background preloader

Haute disponibilité

Facebook Twitter

Haute_dispo_rapport. 4. LVS: Ipvsadm and Schedulers. Ipvsadm is the user code interface to LVS. The scheduler is the part of the ipvs kernel code which decides which realserver will get the next new connection. There are patches for ipvsadm You use ipvsadm from the command line (or in rc files) to setup: - services/servers that the director directs (e.g. http goes to all realservers, while ftp goes only to one of the realservers). Weighting given to each realserver - useful if some servers are faster than others. Horms 30 Nov 2004 The weights are integers, but sometimes they are assigned to an atomic_t, so they can only be 24bits i.e. values so 0 to (2^24-1) should work. scheduling algorithm You use can also use ipvsadm to add services: add a service with weight >0 shutdown (or quiesce) services: set the weight to 0. On the director, the entries for each connection are stored in a hash table (number of buckets set when compiling ipvsadm).

We would like to use LVS in a system where 700Mbit/s traffic is flowing through it. Ratz 22 Nov 2006. Virtual Router Redundancy Protocol. The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork. VRRP provides information on the state of a router, not the routes processed and exchanged by that router. Each VRRP instance is limited, in scope, to a single subnet. It does not advertise IP routes beyond that subnet or affect the routing table in any way.

Implementation[edit] A virtual router must use 00-00-5E-00-01-XX as its Media Access Control (MAC) address. Routers have a priority of between 1-255 and the router with the highest priority will become the master. The default priority is 100 for backups and 255 for a master. Elections of master routers[edit] Backup router(s) are only supposed to send multicast packets during an election process. History[edit] See also[edit] Modèle OSI. Un article de Wikipédia, l'encyclopédie libre. Histoire[modifier | modifier le code] Le Modèle OSI a été conçu dans les années 1970, sur fond de rivalités entre trois architectures de conceptions différentes : la DSA lancée par CII-Honeywell-Bull innove dans l'informatique distribuée en mettant en avant les mini-ordinateurs Mitra 15 puis Mini 6, tandis que Decnet, de DEC, et SNA d'IBM donnent une plus grande place au site central, contrôlant l’ensemble des ressources matérielles et logicielles, les utilisateurs y accédant pour une "session" via des terminaux passifs.

Hubert Zimmermann, recruté en 1971 à l'IRIA par Louis Pouzin pour développer le Datagramme, technologie qui suscite un enthousiasme international [1], appuyée par la CII[2]. Aperçu[modifier | modifier le code] Le modèle de baseArchitecture de sécuritéDénomination et adressageCadre général de gestion Le texte de la norme proprement dite est très abstrait car il se veut applicable à de nombreux types de réseaux. Contrôle de flux. Problems with keepalived | Linux Virtual Server.

HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer.