Load balancer

ABSTRACT

According to one embodiment, an apparatus comprises an interface and one or more processors. The interface receives a request for a web page from a web browser. The one or more processors select a subset of web servers from a resource pool according to a load balancing determination. The one or more processors send the request to at least two of the web servers of the subset before receiving any response from the other web servers. Upon receiving one or more responses from distinct web servers, the one or more processors selects a response to communicate to the web browser.

RELATED APPLICATION

This application is a continuation of U.S. application Ser. No. 13/112,682 filed May 20, 2011 and entitled “Load Balancer,” the entire disclosure of which is hereby incorporated by reference.

BACKGROUND

A load balancer may allocate workload to members of a pool of resources. As an example, a load balancer may allocate a request for a web page to a web server selected from a pool of web servers. To balance the workload, the load balancer may select one web server to provide a response to a first request and another web server to provide a response to a second request. By allocating the different requests to different web servers, the load balancer may reduce the likelihood that one of the web servers becomes over-burdened.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example of a system that may be used to provide load balancing;

FIG. 2 illustrates an example of a load balancer that may be used in the system described in FIG. 1;

FIG. 3 illustrates an example of a method for load balancing using unicast messaging; and

FIG. 4 illustrates an example of a method for load balancing using multicast messaging.

DETAILED DESCRIPTION

A load balancer may allocate workload to members of a pool of resources. As an example, a load balancer may allocate a request for a web page to a web server selected from a pool of web servers. To balance the workload, the load balancer may select one web server to provide a response to a first request and another web server to provide a response to a second request. By allocating the different requests to different web servers, the load balancer may reduce the likelihood that one of the web servers becomes over-burdened. It may be better to have more efficient load balancing in order to provide a faster response to the request and/or to determine the likelihood that the response is valid.

Certain embodiments of the invention may provide for efficient and/or effective load balancing. In certain embodiments, a load balancer sends the same request to multiple resources. The load balancer may select a response to the request according to the resource that responds the fastest, according to a confidence level associated with the response, or according to other suitable criteria. In certain embodiments, the confidence level may be determined by comparing a candidate response to one or more other responses received from different resources in response to the same request.

FIG. 1 illustrates an example of a system 10 that may be used to provide load balancing. In the illustrated example, system 10 includes a requestor 20, a network 30, a load balancer 40, and a resource pool 60 comprising a plurality of resources 62 a through 62 n.

In certain embodiments, load balancer 40 receives a request from requestor 20 via network 30. Load balancer 40 may select a subset of resources 62 from resource pool 60 to respond to the request. Each resource 62 a through 62 n may be operable to provide a response to the request. For purposes of illustration, load balancer 40 may select a subset including resources 62 a, 62 b, and 62 c and excluding resources 62 d through 62 n. Load balancer 40 may send the request to the subset of resources 62 a, 62 b, and 62 c. The request may be sent to at least two of resources (e.g., resources 62 a and 62 b) before receiving a response from any of the resources of the subset (e.g., resources 62 a, 62 b, or 62 c). Load balancer 40 may receive one or more responses to the request. Each response may be received from a distinct resource 62. For example, load balancer 40 may receive a first response from resource 62 a, a second response from resource 62 b, and a third response from resource 62 c. Load balancer 40 may select either the first response, the second response, or the third response and may send the selected response to requestor 20.

Requestor 20 may refer to any device that provides requests to which resources 62 may respond. In certain embodiments, requestor 20 may include a computer, workstation, telephone, Internet browser, electronic notebook, Personal Digital Assistant (PDA), pager, or any other suitable device (wireless, wireline, or otherwise), component, or element capable of receiving, processing, storing, and/or communicating information with other components of system 10. Requestor 20 may also comprise any suitable user interface such as a display, microphone, keyboard, or any other appropriate interface. In certain embodiments, requestor 20 may be configured as a client that accesses computing resources via network 30.

Requestor 20 may request resource 62 to provide data and/or to perform an operation. As an example, requestor 20 may comprise a web browser operable to request a web page, and resource 62 may comprise a web server operable to provide the web page to requestor 20. As another example, requestor 20 may request a web service, and resource 62 may comprise a service provider operable to provide a component or perform a function of the web service. As yet another example, requestor 20 may request a DNS lookup for a domain name, and resource 62 may comprise a DNS server operable to provide an identifier, such as an IP address, corresponding to the domain name.

