SlideShare a Scribd company logo
Load Balancer
Device and
Configurations.
Do you get too many visitors on the website, getting maximum hits on your site may crash your
site, your site may get stuck or it may go through a downtime? How to avoid such instances?
Configuring a load balancer to your website can sort your problem. This load balancer device will
help in distributing networks across numbers of servers. These devices are used to maximize the
reliability and capacity of the network. The overall performance of the network is increased as
this load balancer decreases the load on the servers associated with the network.
Load Balancing Algorithms.
There are types of load balancing algorithms which provide different benefits.
• Round robin: It refers to continue rotating the list of server that is attached to it. When a request
is received by the virtual server, it assigns the connection sequentially.
• Least connections: In this method, the virtual server is configured to use the lowest connections
• Custom load: In this method, the load balancer chooses the server with the lowest load before
distributing the network the load balancer checks where are the lowest transactions going on.
• The least Bandwidth: Load balancer device select the server which currently has lest amount of
traffic measured in MBPS.
• Weighted round robin: It is a simple round robin load balancing method where each server
there are given a static numerical weighting. The request is sent to those servers which have
high ratings.
• Source IP hash: A unique hash key is generated by combining client and server’s IP address.
A particular server is allocated using this hash key. As the key can be regenerated if the session
is broken this method of load balancing can ensure that the client request is directed to the same
server that it was using previously. This is useful if it’s important that a client should connect to a
session that is still active after a disconnection. For example, to retain items in a shopping cart
between sessions.
Load balancer configuration requirement:
1. Windows or Linux servers.
2. Virtual NIC adapter
3.Hardware or Software load balancer.
Configuration of Virtual NIC on windows server:
1-Disable or allow rules the Windows firewall. (To Enable traffic to the loopback adapter)
2-Install the loopback adapter.
3-Configure the loopback adapter. In particular, stop the loopback adapter from responding to ARP
requests.
4-Loopback adapter has the same IP address as the VIP address.
5-Make the Windows networking stack use the weak host model.
6-If you are using IIS, add the loopback adapter to your site bindings.
1. Disable the Windows firewall.
For Microsoft Windows Server 2008 and Windows Server 2012, you need to disable the built-in
firewall or manually change the rules to enable traffic to and from the loopback adapter. By default,
the Windows firewall blocks all connections to the loopback adapter.
2. Install the loopback adapter.
For Windows Server 2008/2012 or Windows Server 2008/2012 R2, follow these instructions to
install a loopback adapter on the server:
1. Open Device Manager. On the Start menu, click Run… and type devmgmt.msc at the prompt.
2. Right-click on the server name and click Add legacy hardware.
3. When prompted by the wizard, choose to install the hardware that I manually select from a list
(Advanced).
4. Find Network Adapter in the list and click next.
5. From the listed manufacturers select Microsoft and then Microsoft Loopback Adapter.
6. This will add a new network interface to your server.
3. Configure the loopback adapter.
After the loopback adapter is installed, follow these steps to configure it:
1. In Control Panel, double-click Network and Dial-up Connections.
2. Right-click the newly installed loopback adapter and click Properties.
3. Click to clear the Client for Microsoft Networks check box.
4. Click to clear the File and Printer Sharing for Microsoft Networks check box.
5. Click TCP/IP properties.
6. Enter the VIP address and the subnet mask.
7. Click Advanced.
8. Change the Interface Metric to 254. This stops the adapter from responding to ARP requests.
9. Click OK.
4. Make the Windows networking stack use the weak host model.
For Windows Server 2008/2012 or Windows Server 2008/2012 R2, this step tells you how to
make the Windows networking stack use the weak host model
Now, to determine the interface ID for both the loopback adapter and the main NIC on the server
1. Open a command prompt and type.
2. netsh interface ipv4 show interface
Note the IDX for both the main network interface and the loopback adapter you created.
If you have not changed the interface names for this server then usually the main NIC will display
as Local Area Connection and the loopback adapter will be named Local Area Connection
An entry will be displayed that includes the IDX numbers for both your loopback adapter and your
Internet-facing NIC. For each of these adapters enter these three commands:
1. netsh interface ipv4 set interface <IDX number for Server NIC> weakhostreceive=enabled
2. netsh interface ipv4 set interface <IDX number for loopback> weakhostreceive=enabled
3. netsh interface ipv4 set interface <IDX number for loopback> weakhostsend=enabled.
Configuration of virtual NIC on Linux servers.
To configure virtual IP on linux server we have to run below-mentioned command.
Where XX.XX.XX.XX is the virtual IP and XXX.XXX.XXX.XXX is the subnet mask.
ifconfig lo:0 XX.XX.XX.XX netmask XXX.XXX.XXX.XXX up
In order to add virtual IP permanently follow the steps mentioned below.
Create /etc/sysconfig/network-scripts/ifcfg-lo: 10
Add Below mentioned parameters.
DEVICE=lo: 10
IPADDR=XX.XX.XX.XX
NETMASK=XXX.XXX.XXX.XXX
NETWORK=XX.XX.XX.0
BROADCAST=XX.XX.XX.255
ONBOOT=yes
NAME=lo10
Restart network service.
Hardware Load balancer and software load balancer
Hardware load balancer :
A hardware load balancer is a device that directs computers to individual servers in a network on
the basis of server performance, server processor utilization, number of connections to the
servers. Hardware load balancer device can decrease the chances of submerging a particular
server and optimize the bandwidth of each computer or terminal. It also decreases the network
downtime, optimizes traffic prioritization, can provide with an end to end application monitoring
and user authentication. There are several load balancers devices available in the market like
foundry, F5, Cisco, Citrix.
,
Software load balancer:
Software load balancers are categorized into two parts that are installable load balancers and
Load balancer as a service (LBaaS). This types of load balancer must be installed, configured
and well managed. Some example of load balancer software is Varnish, HAproxy, Nginx. When it
is about installation there is HA proxy. It is a TCP and HTTP based load balancer which can be
suitable for high traffic. Software-defined load balancers not easy to provision but there are
scalable, programmable and reliable.
Web Werks delivers best load balancing solutions mainly website who deals with High traffic.
Majority of high traffic website rely on Web Werks to deliver content reliably securely and fast.
A software-based load balancer is costs less as compared to hardware-based load balancer with
similar abilities. Choosing Web Werks for load balancer service it increases performance,
reliability, and efficiency of your website and expands both customer’s satisfaction and returns on
IT investment.

