manually.
Requirements for communication protocols
network adapters that are bound to the cluster can only install the TCP/IP protocol, and you mus
longer;
Uneven distribution, if the configuration between several Web servers, can withstand the pressure is different, but the DNS resolution allocation of access is evenly distributed. Unbalanced distribution of user groups results in an imbalance in DNS resolution.
Session hold, if it is a Web site that requires authentication, this is fatal if the software architecture is not modified, because DNS resolution cannot permanently assign authenticated users access to the same server. Al
immediately switch to the Remote data center.
The "minimum time" can be computed in two ways, from the time the request is sent to the top of the server to the response header, and from the time the request is sent to the full request body, header_time respectively response_time .
Session consistency
The session consistency (session persistence) problem can be achieved by specifying the Ip-hash equalization algorithm, and there is a more general imp
As developers of back-end applications, we often develop, debug, test and publish our applications to the production environment, and users have direct access to our applications. But for Internet applications, there is a low profile or thick or thin layer of load balancing software between your application and users, and they do not show the dew silently playing an important role, so much so that we often
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.