`
`.st0{fill:#87E826;} .st1{fill:#FFFFFF;}
`
`DATA CENTERS
`
`(cid:56)(cid:81)(cid:71)(cid:72)(cid:85)(cid:4235)(cid:68)(cid:81)(cid:71)(cid:76)(cid:81)(cid:74)(cid:3)(cid:86)(cid:72)(cid:85)(cid:89)(cid:72)(cid:85)(cid:3)(cid:79)(cid:82)(cid:68)(cid:71)(cid:3)(cid:69)(cid:68)(cid:79)(cid:68)(cid:81)(cid:70)(cid:76)(cid:81)(cid:74)
`
`Getting your servers up to optimal stability and reliability is the most important issue of network
`administrators. Load balancing is one method of achieving a higher degree of efficiency, and
`Deb Shinder helps you to understand this concept.
`
`By Deb Shinder | September 11, 2001, 12:00 AM PST
`
`0
`
`Load balancing is a favorite buzzword (or in this case, buzz phrase) among IT professionals at the
`enterprise level and a favorite “feature” for selling new technologies. Nonetheless, many network
`administrators don’t really understand what it is and how it works. In this Daily Drill Down, I will provide
`an overview of how load balancing can increase the efficiency of your network servers and discuss
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`1
`
`GOOGLE 1015
`
`
`
`Understanding server load balancing - TechRepublic
`
`some of the options available for implementing load balancing on your network.
`
`What is load balancing?
`The concept of load balancing is a simple one: spreading the work that a computer needs to do
`across multiple machines. However, the implementation of this idea can be quite complex. A number
`of vendors offer load balancing solutions that are implemented in different ways. You may have heard
`about Windows Load Balancing Service (WLBS), Network Load Balancing (NLB), Component Load
`Balancing (CLB), and other similar terms. In this Daily Drill Down, I will address the broad term server
`load balancing, which can encompass all of the above and more.
`
`Load balancing and server clustering
`One way to distribute the workload is to use server clustering. A server cluster consists of two or more
`servers that operate and are managed as if they were a single entity. The servers must be able to
`access one another’s disk data. Special software (such as MSCS, Microsoft Cluster Server) is used to
`manage the systems, automatically detect the failure of one system, and provide failover/recovery.
`
`Server clusters are sometimes called server farms. In some implementations, the servers have
`individual operating systems, while in others they share an operating system. Large Web sites such
`as Yahoo use multiple servers in a Web farm to handle the huge volume of traffic.
`
`Hardware vs. software implementations
`Operating systems such as Windows NT/2000 and Red Hat’s High Availability Linux Server provide
`software-based load balancing, and there are also software packages such as Resonate. Many
`vendors also make hardware devices based on switching technology that include load balancing
`functionality.
`
`Load balancing switches and routers, such as those made by Cisco, Radware, Foundary, Alteon, and
`other vendors, use a variety of algorithms to distribute TCP/IP requests among a group of servers.
`Load balancing switches are also often referred to as content switches and content directors.
`
`Early load balancing solutions used a DNS round-robin algorithm; more recent methods include least
`connections and fastest response algorithms.
`
`Loadbalancing.net
`For links to resources and vendors for both software and hardware load balancing solutions, as well
`as numerous articles on specific implementations, see Loadbalancing.net.
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`2
`
`
`
`Understanding server load balancing - TechRepublic
`
`Advantages of server load balancing and clustering
`Load balancing and clustering are part of High Availability (HA) strategy. Having two or more
`computers handle the workload increases performance (speeding up the process), and the
`redundancy also provides fault tolerance; if one of the machines goes down, the other can still
`continue to function. Clients see the group of servers as a single virtual server, with one IP address.
`
`There are three big advantages of clustering servers to provide load balancing:
`Easier and more flexible management: With clustering software, administrators can move the
`workload onto particular servers within a cluster (for example, to update a server without impacting
`accessibility of data and services to clients).
`Uninterrupted availability and fault tolerance: If a server fails, clustering software detects the failure
`and fails over to a remaining server.
`Better scalability: Load balancing can be scaled across multiple servers in a cluster. Applications
`that are written to run on server clusters can perform dynamic load balancing.