More Related Content

What's hot

Server load balancer ppt
Server load balancer pptServer load balancer ppt
Server load balancer ppt
Shilpi Tandon
 
Web Server Load Balancing
Web Server Load BalancingWeb Server Load Balancing
Web Server Load Balancing
Mamdouh Tarabishi
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
Proxies Rent
 
Optimizing proxy
Optimizing proxyOptimizing proxy
Optimizing proxy
Proxies Rent
 
Communication between cloud services
Communication between cloud servicesCommunication between cloud services
Communication between cloud services
Roi Ezra
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
Proxies Rent
 
Load Balancing
Load BalancingLoad Balancing
Load Balancingnashniv
 
Http2
Http2Http2
How to improve your apache web server’s performance
How to improve your apache web server’s performanceHow to improve your apache web server’s performance
How to improve your apache web server’s performance
Andolasoft Inc
 
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
Supachai Jaturaprom
 
Web Servers(IIS, NGINX, APACHE)
Web Servers(IIS, NGINX, APACHE)Web Servers(IIS, NGINX, APACHE)
Web Servers(IIS, NGINX, APACHE)
Reza Jebeli
 
Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3
PerformanceVision (previously SecurActive)
 
Performance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's NewPerformance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's New
PerformanceVision (previously SecurActive)
 
Mule ESB - Consuming RESTful WS with RAML Definition
Mule ESB - Consuming RESTful WS with RAML DefinitionMule ESB - Consuming RESTful WS with RAML Definition
Mule ESB - Consuming RESTful WS with RAML Definition
Giuseppe De Michele
 
