Internet Appliances Facts Flashcards
_____ is responsible for ensuring network uptime, security, and access to network resources.
network administrator
Internet appliances can be implemented to help make the network administrator’s job easier by:
-automating tasks
-providing network security
-monitoring the network for potential issues.
Internet appliances can come in two forms:
-One form is an embedded system that contains all hardware and software in one device.
-The other form is software running on a server.
You can use a _____ to monitor the servers and distribute traffic so one server does not get overwhelmed
load balancer
_____ work by reading the information in the packet headers of incoming traffic and using algorithms to determine the best flow of traffic.
Network layer load balancers
Round robin
is the most basic algorithm. the servers handle network requests in sequential order. The load balancer does not monitor each server’s current load, as it assumes the servers can handle each request in the same amount of time.
This can still lead to a server getting overwhelmed.
This algorithm works the same as the round robin, but takes the server’s power into consideration. A more powerful server is sent more traffic than less powerful servers.
Weighted round robin
_____ algorithm looks at the active connections each server is handling and sends the network traffic to the server that currently has the lowest number of connections.
The least connections
Least connections treats each network request equally.
Does not take into account that some requests require more time.
Does not take into account the power of each server.
facts
Example of least connections is
if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.
Example of least connections is
if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.
This algorithm distributes traffic based on the active connections and the processing power of each server.
weighted least connections
This algorithm creates a hash key based on the source and destination IP addresses. The hash key is assigned to a server and all requests for the remainder of the active session are handled by that same server.
Source IP hash
-makes decisions based solely on the data in the packet header which results in a lot of guesswork.
-This can lead to inefficient distribution of traffic between the servers.
network layer load balancer
_____ can distribute traffic based on the content of network packets including the HTTP header, HTTP message, and the session cookies.
application layer load balancer