`
`Load balancing and server clustering technologies are important to enterprise-level networks because
`of the mission-critical nature of servers such as those that provide a Web presence (and often, secure
`transaction services and database access) on the Internet or those that provide applications and data
`on the corporate intranet. Load balancing ensures high availability and little or no downtime for Web,
`proxy, terminal, and VPN servers.
`
`Load balancing servers in a cluster allow companies to scale their network services in conjunction
`with rapid growth so that additional servers can be added to the cluster as network traffic increases.
`Load balancing is usually implemented in conjunction with server clustering. A load balancing cluster
`distributes the load of incoming TCP/IP traffic, while a server cluster provides fault tolerance.
`
`How does server clustering work?
`The servers that are members of a cluster are called hosts or nodes (depending on the vendor of the
`clustering technology). The cluster members are physically connected via network cables and
`programmatically connected via the clustering software.
`
`The clustering software provides:
`A means by which the cluster members can have common access to disk data.
`A means of detecting when a server or application fails.
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`3
`
`
`
`Understanding server load balancing - TechRepublic
`A means of recovering from a failure by shifting the work to the remaining server(s) or restarting
`the application.
`An interface through which the servers in the cluster can be managed as one entity, presenting a
`“single system image.”
`
`It is also useful if the cluster administration software allows you to remotely manage the server cluster.
`
`Sharing disk data access between servers
`There are several different methods that can be used to allow more than one server to have access to
`disk data. These include:
`Shared disk method
`Mirrored disk method
`“Shared nothing” method
`
`The shared disk method was used with the first implementations of server clustering. Software called
`Distributed Lock Manager (DLM) was used to give all servers in the cluster access to all physical
`disks. Shared disk clustering requires SCSI disks (or special cabling and switches) and applications
`that are modified to be aware of the disk sharing. Oracle’s Parallel Server uses shared disks.
`
`With the mirrored disk method, each of the servers in the cluster has its own disks. The data is
`mirrored (an exact copy is written) to the disks on other servers. This requires special software such
`as that made by Veritas, NSI, and Octopus.
`
`“Shared nothing” is a clustering method in which each server has its own disk resources. The
`clustering software transfers the ownership of a disk from one server to another if the server that owns
`the disk fails. An advantage of this method is that applications do not have to be modified. Microsoft
`Cluster Services (MSCS) uses this method.
`
`Detecting server or application failure
`When server clusters are used to provide fault tolerance, there must be a way for the cluster to detect
`when one of its member servers fails (or when an application on the cluster fails). One way, used by
`Microsoft in their clustering solutions, is with software “heartbeats”—messages that are sent on a
`regular basis between nodes. If a server fails, it will cease to emit the periodic heartbeat message,
`and the software will redistribute the workload among the remaining servers.
`
`Understanding failover and failback
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`4
`
`
`
`Understanding server load balancing - TechRepublic
`
`When a failure is detected, recovery involves failover, which is the transition that occurs when a server
`fails and another server(s) picks up its load. In many cases, this transition is transparent to the clients,
`as the applications, file shares, and other resources are restarted by the clustering software at the
`same IP address. If the client is browsing the Web or using some other “stateless” connection type,
`the user may not be aware of the failure at all. The application automatically reconnects after a
`failover. With some client applications, the user may receive a message that the server is unavailable
`and may be required to log back on. When the failed server comes back online, clustering software
`detects its presence and allows it to automatically rejoin the cluster.
`
`After the failed server rejoins the cluster, failback is the process that automatically redistributes the
`workload again to include the newly rejoined server.
`
`Balancing the load
`Depending upon the load balancing implementations, administrators may be able to specify how much
`of the load each host should handle (the weight) or spread the load equally among all hosts in the
`load balancing cluster.
`
`Load balancing can be integrated with other network services such as network address translation
`(NAT). The load sharing network address translation (LSNAT) technology allows for a router to
`intercept client requests directed to a server and select a node in the server pool to which the request
`will be sent, based on the load sharing algorithm.
`
`RFC 2391
`Load sharing using NAT (LSNAT) is discussed in RFC 2391.