In certain embodiments, network 30 may refer to any interconnecting system capable of transmitting audio, video, signals, data, messages, or any combination of the preceding. Network 30 may include all or a portion of a public switched telephone network (PSTN), a public or private data network, a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a local, regional, or global communication or computer network such as the Internet, a wireline or wireless network, an enterprise intranet, or any other suitable communication link, including combinations thereof.

Resource pool 60 may refer to any suitable grouping of resources 62. As an example, resources 62 may be grouped according to functionality based on the types of requests resources 62 have been configured to process. For example, one resource pool 60 may comprise web servers operable to provide web content, and another resource pool may comprise DNS servers operable to provide address resolution. As another example, resources 62 may be grouped according to the type of requestor 20 resources 62 have been configured to interact with. For example, one resource pool 60 may handle requests associated with external customers of an enterprise and another resource pool may handle requests associated with internal processes of the enterprise. As another example, resources 62 may be grouped according to physical location. A resource pool 60 may include resources located proximate to one another (e.g., resources located in a same datacenter) and/or resources dispersed from one another (e.g., resources located in different datacenters).

Resources 62 comprise any resource operable to respond to requests from requestors 20. In some embodiments, a resource 62 may refer to any suitable combination of hardware and/or software implemented in one or more modules to process data and provide the described functions and operations. In some embodiments, resource 62 may include, for example, a mainframe, server, host computer, workstation, web server, file server, a personal computer such as a laptop, or any other suitable device operable to process data. In some embodiments, resource 62 may execute any suitable operating system such as IBM's zSeries/Operating System (z/OS), MS-DOS, PC-DOS, MAC-OS, WINDOWS, UNIX, OpenVMS, or any other appropriate operating systems, including future operating systems.

FIG. 2 illustrates an example of load balancer 40 that may be used in system 10 described in FIG. 1. In certain embodiments, load balancer 40 may select a subset of resources 62 to forward a request to, receive one or more responses to the request, and select one of the responses to forward to requestor 20.

In certain embodiments, load balancer 40 may include an interface 42, logic 44, memory 46, and/or other suitable element. Interface 42 receives input, sends output, processes the input and/or output, and/or performs other suitable operation. In certain embodiments, interface 42 receives a request from requestor 20 and sends the request to a subset of resources 62. In certain embodiments, interface 42 receives a plurality of responses from resources 62 and sends one of the responses to requestor 20. Interface 42 may comprise hardware and/or software.

Logic 44 performs the operations of the component, for example, logic 44 executes instructions to generate output from input. Logic 44 may include hardware (such as one or more processors 48), software (such as applications 50), and/or other logic. Logic 44 may be encoded in one or more tangible media and may perform operations when executed by a computer. Certain logic 44, such as a processor 48, may manage the method of performing of a component. Examples of a processor 48 include one or more computers, one or more microprocessors, one or more hardware or software applications, and/or other logic.

Applications 50 generally refer to logic, rules, algorithms, code, tables, and/or other suitable instructions for performing the described functions and operations. Examples of applications 50 include a selector 52 and an analyzer 54. Selector 52 selects the subset of resources 62 to send the request to. In certain embodiments, selector 52 may select the number of resources 62 to send the request to and may identify the particular resources 62 to include in the subset. The particular resources 62 may be selected according to a load balancing determination. The load balancing determination may use any suitable load balancing algorithm or combination of algorithms, such as round robin, variable hash, least used resource, and so on. In certain embodiments, the load balancing determination may evaluate health information associated with resources 62. For example, selector 52 may exclude a particular resource 62 from the subset if the health information indicates that resource 62 is overloaded, down, or generating errors.

