US20170149935A1 - Stateless load balancing of connections - Google Patents

Stateless load balancing of connections Download PDF

Info

Publication number
US20170149935A1
US20170149935A1 US15/402,782 US201715402782A US2017149935A1 US 20170149935 A1 US20170149935 A1 US 20170149935A1 US 201715402782 A US201715402782 A US 201715402782A US 2017149935 A1 US2017149935 A1 US 2017149935A1
Authority
US
United States
Prior art keywords
tcp
server
packet
client
servers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/402,782
Inventor
Jeroen van Bemmel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Canada Inc
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent SAS filed Critical Alcatel Lucent SAS
Priority to US15/402,782 priority Critical patent/US20170149935A1/en
Assigned to ALCATEL-LUCENT CANADA INC. reassignment ALCATEL-LUCENT CANADA INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VAN BEMMEL, JEROEN
Publication of US20170149935A1 publication Critical patent/US20170149935A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/42
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1023Server selection for load balancing based on a hash applied to IP addresses or costs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • H04L43/106Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • H04L5/0055Physical resource allocation for ACK/NACK
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1002
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1034Reaction to server failures by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/142Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1027Persistence of sessions during load balancing

Definitions

  • the disclosure relates generally to communication networks and, more specifically but not exclusively, to stateless handling of Transmission Control Protocol (TCP) connections.
  • TCP Transmission Control Protocol
  • connections may include any types of connections suitable for supporting client/server transactions, such as Transmission Control Protocol (TCP) connections or other types of connections.
  • TCP Transmission Control Protocol
  • load balancers Disadvantageously, however, typical physical load balancers are inflexible and cannot be scaled up or down dynamically based on load, and typical software-based load balancers are stateful and do not handle addition or removal of servers gracefully.
  • TCP Transmission Control Protocol
  • an apparatus in one embodiment, includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive a synchronization message including a source address field including an address of a client from which the synchronization message is received and a destination address field including an address of a load balancer.
  • the processor is configured to select a server to support a connection for the client.
  • the processor is configured to form, based on the synchronization message, a modified synchronization message including a source address field including the address of the load balancer, a destination address field including an address of the server, and the address of the client.
  • the processor is configured to propagate the modified synchronization message toward the selected server.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • an apparatus in one embodiment, includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive a TCP SYN packet including a source address field including an address of a client from which the TCP SYN packet is received and a destination address field including an address of a load balancer.
  • the processor is configured to select a server to support a TCP connection for the client.
  • the processor is configured to form, based on the TCP SYN packet, a modified TCP SYN packet including a source address field including the address of the load balancer, a destination address field including an address of the server, and the address of the client.
  • the processor is configured to propagate the modified TCP SYN packet toward the selected server.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • an apparatus in one embodiment, includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive, from a load balancer, a synchronization message including an address of the server and an n-bit server identifier of the server.
  • the processor is configured to generate a synchronization-acknowledgment message including the n-bit server identifier of the server.
  • the processor is configured to propagate the synchronization-acknowledgment message toward the load balancer.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • an apparatus in one embodiment, includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive, from a load balancer, a TCP SYN packet including an address of the server and an n-bit server identifier of the server.
  • the processor is configured to generate a TCP SYN+ACK packet including the n-bit server identifier of the server.
  • the processor is configured to propagate the TCP SYN+ACK packet toward the load balancer.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • an apparatus in one embodiment, includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive a message of a connection from a client, where the message includes an n-bit identifier of a server indicated by the client for the connection.
  • the processor is configured to determine an n-bit identifier of a server for the connection based on server configuration information.
  • the processor is configured to determine handling of the message based on a comparison of the n-bit identifier of the server indicated by the client for the connection and the n-bit identifier of the server determined based on the server configuration information.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • an apparatus includes a processor and a memory communicatively connected to the processor.
  • the processor is configured to receive a TCP packet of a TCP connection from a client, where the TCP packet includes an n-bit identifier of a server indicated by the client for the TCP connection.
  • the processor is configured to determine an n-bit identifier of a server for the TCP connection based on server configuration information.
  • the processor is configured to determine handling of the TCP packet based on a comparison of the n-bit identifier of the server indicated by the client for the TCP connection and the n-bit identifier of the server determined based on the server configuration information.
  • a corresponding method is supported.
  • a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • FIG. 1 depicts an exemplary communication system including a load balancer configured to provide stateless load balancing of TCP connections across a set of servers;
  • FIG. 2 depicts one embodiment of a method for processing a TCP SYN packet of a client at a load balancer to form a modified TCP SYN packet for a server selected by the load balancer to provide the TCP connection for the client;
  • FIG. 3 depicts one embodiment of a method for processing a TCP SYN packet of a load balancer at a server selected by the load balancer to provide a TCP connection for a client;
  • FIG. 4 depicts one embodiment of a method for processing TCP packets of a TCP connection of a client at a load balancer in a manner for statelessly ensuring delivery of packets server selected by the load balancer to provide the TCP connection for the client;
  • FIG. 5 depicts one embodiment of a method for use by a load balancer in managing server configuration information of a set of servers for use in supporting stateless load balancing of TCP connections across the set of servers;
  • FIG. 6 depicts one embodiment of a method for selecting the initial server sequence number for a TCP connection in a manner enabling a load balancer to recognize TCP keep-alive packets on the TCP connection;
  • FIG. 7 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a server in a manner for enabling a load balancer to recognize TCP keep-alive packets on the TCP connection;
  • FIG. 8 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a load balancer for determining whether the TCP packet is a TCP keep-alive packet
  • FIG. 9 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
  • a capability for supporting stateless management of Transmission Control Protocol (TCP) connections is provided.
  • the stateless management of TCP connections may include performing stateless load balancing of TCP connections across a set of servers, stateless detection and handling of TCP keep-alive packets, or the like, as well as various combinations thereof.
  • the functions are stateless in the sense that state is not maintained per TCP connection.
  • stateless management of TCP connections is provided by a stateless TCP connection load balancer.
  • the stateless TCP connection load balancer is configured to perform stateless load balancing of TCP connections across a set of servers. In at least some embodiments, the stateless TCP connection load balancer is configured to perform stateless load balancing of TCP connections across a set of servers based on server configuration information for the set of servers, including updating the server configuration information for the set of servers in response to changes associated with the set of servers such that changes to the servers supporting TCP connections may be identified and, thus, the TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the set of servers.
  • the stateless TCP connection load balancer may be configured to perform stateless detection and handling of TCP keep-alive packets.
  • the stateless TCP connection load balancer may be configured to perform stateless detection and handling of TCP keep-alive packets without maintaining TCP sequence number state per TCP connection.
  • the stateless TCP connection load balancer may be configured to detect and handle TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections.
  • various embodiments of the stateless TCP connection load balancer may support traffic optimizations for topology changes (e.g., by controlling TCP reconnections performed in response to various types of topology changes) and TCP keep-alive packets (e.g., by supporting detection and filtering of TCP keep-alive packets in order to conserve various types of network and server resources).
  • FIG. 1 depicts an exemplary communication system including a load balancer configured to provide stateless management of TCP connections for a set of servers.
  • the communication system 100 includes a plurality of clients 110 1 - 110 M (collectively, clients 110 ), a plurality of servers 120 1 - 120 N (collectively, servers 120 ), and a load balancer (LB) 130 .
  • the clients 110 and servers 120 may be communicatively connected to LB 130 , and may communicate indirectly via LB 130 and directly independent of LB 130 .
  • the clients 110 1 - 110 M include a plurality of client operating systems (OSs) 112 1 - 112 M (collectively, client OSs 112 ), respectively.
  • the client OSs 112 1 - 112 M include a plurality of TCP stacks 113 1 - 113 M (collectively, TCP stacks 113 ), respectively, that may be configured to support TCP communications by the clients 110 1 - 110 M .
  • the TCP stacks 113 may be configured to interwork with LB 130 .
  • the client OSs 112 1 - 112 N also support a plurality of application clients (ACs) 115 1 - 115 N (collectively, ACs 115 ), respectively.
  • ACs application clients
  • the ACs 115 of the clients 110 may support respective instances of an application provided by the servers 120 .
  • the client OSs 112 may be configured to support application layer communications, for the application of the ACs 115 , using TCP and any other suitable communication protocols.
  • the clients 110 may be end user devices (e.g., desktop computers, laptop computers, tablet computers, smartphones, or the like), network devices, machines for use in machine-to-machine communications, or the like.
  • the servers 120 1 - 120 N include a plurality of server operating systems (OSs) 122 1 - 122 N (collectively, server OSs 122 ).
  • the server OSs 122 1 - 122 N include a plurality of TCP stacks 123 1 - 123 N (collectively, TCP stacks 123 ), respectively, that may be configured to support TCP communications by servers 120 1 - 120 N .
  • the TCP stacks 123 may be configured to interwork with LB 130 .
  • the server OSs 122 1 - 122 N may support a plurality of application servers (ASs) 125 1 - 125 N (collectively, ASs 125 ), respectively.
  • ASs application servers
  • the ASs 125 of the servers 120 may support respective instances of an application which may be used by the ACs 115 of the clients 110 .
  • the server OSs 122 may be configured to support application layer communications, for the application of the ASs 125 , using TCP and any other suitable communication protocols.
  • the server OSs 122 may be MICROSOFT WINDOWS-based OSs, LINUX-based OSs, or the like.
  • the servers 120 may be implemented in any suitable manner.
  • at least one of the servers 120 may be implemented directly on hardware (e.g., as one or more server devices including one or more dedicated processors and one or more memories), using one or more virtual machines (VMs), or the like.
  • at least one of the servers 120 may be a physical server deployed in a dedicated data center.
  • the servers 120 may be application server instances hosted on virtual machines in a virtualized environment (e.g., a dedicated data center, a cloud-based data center, or the like).
  • a server 120 may be identified using an n-bit server identifier.
  • the servers 120 may include any suitable numbers of servers (i.e., any suitable value of N).
  • the number N of servers 120 which may be used to provide load balancing for TCP connections also may be dependent on the configurations and capabilities of the LB 130 and the servers 120 .
  • the number N of servers 120 which may be used to provide load balancing for TCP connections also may be dependent on the number of bits n available for identifying the N servers 120 .
  • the n bits used to identify the servers 120 may be n address bits of the addresses of the respective servers 120 , n server index bits of server index values assigned to the respective servers 120 based on a hash function used by LB 130 for distributing TCP connections across the servers 120 , or the like.
  • a given server 120 has one or more addresses associated therewith (e.g., one or more of an IPv4 address, an IPv6 address, an Ethernet Media Access Control (MAC) address, a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI), or any other suitable type of address.
  • addresses e.g., one or more of an IPv4 address, an IPv6 address, an Ethernet Media Access Control (MAC) address, a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI), or any other suitable type of address.
  • the different address types may or may not be configured such that n bits of the respective server addresses of the servers 120 are unique, which may dictate use of n bits of the server addresses (e.g., for an address type for which n unique bits are available within the set of addresses such that the servers 120 may be uniquely identified) or n bits of the server indices (e.g., for an address type for which n unique bits are not available within the set of addresses for uniquely identifying the servers 120 ) to perform TCP load balancing.
  • n bits of the server addresses e.g., for an address type for which n unique bits are available within the set of addresses such that the servers 120 may be uniquely identified
  • n bits of the server indices e.g., for an address type for which n unique bits are not available within the set of addresses for uniquely identifying the servers 120
  • the clients 110 and servers 120 support an application.
  • the application may be any suitable type of application which may be supported using TCP connections.
  • the application may require or allow use of TCP keep-alive packets (e.g., using a WebSocket-based application or any other type of application which may utilize exchanges of TCP keep-alive packets between clients 110 and servers 120 ).