`
`Hardware load balancing devices tend to be expensive; you may need to purchase two devices to
`avoid the problem of having a single point of failure, with the second device remaining passive unless
`a failure occurs. Software solutions may be based on a “dispatcher” model in which all incoming
`requests go through one server, the “dispatcher server,” and are then distributed to other servers in
`the cluster. Other software solutions are fully distributed, avoiding the bottleneck that can result from
`the dispatcher model.
`
`Single system image
`The single system image is the user interface that allows administrators to manage all of the cluster
`resources from a central location.
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`5
`
`
`
`Understanding server load balancing - TechRepublic
`
`For example, when you install and configure NLB on a Windows 2000 computer, you can use the
`cluster control utility Wlbs.exe (located in the <systemroot>\System32 folder) to modify load balancing
`parameters (see Figure A).
`
`Figure A
`
`Windows 2000 includes the cluster control utility for managing load balancing clusters.
`
`The cluster control utility can be run on the host servers that are members of the cluster or on any
`other Windows 2000 machine that has access to the cluster over the network (if remote control is
`enabled).
`
`Enabling remote control
`If you enable remote control for your W2K load balancing cluster, you should set a password to
`prevent unauthorized users from gaining access to the cluster. Do this for each host in its NLB
`properties. You should also use a firewall to protect the UDP control ports 1717 and 2504 on the
`cluster IP address, which receive the remote control commands.
`
`Configuration changes to a load balancing server can also be made using the graphical interface on
`the Network Load Balancing (NLB) Properties sheet, as shown in Figure B.
`
`Figure B
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`6
`
`
`
`Understanding server load balancing - TechRepublic
`
`Use the NLB Properties sheet to configure Windows 2000 load balancing servers.
`
`To access the NLB Properties sheet of a Windows 2000 Server, select Settings | Network And Dialup
`Connections | Local Area Connection | Properties, select Network Load Balancing in the list of
`installed network components, and then click the Properties button.
`
`Windows Network Load Balancing
`Microsoft offered the Windows Load Balancing Service (WLBS) for Windows NT 4.0 Enterprise
`Edition to work in conjunction with MSCS. Windows 2000 Advanced Server includes clustering and
`load balancing technology, now called Network Load Balancing (NLB).
`
`Windows NT Load Balancing Service
`WSLB is downloadable from the Microsoft Web site. It allows load balancing clusters of up to 32
`Windows NT servers, using a distributed algorithm to map the workload between cluster nodes.
`
`How NLB works in Windows 2000
`NLB operates as a networking driver in Windows 2000. Microsoft recommends that load balancing
`servers be configured with two network interface cards (NICs). Then NLB can be configured to use
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`7
`
`
`
`Understanding server load balancing - TechRepublic
`one NIC for client-to-cluster traffic, and other network traffic can be handled by the other adapter.
`(This is a best practice for highest performance; however, NLB can be implemented with only one
`NIC.)
`
`One or more virtual IP addresses are assigned to the NLB cluster. All the hosts in the cluster can
`detect network traffic that is addressed to the cluster’s primary IP address. (Each host also has a
`dedicated IP address that is unique to that host, which is used for network traffic that is not associated
`with the cluster.) The NLB driver on each host allows that host to receive a portion of the incoming
`cluster traffic.
`
`NLB maps the incoming clients to cluster hosts based on IP address, port, and other information. The
`NLB filtering algorithm that runs on each host examines incoming TCP/IP packets to determine which
`cluster host will handle each packet.
`
`NLB can operate in either unicast or multicast mode. Unicast mode uses the cluster’s Media Access
`Control (MAC) address. The MAC address of the host computer’s network adapter is not used. In
`multicast mode, both the cluster MAC address and the NIC’s built-in MAC address are used. The
`cluster MAC address is used for client-to-cluster traffic, and the NIC’s MAC address is used for other
`network traffic destined for the individual host, not for the cluster.
`
`Installing and configuring Network Load Balancing in Windows 2000 Advanced Server
`NLB is installed as a networking component, using the Properties dialog box of the server’s local area
`connection (see Figure C).
`
`Figure C
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`8
`
`
`
`Understanding server load balancing - TechRepublic
`
`NLB is installed as a network component on the server’s local area connection.
