Lesson 2 Load Balancing
Lesson 2 Load Balancing
Cloud Computing
• Hardware load-balancers
• On the other hand, open source load balancers provide best-in-class performance and
multiple deployment options, including both cloud and on-prem support. In addition,
popular open source software projects have the advantage of large communities driving
their use.
• This is especially useful for crucial components such as load balancers, making it easy to
build a production-ready setup using established best practices and community knowledge.
• The decisions can be based strictly on flow counts or they can be based on
knowledge of application.
• For some protocols, like FTP, you have to have knowledge of protocol to correctly
load-balance (i.e., control and data connection must go to same physical server).
• As a result, servers with less capacity may overload and fail more
quickly while capacity on other servers lie idle.
If the underlying load balancing algorithm is Round Robin, if the new request to which server the request will be
forwarded?
Yes, To Server A. Now from here, we can see loads on server A to pile up and server A resources may be
exhausted quickly. By Dr. Gaddisa Olani ([email protected])
least connections Algorithms
• Source IP Hash load balancing uses an algorithm that takes the source
and destination IP address of the client and server to generate a
unique hash key. This key is used to allocate the client to a particular
server. As the key can be regenerated if the session is broken, this
method of load balancing can ensure that the client is directed to the
same server that it was using previously. This is useful if it’s important
that a client should connect to a session that is still active after a
disconnection and reconnection.
Server3
Server3