halb
TRANSCRIPT
Final Year Defense
Presented byPresented by Supervised bySupervised by
Design and Development of High Availability Cluster with Load Balancing
Md. Zakir HossainID: 122-25-249
Department of CSE
Dr. Syed Akhter HossainProfessor & Head
Department of CSE
Sunday 3 November 2013
Final Year Defense
Index
• Introduction• What is High Availability Cluster?• Uses of HAC• Design of HAC• What is Load Balancer?• Types of Load Balancer• Uses of Load Balancer• Design of Load Balancer• Proposed Project Design• Load Balancing Technique• Round-Robin Algorithm• Testing of HAC and Load Balancer• References
2
Final Year Defense
Introduction
It’s a fact of life server don’t run forever. Hardware components can fail. Software can crash. Systems are shutdown for upgrades and maintenance. Whatever the reason, when a server goes down, the applications and the business process that depend on those applications stop. That’s why companies everywhere are turning to high availability clusters allow the application and business process to resume operation quickly despite the failure of a server and ensure business is not interrupted.
3
Final Year Defense
What is High Availability Cluster?
High Availability clusters are simple in principle. Two or more servers are joined or clustered together to back each other up. If the primary server goes down, the clustering system restart the application on one of the other server in the cluster, allowing the business to continue operating normally. The servers are connected using a network or serial interface so they can communicate with each other. With this kind of clustering there is no need to modify the application.
4
Final Year Defense
Uses of High Availability Cluster
• HA clusters are often used for critical databases• File sharing on a network• Business applications• Customer services such as electronic
commerce websites.
5
Final Year Defense
What is Load Balancing?
Load balancing is a computer networking method for distributing workloads
across multiple computers or a computer cluster, network links, central
processing units, disk drives, or other resources. Successful load balancing
optimizes resource use, maximizes throughput, minimizes response time, and
avoids overload. Using multiple components with load balancing instead of a
single component may increase reliability through redundancy. Load
balancing is usually provided by dedicated software or hardware, such as
a multilayer switch or a Domain Name System server Process.
7
Final Year Defense
Types of Load Balancing
There are two types of load balancing available in the market that is:•Hardware– Example: Cisco, Barracuda, Loadbalancer,
ClusterScale etc.
•Software– Example: LVS, HAproxy, Varnish, Nginx,
Ultramonkey etc.
8
Final Year Defense
Uses of Load Balancer
• Balancing the load of one or more local servers
• Balancing load across globally-distributed servers
• Fault tolerance• Distributed the workload
9
Final Year Defense
Load Balancing Technique
There are many kinds of load balancing method such as.1.Round-Robin2.Weighted Round-Robin3.Least-Connection4.Weighted Least-ConnectionI will apply Round-Robin algorithm because it will utilize maximum resource for load Balancing.
12
Final Year Defense
References[1] High Availability at http://www.linuxvirtualserver.org/HighAvailability.html last access on 01-09-2013[2] Load Balancing at http://en.wikipedia.org/wiki/Load_balancing_(computing) last access on 01-09-2013[3] Schedule Algorithm at http://www.linuxvirtualserver.org/docs/scheduling.html last access on 01-09-2013[4] Process Scheduling at http://en.wikipedia.org/wiki/Round-robin_scheduling last access on 01-09-2013[5] Deployment List at http://www.linuxvirtualserver.org/deployment.html last access on 02-09-2013[6] Red Hat Enterprise Linux at http://en.wikipedia.org/wiki/Red_Hat_Enterprise_Linux last access on 02-09-2013[7] Linux Virtual Server at http://www.linuxvirtualserver.org/docs/ha/piranha.html last access on 02-09-2013[8] Apache at http://en.wikipedia.org/wiki/Apache_HTTP_Server last access on 02-09-2013[9] PHP at http://en.wikipedia.org/wiki/PHP last access on 03-09-2013[10] Storage Area Network at http://en.wikipedia.org/wiki/Storage_area_network last access on 03-09-2013[11] Secure Shell at http://en.wikipedia.org/wiki/Secure_Shell last access on 03-09-2013[12] Network Time Protocol at http://en.wikipedia.org/wiki/Network_Time_Protocol last access on 03-09-2013[13] arptables8 at http://www.linuxcommand.org/man_pages/arptables8.html last access on 03-09-2013[14] Putty at http://en.wikipedia.org/wiki/PuTTY last access on 03-09-2013[15] Command Prompt at http://en.wikipedia.org/wiki/Command_Prompt last access on 04-09-2013[16] CURL at http://en.wikipedia.org/wiki/CURL last access on 04-09-2013[17] Web Browser at http://en.wikipedia.org/wiki/Web_browser last access on 04-09-2013[18] Low Orbit Ion Cannon at http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon last access on 04-09-2013[19] 10 things you should do to secure apache at http://www.techrepublic.com/blog/10-things/10-things-you-should-do-to-secure-apache/ last access on 22-10-2013[20] Load Balancing Vendors at http://loadbalancer.biz/vendors.html last access on 27-09-2013
17