Analyzer 54 analyzes a plurality of responses received from resources 62 and determines one of the responses to send to requestor 20. In certain embodiments, analyzer 54 may select the response according to a priority characteristic. Examples of priority characteristics include speed and validity. If the priority characteristic corresponds to speed, analyzer 54 may select the first response (i.e., the response received prior to receiving any other response) to send to requestor 20. If the priority characteristic corresponds to validity, load balancer 40 may select the response according to a validity check. As an example, analyzer 54 may select the response if a confidence level associated with the response is greater than a minimum confidence level as further described with respect to FIGS. 3-4 below. In certain embodiments, the priority characteristic may be determined based on the request. For example, the priority characteristic for certain types of requests may correspond to speed, and the priority characteristic for other types of requests may correspond to validity.

In particular embodiments, the operations of the embodiments may be performed by one or more computer readable media encoded with a computer program, software, computer executable instructions, and/or instructions capable of being executed by a computer. In particular embodiments, the operations of the embodiments may be performed by one or more computer readable media storing, embodied with, and/or encoded with a computer program and/or having a stored and/or an encoded computer program.

Memory 46 stores information. Memory 46 may comprise one or more tangible, computer-readable, and/or computer-executable storage medium, and may exclude signals or carrier waves. Examples of memory include computer memory (for example, Random Access Memory (RAM) or Read Only Memory (ROM)), mass storage media (for example, a hard disk), removable storage media (for example, a Compact Disk (CD) or a Digital Video Disk (DVD)), database and/or network storage (for example, a server), and/or other computer-readable medium.

FIG. 3 illustrates an example of a method 300 for load balancing using unicast messaging. At step 302, load balancer 40 receives a request from requestor 20. The request may request the use of a resource 62 to provide data and/or to perform an operation.

Load balancer 40 selects a subset of resources 62 from resource pool 60 at step 304. Each resource 62 may be operable to provide a response to the request. For example, if requestor 20 requests a web page, resource pool 60 may comprise a plurality of web servers operable to provide the requested web page. As another example, if requestor 20 requests a web service, resource pool 60 may comprise a plurality of service providers operable to provide a component or perform a function of the web service to facilitate providing the web service to requestor 20. As yet another example, if requestor 20 requests a domain name look-up, resource pool 60 may comprise a plurality of DNS servers operable to provide an identifier, such as an IP address, corresponding to the domain name.

Load balancer 40 may select any suitable number of resources 62 to include in the subset of resources, such as less than 5 resources, 5 to 10 resources, 10 to 100 resources, greater than 100 resources, or any other number of resources. In certain embodiments, load balancer 40 analyzes a plurality of factors to determine the number of resources to include in the subset. As an example, one of the factors may evaluate the total number of resources in the resource pool. Load balancer 40 may include more resources in the subset if resource pool 60 is relatively large and may include fewer resources in the subset if resource pool 60 is relatively small. As another example, one of the factors may evaluate the current utilization rate of the resources. That is, the number of resources 62 in the subset may be adjusted according to whether the system is experiencing a busy period or an idle period. As yet another example, one of the factors may evaluate the priority of the request. Load balancer 40 may include more resources in the subset if the request is high priority and fewer resources in the subset if the request is low priority.

Load balancer 40 may select the particular resources 62 to include in the subset of resources according to a load balancing determination. The load balancing determination may use any suitable algorithm or combination of algorithms, such as round robin, variable hash, least used resource, and so on. In certain embodiments, the load balancing determination may evaluate health information associated with resources 62. For example, load balancer 40 may exclude a particular resource 62 from the subset if the health information indicates that resource 62 is overloaded, down, or generating errors. In the example illustrated in FIG. 3, load balancer 40 selects resource 62 a and resource 62 b to include in the subset.

Load balancer 40 sends the request to the subset of resources 62 a and 62 b. The request may be sent to at least two resources 62 of the subset before receiving any response from the other resources 62. In other words, load balancer 40 may send the request to a second resource 62 b without waiting for a response from the first resource 62 a. In certain embodiments, load balancer 40 may send the requests using unicast messaging. For example, load balancer 40 may send a first unicast request (a) to resource 62 a in step 306 and a second unicast request (b) to resource 62 b in step 308. In certain embodiments, request (a) and request (b) may request the resources to provide the same data or to perform the same operation. As an example, request (a) may request resource 62 a to provide web page X and request (b) may request resource 62 b to provide the same web page (i.e., web page X).

