SlideShare a Scribd company logo
1 of 4
Download to read offline
1
Clustering
by Achraf SFAXI
SUN Certified Professional
Bnak/Finance & Telecom Jobs
October 2006
 J2EE application server vendors define a cluster as a group of machines working
together to transparently provide enterprise services (support for JNDI, EJB, JSP,
HttpSession and component failover, and so on)
 In addition to machines, clusters can comprise redundant and failover-capable:
 Load balancers: Single points of entry into the cluster and traffic directors to
individual Web or application servers
 Web servers
 Gateway routers: Exit points out of an internal network
 Multilayer switches: Packet and frame filters to ensure that each machine in
the cluster receives only information pertinent to that machine
 Firewalls: Cluster protectors from hackers by filtering port-level access to the
cluster and internal network
 SAN (Storage Area Networking) switches: Connect the application servers,
Web servers, and databases to a backend storage medium; manage which
physical disk to write data to; and failover
 Databases
Load Balancing of Web Servers
 A Web cluster is a group of servers running a Web application simultaneously,
appearing to the world as if it were a single server. To balance server load, the system
distributes requests to different nodes within the server cluster, with the goal of
optimizing system performance. This results in higher availability and scalability
 High availability can be defined as redundancy. If one server cannot handle a
request, can other servers in the cluster handle it? In a highly available system, if a
single Web server fails, then another server takes over, as transparently as possible, to
process the request.
 Scalability is an application's ability to support a growing number of users. If it takes
an application 10 milliseconds(ms) to respond to one request, how long does it take to
respond to 10,000 concurrent requests? Infinite scalability would allow it to respond
to those in 10 ms; in the real world, it's somewhere between 10 ms and a logjam.
2
Scalability is a measure of a range of factors, including the number of simultaneous
users a cluster can support and the time it takes to process a request.
 Of the many methods available to balance a server load, the main two are:
 DNS round robin and
 Hardware load balancers
 The DNS server generally contains a single IP address mapped to a particular site
name. To balance server loads using DNS, the DNS server maintains several different
IP addresses for a site name. The multiple IP addresses represent the machines in the
cluster, all of which map to the same single logical site name.
 In the case, the DNS server contains the following mappings:
www.loadbalancedsite.com 203.34.23.3
www.loadbalancedsite.com 203.34.23.4
www.loadbalancedsite.com 203.34.23.5
When the first request arrives at the DNS server, it returns the IP address 203.34.23.3,
the first machine. On the second request, it returns the second IP address: 203.34.23.4.
And so on. On the fourth request, the first IP address is returned again.
 The main advantages of DNS round robin are that it's cheap and easy
 Two main disadvantages of this software-based method of load balancing are that it
offers no real support for server affinity and doesn't support high availability.
 Server affinity is a load-balancing system's ability to manage a user's requests, either
to a specific server or any server, depending on whether session information is
maintained on the server or at an underlying, database level.
 No support for high availability: Consider a cluster of n nodes. If a node goes down,
then every nth request to the DNS server directs you to the dead node. An advanced
router solves this problem by checking nodes at regular intervals, detecting failed
nodes and removing them from the list, so no requests go to them. However, the
problem still exists if the node is up but the Web application running on the node
goes down.
 Hardware load balancers solve many of the problems faced by the round robin
software solution through virtual IP addresses. The load balancer shows a single
(virtual) IP address to the outside world, which maps to the addresses of each
machine in the cluster. So, in a way, the load balancer exposes the IP address of the
entire cluster to the world.
3
 When a request comes to the load balancer, it rewrites the request's header to point to
other machines in the cluster. If a machine is removed from the cluster, the request
doesn't run the risk of hitting a dead server, since all of the machines in the cluster
appear to have the same IP address. This address remains the same even if a node in
the cluster is down. Moreover, cached DNS entries around the Internet aren't a
problem. When a response is returned, the client sees it coming from the hardware
load balancer machine. In other words, the client is dealing with a single machine, the
hardware load balancer.
 Advantages of Hardware Load Balancers
 Server affinity : The hardware load balancer reads the cookies or URL
readings on each request made by the client. Based on this information,
it can rewrite the header information and send the request to the
appropriate node in the cluster, where its session is maintained.
Hardware load balancers can provide server affinity in HTTP
communication, but not through a secure channel, such as HTTPS. In a
secure channel, the messages are SSL-encrypted, and this prevents the
load balancer from reading the session information.
 High Availability Through Failover : Failover happens when one node
in a cluster cannot process a request and redirects it to another. There
are two types of failover:
 Request Level Failover : When one node in a cluster cannot
process a request (often because it's down), it passes it along to
another node.
 Transparent Session Failover : When an invocation fails, it's
transparently routed to another node in the cluster to complete the
execution.
 Metrics : Since all requests to a Web application must pass through the
load-balancing system, the system can determine the number of active
sessions, the number of active sessions connected in any instance,
response times, peak load times, the number of sessions during peak
load, the number of sessions during minimum load, and more. All this
audit information is used to fine tune the entire system for optimal
performance.
 Disadvantages of Hardware Load Balancers : The drawbacks to the hardware route
are the costs, the complexity of setting up, and the vulnerability to a single point of
4
failure. Since all requests pass through a single hardware load balancer, the failure of
that piece of hardware sinks the entire site.
 As mentioned above, it's difficult to load balance and maintain session information of
requests that come in over HTTPS, as they're encrypted. The hardware load balancer
cannot redirect requests based on the information in the header, cookies, or URL
readings. There are two options to solve this problem:
 Web server proxies
 Hardware SSL decoders
If you appreciate this document make a donation to a
worldwide children association or organization. I suggest the SOS
association. This document has been downloaded from the
http://achraf.sfaxi.perso.sfr.fr space ; you can use and broadcast it for
non lucrative purposes. Further information are available upon
request.
Si vous appréciez ce document faites un don pour le compte
d’une association ou une organisation qui s’occupe des enfants. Je
recommande l’association SOS. Ce document est disponible sur
http://achraf.http://achraf.sfaxi.perso.sfr.frsfaxi.perso.sfr.fr; son utilisation
ainsi que sa propagation pour des fins non lucratives sont gratuites.