Learn Advanced JAVA at ASIT
Learn Advanced JAVA at ASITLearn Advanced JAVA at ASIT
Learn Advanced JAVA at ASIT
ASIT
 
Ip Phone Apps Training
Ip Phone Apps TrainingIp Phone Apps Training
Ip Phone Apps Trainingbhillis1
 
2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast
Tony Fortunato
 

What's hot (20)

Server load balancer ppt
Server load balancer pptServer load balancer ppt
Server load balancer ppt
 
Web Server Load Balancing
Web Server Load BalancingWeb Server Load Balancing
Web Server Load Balancing
 
Webapplication Load Balancing
Webapplication Load BalancingWebapplication Load Balancing
Webapplication Load Balancing
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Optimizing proxy
Optimizing proxyOptimizing proxy
Optimizing proxy
 
Communication between cloud services
Communication between cloud servicesCommunication between cloud services
Communication between cloud services
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Load Balancing
Load BalancingLoad Balancing
Load Balancing
 
Http2
Http2Http2
Http2
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
How to improve your apache web server’s performance
How to improve your apache web server’s performanceHow to improve your apache web server’s performance
How to improve your apache web server’s performance
 
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
 
Web Servers(IIS, NGINX, APACHE)
Web Servers(IIS, NGINX, APACHE)Web Servers(IIS, NGINX, APACHE)
Web Servers(IIS, NGINX, APACHE)
 
Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3
 
Performance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's NewPerformance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's New
 
Mule ESB - Consuming RESTful WS with RAML Definition
Mule ESB - Consuming RESTful WS with RAML DefinitionMule ESB - Consuming RESTful WS with RAML Definition
Mule ESB - Consuming RESTful WS with RAML Definition
 
Learn Advanced JAVA at ASIT
Learn Advanced JAVA at ASITLearn Advanced JAVA at ASIT
Learn Advanced JAVA at ASIT
 
Ip Phone Apps Training
Ip Phone Apps TrainingIp Phone Apps Training
Ip Phone Apps Training
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast
 

Similar to Load Balancer Device and Configurations.

q4 w3 ICT 10.pptx
q4 w3 ICT 10.pptxq4 w3 ICT 10.pptx
q4 w3 ICT 10.pptx
CrispinaRamirez
 
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceNetwork Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Cloudian
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Aakash Agarwal
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup Guide
Christian Petrou
 
Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2
Freddy Ortiz
 
Nt1330 Unit 1
Nt1330 Unit 1Nt1330 Unit 1
Nt1330 Unit 1
Jenny Calhoon
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Sahira Khan
 
Web375 course project web architecture plan for the de vry daily tribune new...
Web375 course project  web architecture plan for the de vry daily tribune new...Web375 course project  web architecture plan for the de vry daily tribune new...
Web375 course project web architecture plan for the de vry daily tribune new...
bestwriter
 
Always on high availability best practices for informix
Always on high availability best practices for informixAlways on high availability best practices for informix
Always on high availability best practices for informix
IBM_Info_Management
 
Informix HA Best Practices
Informix HA Best Practices Informix HA Best Practices
Informix HA Best Practices
Scott Lashley
 
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptxLoad Balance with NSX-T.pptx
Load Balance with NSX-T.pptx
Dhruv Sharma
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
Kapil Sabharwal
 
Building and Scaling a WebSockets Pubsub System
Building and Scaling a WebSockets Pubsub SystemBuilding and Scaling a WebSockets Pubsub System
Building and Scaling a WebSockets Pubsub System
Kapil Reddy
 
HA System-First presentation
HA System-First presentationHA System-First presentation
HA System-First presentation
Avin Chan
 
Crossfire DDoS Protection
Crossfire DDoS ProtectionCrossfire DDoS Protection
Crossfire DDoS Protection
Farjad Noor
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationwebhostingguy
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationwebhostingguy
 
Server Farms and XML Web Services
Server Farms and XML Web ServicesServer Farms and XML Web Services
Server Farms and XML Web Services
Jorgen Thelin
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
Ar Agarwal
 