Load balancer 40 may receive one or more responses to the requests. Each response may be received from a distinct resource 62. For example, resource 62 b may respond to the request in step 310 and resource 62 a may respond to the request in step 312. The response may comprise requested data and/or the result of a requested operation. As an example, the response in step 310 may include web page X and the response in step 312 may also include web page X.

In certain embodiments, a particular resource 62 may choose not to reply to the request. For example, a service level agreement (SLA) may indicate whether or not a particular resource 62 should provide a response based on any suitable criteria, such as the current load of the particular resource 62. In certain embodiments, the request message may indicate whether or not the particular resource 62 may opt out of providing a response in order to ensure that at least one of the resources 62 processes the request. Alternatively, load balancer 40 may resend the request to the same resources 62 or different resources 62 if it fails to receive a response within a pre-determined time period.

At step 314, load balancer 40 determines a response to send to requestor 20. In certain embodiments, load balancer 40 may select the response according to a priority characteristic. Examples of priority characteristics include speed and validity. If the priority characteristic corresponds to speed, load balancer 40 may select the first response (i.e., the response received prior to receiving any other response) to send to requestor 20. In the example illustrated in FIG. 3, the first response corresponds to the response received from resource 62 b in step 310. In certain embodiments, load balancer 40 may minimize delay by selecting the first response and/or communicating the first response to requestor 20 without waiting to receive responses from any other resources.

If the priority characteristic corresponds to validity, load balancer 40 may select the response according to one or more validity checks. An example of a validity check may include reviewing the response for an error code. If load balancer 40 detects the presence of an error code, load balancer 40 may determine not to select that response. In certain embodiments, a protocol that the response is based on may define error codes, such as 4xx and 5xx status codes of the HTTP protocol. Another example of a validity check includes comparing a candidate response to one or more of the other responses. If the candidate response matches a pre-determined number of other responses, load balancer 40 may set the candidate response as the selected response.

As an example, suppose load balancer 40 sent a request for web page X to five resources 62, and that the pre-determined number of responses is set to two. Suppose load balancer 40 receives a first response including web page Y, a second response including web page X, a third response including web page X, and a fourth response including web page X. Suppose the fifth resource 62 fails to provide any response. Load balancer 40 evaluates the first response as the candidate response and determines that web page Y does not match any of the other responses. Thus, load balancer 40 does not select the first response. Load balancer 40 then evaluates the second response as the candidate response. The second response matches two other responses (web page X of the third response and web page X of the fourth response). That is, the second response matches the pre-determined number of other responses, and load balancer 40 determines the second response is likely valid. Accordingly, load balancer 40 sets the second response as the selected response and communicates the second response to requestor 20. In the example, load balancer 40 selected the response once the pre-determined number of responses matched and without having to wait for responses from all of the resources 62 to which load balancer 40 sent the request (e.g., load balancer 40 received no response from the fifth resource 62).

In certain embodiments, load balancer 40 may use the comparison between the candidate response and the other responses to determine a confidence level for the candidate response. In the above example, the confidence level for the first response may be y % because web page Y was included in y % of the responses. The confidence level of the second response may be x % because web page X was included in x % of the responses. In the illustrated example, x % may be equal to (1−y) %. In certain embodiments, load balancer 40 may determine the response to send to requestor 20 according to the confidence level. For example, load balancer 40 may select the response if the confidence level is greater than 50%, 60%, 70%, or other suitable percentage. Load balancer 40 may optionally communicate the confidence level to requestor 20. For example, load balancer 40 may insert the confidence level in a message comprising the selected response. In certain embodiments, the confidence level may be inserted in a header or an extension field of a packet that comprises at least a portion of the selected response.

