. The client program is not affected by the server cluster and requires no modification. The scalability of the system is achieved by transparently joining or deleting a node in the server cluster, by detecting node or service process failures and correctly resetting the system to high availability.The abstract architecture of LVS is divided into three tiers: Load Scheduler (Payload balancer), server pool, shared storage (GKFX storage)650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M02/7B
completely differently, and the working scene is completely different. Dr Based on data message rewriting, Tun mode is based on IP tunneling, which is the re-encapsulation of data packets. Let's take a look at how Lvs-tun mode works.First, we introduce a concept Ipip tunnel. Encapsulates a complete IP message into the data portion of another new IP packet and transmits it to the specified location via the router. In this process the router does not c
implemented by Ipvs. There are three ways to load balance Ipvs, namely NAT (full NAT), Tun, and Dr, which are described in detail below.Three, Dr modeHere is the DR Mode data transfer diagram:650) this.width=650; "src=" http://s1.51cto.com/wyfs02/M02/7F/65/wKioL1cdqfDDuDE5AAEH-FhXD0k761.jpg "title=" 1.jpg " alt= "Wkiol1cdqfddude5aaeh-fhxd0k761.jpg"/>Dr Mode: Virtual server via direct Routing, that is, the use of direct routing technology to implement the VM. The connection scheduling and manage
The recent performance comparison test of the LVS cluster approach has encountered some strange problems in configuring the IP tunneling mode:1) After stopping the LVS service, the virtual IP is not released (it seems that only restart the server can be released, restart the network card, empty the routing table, restart the switch, etc. are not valid);2) Load imbalance (sometimes the pressure is all pressed on one of the members, and sometimes normal
the source address and source port of the message to the virtual IP address and the corresponding port, then send the data to the user to complete the load scheduling process. As can be seen, in the NAT mode, the user request and response messages must be rewritten by the Director server address, when the user requests more and more time, the scheduler's processing power will be called bottlenecks.? Vs/tun: That is, (virtual server via IP tunneling)
server address, while the destination port of the message is also changed to the corresponding port of the selected real server, Finally, the message request is sent to the selected real Server. After the data is obtained on the server side, when Real server returns the data to the user, it needs to go through the load scheduler again to change the source address and source port of the message to the virtual IP address and the corresponding port, then send the data to the user to complete the l
to the IP address of a selected RS, forwards it to the rs;rs to send the reply packet to lb,lb to the IP address of the RS in the reply packet to the virtual server, and sends it back to the user.IP tunneling (IP tunneling) mode. When LB receives a user request packet, it encapsulates the packet according to the IP Tunneling protocol, and then passes it to a sel
of the request message (that is, the virtual IP address) to the selected real server address, while the destination port of the message is also changed to the corresponding port of the selected real server, and finally the message request is sent to the selected real server. After the data is obtained on the server side, when Real server returns the data to the user, it needs to go through the load scheduler again to change the source address and source port of the message to the virtual IP add
Creating an IP tunnel using GRE on Linux
Contents [Hide]· 1 IP tunelling· 2 Starting Configuration· 3 tunnelling ObjectiveO 3.1 Create TunnelsO 3.2 Additional RoutesO 3.3 Delete Tunnels· 4 Network DiagramO 4.1 Debian Configuration· 5 References
IP tunellingWe'll do IPv4 tunneling using GRE. GRE is a tunneling protocol this was originally developed by Cisco, and it can do a few mo
The following is a small series for everyone to collect the "VPN is what" all content, if you like the small series of recommendations, please continue to pay attention to learning.
The full name of the VPN is virtual private network, which is the meaning of the fictitious private network. Many people do not know what VPN means, in fact, VPN is a temporary security connection through the Internet, is a safe and stable tunnel through the chaotic public network, through this tunnel can securely
limited back node equipment downtime will not affect the businessThree About LVSLvs:linux virtual server abbreviation, meaning is a virtual servers cluster system, it is also an open source software, by the University of Defense technology, Dr. Zhangwensong founded in May 1998, is one of the earliest free software projects in China, it can realize simple load balancing under Linux platform, with low cost, high performance, high reliability and high availability.Four The naming convention for re
process.It can be seen that in the NAT mode, the user requests and response messages must be rewritten by Director server address, when the user requests more and more, the scheduler's processing ability will be called the bottleneck. vs/tun: That is, Virtual Server via IP tunneling That is, the IP tunneling technology implements the virtual server. Its connection scheduling and management is the same as
IP commands are used to display or manipulate the Linux host's routing, network devices, Policy Routing and tunneling, which is the newer powerful network Configuration tool under Linux.IP [OPTIONS] OBJECT {COMMAND | HelpOptions is the option to modify the IP behavior or change its output.-V: Prints the version of the IP and exits-s: outputs more detailed information. If this option occurs two or more times, the output information will be more detaile
About PPTP
Point-to-Point Tunneling Protocol (English: point to Point Tunneling Protocol, abbreviated to PPTP) is one way to implement a virtual private network (VPN). PPTP uses Transmission Control Protocol (TCP) to create controlling channels to send control commands and to encapsulate Point-to-Point Protocol (PPP) packets to send data using the generic Routing Encapsulation (GRE) channel. This agreement
PPTP, that is, the PPTF protocol. This protocol is a new enhanced security protocol developed on the basis of PPP protocol, which supports multi-protocol virtual private network (VPN), and can enhance security through the methods of Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP), etc. You can enable remote users to securely access the enterprise network by dialing into the ISP, by connecting directly to the Internet, or through other networks.
PPTP: Point-to-Po
1. Foreword
Due to the openness of Internet and the limitation of the original design of communication protocol, all information is transmitted in clear text, which leads to the security problem of Internet increasingly serious. Illegal access, network attacks and so on frequently, to the company's normal operation brings security hidden trouble even immeasurable loss, therefore must use the information security technology to ensure the network security problem.
2. Network Solution Description
T
availability and overall reliability and stability of disaster-tolerant systems. Multi-fabric interconnection through the SAN routers ensures the autonomy of the management of the San networks of different departments in the same company, and enhances the freedom of each department's San development.
From the implementation of technology, there are currently two main mainstream technology: one is Fcip (FC over IP), the other is IFCP (Internet Fibre Channel protocol).
"Because San plays a more
.
The industry has put forward many solutions for the evolution strategy of IPv4 to IPv6 technology. In particular, the IETF organization has set up a research group NGTRANS dedicated to studying this evolution, and has submitted various draft evolution strategies to make them standard. Looking at various Evolution Strategies, mainstream technologies can be divided into the following categories:
Dual-stack Policy
The most direct way to connect an IPv6 node with an IPv4 node is to add an IPv4 pro
communication security. Data is encrypted, the attacker can then easily initiate an attack to get the communication endpoint from the packet, if there is no information and session content for the communication layer and exchanging the sender's concubine receiver pays. The mechanism provided by the Proxy tunneling allows access to resources behind the firewall through a proxy server. The proxy server hides the address of the communications host in it
network-layer protocols with similar functions. Both of them are applied to the same physical platform and carry the same transport layer protocol TCP or UDP. If a host supports both IPv6 and IPv4 protocols, the host can communicate with a host that only supports IPv4 or IPv6. The protocol structure of the IPv6/IPv4 protocol stack is shown in:
;
Tunneling Technology
To enable the communication between IPv4 and IPv6 protocols, the tunnel mechanism is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.