`
`By default, NLB will be listed in the components list, but its check box will not be checked. To use and
`configure it, check the check box, highlight the selection, and click the Properties button.
`
`Installing load balancing
`If Network Load Balancing has been uninstalled, you can install it by clicking the Install button and
`selecting it from the Service list. You may be prompted to insert the Windows 2000 Advanced Server
`CD or enter a network path to the installation files.
`
`Configuration of NLB involves first setting the cluster parameters on the first tab of the NLB properties
`sheet:
`Install a second NIC, if desired.
`Provide the cluster’s primary IP address in dotted quad format. This is a virtual IP address that is
`the same for all hosts in the cluster.
`Provide the subnet mask for the cluster IP address.
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`9
`
`
`
`Understanding server load balancing - TechRepublic
`Provide a cluster name, which will be the same for all hosts in the cluster. This is a fully qualified
`domain name (cluster.shinder.net, for example), and it must be resolved to the cluster’s primary IP
`address via your DNS server or hosts file.
`A cluster IP address (the MAC address of the NIC that will handle client-to-cluster traffic) will be
`automatically determined by NLB, based on the primary IP address.
`Decide whether to enable multicast support. All hosts must operate in the same mode (unicast or
`multicast). By default, multicast is not enabled.
`Set and confirm a remote password, used to restrict remote access to the cluster via the Wlbs
`cluster control utility.
`Specify whether remote control is allowed. By default, it is disabled.
`
`The second tab of the NLB properties sheet, used to set host parameters, is shown in Figure D.
`
`Figure D
`
`The second step in configuring NLB is to set the host parameters.
`
`To set the host parameters, perform the following:
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`10
`
`
`
`Understanding server load balancing - TechRepublic
`Set a priority ID that defines the host’s unique priority for handling any traffic for TCP and UDP
`ports that aren’t covered by port rules. (Values are 1 to <number of hosts>, and 1 is the highest
`priority.) Each host in the cluster must have a different priority setting.
`Set the initial cluster state for this host. If the Active box is checked, NLB will start and the host will
`join the cluster when Windows 2000 is started. The box is checked by default; if you do not want
`NLB to start when the operating system loads, uncheck it.
`Provide the dedicated IP address that is unique to this host.
`Provide the subnet mask for the dedicated IP address.
`
`The last tab on the NLB properties sheet is used to set port rules, as shown in Figure E.
`
`Figure E
`
`The last step in configuring NLB is to specify port rules.
`
`Port rules are used to control how the cluster traffic for each port is handled. You can choose from
`three filtering methods:
`Multiple hosts: The traffic for this rule will be handled by multiple hosts in the cluster. You can
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`11
`
`
`
`Understanding server load balancing - TechRepublic
`assign a load weight or you can choose to distribute the traffic equally among the hosts.
`Single host: Traffic for the ports designated by this rule will be handled by one host, determined by
`the handling priority.
`Disabled: Network traffic for the port(s) associated with this rule will be blocked. This allows you to
`keep out unwanted traffic.
`
`The affinity setting allows you to determine whether multiple requests from the same client should be
`sent to the same cluster host. The None setting indicates no client affinity (that is, multiple requests
`from a client need not be sent to the same server). Single is used for client affinity; NLB will send
`multiple requests from the same client to the same server. The Class C setting allows you to direct all
`client requests from an entire Class C address range to the same cluster host. Use this when you
`need client affinity and you have clients that use multiple proxy servers to access the cluster (which
`could make it appear as if requests from the same client were coming from different computers). The
`default setting is Single.
`
`Affinity
`Disabling affinity by using the None option improves performance but you’ll need to enable affinity if
`the server host uses cookies or other session state information between connections.
`
`The settings you choose in the NLB Properties sheets will be recorded in the Windows 2000 Registry
`when you click OK.
`
`After you configure NLB properties, you must set up TCP/IP for Network Load Balancing. To do so,
`ensure that the dedicated IP address set in NLB properties is set as the IP address in the TCP/IP
`properties sheet and that the cluster IP address is added under Advanced TCP/IP properties. If the
`cluster uses additional virtual IP addresses (for example, a multihomed Web server), these should
`also be entered in the Advanced settings.