More Related Content

What's hot

Web ,app and db server presentation
Web ,app and db server presentationWeb ,app and db server presentation
Web ,app and db server presentationParth Godhani
 
Learn REST API at ASIT
Learn REST API at ASITLearn REST API at ASIT
Learn REST API at ASITASIT
 
Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configurationwebhostingguy
 
Scalable Web Architectures and Infrastructure
Scalable Web Architectures and InfrastructureScalable Web Architectures and Infrastructure
Scalable Web Architectures and Infrastructuregeorge.james
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and responseSahil Agarwal
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenancePort80 Software
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Softwarewebhostingguy
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedPort80 Software
 
The experiences of migrating a large scale, high performance healthcare network
The experiences of migrating a large scale, high performance healthcare networkThe experiences of migrating a large scale, high performance healthcare network
The experiences of migrating a large scale, high performance healthcare networkgeorge.james
 
Presentation about servers
Presentation about serversPresentation about servers
Presentation about serversSasin Prabu
 
Esc 209 paper_doin
Esc 209 paper_doinEsc 209 paper_doin
Esc 209 paper_doinJonny Doin
 
Web servers (l6)
Web servers (l6)Web servers (l6)
Web servers (l6)Nanhi Sinha
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and softwareVikram g b
 
Mobility Information Series - Webservice Architecture Comparison by RapidValue
Mobility Information Series - Webservice Architecture Comparison by RapidValueMobility Information Series - Webservice Architecture Comparison by RapidValue
Mobility Information Series - Webservice Architecture Comparison by RapidValueRapidValue
 

What's hot (20)

Web server
Web serverWeb server
Web server
 
Web ,app and db server presentation
Web ,app and db server presentationWeb ,app and db server presentation
Web ,app and db server presentation
 
Learn REST API at ASIT
Learn REST API at ASITLearn REST API at ASIT
Learn REST API at ASIT
 
Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configuration
 
Scalable Web Architectures and Infrastructure
Scalable Web Architectures and InfrastructureScalable Web Architectures and Infrastructure
Scalable Web Architectures and Infrastructure
 
