25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The clustering technique dispatches connections to target servers, excluding<br />

failed servers, from a list of target servers that can receive connections. In this<br />

way, the dispatching function avoids routing connections to a server that is not<br />

capable of satisfying such a request.<br />

The clustering technique requires the implementation of equal application<br />

instances running on different machines. If the application, the operating system<br />

with <strong>TCP</strong>/<strong>IP</strong> stack, or the machine fails, the dispatching technique immediately<br />

provides a backup.<br />

A user requesting service from a particular server would no longer address an<br />

application in a particular server but now would address a group of servers. The<br />

connection request is now sent to the dispatcher, who decides to which available<br />

application server it is forwarded. Therefore, users are not aware to which<br />

application server (within the group) they are connected.<br />

The clustering technique requires addresses that refer to groups of applications.<br />

This can be solved through virtual <strong>IP</strong> addresses. A virtual <strong>IP</strong> address (V<strong>IP</strong>A) is<br />

the <strong>IP</strong> address of a group of application servers, for example, a Telnet server.<br />

This V<strong>IP</strong>A is used for a connection request. The dispatcher is the receiver of the<br />

connection request from the user. It selects from a list of available servers a real<br />

server <strong>and</strong> forwards the request to this server.<br />

The process of selecting an available application server may be extended by the<br />

dispatcher by using different kind distribution rules. The distribution of connection<br />

requests will be discussed in the load balancing section.<br />

Another aspect of availability to consider is when the dispatcher fails. In this<br />

case, a backup dispatcher has to be implemented with the same <strong>IP</strong> address so<br />

that users can send their connection requests to the backup dispatcher. A<br />

backup dispatcher also propagates its <strong>IP</strong> address to the network. Therefore,<br />

routers use the new path that directs the user’s connection requests to the<br />

backup dispatcher.<br />

If dispatchers maintain client/server connections, the backup dispatcher has to<br />

take over the currently running connections. A takeback process must be<br />

implemented to return running connections to the primary dispatcher.<br />

Virtualization is also a technique used to provide availability <strong>and</strong> scalability.<br />

Virtualization has similarities to the clustering technique with regards to<br />

transparency shown to the users regarding which physical machine is being<br />

used as well as the there being no impact to the users if a machine is to fail. We<br />

discuss virtualization next.<br />

Chapter 24. Availability, scalability, <strong>and</strong> load balancing 911

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!