Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Load Balancing Strategies

8

Flashcards

0/8

Still learning
StarStarStarStar

Weighted Round Robin

StarStarStarStar

Approach: Assigns a weight to each server based on its capacity or average response time, then distributes requests in accordance. Suitable Scenarios: Useful when server capacities vary and requests should be allocated proportional to server performance.

StarStarStarStar

Random

StarStarStarStar

Approach: Selects a server at random for each incoming request. Suitable Scenarios: Good for small and uniformly performing server clusters, or when other strategies introduce too much overhead.

StarStarStarStar

IP Hash

StarStarStarStar

Approach: Uses a hash of the client's IP address to determine which server receives the request, ensuring session persistence. Suitable Scenarios: Beneficial for maintaining user session consistency across requests.

StarStarStarStar

Least Time

StarStarStarStar

Approach: Combines the Least Connections method with a dynamic server response time calculation, directing to the server with the lowest time. Suitable Scenarios: Good for when rapid response time is crucial and server load needs consideration.

StarStarStarStar

Least Connections

StarStarStarStar

Approach: Directs new requests to the server with the fewest active connections. Suitable Scenarios: Effective when request load is highly variable and servers have similar capacities.

StarStarStarStar

Weighted Least Connections

StarStarStarStar

Approach: Similar to Least Connections but considers server capacity; directs new requests to the server with the lowest ratio of active connections to server weight. Suitable Scenarios: Ideal for when server capacities differ significantly and systems experience uneven request loads.

StarStarStarStar

Round Robin

StarStarStarStar

Approach: Distributes incoming requests evenly across all servers in a circular order. Suitable Scenarios: Simple and optimal for equal distribution when requests require similar processing time.

StarStarStarStar

Source Hashing

StarStarStarStar

Approach: Uses a hash of the client's source address to consistently route their requests to the same server, typically used to maintain client state. Suitable Scenarios: Used when the system must ensure consistency for clients with sessions that need to be stickily managed.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.