  • the application may be an application used by smartmeter appliances to periodically report the actual energy consumption of respective buildings to a set of servers in the network, an application used by smartphones to periodically provide location information (e.g., over HTTP) to a set of servers in the network, application supporting an IP telephony service in which clients are waiting to receive incoming calls and must traverse a Network Address Translation (NAT) device between the client and the IP telephony server, or the like.
  • NAT Network Address Translation
  • the clients 110 and servers 120 may support application layer communications between the ACs 115 of clients 110 and the ASs 125 of servers 120 using various types of communication capabilities.
  • the clients 110 and the servers 120 may support various communication stacks, communication protocols, and the like.
  • the client OSs 112 of the clients 110 and the server OSs 122 of the servers 120 may support communications capabilities which may or may not be used to transport application layer communications between the ACs 115 of the clients 110 and the ASs 125 of the servers 120 .
  • the client OSs 112 of the CDs 110 and the server OSs 122 of the servers 120 may support communications at various communication layers of the Open Systems Interconnection (OSI) model that are below the application layer; namely, at one or more of the presentation layer (e.g., using Multipurpose Internet Mail Extensions (MIME), External Data Representation (EDR), or any other suitable presentation layer protocols or communication capabilities), the session layer (e.g., using Real-Time Transport Protocol (RTP), Point-To-Point Tunneling Protocol (PPTP), or any other suitable session layer protocols or communication capabilities), the transport layer (e.g., using User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), or any other suitable transport layer protocols or communication capabilities), the network layer (e.g., using Internet Protocol (IP),
  • IP
  • the LB 130 is configured to provide stateless load balancing of TCP connections established between the client OSs 112 and the server OSs 122 , such that the TCP connections of the client OSs 112 are statelessly balanced across the servers 120 .
  • the LB 130 is configured to receive TCP connection requests from client OSs 112 of clients 110 and to dynamically distribute the TCP connection requests and, thus, the TCP connections, across the servers 120 .
  • the LB 130 also is configured to ensure that packets for a given TCP connection of a client OS 112 consistently go to the server 120 selected to handle the TCP connection request and with which the TCP connection is established for the client OS 112 .
  • LB 130 is configured to support application layer communications for the application of the ACs 115 and the ASs 125 using TCP and any other suitable communication protocols (e.g., using various layers of the OSI model of communication layers).
  • the LB 130 is configured to provide various functions related to stateless load balancing of TCP connections across the servers 120 .
  • LB 130 may be configured to perform stateless load balancing of TCP connections across the servers 120 based on server configuration information for servers 120 , including updating the server configuration information for the servers 120 in response to changes associated with the servers 120 (e.g., new server 120 added, existing server 120 failed or removed, or the like) such that changes to the servers 120 supporting TCP connections may be detected and, thus, TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the servers 120 .
  • changes associated with the servers 120 e.g., new server 120 added, existing server 120 failed or removed, or the like
  • LB 130 may be configured to statelessly recognize TCP keep-alive packets (e.g., in order to distinguish TCP keep-alive packets from other types of TCP packets), such that the different packet types may be appropriately handled by the LB 130 (e.g., filtering TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections).
  • the LB 130 may be configured to provide various other related functions in support of stateless balancing of TCP connections across the servers 120 .
  • the LB 130 includes a processor 132 and a memory 133 communicatively connected to processor 132 .
  • the memory 133 stores one or more stateless TCP connection load balancing programs 134 which may be retrieved from memory 133 by processor 132 and executed by processor 132 in order to provide functions for stateless load balancing of TCP connections as discussed herein.
  • the memory 133 also stores server configuration information 135 which may be used by the stateless TCP connection load balancing program(s) 134 to provide functions for stateless load balancing of TCP connections as discussed herein.
  • the memory stores one or more stateless TCP keep-alive packet recognition and filtering programs 136 which may be retrieved from memory 133 by processor 132 and executed by processor 132 in order to provide functions for stateless recognition and filtering of TCP keep-alive packets as discussed herein.
  • the memory 133 may store any other programs or data which may be suitable for use in providing functions of LB 130 depicted and described herein.
  • the LB 130 in at least some embodiments in which the bottleneck to scalability of LB 130 is network I/O throughput, may be deployed in a manner for overcoming (or at least lessening the impact of) network I/O throughput bottleneck (e.g., co-locating the stateless TCP connection load balancer with one or more other network functions which are memory or CPU bound).
  • the LB 130 may be configured to perform stateless load balancing of TCP connections across the servers 120 based on server configuration information for servers 120 , including updating the server configuration information for the servers 120 in response to changes associated with the servers 120 (e.g., new server 120 added, existing server 120 failed or removed, or the like) such that changes to the servers 120 supporting TCP connections may be detected and, thus, TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the servers 120 .
  • changes associated with the servers 120 e.g., new server 120 added, existing server 120 failed or removed, or the like
  • changes to the servers 120 supporting TCP connections may be detected and, thus, TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the servers 120 .
  • the LB 130 is configured to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 .
  • the LB 120 may be configured to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 using server configuration information that includes (1) a first array which maps potential hash values of a hash function used by the LB 130 to server index values associated with the servers 120 and (2) a second array which maps the server index values associated with the servers 120 to the addresses (e.g., IP, Ethernet, or the like) of the servers 120 .
  • LB 130 may be configured to use fewer or more arrays to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 . It will be appreciated that although primarily depicted and described with respect to use of arrays to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 , LB 130 may be configured to use any other suitable type(s) of data structure(s) to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 .
  • the LB 130 maintains the first array which maps (1) potential hash values of a hash function used by the LB 130 to (2) server index values associated with the servers 120 .
  • the first array has a length A (i.e., supports A entries for mapping potential hash values of the hash function used by the LB 130 to the server index values associated with the servers 120 .
  • the hash may be computed over one or more header fields of TCP packets to be received and processed by LB 130 (e.g., over one or more of the source IP address (IPv4 or IPv6), the client source port, or the server destination port).
  • IPv4 or IPv6 the source IP address
  • the LB 130 may be configured to balance TCP connections across the servers 120 evenly or based on weightings of the servers 120 . In either case, respective numbers of entries of the first array may be assigned to respective servers 120 in a manner for achieving the desired balancing of TCP connections across the servers 120 .
  • the various possibilities for configurations of the first array may be better understood
  • the first array includes sixty-four (64) entries for handling mappings to server indices of four (4) servers 120 .
  • the first, second, third, and fourth servers 120 are all weighted the same, such that the four servers 120 are expected to handle the same number of TCP connections.
  • each of the four servers 120 will have sixteen (16) of the sixty-four entries of the first array associated therewith (e.g., sixteen entries including one or more different hash values may be mapped to a first server index value of the first server 120 , sixteen entries including one or more different hash values may be mapped to a second server index value of the second server 120 , sixteen entries including one or more different hash values may be mapped to a third server index value of the third server 120 , and sixteen entries including one or more different hash values may be mapped to a fourth server index value of the second server 120 ).
  • sixteen entries including one or more different hash values may be mapped to a first server index value of the first server 120
  • sixteen entries including one or more different hash values may be mapped to a second server index value of the second server 120
  • sixteen entries including one or more different hash values may be mapped to a third server index value of the third server 120
  • sixteen entries including one or more different hash values may be mapped to a fourth server index value of the second server
  • the first array includes a number of entries for handling mappings to server indices of four servers 120 where the first, second, third, and fourth servers have weights of 2, 1, 1, and 1, respectively, such that the first server 120 is expected to handle twice the number of TCP connections as each of the second, third, and fourth servers 120 .
  • a value of ten may be used for length A, such that the first server 120 has four entries in which four hash values map to a first server index value of the first server 120 , the second server 120 has two entries in which two hash values map to a second server index value of the second server 120 , the third server 120 has two entries in which two hash values map to a third server index value of the third server 120 , and the fourth server 120 has two entries in which two hash values map to a fourth server index value of the fourth server 120 .
  • a value of two hundred may be used for A, such that the first server 120 has eighty (80) entries in which eighty hash values map to a first server index value of the first server 120 , the second server 120 has forty entries in which forty hash values map to a second server index value of the second server 120 , the third server 120 has forty entries in which forty hash values map to a third server index value of the third server 120 , and the fourth server 120 has forty entries in which forty hash values map to a fourth server index value of the fourth server 120 .
  • the first array may be configured using any suitable weights of servers 120 , any suitable numbers of different hash values supported by the hash function, any suitable numbers of hash values used for the respective servers 120 , any suitable numbers of entries A of the first array, or the like.
  • the hash values associated with a given server 120 may be the same or different for the given server 120 (e.g., depending on the total number of possible hash values possible given the hash function used, the header field(s) used to compute the hash values, the number of potential values for the header field(s) used to compute the hash values, or the like, as well as various combinations thereof).
  • the total number of entries A of the first mapping may depend on the total number of possible hash values possible given the hash function used, the header field(s) used to compute the hash values, the number of potential values for the header field(s) used to compute the hash values, or the like, as well as various combinations thereof).
  • the LB 130 maintains the second array which maps the server index values associated with the servers 120 to the addresses (e.g., IP, Ethernet, or the like) of the servers 120 .
  • the second array may include a single entry for the server 120 which maps that server index value to the address of the server 120 .
  • the second array may include one or more entries for the server 120 which map those server index value to the address of the server 120 .
  • the servers 120 and LB 130 may be configured to provide various functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120 .
  • the LB 130 is configured to receive and process a TCP SYN packet from a client 110 , to form thereby a modified TCP SYN packet, in a manner for enabling LB 130 to statelessly control which of the servers 120 will handle the TCP connection for the client 110 (an exemplary embodiment is depicted and described with respect to FIG. 2 ).
  • the server 120 selected to handle the TCP connection for the client 110 is configured to receive and process the modified TCP SYN packet from LB 130 in a manner for enabling LB 130 to statelessly control consistent delivery of TCP packets for the TCP connection to the server 120 selected to handle the TCP connection for the client 110 (an exemplary embodiment is depicted and described with respect to FIG. 3 ).
  • the LB 130 is configured to receive additional TCP packets for the TCP connection from the client 110 and to statelessly control consistent delivery of TCP packets for the TCP connection to the server 120 selected to handle the TCP connection for the client 110 assuming that the server 120 selected to handle the TCP connection for the client 110 has not changed (an exemplary embodiment is depicted and described with respect to FIG. 4 ).
  • the servers 120 and LB 130 may be configured to provide various other functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120 , as discussed in additional detail below.
  • FIG. 2 depicts one embodiment of a method for processing a TCP SYN packet of a client at a load balancer to form a modified TCP SYN packet for a server selected by the load balancer to provide the TCP connection for the client.
  • the steps of method 200 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1 ). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 200 may be performed contemporaneously or in a different order than presented in FIG. 2 .
  • step 201 method 200 begins.
  • a TCP SYN packet is received from a client.
  • the TCP packet has only the SYN flag set and, thus, is a TCP SYN packet.
  • the TCP SYN packet includes a source address field that includes a client address of the client which sent the TCP SYN packet and a destination address field which includes an address of the load balancer.
  • a hash value is computed for the TCP SYN packet based on one or more fields of the TCP SYN packet.
  • the one or more fields may include one or more of source address (e.g., source IP address), source port, destination address, destination port, or the like.
  • the hash value is computed using a hash function that is used as the basis for generating entries of the first array that is maintained by the load balancer.
  • a server is selected using the hash value as a key into server mapping information maintained by the load balancer.
  • the server may be selected by using the hash value as a key into the first array in order to identify the server index of one of the servers to be used to provide the TCP connection for the client (and, thus, to which the TCP SYN packet is to be routed).
