Brocade Communications Systems ServerIron ADX 12.4.00 Service Manual Page 67

  • Download
  • Add to my manuals
  • Print
  • Page
    / 136
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 66
ServerIron ADX Advanced Server Load Balancing Guide 55
53-1002435-01
Other TCS options
2
"AND" the destination IPv6 address and destination IPv6 mask to get 16 1-byte values: d1, d2
... d15, d16
"AND" the source IP address and source IP mask to get 16 1-byte values: s1, s2 ... s15, s16
Add each of the 1-byte values together sequentually: d1 + d2 + ...+ d15 + d16 + s1 + s2 + ... +
s15 + s16. This yields a 1-byte value that is used as the hash value.
This 1-byte hash value is used to map to an entry in the hash table. Each entry maps to an
active cache server.
The ServerIron ADX contains 256 hash slots. If you do not assign weights to the cache servers
(refer to “Setting the cache server weight” on page 61), the software divides the hash slots evenly
among the cache servers. If you assign differing weights to the cache servers, the software assigns
hash slots to the cache servers based on the ratios of their relative weights.
The hashing feature allows the switch to spread the traffic across the caches and minimizes
duplicate data on the cache servers.
If all the cache servers become unavailable, traffic flows across the switch at Layer 2 and users go
directly out to the Internet. The ServerIron ADX does not drop the traffic.
To change the hash-mask use the following command.
For IPv4
ServerIronADX(config)# server cache-group 1
ServerIronADX(config-tc-1)# hash-mask 255.255.255.0 255.255.0.0
For IPv6
ServerIronADX(config)# server cache-group 1
ServerIronADX(config-tc-1)# hash-mask ffff:ffff:ffff:ffff:: ffff:ffff:ffff::
Syntax: hash-mask { <IPv4-destination-mask> <IPv4-source-mask> | <IPv6-destination-mask>
<IPv6-source-mask> }
The <IPv4-destination-mask> <IPv4-source-mask> variables specify the IPv4 destination and
source masks to be used for the distribution algorithm.
The <IPv6-destination-mask> <IPv6-source-mask> variables specify the IPv6 destination and
source masks to be used for the distribution algorithm.
Table 4 shows other examples of how the hash masks work.
TABLE 4 Example TCS hash masks (IPv4+IPv6)
Destination mask Source mask Destination IP address Source IP address Cache server
255.255.255.0 0.0.0.0 125.24.32.12 Any C1
125.24.32.210 Any C1
125.24.33.210 Any C2
125.24.34.210 Any C3
255.255.255.192 0.0.0.0 125.24.32.12 Any C1
125.24.32.70 Any C2
125.24.32.190 Any C3
Page view 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 135 136

Comments to this Manuals

No comments