D-Link DFL-2500 User Guide - Page 284

Server Health Checks

Page 284 highlights

24.2. SLB Implementation 265 1. Round-Robin Algorithm - treats all real servers as having equal capabilities, regardless of other facts, such as the number of existing connections or response time. 2. Connection-Rate Algorithm - redirects a connection to the server with the least number of new connections in a predefined time span. An array inside the firewall saves the number of new connections per second for each server. It updates every second to remove old connection counting values. The Round-Robin Algorithm is suitable when the real servers within the server farm have equal processing powers, while using Connection-Rate Algorithm can optimize the response time. Regardless which algorithm is chosen, if a server goes down, traffic will be sent to other servers. And when the sever comes back online, it can automatically be placed back into the server farm and start getting requests again. 24.2.3 Server Health Checks Performing various checks to determine the "health" condition of servers is one of the most important benefits of the SLB. At different OSI layers, D-Link firewalls can carry out certain network-level checks. When a server fails, the firewall removes it from the active server list, and will not route any packet to this server until it resumes back. An ICMP Destination Host Unreachable message will be sent by the firewall once the active server list is empty. ICMP Ping At OSI layer 3, the check involves a Ping to the real server's IP address to see whether the server is up and running. TCP Connection At OSI layer 4, the firewall attempts to connect to a configured port of the server where an application is running. For example, if the server is running web application (HTTP) on port 80, the firewall will try to establish a connection to bind to that port. It sends a TCP SYN request to port 80 on that server and waits for a TCP SYN/ACK in return; if failing, it marks the port 80 to be down on that server. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

24.2. SLB Implementation
265
1.
Round-Robin Algorithm
– treats all real servers as having equal
capabilities, regardless of other facts, such as the number of existing
connections or response time.
2.
Connection-Rate Algorithm
– redirects a connection to the server
with the least number of new connections in a predefined time span.
An array inside the firewall saves the number of new connections per
second for each server. It updates every second to remove old
connection counting values.
The
Round-Robin Algorithm
is suitable when the real servers within the
server farm have equal processing powers, while using
Connection-Rate
Algorithm
can optimize the response time.
Regardless which algorithm is chosen, if a server goes down, traffic will be
sent to other servers. And when the sever comes back online, it can
automatically be placed back into the server farm and start getting requests
again.
24.2.3
Server Health Checks
Performing various checks to determine the ”health” condition of servers is
one of the most important benefits of the SLB. At different OSI layers,
D-Link firewalls can carry out certain network-level checks.
When a server fails, the firewall removes it from the active server list, and
will not route any packet to this server until it resumes back. An
ICMP
Destination Host Unreachable message
will be sent by the firewall once the
active server list is empty.
ICMP Ping
At OSI layer 3, the check involves a
Ping
to the real server’s IP address to
see whether the server is up and running.
TCP Connection
At OSI layer 4, the firewall attempts to connect to a configured port of the
server where an application is running. For example, if the server is running
web application (HTTP) on port 80, the firewall will try to establish a
connection to bind to that port. It sends a TCP SYN request to port 80 on
that server and waits for a TCP SYN/ACK in return; if failing, it marks
the port 80 to be down on that server.
D-Link Firewalls User’s Guide