  • the server is selected from among a plurality of servers available to handle the TCP connection for the client.
  • a server address of the server is determined based on the server mapping information.
  • the server address of the server may be determined by using the server index of the selected server as a key into the second array which includes mappings of server indices to server addresses.
  • the server address of the server may be any suitable type of address (e.g., an IPv4 address, an IPv6 address, an Ethernet MAC address, a SIP URI, or any other suitable type of address).
  • a modified TCP SYN packet is formed based on the received TCP SYN packet.
  • the modified TCP SYN packet may be formed by modifying the received TCP SYN packet to form the modified TCP SYN packet or generating the modified TCP SYN packet.
  • the modified TCP SYN packet includes a source address field that includes an address of the load balancer and a destination address field which includes the server address of the server.
  • the modified TCP SYN packet also includes the client address of the client.
  • the client address of the client may be inserted in any suitable location within the modified TCP SYN packet, such as within the ACK field of the modified TCP SYN packet (e.g., for an IPv4 address of the client), within a TCP option header field of the modified TCP SYN packet (e.g., for an IPv6 address of the client), within a trailer field of the modified TCP SYN packet, or the like.
  • the inclusion of the client address facilitates stateless control over the TCP connection by the load balancer.
  • the modified TCP SYN packet may include one or more timestamps.
  • the one or more timestamps may include one or more of a hardware timestamp generated at the time the TCP SYN packet was received from the network, the current time as determined by a hardware or software clock, a logical clock value which increases monotonically, or the like.
  • the LB 130 may insert the one or more timestamps into the modified TCP SYN packet by inserting a standard TCP timestamp option field (e.g., as defined by RFC 1323), modifying a received timestamp header from client 110 , inserting a custom TCP option header, insert the timestamp header into the payload of the SYN packet, or the like, as well as various combinations thereof. More generally, LB 130 may use any field(s) or method(s) suitable for communicating the one or more timestamp values to the server 120 .
  • the modified TCP SYN packet may include the n bits of the server index of the selected server.
  • the n bits of the server index may be inserted into the modified TCP SYN packet at any suitable location (e.g., in the upper n bits of the sequence number of the TCP SYN packet, in n bits of a timestamp value inserted as a TCP option header of the TCP SYN packet, or the like).
  • the n bits of the server index of the selected server may be used by the server to replace the upper n bits of its initial sequence number (e.g., as discussed with respect to FIG. 3 ).
  • the value of n may be constant within the system (e.g., the value of n is hardcoded into the load balancer and the server, such that the load balancer does not dynamically modify the number of servers over which TCP connections may be load balanced). In at least some embodiments, the value of n may be dynamic within the system (e.g., the value of n is not hardcoded into the load balancer or the server, such that the load balancer may be configured to dynamically modify the number of servers over which TCP connections may be load balanced).
  • the modified TCP SYN packet also may include the size of the n-bit server index (i.e., the value of n), such that the size of the n-bit server index is available for use by the server in replacing the upper n bits of its initial sequence number with the n bits of the n-bit server index.
  • the size of the n-bit server index may be inserted into the modified TCP SYN packet in any suitable location.
  • Another advantage of at least some such embodiments is that it is expected to be more efficient to compare n bits from the ACK field of a TCP packet with the server index value found based on the hash value calculated for the TCP packet (instead of comparing n bits from the server address, which may require a second memory lookup to the second array of the server configuration information), as discussed hereinabove and depicted and described with respect to FIG. 4 .
  • the load balancer uses a different server index for the second server rather than only replacing the address of the first server with the address of the second server (such that subsequently received TCP keep-alive packets from TCP connections to the first server will properly detect that the server has changed, because the server index comparison yields a difference).
  • the modified TCP SYN packet may include an indication to the server that the server is to insert n bits of a server address of the server into the TCP SYN+ACK packet that the server sends in response to receiving the TCP SYN packet from the load balancer.
  • the address of the server may include an IPv4 address of the server, an IPv6 address of the server, an Ethernet address of the server, or any other suitable address of the server.
  • the modified TCP SYN packet is propagated toward the server.
  • the processing of the modified TCP SYN packet by the server may be performed as depicted and described with respect to FIG. 3 .
  • step 299 method 200 ends.
  • server selection for TCP connection load balancing may be performed based on server performance information associated with one or more servers of the set of servers available for selection.
  • the server performance information for a server may include information indicative of the current load on the server, response time information associated with the server (e.g., average response time, maximum response time, or the like), or the like, as well as various combinations thereof.
  • the server performance information may be obtained by the load balancer based on feedback from the servers that is inserted into TCP SYN+ACK packet sent from the servers to clients via the load balancer (e.g., as described with respect to FIG. 3 ).
  • the server performance information may be obtained by the load balancer in any other suitable manner.
  • the server performance information may be maintained by the load balancer as a separate set of information, as part of the server configuration information maintained by the load balancer, or the like, as well as various combinations thereof.
  • the load balancer may use the server performance information for load balancing of TCP connections in place or in addition to use of one or more fields of the TCP SYN packet.
  • FIG. 3 depicts one embodiment of a method for processing a TCP SYN packet of a load balancer at a server selected by the load balancer to provide a TCP connection for a client.
  • a server e.g., a server 120 depicted and described with respect to FIG. 1 . It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 300 may be performed contemporaneously or in a different order than presented in FIG. 3 .
  • step 301 method 300 begins.
  • a TCP SYN packet is received from a load balancer.
  • the server is not immediately aware that a modified TCP SYN packet has been received (as opposed to an unmodified TCP SYN packet that may have been routed to the server without traversing the load balancer).
  • the modified TCP packet may be generated by the load balancer as depicted and described with respect to FIG. 2 .
  • the server may determine whether the TCP SYN packet is an unmodified TCP SYN packet or a modified TCP SYN packet based on information regarding the manner in which the load balancer processes TCP SYN packets to form modified TCP SYN packets (e.g., the location within the modified TCP packet at which the load balancer inserts the client address of the client).
  • a determination that the ACK field includes a value of zero results in a determination that the TCP SYN packet is an unmodified TCP SYN packet whereas a determination that the ACK field includes a non-zero value results in a determination that the TCP SYN packet is a modified TCP SYN packet.
  • a determination that the TCP SYN packet does not include a TCP options field results in a determination that the TCP SYN packet is an unmodified TCP SYN packet whereas a determination that the TCP SYN packet does include a TCP options field results in a determination that the TCP SYN packet is a modified TCP SYN packet.
  • TCP SYN packets may need to be made (e.g., where multiple client types (e.g., IPv4 and IPv6 clients) are supported and different types of modifications are made to TCP SYN packets at the load balancer for the different client types). For example, a determination that the ACK field of the TCP SYN packet includes a value of zero may not immediately result in a determination that the TCP SYN packet is an unmodified TCP SYN packet; rather an additional check may need to be performed to determine whether the TCP SYN packet includes a TCP options field which might be used by an IPv6 client but not an IPv4 client.
  • client types e.g., IPv4 and IPv6 clients
  • a determination that the TCP SYN packet does not include a TCP options field may not immediately result in a determination that the TCP SYN packet is an unmodified TCP SYN packet; rather an additional check may need to be performed to determine whether the ACK field of the TCP SYN packet includes a value of zero or a non-zero value. It will be appreciated that the order in which multiple such determinations are made may be selected based on the type of modification to the TCP SYN packet that is expected to be more prevalent.
  • TCP SYN packet is an unmodified TCP SYN packet
  • method 300 proceeds to step 330 . If the TCP SYN packet is a modified TCP SYN packet, method 300 proceeds to step 340 .
  • the unmodified TCP SYN packet is processed and a TCP SYN+ACK packet is generated based on the unmodified TCP SYN packet.
  • the unmodified TCP SYN packet is processed using packet processing that is typically performed by a server for a TCP SYN packet. The typical processing of a TCP SYN packet and associated generation of a TCP SYN+ACK packet by a server will be understood by one skilled in the art. From step 330 , method 300 proceeds to step 350 .
  • the modified TCP SYN packet is processed and a TCP SYN+ACK packet is generated based on the modified TCP SYN packet.
  • the modified TCP SYN packet is processed using packet processing that is typically performed by a server for a TCP SYN packet, but with at least one exception that the TCP SYN+ACK packet includes an identifier of the server (e.g., n bits of an address of the server, the n-bit server index of the server, or the like).
  • the server replaces the upper n bits of its initial sequence number with the n bits of its own server address (e.g., IPv4 address, IPv6 address, Ethernet address, or the like), thereby leaving 32-n bits for the initial sequence number.
  • the server also may clear the next upper two bits of its randomly generated initial sequence number (to delay the moment at which the sequence number wraps into the n upper bits), thereby leaving 32-n-2 bits for the initial sequence number. It is noted that the number of bits for the initial sequence number may be reduced to 24-n-2 random bits if TCP SYN cookies are used.
  • the server may replace the upper n bits of its initial sequence number with the n bits of its own server address based on an indication detected in the TCP SYN packet. From step 340 , method 300 proceeds to step 350 .
  • the server replaces the upper n bits of its initial sequence number with the n bits of its own server index (from server configuration information maintained on the load balancer).
  • the server may determine the n bits of its own server index from the modified TCP SYN packet received from the load balancer (e.g., inserted into the modified TCP SYN packet by the load balancer, as discussed with respect to method 200 of FIG. 2 ).
  • the value of n may be constant or dynamic within the system.
  • the server may determine the size of the n-bit server index (i.e., the value of n) from the modified TCP SYN packet received from the load balancer for use by the server in replacing the upper n bits of its initial sequence number with the n bits of the n-bit server index.
  • the size of the n-bit server index may be determined from any suitable location within the modified TCP SYN packet (which may depend on placement of the size of the n-bit server index within the modified TCP SYN packet by the load balancer, as depicted and described with respect to FIG. 2 ). As described with respect to FIG.
  • the server addresses need not be unique in any n bits, it is expected to be more efficient to compare n bits from the ACK field of a TCP packet with the server index value found based on the hash value calculated for the TCP packet, or the like). It is noted that, in at least some such embodiments, when a first server fails and a second server takes the place of the failed first server, the load balancer uses a different server index for the second server such that the change from the first server to the second server can be detected at the load balancer when subsequent keep-alive packets are received at the load balancer.
  • the server may instead use a different field of the TCP SYN+ACK packet (e.g., the timestamp option header or any other suitable field) to store the n bits of its own server index, thereby avoiding the constraint on the maximum number of bytes which may be sent by the server due to use of part of the server sequence number to convey then bits of the server index of the server.
  • a different field of the TCP SYN+ACK packet e.g., the timestamp option header or any other suitable field
  • the server copies information from the modified TCP SYN packet into the TCP SYN+ACK packet.
  • the server may copy the client address of the client from the modified TCP SYN packet into the TCP SYN+ACK packet.
  • the server may copy one or more timestamps from the modified TCP SYN packet into the TCP SYN+ACK packet.
  • the server may copy information from the modified TCP SYN packet into the TCP SYN+ACK packet using one or more option headers.
  • the server inserts performance-indicative information for the server into the TCP SYN+ACK packet for the TCP connection.
  • the performance-indicative information for the server includes information which may be used by the load balancer to determine server performance information for the server.
  • the server performance information for a server may include information indicative of the current load on the server, response time information associated with the server (e.g., average response time, maximum response time, or the like), or the like, as well as various combinations thereof.
  • the performance-indicative information for the server that is included within TCP SYN+ACK packet for the TCP connection may include a current server load value of the server (e.g., as a value indicative of a percentage, 0%-100%, of the current server system load) for use by the load balancer in determining the information indicative of the current load on the server, a timestamp for use by the load balancer in determining a response time of the server for the TCP connection where the response time of the server for the TCP connection may then be used by the load balancer in determining response time information associated with the server, or the like.
