Episode - 7 - AWS Interview Q&A Series

Table of contents

No heading

No headings in the article.

1. Define Load Balancing ?

Load balancing is a technique used to distribute a set of tasks or traffic between different servers or machines. It is the process of effective sharing of incoming network traffic through a server farm or pool. The objective of load balancing is to obtain optimal performance and reduce response time.

2. How does the load balancer process work?

Or

Load balancer Techniques?

There are 8 techniques mostly used in Load balancing techniques.

  1. They are round-robin technique
  2. Least connection technique
  3. Weighted least connection technique
  4. Resource-based technique
  5. fastest response time technique
  6. spare nodes technique
  7. source IP hash technique a
  8. URL hash technique.

The round-robin algorithm is the Easiest and the most widely used load balancing technique.'

3. Can you explain the definition of a reverse proxy server?

The reverse proxy server is a characteristic of a load balancing solution that exists behind the firewall in a private network and transmits the client's request to the appropriate main server. It is a mediator for the original customer and server and offers extra protection against security attacks. The reverse proxy server can also help to accelerate the flow between the server and customers.

4. Explain load balancing failover?

Load balancing tipping is a process of tipping from one machine to another when the preceding machine fails. Normally, load balancers that have the core check function can easily detect when a machine has stopped responding. When the machine is no longer running, the load balancer redirects the request sent to the machine to another working machine.

5. Define sticky session load balancing and session affinity?

The sticky session is a load balancing technique that redirects the subsequent request for a specific session to the same machine that maintained the original request for that session. It makes sure that you can associate a single machine with a particular session and that only that machine stores user data. Session affinity is like the sticky session technique. It is the characteristic of the load balancer that allows it to redirect consequential requests from a specific session to the same original machine in the load balancer pool.

6. explain the difference between the weighted load balancing technique and the round-robin load balancing technique?

Weighted load balancing is an algorithm that allows the application servers' response time to determine which application server gets the next request. When using the weighted load balancing technique, you can handle the volume of traffic a specific resource receives. The round-robin technique is the simplest way to share client queries on several servers. The main difference between these techniques lies in the manner in which they allocate applications. While the round-robin technique allows an even distribution of queries, the weighted load balancing method allows you to define distribution queries unequally.

7. Define TCP load balancer?

TCP load balancer is a kind of load balancer that uses the transmission control protocol. The transfer protocol runs at the fourth layer, the transport layer, in an open system interconnect model. The load balancer sends a large amount of reliable data, without mistakes, to IP addresses. TCP load balancer works for applications that do not have HTTP functionality.

8. Benefits of the round-robin load balancing technique?

The main advantage of the balancing technique is that it is simple to understand, manage and apply. It works well when servers have practically similar processing capacities and storage sizes. The round-robin load balancing technique shares the load on the server consistently so that the server can handle high traffic well.

9. How does SSL impact the load balancing process?

SSL stands for Secure Sockets Layer. This is the improved technology to ensure the safety of the Internet connection and protect sensitive details from the acts of cybercriminals. When you use a load balance with the SSL or TLS endpoint, it executes the process at the HTTP level. The load balancer can decrypt the request, extract the information needed to balance the load, and re-encode the request before it is sent to the server.

10. Can you briefly describe the affinity technique of IP addresses for load balancing?

The IP address affinity technique is a popular technique to achieve load balancing. Affinity refers to the load balancer using only one server for a specific user or process. The technique links the IP address of the client to a server node, and that server node sends all requests from the IP address of the client. The technique is very easy to implement because the IP address is available at all times.»

11. Describe the IP address affinity technique for load balancing?

The IP address affinity technique is a popular technique to achieve load balancing. Affinity means that the loadbalancer uses a single server for a specific user or process. The technique connects the client's IP address to a server node, that server node transmits all requests of the client's IP address. The technique is very easy to implement because the IP address is available at all times.»

Did you find this article valuable?

Support Cloudnloud Tech Community by becoming a sponsor. Any amount is appreciated!