`
`Both IP addresses (dedicated and cluster’s primary address) must be static addresses; you cannot
`have them assigned via DHCP.
`
`Conclusion
`Server load balancing provides a way to improve performance for high traffic server functions and,
`when used in conjunction with server clustering, it provides fault tolerance for your mission-critical
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`12
`
`
`
`Understanding server load balancing - TechRepublic
`network services. In this Daily Drill Down, I have provided an overview of what load balancing and
`server clustering are, how they work, and how to configure a Windows 2000 Advanced Server to use
`NLB.
`
`0
`
`About Deb Shinder
`Debra Littlejohn Shinder, MCSE, MVP is a technology consultant, trainer, and writer who has authored
`a number of books on computer operating systems, networking, and security. Deb is a tech editor,
`developmental editor, and contributor to over 20 add...
`
`Full Bio // Contact // See all of Deb's content // Google+
`
`ADVERTISING
`
`Recommended
`
`Promoted Links
`
`by Taboola
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`13
`
`
`
`Understanding server load balancing - TechRepublic
`
`Benevolent Millionaire Shares New Market Discovery
`Money Morning
`
`New Device Leaves Auto Mechanics Angry
`FIXD
`
`Hollywood Actress Tells All: “I Hope My Story Will Help
`Other Women”
`ActivatedYou
`
`An $89 Raspberry Pi rival that runs full Windows 10 and
`Android
`
`LOG IN TO COMMENT
`
`| Commenting FAQs | Community Guidelines
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`14
`
`
`
`Understanding server load balancing - TechRepublic
`
`Join Discussion
`
`ADD YOUR COMMENT
`
`WHITE PAPERS, WEBCASTS, AND DOWNLOADS
`
`White Papers // From Adobe Systems
`Mobile Learning Leading The Charge
`The learning expectations of today's workers have changed. Traditional classroom and
`eLearning courses have less relevance in today's corporate, fast-paced environment. Our
`research shows that online learning is as effective as -- and in some cases more effective
`than -- classroom learning. Technology enables fast, efficient learning and allows for in-
`depth analysis and problem-based learning. Digital disruption affects the tools, content,
`and delivery methods that make up your...
`
`DOWNLOAD NOW
`
`eBooks // From Microsoft Surface
`(cid:55)(cid:75)(cid:72)(cid:3)(cid:51)(cid:85)(cid:82)(cid:71)(cid:88)(cid:70)(cid:87)(cid:76)(cid:89)(cid:76)(cid:87)(cid:92)(cid:3)(cid:51)(cid:88)(cid:93)(cid:93)(cid:79)(cid:72)(cid:29)(cid:3)(cid:43)(cid:82)(cid:90)(cid:3)(cid:55)(cid:82)(cid:3)(cid:42)(cid:72)(cid:87)(cid:3)(cid:55)(cid:75)(cid:72)(cid:3)(cid:57)(cid:72)(cid:85)(cid:92)(cid:3)(cid:37)(cid:72)(cid:4235)(cid:3)(cid:50)(cid:88)(cid:87)(cid:3)(cid:50)(cid:73)(cid:3)(cid:60)(cid:82)(cid:88)(cid:85)(cid:3)(cid:51)(cid:72)(cid:82)(cid:83)(cid:79)(cid:72)(cid:3)(cid:44)(cid:81)(cid:3)(cid:55)(cid:75)(cid:72)(cid:3)(cid:48)(cid:82)(cid:71)(cid:72)(cid:85)(cid:81)
`Workplace
`
`LEARN MORE
`
`Videos // From Rsam
`(cid:44)(cid:80)(cid:83)(cid:79)(cid:72)(cid:80)(cid:72)(cid:81)(cid:87)(cid:76)(cid:81)(cid:74)(cid:3)(cid:40)(cid:4231)(cid:72)(cid:70)(cid:87)(cid:76)(cid:89)(cid:72)(cid:3)(cid:44)(cid:81)(cid:70)(cid:76)(cid:71)(cid:72)(cid:81)(cid:87)(cid:3)(cid:53)(cid:72)(cid:86)(cid:83)(cid:82)(cid:81)(cid:86)(cid:72)
`
`DOWNLOAD NOW
`
`eBooks // From Kaspersky Lab
`(cid:58)(cid:75)(cid:82)(cid:71)(cid:88)(cid:81)(cid:76)(cid:87)(cid:29)(cid:3)(cid:55)(cid:75)(cid:72)(cid:3)(cid:48)(cid:92)(cid:4235)(cid:72)(cid:85)(cid:92)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:36)(cid:51)(cid:55)
`
`DOWNLOAD NOW
`
`Downloads // From SolarWinds
`Download a free trial of the Network Bandwidth Analyzer Pack from SolarWinds
`
`DOWNLOAD NOW
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`15
`
`
`
`Understanding server load balancing - TechRepublic
`
`FEATURED CONTENT
`
`EDITOR'S PICKS
`
`Here &
`Everywhere.