  • a current server load value of the server e.g., as a value indicative of a percentage, 0%-100%, of the current server system load
  • a timestamp for use by the load balancer in determining a response time of the server for the TCP connection where the response time of the server for the TCP connection may then be used by the load balancer in determining response time information associated with the server, or the like.
  • the load balancer may receive performance-indicative information for a set of servers in TCP SYN+ACK packets received from the set of servers and use the performance-indicative information to update server performance information maintained by the load balancer (e.g., by updating server performance information maintained by the load balancer separate from the server configuration information maintained by the load balancer, by modifying weights assigned to the servers in the server configuration information maintained by the load balancer, or the like).
  • the load balancer may use the server performance information maintained by the load balancer to perform load balancing of TCP connections across the set of servers (e.g., as a basis for server selection within the context of method 200 of FIG. 2 ).
  • the TCP SYN+ACK packet is propagated toward the load balancer.
  • step 399 method 300 ends.
  • FIG. 4 depicts one embodiment of a method for processing TCP packets of a TCP connection of a client at a load balancer in a manner for statelessly ensuring delivery of packets server selected by the load balancer to provide the TCP connection for the client.
  • the steps of method 400 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1 ). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 400 may be performed contemporaneously or in a different order than presented in FIG. 4 .
  • step 401 method 400 begins.
  • a TCP packet is received from a client.
  • the TCP packet does not have the SYN flag set and, thus, is a TCP packet other than a TCP SYN packet (and, thus, should be sent to the same server 120 to which the corresponding TCP SYN packet was sent, if possible).
  • the TCP packet is associated with a TCP connection.
  • the TCP packet includes a source address field that includes a client address of the client which sent the TCP packet and a destination address field which includes an address of the load balancer.
  • the TCP packet also includes an n-bit identifier of the server (e.g., n bits of an address of the server, n-bit server index of the server, or the like) inserted by the client based on the modified TCP SYN+ACK packet received at the client from the load balancer (e.g., based on the modified TCP SYN+ACK packet generated as depicted and described with respect to method 300 of FIG. 3 ).
  • the n-bit identifier of the server may be included within the TCP packet in the ACK field or in any other suitable location within the TCP packet.
  • a hash value is computed for the TCP packet based on one or more fields of the TCP packet.
  • the one or more fields may include one or more of source address (e.g., source IP address), source port, destination address, destination port, or the like.
  • the hash value is computed using a hash function that is used as the basis for generating entries of the first array that is maintained by the load balancer as well as for computing hash values when TCP SYN packets are received.
  • the use of a consistent hash in this manner is meant to ensure that, when possible, the TCP packets of a TCP connection are consistently routed to the same server selected for the TCP connection when the first hash is computed in response to the TCP SYN packet.
  • a server is identified using the hash value as a key into server mapping information maintained by the load balancer.
  • the server may be identified by using the hash value as a key into the first array in order to identify the server index of one of the servers to which the TCP packet is to be routed.
  • a server address of the server is determined based on the server mapping information.
  • the server address of the server may be determined by using the server index of the selected server as a key into the second array which includes mappings of server indices to server addresses.
  • a comparison is performed for determining whether the server of the TCP connection has changed.
  • the modified TCP SYN+ACK packet generated by the server includes n bits of the server address as the upper n bits of the initial server sequence number
  • the upper n bits of the server sequence number from the received TCP packet and the corresponding n bits of the server address determined based on the server mapping information maintained at the load balancer (namely, from the first and second arrays) are compared.
  • the modified TCP SYN+ACK packet generated by the server includes the n bits of the server index (e.g., as the upper n bits of the initial server sequence number, within a timestamp option header, or the like), the n bits of the server index from the received TCP packet (again, e.g., as the upper n bits of the server sequence number, within a timestamp option header, or the like), and the corresponding n bits of the server index determined based on the server mapping information maintained at the load balancer (namely, from the first array) are compared.
  • the server of the TCP connection has not changed (since the TCP SYN packet for the TCP connection was processed and initial server selection was performed by the load balancer). If the compared bits do not match (a less likely scenario), the server of the TCP connection has changed (e.g., due to one or more events or conditions which may cause modifications to the server configuration information maintained by the load balancer).
  • the TCP packet is forwarded toward the server.
  • the server receives the TCP packet from the load balancer and initiates appropriate processing of the TCP packet.
  • the server may process the TCP packet in any suitable manner, which may result in generation of an associated TCP response packet by the server.
  • the server may propagate the TCP response packet to the client indirectly via the load balancer or directly without traversing the load balancer. It will be appreciated that sending TCP response packets directly from the server to the client avoids overhead and delay of processing such TCP response packets at the load balancer.
  • the server may be configured to use direct forwarding of TCP response packets to the client by configuring the server to accept traffic from a common IP address associated with the load balancer without responding to Address Resolution Protocol (ARP) requests for that IP address. From step 470 , method 400 proceeds to step 499 , where method 400 ends.
  • ARP Address Resolution Protocol
  • a TCP response packet is sent toward the client without forwarding the TCP packet to the server.
  • the TCP response packet may be a TCP Reset (RST) packet for causing the client to close the TCP connection and initiate a TCP reconnection, a TCP FIN packet for causing the client to close the TCP connection without initiating a TCP reconnection, or any other suitable type of TCP response packet.
  • RST TCP Reset
  • TCP FIN packet for causing the client to close the TCP connection without initiating a TCP reconnection
  • the client receives the TCP response packet from the load balancer and initiates appropriate processing of the TCP response packet. From step 480 , method 400 proceeds to step 499 , where method 400 ends.
  • step 499 as noted above, method 400 ends.
  • the servers 120 and LB 130 also may be configured to provide various additional functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120 .
  • the server 120 may be configured to monitor the TCP sequence number for the TCP connection with client 110 .
  • the server 120 in response to a determination that the TCP sequence number for the TCP connection with client 110 is within a threshold number of bits of the maximum TCP sequence number which may be supported (namely, 2 (32-n) ) closes the TCP connection with the client 110 in order to avoid a situation in which the TCP sequence number for the TCP connection overflows into the upper n bits used for the address of the server 120 .
  • TCP connection such as Session Initiation Protocol (SIP) signaling of WebRTC calls, smartmeter clients reporting measured values to server where the servers only acknowledge reception of the bytes without sending associated responses, or the like).
  • SIP Session Initiation Protocol
  • the application being supported by the TCP connection may be configured to handle a failing TCP connection by reconnecting (i.e., the TCP sequence number overflow condition would only be a specific case of a “failure” which might cause initiation of a TCP reconnection).
  • TCP sequence number overflow condition prevention and handling may only be applicable for TCP connections that are load balanced by LB 130 (e.g., for which the associated TCP SYN packet included a non-zero ACK field).
  • communication system 100 may be dynamic in that various types of events may result in changes to the server configuration information used by LB 130 to balance TCP connections across the servers 120 .
  • server configuration information used by LB 130 to balance TCP connections across the servers 120 may change as a result of changes to server weights of existing servers 120 , addition of one or more new servers 120 to communication system 100 , unavailability of one or more existing servers 120 within communication system 100 (e.g., due to one or more of a failure(s) of an existing server(s) 120 , a removal(s) of an existing server(s) 120 , or the like), or the like, as well as various combinations thereof.
  • the LB 130 is configured to continue to be able to perform load balancing of TCP connections while accommodating various types of changes associated with the set of servers 120 across which TCP connections may be balanced.
  • the LB 130 may be configured to, in response to an indication of availability of a new server 120 in the communication system 100 , update its server configuration information (e.g., its mapping of A entries in the first array, updating the mapping of one or more server indices for the new server 120 to the address of the new server 120 in the second array, or the like).
  • the LB 130 may update the first array in a manner tending to minimize the number of entries of the first array that are changed, because any client 110 that has a TCP connection that hashes to one of the changed entries of the first array may have to (1) reconnect from the server 120 to which they were connected to a new server 120 indicated by the changed entry of the first array or (2) terminate the TCP connection without reconnecting.
  • LB 130 since LB 130 is stateless, LB 130 does not know the correct TCP sequence number for the TCP connection and, thus, cannot proactively send a TCP RST packet or a TCP FIN packet to the client 110 until it first receives a packet from the client 110 . In other words, this reconnection or termination by a client 110 for the TCP connection will not occur until the next time that a data packet or keep-alive packet is received from the client 110 at the LB 130 for that TCP connection.
  • LB 130 may be configured to ignore (drop) one or more keep-alive packets received for one or more TCP connections impacted by the addition of the new server 120 (e.g., TCP connections that hash to one of the changed entries of the first array), rather than responding to the associated client(s) 110 with TCP RST or TCP FIN packets, so as to rate-limit the arrival of TCP connections to the new server 120 and, thus, avoid overloading the new server 120 .
  • keep-alive packets received for one or more TCP connections impacted by the addition of the new server 120 (e.g., TCP connections that hash to one of the changed entries of the first array), rather than responding to the associated client(s) 110 with TCP RST or TCP FIN packets, so as to rate-limit the arrival of TCP connections to the new server 120 and, thus, avoid overloading the new server 120 .
  • the LB 130 may be configured to, in response to an indication of unavailability of an existing server 120 in the communication system 100 (e.g., the existing server 120 has failed, the existing server 120 has been dynamically removed, a TCP RST packet has been received from the existing server 120 or from another network element, or the like), update its server configuration information 135 (e.g., updating its mapping of A entries in the first array, removing the mapping of one or more server indices for the existing server 120 to the address of the existing server 120 in the second array, or the like).
  • update its server configuration information 135 e.g., updating its mapping of A entries in the first array, removing the mapping of one or more server indices for the existing server 120 to the address of the existing server 120 in the second array, or the like.
  • the LB 130 may update the first array in a manner tending to minimize the number of entries of the first array that are changed, because any client 110 that has a TCP connection that hashes to one of the changed entries of the first array may have to (1) reconnect from the server 120 to which they were connected to a different server 120 indicated by the changed entry of the first array or (2) terminate the TCP connection without reconnecting.
  • LB 130 since LB 130 is stateless, LB 130 does not know the correct TCP sequence number for the TCP connection and, thus, cannot send a TCP RST packet or a TCP FIN packet to the client 110 until it first receives a packet from the client 110 .
  • this reconnection or termination by a client 110 for the TCP connection will not occur until the next time that a data packet or keep-alive packet is received from the client 110 at the LB 130 for that TCP connection.
  • the existing TCP connections of the server 120 that has become unavailable may be distributed across the remaining servers 120 , such that the additional load on the remaining servers 120 is not expected to be an issue (as opposed to the situation in which a new server(s) 120 becomes available and existing TCP connections of a potentially large number of existing servers 120 are all offloaded onto the relatively small number of new servers 120 ).
  • mechanisms relied upon in the case in which a new server(s) 120 becomes available within communication system 100 may not be necessary (although they may still be used) for the case in which an existing server(s) 120 becomes unavailable within communication system 100 .
  • FIG. 5 depicts one embodiment of a method for use by a load balancer in managing server configuration information of a set of servers for use in supporting stateless load balancing of TCP connections across the set of servers.
  • the steps of method 500 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1 ). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 500 may be performed contemporaneously or in a different order than presented in FIG. 5 .
  • method 500 begins.
  • one or more changes associated with the set of servers are detected.
  • the one or more changes may include a change in weights of the servers, addition of one or more new servers to the set of servers, an error condition associated with one or more servers in the set of servers, failure of one or more servers in the set of servers, removal of one or more servers from the set of servers, or the like.
  • server configuration information for the set of servers is modified based on the one or more changes associated with the set of servers.
