Академический Документы
Профессиональный Документы
Культура Документы
IP traffic
switches
load balancer
database
server nodes
Node
Ext 1
1
LB Node
2
Ext
2 Node
n
Node
Ext 1
1
LB
Node
2
Backend
Ext
2 Node
n
Node
Ext 1
1
LB Node
2
Ext
2 Node
n
The disadvantage is that the scalability of the virtual server via NAT is limited as
all the traffic passes through it.
VIP payload
Node encapsulation
Ext 1
1 srcI VIP payload
P
LB Node Internal
2 network
Ext srcI VIP payload
2 P
Node Decapsulation
n
VIP payload
VIP payload
Direct routing
src VIP payload
MAC
Internal
network
src VIP payload
MAC
Decapsulation
VIP payload
Node
4
Now if an additional node is removed, for the same call, the hash returns node 3.
Node
Ext 1
1
LB Node
2
Ext
2 Node
3
When a request comes to the LB from the outside world and the
routing-function generates 3, which has gray Service Node ID
corresponding to it; then the LB checks to see if the Call ID of the
incoming request exists in the pending calls for the node. If yes, it
sends it to node 2, else it sends it to node 3.
When a response comes to the LB from outside world and the
routing-function generates 3, which has gray Service Node ID
corresponding to it; then the LB checks to see if the Call ID of the
incoming response exists in the pending calls for the node. If yes,
it sends it to node 2, else it sends it to node 3.
So capacity based load balancer nicely spreads the traffic by merely changing the
population of the HashTable, nothing else is changed.