`The AT&T network helps
`medical teams collaborate
`better together.
`
`Don’t fear the
`cloud
`Exploring myths and
`misconceptions around
`data in the public cloud
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`16
`
`
`
`Understanding server load balancing - TechRepublic
`
`Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`17
`
`
`
`Understanding server load balancing - TechRepublic
`
`Elon Musk and the cult of Tesla: How a tech startup rattled the auto industry to its core
`
`The truth about MooCs and bootcamps: Their biggest benefit isn't creating more coders
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`18
`
`
`
`Understanding server load balancing - TechRepublic
`
`How Mark Shuttleworth became the first African in space and launched a software revolution
`
`RECOMMENDED
`
`Sponsored Links
`
`by Taboola
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`19
`
`
`
`Understanding server load balancing - TechRepublic
`
`How To Fix Your Fatigue (Do This Every Day)
`Vital Reds Supplement
`
`When Is Debt Consolidation A Good Idea? | Santander Bank
`Santander Bank
`
`FREE NEWSLETTERS, IN YOUR INBOX
`
`Tech News You Can Use
`We deliver the top business tech news stories about the companies, the people, and the products revolutionizing
`the planet.
`
`Delivered Daily
`
`SUBSCRIBE
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`20
`
`
`
`Understanding server load balancing - TechRepublic
`(cid:37)(cid:72)(cid:4235)(cid:3)(cid:82)(cid:73)(cid:3)(cid:87)(cid:75)(cid:72)(cid:3)(cid:58)(cid:72)(cid:72)(cid:78)
`Our editors highlight the TechRepublic articles, galleries, and videos that you absolutely cannot miss to stay current
`on the latest IT news, innovations, and tips.
`
`Delivered Fridays
`
`SUBSCRIBE
`
`Related Ads
`
`1 Recover Passwords
`
`2 Mobile Security
`
`3 Free Spyware Removal
`
`5 Brand New IPhone
`
`6 Anonymous Surfing
`
`7 Malware Removal
`
`4 Cloud Computing Companies
`
`8 Certification Programs
`
`Snapt
`Balancer
`
`Built by people like you, for
`people like you. The ultimate
`load balancer for DevOps.
`
`LATEST FROM TECH PRO RESEARCH
`
`Hiring kit: JavaScript developer
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`21
`
`
`
`Understanding server load balancing - TechRepublic
`
`Windows 10 power tips: Secret shortcuts to your favorite settings
`
`Home usage of company-owned equipment policy
`
`Hiring kit: ecommerce tech analyst
`
`SERVICES
`
`About Us
`
`Membership
`
`Newsletters
`
`RSS Feeds
`
`Site Map
`
`EXPLORE
`
`Blogs
`
`Downloads
`
`TechRepublic Forums
`
`Meet the Team
`
`TechRepublic Academy
`
`Site Help & Feedback
`
`FAQ
`
`Advertise
`
`Reprint Policy
`
`Tech Pro Research
`
`Resource Library
`
`Photos
`
`Videos
`
`© 2017 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Terms of Use | Mobile User
`Agreement
`
`A ZDNet site | Visit other CBS Interactive sites: Select Site
`Select Site
`
`http://www.techrepublic.com/article/understanding-server-load-balancing/[7/26/2017 7:41:53 AM]
`
`22
`
`