In certain embodiments, load balancer 40 may generate an indicator indicating that a candidate response comprises an aberration. For example, if the candidate response differs from a pre-determined number of other responses, it may be determined that the candidate response comprises an aberration. In certain embodiments, it may be determined that the candidate response differs from a pre-determined number of other responses based on the confidence level, such as a confidence level less than 50%, 40%, 30%, or other suitable percentage. The indicator provides an identifier identifying the resource 62 that provided the aberrant response. The indicator may indicate that an administrator should check the health of the identified resource 62. Load balancer 40 may optionally wait until the indicator has been cleared before including the identified resource 62 in a subsequent subset of resources 62 selected to process a subsequent request. That is, load balancer 40 may optionally remove the identified resource 62 from resource pool 60 until the indicator has been cleared. In certain embodiments, load balancer 40 may determine whether or not to include the identified resource 62 in resource pool 60 based on the number and/or frequency of aberrant responses associated with the identified resource 62.

In step 316, load balancer 40 communicates the selected response to requestor 20. The method then ends.

FIG. 4 illustrates an example of a method 400 for load balancing using multicast messaging. At step 402, load balancer 40 receives a request from requestor 20. The request may request the use of a resource 62 to provide data and/or to perform an operation. Load balancer 40 selects a subset of resources 62 from resource pool 60 at step 404. Each resource 62 may be operable to provide a response to the request. Load balancer 40 may select any suitable number of resources 62 to include in the subset of resources. In certain embodiments, the subset of resources 62 may be determined according to a load balancing determination. In the example illustrated in FIG. 4, load balancer 40 selects resource 62 b and resource 62 c to include in the subset.

Load balancer 40 sends the request to the subset of resources 62 b and 62 c. The request may be sent to at least two resources 62 of the subset before receiving any response from the other resources 62. In certain embodiments, load balancer 40 may send the requests using multicast messaging. For example, load balancer 40 may send a single multicast request (b,c) simultaneously to resource 62 b and resource 62 c as illustrated in step 406.

Load balancer 40 may receive one or more responses to request 406. Each response may be received from a distinct resource 62. For example, resource 62 b may respond to the request in step 408 and resource 62 c may respond to the request in step 410. The response may comprise requested data and/or the result of a requested operation.

At step 412, load balancer 40 determines a response to send to requestor 20. In certain embodiments, load balancer 40 may select the response according to a priority characteristic. Examples of priority characteristics include speed and validity. If the priority characteristic corresponds to speed, load balancer 40 may select the first response (i.e., the response received prior to receiving any other response) to send to requestor 20. In the example illustrated in FIG. 4, the first response corresponds to the response received from resource 62 b in step 408. In certain embodiments, load balancer 40 may minimize delay by selecting the first response and/or communicating the first response to requestor 20 without waiting to receive responses from any other resources.

If the priority characteristic corresponds to validity, load balancer 40 may select the response according to a validity check. For example, load balancer 40 may compare a candidate response to one or more of the other responses. If the candidate response matches a pre-determined number of other responses, load balancer 40 may set the candidate response as the selected response. In certain embodiments, the candidate response may be determined to match a pre-determined number of other responses if a confidence level associated with the candidate response is greater than a minimum confidence level. In certain embodiments, the pre-determined number of responses and/or the minimum confidence level may be determined based on the request. For example, the minimum confidence level may be higher for certain types of requests and lower for other types of requests.

In step 414, load balancer 40 communicates the selected response to requestor 20. The method then ends.

Modifications, additions, or omissions may be made to the systems and apparatuses described herein without departing from the scope of the invention. The components of the systems and apparatuses may be integrated or separated. Moreover, the operations of the systems and apparatuses may be performed by more, fewer, or other components. Additionally, the operations of the systems and apparatuses may be performed using any suitable logic comprising software, hardware, and/or other logic. As used in this document, “each” refers to each member of a set or each member of a subset of a set.

Modifications, additions, or omissions may be made to the method without departing from the scope of the invention. The method may include more, fewer, or other steps. Additionally, steps may be performed in any suitable order.

Although this disclosure has been described in terms of certain embodiments, alterations and permutations of the embodiments will be apparent to those skilled in the art. Accordingly, the above description of the embodiments does not constrain this disclosure. Other changes, substitutions, and alterations are possible without departing from the spirit and scope of this disclosure, as defined by the following claims. 

