Final Year Defense Presented by Supervised by Design and Development of High Availability Cluster with Load Balancing Md. Zakir Hossain ID: 122-25-249 Department of CSE Dr. Syed Akhter Hossain Professor & Head Department of CSE Sunday 3 November 2013
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Final Year Defense
Presented byPresented by Supervised bySupervised by
Design and Development of High Availability Cluster with Load Balancing
Md. Zakir HossainID: 122-25-249
Department of CSE
Dr. Syed Akhter HossainProfessor & Head
Department of CSE
Sunday 3 November 2013
Final Year Defense
Index
• Introduction• What is High Availability Cluster?• Uses of HAC• Design of HAC• What is Load Balancer?• Types of Load Balancer• Uses of Load Balancer• Design of Load Balancer• Proposed Project Design• Load Balancing Technique• Round-Robin Algorithm• Testing of HAC and Load Balancer• References
2
Final Year Defense
Introduction
It’s a fact of life server don’t run forever. Hardware components can fail. Software can crash. Systems are shutdown for upgrades and maintenance. Whatever the reason, when a server goes down, the applications and the business process that depend on those applications stop. That’s why companies everywhere are turning to high availability clusters allow the application and business process to resume operation quickly despite the failure of a server and ensure business is not interrupted.
3
Final Year Defense
What is High Availability Cluster?
High Availability clusters are simple in principle. Two or more servers are joined or clustered together to back each other up. If the primary server goes down, the clustering system restart the application on one of the other server in the cluster, allowing the business to continue operating normally. The servers are connected using a network or serial interface so they can communicate with each other. With this kind of clustering there is no need to modify the application.
4
Final Year Defense
Uses of High Availability Cluster
• HA clusters are often used for critical databases• File sharing on a network• Business applications• Customer services such as electronic
commerce websites.
5
Final Year Defense
Design of High Availability Cluster
6
Final Year Defense
What is Load Balancing?
Load balancing is a computer networking method for distributing workloads
across multiple computers or a computer cluster, network links, central
processing units, disk drives, or other resources. Successful load balancing
optimizes resource use, maximizes throughput, minimizes response time, and
avoids overload. Using multiple components with load balancing instead of a
single component may increase reliability through redundancy. Load
balancing is usually provided by dedicated software or hardware, such as
a multilayer switch or a Domain Name System server Process.
7
Final Year Defense
Types of Load Balancing
There are two types of load balancing available in the market that is:•Hardware– Example: Cisco, Barracuda, Loadbalancer,
ClusterScale etc.
•Software– Example: LVS, HAproxy, Varnish, Nginx,
Ultramonkey etc.
8
Final Year Defense
Uses of Load Balancer
• Balancing the load of one or more local servers
• Balancing load across globally-distributed servers
• Fault tolerance• Distributed the workload
9
Final Year Defense
Design of Load Balancing
10
Final Year Defense
Proposed Project Design
11
Final Year Defense
Load Balancing Technique
There are many kinds of load balancing method such as.1.Round-Robin2.Weighted Round-Robin3.Least-Connection4.Weighted Least-ConnectionI will apply Round-Robin algorithm because it will utilize maximum resource for load Balancing.
12
Final Year Defense
Round-Robin Algorithm
13
Final Year Defense
Serve by Active Node
14
Final Year Defense
Serve by Backup Node
15
Final Year Defense
Load Balance Testing
16
Final Year Defense
References[1] High Availability at http://www.linuxvirtualserver.org/HighAvailability.html last access on 01-09-2013[2] Load Balancing at http://en.wikipedia.org/wiki/Load_balancing_(computing) last access on 01-09-2013[3] Schedule Algorithm at http://www.linuxvirtualserver.org/docs/scheduling.html last access on 01-09-2013[4] Process Scheduling at http://en.wikipedia.org/wiki/Round-robin_scheduling last access on 01-09-2013[5] Deployment List at http://www.linuxvirtualserver.org/deployment.html last access on 02-09-2013[6] Red Hat Enterprise Linux at http://en.wikipedia.org/wiki/Red_Hat_Enterprise_Linux last access on 02-09-2013[7] Linux Virtual Server at http://www.linuxvirtualserver.org/docs/ha/piranha.html last access on 02-09-2013[8] Apache at http://en.wikipedia.org/wiki/Apache_HTTP_Server last access on 02-09-2013[9] PHP at http://en.wikipedia.org/wiki/PHP last access on 03-09-2013[10] Storage Area Network at http://en.wikipedia.org/wiki/Storage_area_network last access on 03-09-2013[11] Secure Shell at http://en.wikipedia.org/wiki/Secure_Shell last access on 03-09-2013[12] Network Time Protocol at http://en.wikipedia.org/wiki/Network_Time_Protocol last access on 03-09-2013[13] arptables8 at http://www.linuxcommand.org/man_pages/arptables8.html last access on 03-09-2013[14] Putty at http://en.wikipedia.org/wiki/PuTTY last access on 03-09-2013[15] Command Prompt at http://en.wikipedia.org/wiki/Command_Prompt last access on 04-09-2013[16] CURL at http://en.wikipedia.org/wiki/CURL last access on 04-09-2013[17] Web Browser at http://en.wikipedia.org/wiki/Web_browser last access on 04-09-2013[18] Low Orbit Ion Cannon at http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon last access on 04-09-2013[19] 10 things you should do to secure apache at http://www.techrepublic.com/blog/10-things/10-things-you-should-do-to-secure-apache/ last access on 22-10-2013[20] Load Balancing Vendors at http://loadbalancer.biz/vendors.html last access on 27-09-2013