halb

18
Final Year Defense Presented by Supervised by Design and Development of High Availability Cluster with Load Balancing Md. Zakir Hossain ID: 122-25-249 Department of CSE Dr. Syed Akhter Hossain Professor & Head Department of CSE Sunday 3 November 2013

Upload: hard-target

Post on 18-Aug-2015

59 views

Category:

Documents


0 download

TRANSCRIPT

Final Year Defense

Presented byPresented by Supervised bySupervised by

Design and Development of High Availability Cluster with Load Balancing

Md. Zakir HossainID: 122-25-249

Department of CSE

Dr. Syed Akhter HossainProfessor & Head

Department of CSE

Sunday 3 November 2013

Final Year Defense

Index

• Introduction• What is High Availability Cluster?• Uses of HAC• Design of HAC• What is Load Balancer?• Types of Load Balancer• Uses of Load Balancer• Design of Load Balancer• Proposed Project Design• Load Balancing Technique• Round-Robin Algorithm• Testing of HAC and Load Balancer• References

2

Final Year Defense

Introduction

It’s a fact of life server don’t run forever. Hardware components can fail. Software can crash. Systems are shutdown for upgrades and maintenance. Whatever the reason, when a server goes down, the applications and the business process that depend on those applications stop. That’s why companies everywhere are turning to high availability clusters allow the application and business process to resume operation quickly despite the failure of a server and ensure business is not interrupted.

3

Final Year Defense

What is High Availability Cluster?

High Availability clusters are simple in principle. Two or more servers are joined or clustered together to back each other up. If the primary server goes down, the clustering system restart the application on one of the other server in the cluster, allowing the business to continue operating normally. The servers are connected using a network or serial interface so they can communicate with each other. With this kind of clustering there is no need to modify the application.

4

Final Year Defense

Uses of High Availability Cluster

• HA clusters are often used for critical databases• File sharing on a network• Business applications• Customer services such as electronic

commerce websites.

5

Final Year Defense

Design of High Availability Cluster

6

Final Year Defense

What is Load Balancing?

Load balancing is a computer networking method for distributing workloads

across multiple computers or a computer cluster, network links, central

processing units, disk drives, or other resources. Successful load balancing

optimizes resource use, maximizes throughput, minimizes response time, and

avoids overload. Using multiple components with load balancing instead of a

single component may increase reliability through redundancy. Load

balancing is usually provided by dedicated software or hardware, such as

a multilayer switch or a Domain Name System server Process.

7

Final Year Defense

Types of Load Balancing

There are two types of load balancing available in the market that is:•Hardware– Example: Cisco, Barracuda, Loadbalancer,

ClusterScale etc.

•Software– Example: LVS, HAproxy, Varnish, Nginx,

Ultramonkey etc.

8

Final Year Defense

Uses of Load Balancer

• Balancing the load of one or more local servers

• Balancing load across globally-distributed servers

• Fault tolerance• Distributed the workload

9

Final Year Defense

Design of Load Balancing

10

Final Year Defense

Proposed Project Design

11

Final Year Defense

Load Balancing Technique

There are many kinds of load balancing method such as.1.Round-Robin2.Weighted Round-Robin3.Least-Connection4.Weighted Least-ConnectionI will apply Round-Robin algorithm because it will utilize maximum resource for load Balancing.

12

Final Year Defense

Round-Robin Algorithm

13

Final Year Defense

Serve by Active Node

14

Final Year Defense

Serve by Backup Node

15

Final Year Defense

Load Balance Testing

16

Final Year Defense

References[1] High Availability at http://www.linuxvirtualserver.org/HighAvailability.html last access on 01-09-2013[2] Load Balancing at http://en.wikipedia.org/wiki/Load_balancing_(computing) last access on 01-09-2013[3] Schedule Algorithm at http://www.linuxvirtualserver.org/docs/scheduling.html last access on 01-09-2013[4] Process Scheduling at http://en.wikipedia.org/wiki/Round-robin_scheduling last access on 01-09-2013[5] Deployment List at http://www.linuxvirtualserver.org/deployment.html last access on 02-09-2013[6] Red Hat Enterprise Linux at http://en.wikipedia.org/wiki/Red_Hat_Enterprise_Linux last access on 02-09-2013[7] Linux Virtual Server at http://www.linuxvirtualserver.org/docs/ha/piranha.html last access on 02-09-2013[8] Apache at http://en.wikipedia.org/wiki/Apache_HTTP_Server last access on 02-09-2013[9] PHP at http://en.wikipedia.org/wiki/PHP last access on 03-09-2013[10] Storage Area Network at http://en.wikipedia.org/wiki/Storage_area_network last access on 03-09-2013[11] Secure Shell at http://en.wikipedia.org/wiki/Secure_Shell last access on 03-09-2013[12] Network Time Protocol at http://en.wikipedia.org/wiki/Network_Time_Protocol last access on 03-09-2013[13] arptables8 at http://www.linuxcommand.org/man_pages/arptables8.html last access on 03-09-2013[14] Putty at http://en.wikipedia.org/wiki/PuTTY last access on 03-09-2013[15] Command Prompt at http://en.wikipedia.org/wiki/Command_Prompt last access on 04-09-2013[16] CURL at http://en.wikipedia.org/wiki/CURL last access on 04-09-2013[17] Web Browser at http://en.wikipedia.org/wiki/Web_browser last access on 04-09-2013[18] Low Orbit Ion Cannon at http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon last access on 04-09-2013[19] 10 things you should do to secure apache at http://www.techrepublic.com/blog/10-things/10-things-you-should-do-to-secure-apache/ last access on 22-10-2013[20] Load Balancing Vendors at http://loadbalancer.biz/vendors.html last access on 27-09-2013

17

Final Year Defense

Thanks to All

18