  • method 500 ends. It will be appreciated that method 500 may represent various embodiments related to management of server configuration for use in stateless load balancing of TCP connections across a set of servers.
  • a change in configuration of the servers 120 results in a change to the server configuration information that is used by LB 130 to perform load balancing of TCP connections across the servers 120 .
  • LB 130 maintains multiple server configurations in memory 133 (rather than simply updating the server configuration information based on the latest configuration of servers 120 and forgetting about the previous configurations of servers 120 ).
  • the LB 130 also may maintain timestamps for the multiple server configurations (e.g., timestamps indicative of times at which the server configuration changes were made).
  • LB 130 may maintain the x most recent server configurations (or any other suitable combination of multiple server configurations).
  • LB 130 upon receiving a TCP packet, LB 130 iteratively performs the check to determine whether the server has changed, using the server configuration information of one or more of the multiple server configurations (e.g., in an order from most recent to least recent), until (a) a match is found or (b) the multiple server configurations have been considered in determining whether the server has changed and a match has not been found for any of the multiple server configurations.
  • LB 130 may identify a server using the server configuration information of the currently selected server configuration, determine an address of the identified server, and compare the n-bit identified of the server from the TCP packet to the n-bit identified of the server determined from the server configuration information of the currently selected server configuration. It will be appreciated that these steps correspond to steps 430 - 450 of method 400 of FIG. 4 , and, thus, that method 400 of FIG. 4 may be modified to support this type of iterative checking for server changes based on multiple server configurations maintained by LB 130 . These types of embodiments allow LB 130 to maintain TCP connections across configuration changes, and to dynamically adjust weights without forcing clients to reconnect existing connections.
  • TCP keep-alive packets may be utilized for applications in which relatively few data packets are expected to be sent and, thus, the TCP connection would timeout in the absence of use of the TCP keep-alive packets.
  • TCP keep-alive packets may be utilized for preventing any Network Address Translation (NAT) device(s) on the path between the client and the server from timing out. It will be appreciated that TCP keep-alive packets also may be used for various other purposes.
  • NAT Network Address Translation
  • TCP keep-alive packets it may be desirable to filter TCP keep-alive packets at some point in the network that is between the client and server ends of a TCP connection, so as to reduce the number of TCP keep-alive packets that need to traverse the entire path between the client and server ends of the TCP connection and to reduce the processing overhead on the server end of the TCP connection for processing of the TCP keep-alive packets.
  • a proxy device that is disposed between two ends of a TCP connection may be used as a proxy for TCP keep-alive packets, where the proxy device is configured to filter TCP keep-alive packets sent from clients such that the TCP keep-alive packets are not forwarded to the associated servers while also issuing TCP keep-alive packets to servers on behalf of clients.
  • LB 130 may be configured to operate as a proxy for TCP keep-alive packets exchanged between clients 110 and servers 120 , thereby reducing the amount of TCP keep-alive packets sent from LB 130 to the servers 120 and reducing the processing overhead on the servers 120 for processing of TCP keep-alive packets from the clients 110 .
  • the LB 130 may operate as a proxy for TCP keep-alive packets exchanged between clients 110 and servers 120 by recognizing and filtering TCP keep-alive packets received from the clients 110 for TCP connections supported by the servers 120 .
  • LB 130 is configured to statelessly recognize TCP keep-alive packets (e.g., in order to distinguish TCP keep-alive packets from other types of TCP packets), such that the different TCP packet types may be appropriately handled by the LB 130 (e.g., filtering TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections, while allowing other TCP packet types to be forwarded to the appropriate servers 120 such that the associated TCP connections are not impacted).
  • TCP keep-alive packets e.g., in order to distinguish TCP keep-alive packets from other types of TCP packets
  • the different TCP packet types may be appropriately handled by the LB 130 (e.g., filtering TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections, while allowing other TCP packet types to be forwarded to the appropriate servers 120 such that
  • TCP keep-alive packets may have different characteristics for different TCP implementations (e.g., as described in RFC 1122 ).
  • TCP keep-alive packets for a TCP connection typically have (1) a payload of zero bytes (e.g., for LINUX-based OSs) or a payload of one byte (e.g., for WINDOWS-based OSs) and (2) a server sequence number for the server 120 of the TCP connection that is one less than the client sequence number of the client 110 of the TCP connection.
  • TCP keep-alive packets also may have characteristics that are the same as or similar to characteristics of one or more other types of TCP packets (e.g., in certain TCP implementations, TCP ACK packets, TCP data packets, and TCP keep-alive packets may have empty payloads), such that it may be difficult to distinguish TCP keep-alive packets from one or more other types of TCP packets.
  • LB 130 may be configured to recognize TCP keep-alive packets in a reliable manner such that LB 130 may properly filter such TCP keep-alive packets without incorrectly filtering other types of TCP packets (e.g., TCP ACK packets, TCP data packets with 0-byte payloads, and the like) which should not be filtered due to the fact that such filtering may disturb the associated TCP connections for which the other types of TCP packets are sent.
  • TCP ACK packets e.g., TCP ACK packets, TCP data packets with 0-byte payloads, and the like
  • the LB 130 may be configured, based on information indicative of one or more characteristics of TCP keep-alive packets for a TCP implementation, to support recognition of TCP keep-alive packets for that TCP implementation.
  • one or more of the clients 110 may be WINDOWS-based clients (e.g., having a WINDOWS-based client OS 112 ).
  • a TCP keep-alive packet includes a one-byte payload of “ ⁇ 0”.
  • LB 130 may be configured to determine whether a received TCP packet is a TCP keep-alive packet (as opposed to some other type of TCP packet) when the TCP packet includes a one-byte payload.
  • LB 130 may be configured to determine a length of the payload of a received TCP packet, determine whether the payload of the TCP packet includes a value of “ ⁇ 0” (or other appropriate value) based on a determination that the length of the payload of the TCP packet is one byte, and determine whether the TCP packet is a TCP keep-alive packet based on the determination as to whether the payload of the TCP packet has a value of “ ⁇ 0” (e.g., identify the TCP packet as being a TCP keep-alive packet when the payload of the TCP packet has a value of “ ⁇ 0” or identify the TCP packet as a being a TCP packet other than a TCP keep-alive packet when the payload of the TCP packet has a value other than “ ⁇ 0”).
  • ⁇ 0 e.g., identify the TCP packet as being a TCP keep-alive packet when the payload of the TCP packet has a value of “ ⁇ 0” or identify the TCP packet as a being
  • one or more of the clients 110 may be LINUX-based clients (e.g., having a LINUX-based client OS 112 ).
  • a TCP keep-alive packet includes an empty payload.
  • some other types of TCP packets also may have empty payloads (e.g., a TCP ACK packet, a TCP data packet with a 0-byte payload, or the like), such that reliable recognition of TCP keep-alive packets for LINUX-based clients is expected to be more difficult than reliable recognition of TCP keep-alive packets for WINDOWS-based clients.
  • the server 120 and LB 130 may be configured to cooperate in a manner for enabling the LB 130 to recognize TCP keep-alive packets on the TCP connection and, thus, to distinguish TCP keep-alive packets on the TCP connection (e.g., to be filtered by LB 130 ) from other types of TCP packets on the TCP connection (e.g., to be forwarded by the LB 130 to the server 120 for the client 110 ).
  • the reliable recognition of TCP keep-alive packets by LB 130 for a TCP connection between a client 110 and a server 120 via the LB 130 is provided via configuration of the server 120 and the LB 130 in a manner that enables the LB 130 to recognize TCP keep-alive packets of the TCP connection.
  • recognition of TCP keep-alive packets by LB 130 may be supported by: (1) configuring the server 120 and the LB 130 to support a parity rule indicative that a first parity (odd or even) is associated with TCP keep-alive packets and a second parity (odd or even, but different than the first parity) is associated with other types of TCP packets (e.g., at those types of TCP packets which may have zero-byte payloads and, thus, may be mistaken by the load balancer for TCP keep-alive packets, (2) configuring the server 120 to evaluate various conditions based on received TCP packets and, where necessary, to manipulate TCP packets sent by the server 120 , in order to maintain the parity rule agreed to by the server 120 and the LB 130 for recognition of TCP keep-alive packets, and (3) configuring LB 130 to evaluate various conditions based on received TCP packets in order for determining whether the received TCP packets are TCP keep-alive packets or T
  • parity rule configured on the server 120 and the LB 130 may dictate the conditions used by the server 120 and the LB 130 for supporting recognition of TCP keep-alive packets by the LB 130 . More detailed descriptions of these and various other related embodiments follow.
  • the server 120 is configured to select the initial server sequence number for a TCP connection in a particular way that will enable LB 130 to distinguish between a 0-byte TCP keep-alive packet on the TCP connection and other types of 0-byte TCP packets which may be exchanged using the TCP connection (e.g., the 0-byte ACK packet sent by the client 110 , a 0-byte data packet which may be sent by the client 110 , or the like).
  • An exemplary embodiment is depicted and described with respect to FIG. 6 .
  • FIG. 6 depicts one embodiment of a method for selecting the initial server sequence number for a TCP connection in a manner enabling a load balancer to recognize TCP keep-alive packets on the TCP connection.
  • the steps of method 600 may be performed by a server (e.g., a server 120 depicted and described with respect to FIG. 1 ). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 600 may be performed contemporaneously or in a different order than presented in FIG. 6 .
  • step 601 method 600 begins.
  • a TCP SYN packet is received.
  • the TCP SYN packet includes an initial client sequence number for the TCP connection.
  • a parity of the initial client sequence number for the TCP connection is determined
  • an initial server sequence number is selected for the TCP connection based the parity of the initial client sequence number for the TCP connection and a parity rule supported by the server and the load balancer.
  • the initial server sequence number is selected to have an odd parity if the parity of the initial client sequence number is odd and is selected to have an even parity if the parity of the initial client sequence number is even.
  • the initial server sequence number is selected to have the same parity as the least significant bit (LSB, bit# 0 ) of the initial client sequence number from the TCP SYN packet.
  • the initial server sequence number is selected to have an even parity if the parity of the initial client sequence number is odd and is selected to have an odd parity if the parity of the initial client sequence number is even.
  • the initial server sequence number is selected to have the inverse parity of the LSB (bit# 0 ) of the initial client sequence number from the TCP SYN packet.
  • the server 120 may select the initial server sequence number, a 32 bit number, as follows: [ ⁇ n lowest bits of address of server 120 > ⁇ 32-n-1 arbitrary bits> ⁇ parity bit (bit 0 )>].
  • a TCP SYN+ACK packet including the initial server sequence number is generated.
  • the TCP SYN+ACK packet is propagated toward the load balancer. It will be appreciated that the TCP SYN+ACK packet including the initial server sequence number also is ultimately propagated from the load balancer to the client, such that the server 120 is able to control the parity of the sum of the SEQ and ACK fields generated by the client 110 via control over the initial server sequence number and control over the amount of response bytes it sends.
  • step 699 method 600 ends.
  • the server 120 is configured to perform processing in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client 110 will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet.
  • An exemplary embodiment is depicted and described with respect to FIG. 7 .
  • FIG. 7 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a server in a manner for enabling a load balancer to recognize TCP keep-alive packets on the TCP connection.
  • a server e.g., a server 120 depicted and described with respect to FIG. 1 . It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 700 may be performed contemporaneously or in a different order than presented in FIG. 7 .
  • step 701 method 700 begins.
  • the server receives a TCP packet of a TCP connection.
  • the TCP packet includes a sequence number field (SEQ) including a client sequence number (client-seq) and an acknowledgment field (ACK) including a client acknowledgement number (client-ack).
  • SEQ sequence number field
  • ACK acknowledgment field
  • client-ack client acknowledgement number
  • the server determines the length of the TCP response packet to be sent from the server to the client in response to the received TCP packet.