Meeting 4 : proxy
Meeting 4 : proxyMeeting 4 : proxy
Meeting 4 : proxy
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
 
Web Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server MaintenanceWeb Server Technologies II: Web Applications & Server Maintenance
Web Server Technologies II: Web Applications & Server Maintenance
 
Web server
Web serverWeb server
Web server
 
Web Server Hardware and Software
Web Server Hardware and SoftwareWeb Server Hardware and Software
Web Server Hardware and Software
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
HTTP/2
HTTP/2HTTP/2
HTTP/2
 
The experiences of migrating a large scale, high performance healthcare network
The experiences of migrating a large scale, high performance healthcare networkThe experiences of migrating a large scale, high performance healthcare network
The experiences of migrating a large scale, high performance healthcare network
 
Presentation about servers
Presentation about serversPresentation about servers
Presentation about servers
 
Esc 209 paper_doin
Esc 209 paper_doinEsc 209 paper_doin
Esc 209 paper_doin
 
Web servers (l6)
Web servers (l6)Web servers (l6)
Web servers (l6)
 
Web servers
Web serversWeb servers
Web servers
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Mobility Information Series - Webservice Architecture Comparison by RapidValue
Mobility Information Series - Webservice Architecture Comparison by RapidValueMobility Information Series - Webservice Architecture Comparison by RapidValue
Mobility Information Series - Webservice Architecture Comparison by RapidValue
 
Jagmohancrawl
JagmohancrawlJagmohancrawl
Jagmohancrawl
 

Similar to Clustering - october 2006

A Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksA Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksSruthi Kamal
 
Back-End application for Distributed systems
Back-End application for Distributed systemsBack-End application for Distributed systems
Back-End application for Distributed systemsAtif Imam
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...iosrjce
 
Scalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed SystemsScalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed Systemshyun soomyung
 
Top System Design Interview Questions
Top System Design Interview QuestionsTop System Design Interview Questions
Top System Design Interview QuestionsSoniaMathias2
 
Deep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingDeep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingAmazon Web Services
 
Server Farms and XML Web Services
Server Farms and XML Web ServicesServer Farms and XML Web Services
Server Farms and XML Web ServicesJorgen Thelin
 
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...idescitation
 
Plandas-CacheCloud
Plandas-CacheCloudPlandas-CacheCloud
Plandas-CacheCloudGyuman Cho
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.pptImXaib
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...webhostingguy
 
Scale from zero to millions of users.pdf
Scale from zero to millions of users.pdfScale from zero to millions of users.pdf
Scale from zero to millions of users.pdfNedyalkoKarabadzhako
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.netHostin Services Pvt Ltd
 

Similar to Clustering - october 2006 (20)

A Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksA Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery Networks
 
Back-End application for Distributed systems
Back-End application for Distributed systemsBack-End application for Distributed systems
Back-End application for Distributed systems
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
 
J017367075
J017367075J017367075
J017367075
 
Clustering & nlb
Clustering & nlbClustering & nlb
Clustering & nlb
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
Scalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed SystemsScalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed Systems
 
Database System Architectures
Database System ArchitecturesDatabase System Architectures
Database System Architectures
 
Top System Design Interview Questions
Top System Design Interview QuestionsTop System Design Interview Questions
Top System Design Interview Questions
 
Deep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingDeep Dive on Elastic Load Balancing
Deep Dive on Elastic Load Balancing
 
Server Farms and XML Web Services
Server Farms and XML Web ServicesServer Farms and XML Web Services
Server Farms and XML Web Services
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...
A Modified Genetic Algorithm based Load Distribution Approach towards Web Hot...
 
Plandas-CacheCloud
Plandas-CacheCloudPlandas-CacheCloud
Plandas-CacheCloud
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...
 
