Class 6 - Proxies, Load Balancers
Class 6 - Proxies, Load Balancers
Forward Proxies:
- Role: Represents clients to access resources from the internet.
- Usage: Enhances privacy, filters content, and hides client identities.
- Example: Used in corporate networks to control outbound traffic.
Reverse Proxies:
- Role: Represents servers, handles requests on behalf of them.
- Usage: Load balancing, security, caching, SSL termination.
- Example: Used by websites to manage incoming traffic and improve performance.
- Function:
- Forward: Protects clients' identities, filters content.
- Reverse: Offloads servers, enhances security, manages traffic.
- Access:
- Forward: Clients access internet via proxy.
- Reverse: Clients access servers via proxy.
- Visibility:
- Forward: Servers don't know client identities.
- Reverse: Clients don't know server details.
- Location:
- Forward: Typically located in client networks.
- Reverse: Typically located in front of servers.
- Use Cases:
- Forward: Anonymity, content filtering.
- Reverse: Load balancing, security, caching.
- Examples:
- Forward: Used in home networks, corporate setups.
- Reverse: Common for websites, web applications.
Load Balancers:
- Load balancers distribute incoming network traffic across multiple servers to ensure
efficient resource utilization and prevent overload.
- Purpose: Enhance system performance, optimize resource usage, and improve reliability.
Load Balancing Strategies:
Round Robin:
- Distributes traffic equally to each server in a cyclic manner.
- Simple to implement but doesn't consider server load or capacity.
Least Connections:
- Routes traffic to the server with the fewest active connections.
- Suitable for balancing unevenly sized requests.
IP Hash:
- Assigns clients to servers based on their IP addresses.
- Ensures consistent routing for the same client.
Random:
- Randomly selects a server to handle each request.
- Simple but might not ensure even load distribution.