What is claimed is:
 1. An apparatus, comprising: an interface, a memory, and one or more processors; the interface operative to: receive a request from a client; and the one or more processors comprising hardware, the one or more processors, upon execution of logic in the memory, operative to: determine a total number of computing resources to include in a subset of computing resources; select the subset of computing resources from a resource pool, each computing resource operable to provide a response to the request, the subset of computing resources selected according to a load balancing determination and the total number of computing resources to include in the subset; send the request to each of the computing resources in the subset of computing resources, the request sent to at least two of the computing resources; receive one or more responses from the computing resources; perform one or more validity checks on the received one or more responses, wherein at least one validity check compares a candidate response with one or more of the other responses; determine a confidence level for the candidate response based at least in part on the comparison; select a response of the one or more responses; and communicate a message comprising the selected response and the confidence level to the client over a communication network.
 2. The apparatus of claim 1, the selected response comprising a first response of the one or more responses, the first response received prior to receiving any other response.
 3. The apparatus of claim 1, the one or more processors further operative to: set the candidate response as the selected response if the candidate response matches a threshold number of other responses.
 4. The apparatus of claim 1, wherein the one or more processors are operative to determine the total number of computing resources to include in the subset based at least in part on a current utilization rate of the computing resources.
 5. The apparatus of claim 1, wherein the one or more processors are operative to determine the total number of computing resources to include in the subset based at least in part on a priority of the request such that the subset includes more computing resources if the request is high priority and the subset includes fewer computing resources if the request is low priority.
 6. Hardware comprising one or more non-transitory computer-readable media, the non-transitory computer-readable media, when executed by one or more processors, is operative to: receive a request from a client; determine a total number of computing resources to include in a subset of computing resources; select the subset of computing resources from a resource pool, the computing resources operable to provide a response to the request, the subset of computing resources selected according to a load balancing determination and the total number of computing resources to include in the subset; send the request to the computing resources in the subset of computing resources, the request sent to at least two of the computing resources; receive one or more responses from the computing resources; perform one or more validity checks on the received one or more responses, wherein at least one validity check compares a candidate response with one or more of the other responses; determine a confidence level for the candidate response based at least in part on the comparison; select a response of the one or more responses; and communicate a message comprising the selected response and the confidence level to the client over a communication network.
 7. The computer-readable media of claim 6, the selected response comprising a first response of the one or more responses, the first response received prior to receiving any other response.
 8. The computer-readable media of claim 6, the logic further operative to: set the candidate response as the selected response if the candidate response matches a threshold number of other responses.
 9. The computer-readable media of claim 6, wherein the logic is operative to determine the total number of computing resources to include in the subset based on a current utilization rate of the computing resources.
 10. The computer-readable media of claim 6, wherein the logic is operative to determine the total number of computing resources to include in the subset based at least in part on a priority of the request such that the subset includes more computing resources if the request is high priority and the subset includes fewer computing resources if the request is low priority.
 11. A computer-implemented method, comprising: receiving a request from a requestor device; determining a total number of computing resources to include in a subset of computing resources; selecting the subset of computing resources from a resource pool, the computing resources operable to provide a response to the request, the subset of computing resources selected according to a load balancing determination and the total number of computing resources to include in the subset; sending the request to the computing resources in the subset of computing resources, the request sent to at least two of the computing resources; receiving one or more responses from the computing resources; performing one or more validity checks on the received one or more responses, wherein at least one validity check comprises comparing a candidate response with one or more of the other responses; determining a confidence level for the candidate response based at least in part on the comparison; selecting a response of the one or more responses; and sending a message comprising the selected response and the confidence level to the requestor.
 12. The method of claim 11, the selected response comprising a first response of the one or more responses, the first response received prior to receiving any other response.
 13. The method of claim 11, wherein the selecting the response further comprises: determining whether any of the responses include an error code; and excluding the responses that include the error code.
 14. The method of claim 11, wherein the request comprises a request for a web service and the response facilitates providing the web service to the requestor device.
 15. The method of claim 11, wherein the total number of computing resources to include in the subset is determined based at least in part on a current utilization rate of the computing resources.
 16. The method of claim 11, wherein the total number of computing resources to include in the subset is determined based at least in part on a priority of the request such that the subset includes more computing resources if the request is high priority and the subset includes fewer computing resources if the request is low priority. 