Similar to Load Balancer Device and Configurations. (20)

q4 w3 ICT 10.pptx
q4 w3 ICT 10.pptxq4 w3 ICT 10.pptx
q4 w3 ICT 10.pptx
 
ACE - Comcore
ACE - ComcoreACE - Comcore
ACE - Comcore
 
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceNetwork Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup Guide
 
Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2
 
Nt1330 Unit 1
Nt1330 Unit 1Nt1330 Unit 1
Nt1330 Unit 1
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
Web375 course project web architecture plan for the de vry daily tribune new...
Web375 course project  web architecture plan for the de vry daily tribune new...Web375 course project  web architecture plan for the de vry daily tribune new...
Web375 course project web architecture plan for the de vry daily tribune new...
 
Always on high availability best practices for informix
Always on high availability best practices for informixAlways on high availability best practices for informix
Always on high availability best practices for informix
 
Informix HA Best Practices
Informix HA Best Practices Informix HA Best Practices
Informix HA Best Practices
 
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptxLoad Balance with NSX-T.pptx
Load Balance with NSX-T.pptx
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
Building and Scaling a WebSockets Pubsub System
Building and Scaling a WebSockets Pubsub SystemBuilding and Scaling a WebSockets Pubsub System
Building and Scaling a WebSockets Pubsub System
 
HA System-First presentation
HA System-First presentationHA System-First presentation
HA System-First presentation
 
Crossfire DDoS Protection
Crossfire DDoS ProtectionCrossfire DDoS Protection
Crossfire DDoS Protection
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Server Farms and XML Web Services
Server Farms and XML Web ServicesServer Farms and XML Web Services
Server Farms and XML Web Services
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Load Balancer Device and Configurations.