  • the server calculates the next client sequence number (client-seq') for the next TCP response to be sent by the client in response to the TCP response packet to be sent from the server to the client.
  • the server calculates the next client sequence number client-seq' as a sum of the client sequence number of the received TCP packet (client-seq) and a data length of the received TCP packet.
  • the server calculates the next client acknowledgment number (client-ack') for the next TCP response to be sent by the client in response to the TCP response packet to be sent from the server to the client.
  • the server calculates the next client acknowledgment number client-ack' as a sum of the client acknowledgement number of the received TCP packet (client-ack) and the length of the TCP response packet to be sent by the server (before any associated manipulation which may be performed by the server).
  • the server determines the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client.
  • the server determines the parity of the next TCP response packet to be sent by the client based on the next client sequence number (client-seq') for the next TCP response packet to be sent by the client and the next client acknowledgment number (client-ack') for the next TCP response packet to be sent by the client.
  • the server determines the parity of the next TCP response packet to be sent by the client using the test ((LSB of client-seq'+LSB of client-ack') & 1).
  • the server determines whether to manipulate the TCP response packet to be sent from the server to the client.
  • the server determines whether to manipulate the TCP response packet to be sent from the server to the client based on a determination as to whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client (again, before any associated manipulation which may be performed by the server) will be improperly recognized by the load balancer as a TCP keep-alive packet.
  • the server determines whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client will be improperly recognized by the load balancer as a TCP keep-alive packet based on the parity of the next TCP response packet to be sent by the client and a parity rule used by the server and the load balancer.
  • the parity rule indicates an expected parity of a TCP keep-alive packet (e.g., an indication as to whether even or odd parity indicates a TCP keep-alive packet).
  • the server determines whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client will be improperly recognized by the load balancer as a TCP keep-alive packet by determining whether the parity of the next TCP response packet to be sent by the client matches the expected parity of the TCP keep-alive packet.
  • the server based on a determination that the parity of the next TCP response packet to be sent by the client does not match the expected parity of the TCP keep-alive packet, generates the TCP response without manipulation of the TCP response (illustratively, method 700 proceeds to step 770 ).
  • the server based on a determination that the parity of the next TCP response packet to be sent by the client matches the expected parity of the TCP keep-alive packet, generates the TCP response including manipulating the TCP response (illustratively, method 700 proceeds to step 780 ).
  • the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be odd (1).
  • step 770 If the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client is even, the load balancer will not improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet and, thus, method 700 proceeds to step 770 since no manipulation of the TCP response packet of the server is needed.
  • step 780 manipulation of the TCP response packet of the server may be performed.
  • the load balancer will not improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet and, thus, method 700 proceeds to step 770 since no manipulation of the TCP response packet of the server is needed.
  • step 780 manipulation of the TCP response packet of the server may be performed.
  • step 770 the server generates the TCP response packet without manipulating the TCP response packet.
  • the typical manner in which such a TCP response packet may be generated will be understood by one skilled in the art. From step 770 , method 700 proceeds to step 790 .
  • the server generates the TCP response including a manipulation of the TCP response of the server such that the next TCP response packet to be sent by the client in response to the TCP response of the server is not incorrectly identified as a TCP keep-alive packet.
  • the server may manipulate the TCP response by padding the TCP response with one or more bytes.
  • the server may pad the TCP packet with one or more bytes in any suitable manner, which may depend on the application being supported by the TCP connection.
  • the server may choose the location and contents of the padding byte(s) such that the application layer protocol is not impacted.
  • a custom header could be inserted having a length of an odd number of bytes (like “X:p ⁇ r ⁇ n”, which is 5 bytes).
  • a whitespace character e.g., space—ASCII 0x20—or newline—ASCII 0x0a
  • XML message e.g., as used by XMPP or HTML response bodies
  • Various other protocols may have various other options for padding of one or more bytes (although at least some such protocols may require other modifications in order to support addition of one or more padding bytes).
  • the padding of the TCP packet by the server 120 may be performed in any suitable manner.
  • the TCP stack of the server may perform the padding of the TCP packet in a manner that is transparent to the application layer protocol.
  • the TCP stack of the server may provide TCP packet padding information to the application for use by the application to perform the padding of the TCP packet (e.g., a hint as to whether the application needs to send an odd or even number of bytes as response).
  • padding of the TCP packet may be performed at the application layer without the application layer requiring TCP packet padding information from the TCP stack of the server. From step 770 , method 700 proceeds to step 790 .
  • the server propagates the TCP response packet toward the load balancer. It will be appreciated that the TCP response packet also is ultimately propagated from the load balancer to the client.
  • step 799 method 700 ends.
  • the LB 130 is configured to receive a TCP packet and determine whether or not the TCP packet is a TCP keep-alive packet (as opposed to some other type of TCP packet).
  • An exemplary embodiment is depicted and described with respect to FIG. 8 .
  • FIG. 8 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a load balancer for determining whether the TCP packet is a TCP keep-alive packet.
  • the steps of method 800 may be performed by a load balancer (e.g., LB 130 depicted and described with respect to FIG. 1 ). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 800 may be performed contemporaneously or in a different order than presented in FIG. 8 .
  • step 801 method 800 begins.
  • a TCP packet is received.
  • the TCP packet includes a sequence number field (SEQ) including a client sequence number (client-seq) and an acknowledgment field (ACK) including a client acknowledgment number (client-ack).
  • SEQ sequence number field
  • ACK acknowledgment field
  • an empty payload i.e., the length of the payload of the TCP packet is zero
  • the parity of the TCP packet is determined.
  • the parity of the TCP packet may be determined based on the client sequence number (client-seq) and the client acknowledgment number (client-ack).
  • the parity of the TCP packet may be determined based on ((LSB of client-seq+LSB of client-ack) & 1).
  • the parity rule is indicative as to whether the parity of TCP keep-alive packets is to be odd (0) or even (1). For example, if the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be odd, then the packet is identified as being a TCP keep-alive packet if the parity of the TCP packet is odd and is not identified as being a TCP keep-alive packet if the parity of the TCP packet is even.
  • the packet is identified as being a TCP keep-alive packet if the parity of the TCP packet is even and is not identified as being a TCP keep-alive packet if the parity of the TCP packet is odd.
  • the server may be configured to use a similar parity test for determining whether the load balancer will improperly recognize a next TCP response to be sent by the client as a TCP keep-alive packet and, thus, to determine whether or not the next TCP response packet sent by the server is to be manipulated (e.g., as depicted and described with respect to method 700 of FIG. 7 ). If the TCP packet is not a TCP keep-alive packet, method 800 proceeds to step 850 . If the TCP packet is a TCP keep-alive packet, method 800 proceeds to step 860 .
  • the TCP packet is processed in a manner for handling TCP packets other than TCP keep-alive packets.
  • the TCP packet may be forwarded toward an appropriate server.
  • the TCP packet may be processed as depicted and described with respect to method 400 of FIG. 4 .
  • the TCP packet may be handled in any other suitable manner. From step 850 , method 800 proceeds to step 899 .
  • the TCP keep-alive packet is processed in a manner for handling TCP keep-alive packets. For example, a corresponding TCP keep-alive response may be sent to the client without the TCP keep-alive packet being forwarded to the server.
  • the TCP keep-alive packet may be handled in any other suitable manner. From step 860 , method 800 proceeds to step 899 .
  • step 899 method 800 ends.
  • a server 120 and LB 130 in enabling LB 130 to recognize TCP keep-alive packets of a TCP connection between a client 110 and the server 120 may be better understood by considering a typical TCP packet exchange between the client 110 and the server 120 that traverses the LB 130 .
  • the parity rule maintained by the server 120 and the LB 130 indicates that odd parity is indicative of a TCP keep-alive packet (although it will be appreciated that the example could be modified for the case in which even parity is indicative of a TCP keep-alive packet).
  • the TCP connection starts with an initial three-way handshake as follows.
  • the client 110 sends a TCP SYN packet including an initial client sequence number (denoted as client-seq) and an ACK value of “0”.
  • the TCP ACK packet sent from the client 110 to the server 120 typically does not include any data (i.e., the payload is empty). The manner in which the LB 130 may operate on the three TCP packets of this initial three-way handshake is ignored for the moment.
  • the initial three-way handshake for the TCP connection may be expressed as (shown here as 31:1 bits):
  • the LB 130 receives the TCP ACK packet from client 110 .
  • the LB 130 is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP ACK packet has been received (as opposed to a TCP keep-alive packet or some other type of TCP packet).
  • the LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet (as is the case), a TCP keep-alive packet, or a TCP data packet with an empty payload.
  • the LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward the server 120 ).
  • the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward the server 120 ).
  • TCP packet exchange may be expressed as (shown here as 31:1 bits):
  • the LB 130 receives the TCP ACK packet from client 110 .
  • the LB 130 again, is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP ACK packet has been received (as opposed to a TCP keep-alive packet or some other type of TCP packet).
  • the LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet (as is the case), a TCP keep-alive packet, or a TCP data packet with an empty payload.
  • the LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the received TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward the server 120 ).
  • the received TCP packet e.g., using (LSB of client-seq+LSB of client-ack) & 1
  • the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the received TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward
  • the server 120 would have had to manipulate its TCP response packet in a manner for preventing LB 130 from falsely identify the subsequent ACK packet from the client as a TCP keep-alive packet (e.g., manipulating itsTCP response such that it also includes an odd number of bytes).
  • TCP keep-alive packet In general, if the TCP keep-alive feature is enabled for the TCP connection and the TCP connection remains idle for a (configurable) period of time, the TCP stack 113 of the client 110 will send the TCP keep-alive packet in order to verify that the TCP connection is still working.
  • This TCP keep-alive packet may be expressed as:
  • the LB 130 receives the TCP keep-alive packet from client 110 .
  • the LB 130 again, is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP keep-alive packet has been received (as opposed to a TCP ACK packet or some other type of TCP packet).
  • the LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet, a TCP keep-alive packet (as is the case), or a TCP data packet with an empty payload.
  • the LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is one, such that LB 130 determines that the received TCP packet is a TCP keep-alive packet and initiates appropriate handling of the TCP packet (e.g., sending a TCP keep-alive response packet to the client 110 while also filtering the TCP keep-alive packet to prevent forwarding of the TCP keep-alive packet to the server 120 ).
  • the LB 130 may only need to be configured to identify TCP keep-alive packets for a specific type of TCP implementation. For example, where LB 130 performs stateless TCP load balancing for TCP connections of an application which may only may be used by LINUX-based clients (or other similar types of TCP implementations), LB 130 does not necessarily need to include logic for detecting TCP keep-alive packets for other types of TCP implementations (e.g., LB 130 may not perform any additional processing to check TCP packets having one-byte payloads).
  • LB 130 performs stateless TCP load balancing for TCP connections of an application which may only be used by WINDOWS-based clients (or other similar types of TCP implementations)
  • LB 130 does not necessarily need to include logic for detecting TCP keep-alive packets for other types of TCP implementations (e.g., LB 130 may not perform any additional processing to check TCP packets having zero-byte payloads).
  • LB 130 may be configured to identify TCP keep-alive packets for other types of TCP implementations in which the TCP keep-alive packets may have other sets of characteristics associated therewith (e.g., other payload lengths, different types of payload values, other flag combinations, or the like, as well as various combinations thereof).
  • the server is configured to perform processing in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet
  • the processing that is performed in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client 110 will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet may be performed by any other suitable element.
  • a stateful NAT gateway located between the server 120 and the client 110 might perform the required modification to the TCP response packet sent from the server 120 to the client 110 .