Document 22.pdf
Document 22.pdfDocument 22.pdf
Document 22.pdf
 
Scale from zero to millions of users.pdf
Scale from zero to millions of users.pdfScale from zero to millions of users.pdf
Scale from zero to millions of users.pdf
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.net
 

More from achraf_ing

Ejb - september 2006
Ejb  - september 2006Ejb  - september 2006
Ejb - september 2006achraf_ing
 
Distributed computing - november 2006
Distributed computing  - november 2006Distributed computing  - november 2006
Distributed computing - november 2006achraf_ing
 
Initiation à Linux - Fundamentals
Initiation à Linux  - FundamentalsInitiation à Linux  - Fundamentals
Initiation à Linux - Fundamentalsachraf_ing
 
Apache server configuration & sécurisation -
Apache server configuration & sécurisation  -Apache server configuration & sécurisation  -
Apache server configuration & sécurisation -achraf_ing
 
Ssl et certification electronique - (construction de certification)
Ssl et certification electronique  - (construction de certification)Ssl et certification electronique  - (construction de certification)
Ssl et certification electronique - (construction de certification)achraf_ing
 
Crise financiere
Crise financiereCrise financiere
Crise financiereachraf_ing
 
The 23 gof design patterns in java ,the summary
The 23 gof design patterns in java ,the summaryThe 23 gof design patterns in java ,the summary
The 23 gof design patterns in java ,the summaryachraf_ing
 
Internationalization in Java
Internationalization in JavaInternationalization in Java
Internationalization in Javaachraf_ing
 

More from achraf_ing (10)

Ejb - september 2006
Ejb  - september 2006Ejb  - september 2006
Ejb - september 2006
 
Distributed computing - november 2006
Distributed computing  - november 2006Distributed computing  - november 2006
Distributed computing - november 2006
 
Initiation à Linux - Fundamentals
Initiation à Linux  - FundamentalsInitiation à Linux  - Fundamentals
Initiation à Linux - Fundamentals
 
Apache server configuration & sécurisation -
Apache server configuration & sécurisation  -Apache server configuration & sécurisation  -
Apache server configuration & sécurisation -
 
Ssl et certification electronique - (construction de certification)
Ssl et certification electronique  - (construction de certification)Ssl et certification electronique  - (construction de certification)
Ssl et certification electronique - (construction de certification)
 
Crise financiere
Crise financiereCrise financiere
Crise financiere
 
Stratégie
StratégieStratégie
Stratégie
 
The 23 gof design patterns in java ,the summary
The 23 gof design patterns in java ,the summaryThe 23 gof design patterns in java ,the summary
The 23 gof design patterns in java ,the summary
 
Internationalization in Java
Internationalization in JavaInternationalization in Java
Internationalization in Java
 
My Rmi F
My Rmi FMy Rmi F
My Rmi F
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Clustering - october 2006

