Network Load Balancing Addressing

Slides:



Advertisements
Similar presentations
Internetworking II: MPLS, Security, and Traffic Engineering
Advertisements

RIP V1 W.lilakiatsakun.
Module 9: Installing and Configuring Network Load Balancing
Basic IP Traffic Management with Access Lists
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
Module 8: Concepts of a Network Load Balancing Cluster
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Module 8: Concepts of a Network Load Balancing Cluster
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Lesson 1: Configuring Network Load Balancing
Lesson 9: Creating and Configuring Virtual Networks
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
(ITI310) By Eng. BASSEM ALSAID SESSIONS 8: Network Load Balancing (NLB)
Internet Setup in Microsoft Windows Windows Layering Bindings Adding Adapters, Protocols, and Clients TCP/IP Configuration.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Hands-on Networking Fundamentals
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
© 2002, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Module 9: Installing and Configuring Network Load Balancing.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Enabling Port Security
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
© 2002 Global Knowledge Network, Inc. All rights reserved. Windows Server 2003 MCSA and MCSE Upgrade Clustering Servers.
Microsoft Windows XP Professional
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
CCNA3 v3 Module 4 v3 CCNA 3 Module 4 JEOPARDY K. Martin.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Chapter TCP/IP in the Windows Environment © N. Ganesan, Ph.D., All rights reserved.
Chapter Overview Understanding Windows Name Resolution Using WINS.
Lab A: Planning an Installation
(ITI310) SESSIONS 8: Network Load Balancing (NLB)
MAC Address Tables on Connected Switches
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Module 8: Networking Services
Selecting Unicast or Multicast Mode
Wlbs.exe Commands The Wlbs.exe program operates on Network Load Balanced hosts or on any remote computer running Windows 2000 that accesses the cluster.
Network Load Balancing
Module 8: Concepts of a Network Load Balancing Cluster
Managing IP Traffic with ACLs
Network Load Balancing Topology
Network Cards Server clusters use a variety of networks to communicate with other nodes and with clients.
Load Weighting and Priority
Introduction to Networks
Chapter 2: Basic Switching Concepts and Configuration
Virtual LANs.
Chapter 9 Objectives Understand TCP/IP Protocol.
Ethernet : Framing and Addressing
Chapter 2: Static Routing
Examining IP Addressing
Multicasting Unicast.
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Network Load Balancing Addressing After you have enabled Network Load Balancing, you configure its parameters by using the Properties dialog box.

After you have enabled Network Load Balancing, you configure its parameters by using the Properties dialog box. The Network Load Balancing cluster is assigned a primary Internet Protocol address. This IP address represents a virtual IP address to which all of the cluster hosts respond and the remote control program that is provided with Network Load Balancing uses this IP address to identify a target cluster.

Primary IP Address The primary IP address is the virtual IP address of the cluster and must be set identically for all hosts in the cluster. You can use the virtual IP address to address the cluster as a whole. The virtual IP address is also associated with the Internet name that you specify for the cluster.

Dedicated IP Address You can also assign each cluster host a dedicated IP address for network traffic that is designated for that particular host only. Network Load Balancing never load-balances the traffic for the dedicated IP addresses, it only load-balances incoming traffic from all IP addresses other than the dedicated IP address. When you configure the Network Load Balancing driver, it is important to enter the dedicated IP address, the primary IP address, and other optional virtual IP addresses into the TCP/IP Properties dialog box. Entering the virtual IP addresses into the Properties dialog box will enable the host’s TCP/IP stack to respond to these IP addresses.

Distribution of Traffic Within the Cluster When the virtual IP address is resolved to the station address (MAC address), this MAC address is common for all hosts in the cluster. You can enable client connections to only the required cluster host when more packets are sent. The responding host then substitutes a different MAC address for the inbound MAC address in the reply traffic. The substitute MAC address is referred to as the Source MAC address. The table shows the MAC addresses that will be generated for a cluster adapter.

IP Mode MAC Address Explanation Unicast inbound 02-BF-W-X-Y-Z W-X-Y-Z = IP address Onboard MAC disabled Multicast inbound 03-BF-W-X-Y-Z W-X-Y-Z = IP Address Onboard MAC enabled Source outbound 02-P-W-X-Y-Z P = Host Priority

In the unicast mode of operation, the Network Load Balancing driver disables the onboard MAC address for the cluster adapter. You cannot use the dedicated IP address for interhost communications, because all of the hosts have the same MAC address. In multicast mode of operation, the Network Load Balancing driver supports both the onboard and the multicast address. If your cluster configuration will require connections from one cluster host to another, for example, when making a NetBIOS connection to copy files, use multicast mode or install a second network interface card (NIC).

If the cluster hosts were attached to a switch instead of a hub, the use of a common MAC address would create a conflict because layer-2 switches expect to see unique source MAC addresses on all switch ports. To avoid this problem, Network Load Balancing uniquely modifies the source MAC address for outgoing packets; a cluster MAC address of 02-BF-1-2-3-4 is set to 02-p-1-2-3-4, where p is the host’s priority within the cluster. This technique prevents the switch from learning the cluster’s inbound MAC address, and as a result, incoming packets for the cluster are delivered to all of the switch ports. If the cluster hosts are connected to a hub instead of to a switch, you can disable Network Load Balancing’s masking of the source MAC address in unicast mode to avoid flooding upstream switches. You disable Network Load Balancing by setting the Network Load Balancing registry parameter MaskSourceMAC to 0. The use of an upstream level three switch will also limit switch flooding.

The unicast mode of Network Load Balancing induces switch flooding to simultaneously deliver incoming network traffic to all of the cluster hosts. Also, when Network Load Balancing uses multicast mode, switches often flood all of the ports by default to deliver multicast traffic. However, the multicast mode of Network Load Balancing gives the system administrator the opportunity to limit switch flooding by configuring a virtual LAN within the switch for the ports corresponding to the cluster hosts.