  • the server of a TCP connection is configured to perform manipulation of TCP response packets of the server such that the next TCP response to be sent by the client in response to the TCP response of the server is not incorrectly identified as a TCP keep-alive packet
  • manipulation by the server may not be needed if the client supports TCP timestamps (e.g., determined by the presence of a TCP timestamp option header in the SYN packet sent by client, as specified in RFC 1323).
  • the server may be configured to identify that the client supports TCP timestamps and to add a timestamp option header to the TCP response packets that the server sends to the client, where one bit of the value inserted by the server (e.g., the LSB) is designated as a parity bit and set to an appropriate parity value based on the test ((LSB of client-seq'+LSB of client-ack') & 1) as previously discussed.
  • the LSB one bit of the value inserted by the server
  • the LSB is designated as a parity bit and set to an appropriate parity value based on the test ((LSB of client-seq'+LSB of client-ack') & 1) as previously discussed.
  • the load balancer may be configured to first check for the presence of a timestamp option header in a received TCP packet and to then perform a test (((LSB of client-seq'+LSB of client-ack'+timestamp.ecr) & 1), where “timestamp.ecr” is the value of the ‘ecr’ field in the timestamp option header (which is set by the client 110 to be equal to the value of the timestamp last sent by server 120 )).
  • the load balancer 130 may then determine whether or not a received TCP packet is a TCP keep-alive packet based on the result of the test ((LSB of client-seq'+LSB of client-ack'+timestamp.ecr) & 1) and the parity rule supported by the load balancer 130 and the server 120 .
  • TCP keep-alive packet detection may result in false positives (i.e., false identification of a TCP packet as a TCP keep-alive packet when in fact it is not a TCP keep-alive packet).
  • false positives i.e., false identification of a TCP packet as a TCP keep-alive packet when in fact it is not a TCP keep-alive packet.
  • the server 120 sends a multi-segmented TCP response, because the associated client 110 may acknowledge every second TCP segment of the TCP response with a TCP packet having a 0-byte payload that might be wrongly identified by the load balancer 130 as being a TCP keep-alive packet, in which case the server 120 would not receive TCP window updates and, thus, may stop sending on the TCP connection.
  • the potential false positive problem for multi-segmented TCP responses of a TCP connection may be avoided by configuring the server 120 to correct the parity of the TCP connection when the first server data segment of the TCP connection is sent by the server 120 .
  • the LINUX-based OS typically sends a TCP response as (N*max-segment-size (MSS)) packets plus a final packet for the remainder of the TCP response, where MSS is typically even (e.g., 1460 or any other suitable value).
  • the first segment sent by the server 120 may be configured to include MSS-1 bytes in order to maintain even parity for the TCP connection, and then the rest of the data of the TCP response may be sent in the usual manner.
  • the Network Interface Card (NIC) of the client 110 that is supporting the TCP connection may include a feature known as TCP Segmentation Offload (TSO), which may need to be disabled in order for the server 120 to be able to correct the size of the first server data segment of the TCP connection that is sent by the server 120 .
  • TSO TCP Segmentation Offload
  • the potential false positive problem for multi-segmented TCP responses of a TCP connection may be avoided based on the advertised window size of the TCP connection.
  • the load balancer 130 may be configured to evaluate the advertised window size based on an assumption that a smaller advertised window size indicates that the TCP packet is less likely to be a TCP keep-alive packet.
  • window scaling which is typically only announced in the initial SYN/ACK exchange between the client 110 and the server 120
  • the absolute value of the advertized window size in individual packets of the TCP connection can be hard to interpret.
  • window scaling may be disabled on the client 110 in order to make the evaluation of the advertised window size of TCP packets more accurate, however, certain types of clients (e.g., WINDOWS-based clients) may still send 0-byte TCP ACK packets with a large window size (which might wrongly be identified as TCP keep-alive packets).
  • clients e.g., WINDOWS-based clients
  • TCP keep-alive packet detection and filtering may be advantageous for various types of applications and TCP implementations. It will be further appreciated that use of TCP keep-alive packet detection and filtering may be particularly advantageous for use by applications that send TCP keep-alive packets with a relatively high frequency (e.g., relative to transmission of TCP requests and responses via the TCP connections, relative to other applications, or the like).
  • An example of one such application is an application that uses the WebSocket protocol, which is implemented in various browser versions, in which TCP keep-alive messages are sent every 45 seconds.
  • an otherwise idle TCP connection sends a packet of at least 54 bytes (e.g., may be 55 bytes for a WINDOWS-based client, and may be more if timestamps are used).
  • These relatively small packets can, in many cases, represent a significant percentage of the traffic on the TCP connection.
  • the TCP keep-alive packets represent approximately 50% of the traffic exchanged on the TCP connection. Accordingly, use of embodiments of TCP keep-alive packet detection and filtering to handle such TCP keep-alive packets at the load balancer, rather than at the server, would reduce the bandwidth between the load balancer and the server by approximately 50%.
  • a load balancer protection scheme may be used in order to protect against load balancer failures (e.g., a 1:1 protection scheme, a 1:N protection scheme, or the like).
  • the second load balancer may not have any historical information indicative of how TCP connections have been distributed across the set of servers used by the first load balancer to perform load balancing and, thus, may determine a new distribution based on the set of servers to be used by the second load balancer to perform load balancing (even though existing TCP connections were arranged according to the distribution of the first load balancer).
  • the second load balancer may, for a configurable period after startup or after beginning load balancing, enter a learning mode.
  • the configurable period may be measured based on one or more of a number of packets processed before leaving the learning mode, a percentage of mapping entries to have been learned during the learning mode, a fixed time interval, or the like).
  • the second load balancer rather than responding negatively to an incoming TCP keep-alive packet based on a determination that there is a mismatch between the server index of the TCP keep-alive packet (e.g., upper n bits of the sequence number or any other suitable encoding of server index within the TCP keep-alive packet) and the server index calculated by the second load balancer based on receipt of the TCP keep-alive packet, updates its mapping information with the mapping information from the TCP keep-alive packet (i.e., use of the existing server index from the TCP keep-alive packet) and forwards the TCP keep-alive packet to the server indicated by the server index included within the TCP keep-alive packet (rather than the computed server index).
  • the second load balancer is able to reconstruct at least a portion of the load balancing configuration that the first load balancer was using from the TCP keep-alive packets that the second load balancer receives from the associated clients.
  • the second load balancer also may collect other types of information which also may have been collected by the first load balancer when the first load balancer was active (e.g., server response times, server load information, or the like, as well as various combinations thereof).
  • the second load balancer may transition from the learning mode to an operating mode in which the second load balancer will interpret a mismatch between the server index of the TCP keep-alive packet and the server index calculated by the second load balancer based on receipt of the TCP keep-alive packet as an indication that the server of the TCP connection has changed, as previously described. It will be appreciated that use of one or more such transition modes (e.g., the learning mode discussed above) may enable a more smooth transition between load balancers in various failover scenarios.
  • one or more of the functions presented herein may be provided by any suitable type of device(s) or element(s) configured to provide a load balancing function (e.g., a network device of a communication server provider, a device or element of a data center hosting one or more servers, or the like).
  • a load balancing function e.g., a network device of a communication server provider, a device or element of a data center hosting one or more servers, or the like.
  • a load balancer is configured to provide various functions depicted and described herein
  • one or more of the functions presented herein as being performed by a load balancer may be performed by one or more other types of devices or elements.
  • stateless handling of connections may be supported.
  • Various embodiments may be provided for supporting stateless management of connections of one or more other types of protocols (e.g., one or more other protocols at the transport layer of the OSI model, one or more other protocols at the transport layer of the IP Suite, one or more protocols at one or more other layers of the OSI model, one or more protocols at one or more other layers of the IP Suite, one or more other protocols which may have one or more characteristics derived from or similar to TCP, one or more other connection-oriented protocols which may be managed in a stateless manner using various embodiments presented herein, or the like, as well as various combinations thereof).
  • TCP-specific terms used herein may be read more generally.
  • references herein to TCP SYN packets may be read more generally as synchronization packets or synchronization messages
  • references herein to TCP SYN+ACK packets may be read more generally as synchronization+acknowledgment packets (or synchronization and acknowledgment) packets or synchronization+acknowledgment packets (or synchronization and acknowledgment) messages
  • references herein to TCP keep-alive packets may be read more generally as keep-alive packets or messages, and so forth.
  • Various other protocol-specific terms used herein also may be read more generally in a similar manner.
  • various embodiments depicted and described herein within the context of TCP may be provided within the context of various other types of protocols and environments.
  • FIG. 9 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
  • the computer 900 includes a processor 902 (e.g., a central processing unit (CPU) or other suitable processor(s)) and a memory 904 (e.g., random access memory (RAM), read only memory (ROM), and the like).
  • processor 902 e.g., a central processing unit (CPU) or other suitable processor(s)
  • memory 904 e.g., random access memory (RAM), read only memory (ROM), and the like.
  • the computer 900 also may include a cooperating module/process 905 .
  • the cooperating process 905 can be loaded into memory 904 and executed by the processor 902 to implement functions as discussed herein and, thus, cooperating process 905 (including associated data structures) can be stored on a computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette, and the like.
  • the computer 900 also may include one or more input/output devices 906 (e.g., a user input device (such as a keyboard, a keypad, a mouse, and the like), a user output device (such as a display, a speaker, and the like), an input port, an output port, a receiver, a transmitter, one or more storage devices (e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like), or the like, as well as various combinations thereof).
  • a user input device such as a keyboard, a keypad, a mouse, and the like
  • a user output device such as a display, a speaker, and the like
  • an input port such as a display, a speaker, and the like
  • an output port such as a receiver, a transmitter
  • storage devices e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like
  • computer 900 depicted in FIG. 9 provides a general architecture and functionality suitable for implementing functional elements described herein or portions of functional elements described herein.
  • the computer 900 provides a general architecture and functionality suitable for implementing one or more of a client 110 , a portion of a client 110 , a server 120 , a portion of a server 120 , load balancer 130 , a portion of load balancer 130 , or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A capability is provided for statelessly load balancing Transmission Control Protocol (TCP) connections across a set of servers. A load balancer receives a TCP SYN packet from a client, selects a server for a TCP connection for the client, forms a modified TCP SYN packet including an address of the client, and propagates the modified TCP SYN packet toward the server. The server receives the modified TCP SYN packet, forms a TCP SYN+ACK packet including an identifier (e.g., n bits of an address, an n-bit server index based on mapping information of the load balancer, or the like) of the server, and propagates the modified TCP SYN+ACK packet toward the load balancer. The load balancer receives a TCP packet from the client on the TCP connection, determines a server associated with the TCP connection based on information included within the TCP packet, and propagates the TCP packet toward the server.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 13/887,523, filed on May 6, 2013, entitled STATELESS LOAD BALANCING OF CONNECTIONS, which is hereby incorporated herein by reference.
  • TECHNICAL FIELD
  • The disclosure relates generally to communication networks and, more specifically but not exclusively, to stateless handling of Transmission Control Protocol (TCP) connections.
  • BACKGROUND
  • There are various situations in which it may be necessary or desirable to deploy multiple servers to support connections with client devices. The connections may include any types of connections suitable for supporting client/server transactions, such as Transmission Control Protocol (TCP) connections or other types of connections. Additionally, in at least some situations, it may be necessary or desirable to balance the connections across multiple servers using one or more load balancers. Disadvantageously, however, typical physical load balancers are inflexible and cannot be scaled up or down dynamically based on load, and typical software-based load balancers are stateful and do not handle addition or removal of servers gracefully.