  • 1. 1 Clustering by Achraf SFAXI SUN Certified Professional Bnak/Finance & Telecom Jobs October 2006  J2EE application server vendors define a cluster as a group of machines working together to transparently provide enterprise services (support for JNDI, EJB, JSP, HttpSession and component failover, and so on)  In addition to machines, clusters can comprise redundant and failover-capable:  Load balancers: Single points of entry into the cluster and traffic directors to individual Web or application servers  Web servers  Gateway routers: Exit points out of an internal network  Multilayer switches: Packet and frame filters to ensure that each machine in the cluster receives only information pertinent to that machine  Firewalls: Cluster protectors from hackers by filtering port-level access to the cluster and internal network  SAN (Storage Area Networking) switches: Connect the application servers, Web servers, and databases to a backend storage medium; manage which physical disk to write data to; and failover  Databases Load Balancing of Web Servers  A Web cluster is a group of servers running a Web application simultaneously, appearing to the world as if it were a single server. To balance server load, the system distributes requests to different nodes within the server cluster, with the goal of optimizing system performance. This results in higher availability and scalability  High availability can be defined as redundancy. If one server cannot handle a request, can other servers in the cluster handle it? In a highly available system, if a single Web server fails, then another server takes over, as transparently as possible, to process the request.  Scalability is an application's ability to support a growing number of users. If it takes an application 10 milliseconds(ms) to respond to one request, how long does it take to respond to 10,000 concurrent requests? Infinite scalability would allow it to respond to those in 10 ms; in the real world, it's somewhere between 10 ms and a logjam.
  • 2. 2 Scalability is a measure of a range of factors, including the number of simultaneous users a cluster can support and the time it takes to process a request.  Of the many methods available to balance a server load, the main two are:  DNS round robin and  Hardware load balancers  The DNS server generally contains a single IP address mapped to a particular site name. To balance server loads using DNS, the DNS server maintains several different IP addresses for a site name. The multiple IP addresses represent the machines in the cluster, all of which map to the same single logical site name.  In the case, the DNS server contains the following mappings: www.loadbalancedsite.com 203.34.23.3 www.loadbalancedsite.com 203.34.23.4 www.loadbalancedsite.com 203.34.23.5 When the first request arrives at the DNS server, it returns the IP address 203.34.23.3, the first machine. On the second request, it returns the second IP address: 203.34.23.4. And so on. On the fourth request, the first IP address is returned again.  The main advantages of DNS round robin are that it's cheap and easy  Two main disadvantages of this software-based method of load balancing are that it offers no real support for server affinity and doesn't support high availability.  Server affinity is a load-balancing system's ability to manage a user's requests, either to a specific server or any server, depending on whether session information is maintained on the server or at an underlying, database level.  No support for high availability: Consider a cluster of n nodes. If a node goes down, then every nth request to the DNS server directs you to the dead node. An advanced router solves this problem by checking nodes at regular intervals, detecting failed nodes and removing them from the list, so no requests go to them. However, the problem still exists if the node is up but the Web application running on the node goes down.  Hardware load balancers solve many of the problems faced by the round robin software solution through virtual IP addresses. The load balancer shows a single (virtual) IP address to the outside world, which maps to the addresses of each machine in the cluster. So, in a way, the load balancer exposes the IP address of the entire cluster to the world.
  • 3. 3  When a request comes to the load balancer, it rewrites the request's header to point to other machines in the cluster. If a machine is removed from the cluster, the request doesn't run the risk of hitting a dead server, since all of the machines in the cluster appear to have the same IP address. This address remains the same even if a node in the cluster is down. Moreover, cached DNS entries around the Internet aren't a problem. When a response is returned, the client sees it coming from the hardware load balancer machine. In other words, the client is dealing with a single machine, the hardware load balancer.  Advantages of Hardware Load Balancers  Server affinity : The hardware load balancer reads the cookies or URL readings on each request made by the client. Based on this information, it can rewrite the header information and send the request to the appropriate node in the cluster, where its session is maintained. Hardware load balancers can provide server affinity in HTTP communication, but not through a secure channel, such as HTTPS. In a secure channel, the messages are SSL-encrypted, and this prevents the load balancer from reading the session information.  High Availability Through Failover : Failover happens when one node in a cluster cannot process a request and redirects it to another. There are two types of failover:  Request Level Failover : When one node in a cluster cannot process a request (often because it's down), it passes it along to another node.  Transparent Session Failover : When an invocation fails, it's transparently routed to another node in the cluster to complete the execution.  Metrics : Since all requests to a Web application must pass through the load-balancing system, the system can determine the number of active sessions, the number of active sessions connected in any instance, response times, peak load times, the number of sessions during peak load, the number of sessions during minimum load, and more. All this audit information is used to fine tune the entire system for optimal performance.  Disadvantages of Hardware Load Balancers : The drawbacks to the hardware route are the costs, the complexity of setting up, and the vulnerability to a single point of
  • 4. 4 failure. Since all requests pass through a single hardware load balancer, the failure of that piece of hardware sinks the entire site.  As mentioned above, it's difficult to load balance and maintain session information of requests that come in over HTTPS, as they're encrypted. The hardware load balancer cannot redirect requests based on the information in the header, cookies, or URL readings. There are two options to solve this problem:  Web server proxies  Hardware SSL decoders If you appreciate this document make a donation to a worldwide children association or organization. I suggest the SOS association. This document has been downloaded from the http://achraf.sfaxi.perso.sfr.fr space ; you can use and broadcast it for non lucrative purposes. Further information are available upon request. Si vous appréciez ce document faites un don pour le compte d’une association ou une organisation qui s’occupe des enfants. Je recommande l’association SOS. Ce document est disponible sur http://achraf.http://achraf.sfaxi.perso.sfr.frsfaxi.perso.sfr.fr; son utilisation ainsi que sa propagation pour des fins non lucratives sont gratuites.