Добавил:
Я за два дня прошел весь курс ТВиМС Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
!ОСНОВНАЯ КНИГА КУРСА! Chapple M. (ISC)2 CISSP Certified IS...Study Guide 9ed 2021.pdf
Скачиваний:
1
Добавлен:
20.06.2025
Размер:
15.75 Mб
Скачать

Load Balancing

595

such as Twitter, Facebook Messenger, and Snapchat. Others are designed for private or internal use, such as Slack, Discord, Line, Telegram, WeChat, Signal, WhatsApp, Google Chat, Cisco Spark, Zoom, Workplace by Facebook, Microsoft Teams, and Skype. Most of these messaging services are designed with security as a key feature, often employing multifactor authentication and transmission encryption.

Load Balancing

The purpose of load balancing is to obtain more optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading, and eliminate bottlenecks. A load balancer is used to spread or distribute network traffic load across several network links or network devices. Although load balancing can be used in a variety of situations, a common implementation is spreading a load across multiple members of a server farm or cluster. Scheduling or load balancing methods are the means by which a load balancer distributes the work, requests, or loads among the devices behind it. A load balancer might use a variety of scheduling techniques to perform load distribution, as described in Table 12.1.

TABLE 12 . 1   Common load-balancing scheduling techniques

Technique

Description

 

 

Random choice

Each packet or connection is assigned a destination randomly.

Round robin

Each packet or connection is assigned the next destination in order,

 

such as 1, 2, 3, 4, 5, 1, 2, 3, 4, 5, and so on.

Load monitoring

Each packet or connection is assigned a destination based on the

 

current load or capacity of the targets.The device/path with the lowest

 

current load receives the next packet or connection.

Preferencing or

Each packet or connection is assigned a destination based on a

weighted

subjective preference or known capacity difference. For example, sup-

 

pose system 1 can handle twice the capacity of systems 2 and 3; in this

 

case, preferencing would look like 1, 2, 1, 3, 1, 2, 1, 3, 1, and so on.

Least connections/

Each packet or connection is assigned a destination based on the least

traffic/latency

number of active connections, traffic load, or latency.

Locality based (geoEach packet or connection is assigned a destination based on the destinagraphic) tion’s relative distance from the load balancer (used when cluster mem-

bers are geographically separated or across numerous router hops).

Locality based

Each packet or connection is assigned a destination based on previous

(affinity)

connections from the same client, so subsequent requests go to the

 

same destination to optimize continuity of service.

 

 

Соседние файлы в предмете Информационная безопасность автоматизированных систем