  • 2. Do you get too many visitors on the website, getting maximum hits on your site may crash your site, your site may get stuck or it may go through a downtime? How to avoid such instances? Configuring a load balancer to your website can sort your problem. This load balancer device will help in distributing networks across numbers of servers. These devices are used to maximize the reliability and capacity of the network. The overall performance of the network is increased as this load balancer decreases the load on the servers associated with the network. Load Balancing Algorithms. There are types of load balancing algorithms which provide different benefits. • Round robin: It refers to continue rotating the list of server that is attached to it. When a request is received by the virtual server, it assigns the connection sequentially. • Least connections: In this method, the virtual server is configured to use the lowest connections • Custom load: In this method, the load balancer chooses the server with the lowest load before distributing the network the load balancer checks where are the lowest transactions going on. • The least Bandwidth: Load balancer device select the server which currently has lest amount of traffic measured in MBPS.
  • 3. • Weighted round robin: It is a simple round robin load balancing method where each server there are given a static numerical weighting. The request is sent to those servers which have high ratings. • Source IP hash: A unique hash key is generated by combining client and server’s IP address. A particular server is allocated using this hash key. As the key can be regenerated if the session is broken this method of load balancing can ensure that the client request is directed to the same server that it was using previously. This is useful if it’s important that a client should connect to a session that is still active after a disconnection. For example, to retain items in a shopping cart between sessions. Load balancer configuration requirement: 1. Windows or Linux servers. 2. Virtual NIC adapter 3.Hardware or Software load balancer.
  • 4. Configuration of Virtual NIC on windows server: 1-Disable or allow rules the Windows firewall. (To Enable traffic to the loopback adapter) 2-Install the loopback adapter. 3-Configure the loopback adapter. In particular, stop the loopback adapter from responding to ARP requests. 4-Loopback adapter has the same IP address as the VIP address. 5-Make the Windows networking stack use the weak host model. 6-If you are using IIS, add the loopback adapter to your site bindings. 1. Disable the Windows firewall. For Microsoft Windows Server 2008 and Windows Server 2012, you need to disable the built-in firewall or manually change the rules to enable traffic to and from the loopback adapter. By default, the Windows firewall blocks all connections to the loopback adapter. 2. Install the loopback adapter.
  • 5. For Windows Server 2008/2012 or Windows Server 2008/2012 R2, follow these instructions to install a loopback adapter on the server: 1. Open Device Manager. On the Start menu, click Run… and type devmgmt.msc at the prompt. 2. Right-click on the server name and click Add legacy hardware. 3. When prompted by the wizard, choose to install the hardware that I manually select from a list (Advanced). 4. Find Network Adapter in the list and click next. 5. From the listed manufacturers select Microsoft and then Microsoft Loopback Adapter. 6. This will add a new network interface to your server. 3. Configure the loopback adapter. After the loopback adapter is installed, follow these steps to configure it: 1. In Control Panel, double-click Network and Dial-up Connections. 2. Right-click the newly installed loopback adapter and click Properties. 3. Click to clear the Client for Microsoft Networks check box.
  • 6. 4. Click to clear the File and Printer Sharing for Microsoft Networks check box. 5. Click TCP/IP properties. 6. Enter the VIP address and the subnet mask. 7. Click Advanced. 8. Change the Interface Metric to 254. This stops the adapter from responding to ARP requests. 9. Click OK. 4. Make the Windows networking stack use the weak host model. For Windows Server 2008/2012 or Windows Server 2008/2012 R2, this step tells you how to make the Windows networking stack use the weak host model Now, to determine the interface ID for both the loopback adapter and the main NIC on the server 1. Open a command prompt and type. 2. netsh interface ipv4 show interface Note the IDX for both the main network interface and the loopback adapter you created. If you have not changed the interface names for this server then usually the main NIC will display as Local Area Connection and the loopback adapter will be named Local Area Connection
  • 7. An entry will be displayed that includes the IDX numbers for both your loopback adapter and your Internet-facing NIC. For each of these adapters enter these three commands: 1. netsh interface ipv4 set interface <IDX number for Server NIC> weakhostreceive=enabled 2. netsh interface ipv4 set interface <IDX number for loopback> weakhostreceive=enabled 3. netsh interface ipv4 set interface <IDX number for loopback> weakhostsend=enabled. Configuration of virtual NIC on Linux servers. To configure virtual IP on linux server we have to run below-mentioned command. Where XX.XX.XX.XX is the virtual IP and XXX.XXX.XXX.XXX is the subnet mask. ifconfig lo:0 XX.XX.XX.XX netmask XXX.XXX.XXX.XXX up In order to add virtual IP permanently follow the steps mentioned below. Create /etc/sysconfig/network-scripts/ifcfg-lo: 10 Add Below mentioned parameters. DEVICE=lo: 10 IPADDR=XX.XX.XX.XX NETMASK=XXX.XXX.XXX.XXX NETWORK=XX.XX.XX.0
  • 8. BROADCAST=XX.XX.XX.255 ONBOOT=yes NAME=lo10 Restart network service. Hardware Load balancer and software load balancer Hardware load balancer : A hardware load balancer is a device that directs computers to individual servers in a network on the basis of server performance, server processor utilization, number of connections to the servers. Hardware load balancer device can decrease the chances of submerging a particular server and optimize the bandwidth of each computer or terminal. It also decreases the network downtime, optimizes traffic prioritization, can provide with an end to end application monitoring and user authentication. There are several load balancers devices available in the market like foundry, F5, Cisco, Citrix. ,
  • 9. Software load balancer: Software load balancers are categorized into two parts that are installable load balancers and Load balancer as a service (LBaaS). This types of load balancer must be installed, configured and well managed. Some example of load balancer software is Varnish, HAproxy, Nginx. When it is about installation there is HA proxy. It is a TCP and HTTP based load balancer which can be suitable for high traffic. Software-defined load balancers not easy to provision but there are scalable, programmable and reliable. Web Werks delivers best load balancing solutions mainly website who deals with High traffic. Majority of high traffic website rely on Web Werks to deliver content reliably securely and fast. A software-based load balancer is costs less as compared to hardware-based load balancer with similar abilities. Choosing Web Werks for load balancer service it increases performance, reliability, and efficiency of your website and expands both customer’s satisfaction and returns on IT investment.