  • SUMMARY OF EMBODIMENTS
  • Various deficiencies in the prior art may be addressed by embodiments for stateless load balancing of connections, such as Transmission Control Protocol (TCP) connections, across a set of servers.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive a synchronization message including a source address field including an address of a client from which the synchronization message is received and a destination address field including an address of a load balancer. The processor is configured to select a server to support a connection for the client. The processor is configured to form, based on the synchronization message, a modified synchronization message including a source address field including the address of the load balancer, a destination address field including an address of the server, and the address of the client. The processor is configured to propagate the modified synchronization message toward the selected server. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive a TCP SYN packet including a source address field including an address of a client from which the TCP SYN packet is received and a destination address field including an address of a load balancer. The processor is configured to select a server to support a TCP connection for the client. The processor is configured to form, based on the TCP SYN packet, a modified TCP SYN packet including a source address field including the address of the load balancer, a destination address field including an address of the server, and the address of the client. The processor is configured to propagate the modified TCP SYN packet toward the selected server. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive, from a load balancer, a synchronization message including an address of the server and an n-bit server identifier of the server. The processor is configured to generate a synchronization-acknowledgment message including the n-bit server identifier of the server. The processor is configured to propagate the synchronization-acknowledgment message toward the load balancer. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive, from a load balancer, a TCP SYN packet including an address of the server and an n-bit server identifier of the server. The processor is configured to generate a TCP SYN+ACK packet including the n-bit server identifier of the server. The processor is configured to propagate the TCP SYN+ACK packet toward the load balancer. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive a message of a connection from a client, where the message includes an n-bit identifier of a server indicated by the client for the connection. The processor is configured to determine an n-bit identifier of a server for the connection based on server configuration information. The processor is configured to determine handling of the message based on a comparison of the n-bit identifier of the server indicated by the client for the connection and the n-bit identifier of the server determined based on the server configuration information. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • In one embodiment, an apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive a TCP packet of a TCP connection from a client, where the TCP packet includes an n-bit identifier of a server indicated by the client for the TCP connection. The processor is configured to determine an n-bit identifier of a server for the TCP connection based on server configuration information. The processor is configured to determine handling of the TCP packet based on a comparison of the n-bit identifier of the server indicated by the client for the TCP connection and the n-bit identifier of the server determined based on the server configuration information. In one embodiment, a corresponding method is supported. In one embodiment, a computer-readable storage medium stores instructions which, when executed by a computer, cause the computer to perform a corresponding method.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The teachings herein can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
  • FIG. 1 depicts an exemplary communication system including a load balancer configured to provide stateless load balancing of TCP connections across a set of servers;
  • FIG. 2 depicts one embodiment of a method for processing a TCP SYN packet of a client at a load balancer to form a modified TCP SYN packet for a server selected by the load balancer to provide the TCP connection for the client;
  • FIG. 3 depicts one embodiment of a method for processing a TCP SYN packet of a load balancer at a server selected by the load balancer to provide a TCP connection for a client;
  • FIG. 4 depicts one embodiment of a method for processing TCP packets of a TCP connection of a client at a load balancer in a manner for statelessly ensuring delivery of packets server selected by the load balancer to provide the TCP connection for the client;
  • FIG. 5 depicts one embodiment of a method for use by a load balancer in managing server configuration information of a set of servers for use in supporting stateless load balancing of TCP connections across the set of servers;
  • FIG. 6 depicts one embodiment of a method for selecting the initial server sequence number for a TCP connection in a manner enabling a load balancer to recognize TCP keep-alive packets on the TCP connection;
  • FIG. 7 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a server in a manner for enabling a load balancer to recognize TCP keep-alive packets on the TCP connection;
  • FIG. 8 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a load balancer for determining whether the TCP packet is a TCP keep-alive packet; and
  • FIG. 9 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
  • To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • In general, a capability for supporting stateless management of connections is provided.
  • In at least some embodiments, a capability for supporting stateless management of Transmission Control Protocol (TCP) connections is provided. The stateless management of TCP connections may include performing stateless load balancing of TCP connections across a set of servers, stateless detection and handling of TCP keep-alive packets, or the like, as well as various combinations thereof. In at least some embodiments, the functions are stateless in the sense that state is not maintained per TCP connection.
  • In at least some embodiments, stateless management of TCP connections is provided by a stateless TCP connection load balancer.
  • In at least some embodiments, the stateless TCP connection load balancer is configured to perform stateless load balancing of TCP connections across a set of servers. In at least some embodiments, the stateless TCP connection load balancer is configured to perform stateless load balancing of TCP connections across a set of servers based on server configuration information for the set of servers, including updating the server configuration information for the set of servers in response to changes associated with the set of servers such that changes to the servers supporting TCP connections may be identified and, thus, the TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the set of servers.
  • In at least some embodiments, the stateless TCP connection load balancer may be configured to perform stateless detection and handling of TCP keep-alive packets. The stateless TCP connection load balancer may be configured to perform stateless detection and handling of TCP keep-alive packets without maintaining TCP sequence number state per TCP connection. The stateless TCP connection load balancer may be configured to detect and handle TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections.
  • In this manner, various embodiments of the stateless TCP connection load balancer may support traffic optimizations for topology changes (e.g., by controlling TCP reconnections performed in response to various types of topology changes) and TCP keep-alive packets (e.g., by supporting detection and filtering of TCP keep-alive packets in order to conserve various types of network and server resources).
  • It will be appreciated that, although primarily depicted and described herein with respect to specific types of networks, connections, protocols, and messages, various embodiments of the capability for supporting stateless management of TCP connections may be applied within various other types of networks, for various other types of connections, for various other types of protocols, or in conjunction with various other types of messages.
  • Various embodiments of the capability for supporting stateless management of TCP connections may be better understood by considering an exemplary communication system including a load balancer configured to provide stateless management of TCP connections for a set of servers, as depicted and described with respect to FIG. 1.
  • FIG. 1 depicts an exemplary communication system including a load balancer configured to provide stateless management of TCP connections for a set of servers.
  • The communication system 100 includes a plurality of clients 110 1-110 M (collectively, clients 110), a plurality of servers 120 1-120 N (collectively, servers 120), and a load balancer (LB) 130. The clients 110 and servers 120 may be communicatively connected to LB 130, and may communicate indirectly via LB 130 and directly independent of LB 130.
  • The clients 110 1-110 M include a plurality of client operating systems (OSs) 112 1-112 M (collectively, client OSs 112), respectively. The client OSs 112 1-112 M include a plurality of TCP stacks 113 1-113 M (collectively, TCP stacks 113), respectively, that may be configured to support TCP communications by the clients 110 1-110 M. The TCP stacks 113 may be configured to interwork with LB 130. The client OSs 112 1-112 N also support a plurality of application clients (ACs) 115 1-115 N (collectively, ACs 115), respectively. The ACs 115 of the clients 110 may support respective instances of an application provided by the servers 120. The client OSs 112 may be configured to support application layer communications, for the application of the ACs 115, using TCP and any other suitable communication protocols. For example, the clients 110 may be end user devices (e.g., desktop computers, laptop computers, tablet computers, smartphones, or the like), network devices, machines for use in machine-to-machine communications, or the like.
  • The servers 120 1-120 N include a plurality of server operating systems (OSs) 122 1-122 N (collectively, server OSs 122). The server OSs 122 1-122 N include a plurality of TCP stacks 123 1-123 N (collectively, TCP stacks 123), respectively, that may be configured to support TCP communications by servers 120 1-120 N. The TCP stacks 123 may be configured to interwork with LB 130. The server OSs 122 1-122 N may support a plurality of application servers (ASs) 125 1-125 N (collectively, ASs 125), respectively. The ASs 125 of the servers 120 may support respective instances of an application which may be used by the ACs 115 of the clients 110. The server OSs 122 may be configured to support application layer communications, for the application of the ASs 125, using TCP and any other suitable communication protocols. The server OSs 122 may be MICROSOFT WINDOWS-based OSs, LINUX-based OSs, or the like.
  • The servers 120 may be implemented in any suitable manner. For example, at least one of the servers 120 may be implemented directly on hardware (e.g., as one or more server devices including one or more dedicated processors and one or more memories), using one or more virtual machines (VMs), or the like. For example, at least one of the servers 120 may be a physical server deployed in a dedicated data center. For example, the servers 120 may be application server instances hosted on virtual machines in a virtualized environment (e.g., a dedicated data center, a cloud-based data center, or the like). In at least some embodiments, a server 120 may be identified using an n-bit server identifier.
  • The servers 120 may include any suitable numbers of servers (i.e., any suitable value of N). The number N of servers 120 which may be used to provide load balancing for TCP connections also may be dependent on the configurations and capabilities of the LB 130 and the servers 120. For example, communication system 100 may include up to 16 servers (N=16) where the LB 130 includes a single 10 G port and each of the 16 servers supports a 1 Gbps network port, such that n=4 bits. Similarly, for example, communication system 100 may include up to 32 servers (N=32) where the LB 130 includes four 10 Gbps network ports and each of the 32 servers supports a 1 G port, such that n=5 bits. Similarly, for example, communication system 100 may include up to 32 servers (N=32) where the LB 130 includes a single 100 Gbps network port and each of the 32 servers supports two 1 Gbps network ports, such that n=5 bits. The number N of servers 120 which may be used to provide load balancing for TCP connections also may be dependent on the number of bits n available for identifying the N servers 120. The n bits used to identify the servers 120 may be n address bits of the addresses of the respective servers 120, n server index bits of server index values assigned to the respective servers 120 based on a hash function used by LB 130 for distributing TCP connections across the servers 120, or the like. In general, a given server 120 has one or more addresses associated therewith (e.g., one or more of an IPv4 address, an IPv6 address, an Ethernet Media Access Control (MAC) address, a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI), or any other suitable type of address. The different address types may or may not be configured such that n bits of the respective server addresses of the servers 120 are unique, which may dictate use of n bits of the server addresses (e.g., for an address type for which n unique bits are available within the set of addresses such that the servers 120 may be uniquely identified) or n bits of the server indices (e.g., for an address type for which n unique bits are not available within the set of addresses for uniquely identifying the servers 120) to perform TCP load balancing. It will be appreciated that various other numbers of servers 120 may be used and, thus, that various other values of n may be supported. It also will be appreciated that the number of servers used or active at a given moment can be less than N.
  • The clients 110 and servers 120, as discussed herein, support an application. The application may be any suitable type of application which may be supported using TCP connections. The application may require or allow use of TCP keep-alive packets (e.g., using a WebSocket-based application or any other type of application which may utilize exchanges of TCP keep-alive packets between clients 110 and servers 120). For example, the application may be an application used by smartmeter appliances to periodically report the actual energy consumption of respective buildings to a set of servers in the network, an application used by smartphones to periodically provide location information (e.g., over HTTP) to a set of servers in the network, application supporting an IP telephony service in which clients are waiting to receive incoming calls and must traverse a Network Address Translation (NAT) device between the client and the IP telephony server, or the like. It will be appreciated that various other types of applications may be supported. The clients 110 and servers 120 may support application layer communications between the ACs 115 of clients 110 and the ASs 125 of servers 120 using various types of communication capabilities. For example, the clients 110 and the servers 120 may support various communication stacks, communication protocols, and the like. More specifically, the client OSs 112 of the clients 110 and the server OSs 122 of the servers 120 may support communications capabilities which may or may not be used to transport application layer communications between the ACs 115 of the clients 110 and the ASs 125 of the servers 120. For example, the client OSs 112 of the CDs 110 and the server OSs 122 of the servers 120 may support communications at various communication layers of the Open Systems Interconnection (OSI) model that are below the application layer; namely, at one or more of the presentation layer (e.g., using Multipurpose Internet Mail Extensions (MIME), External Data Representation (EDR), or any other suitable presentation layer protocols or communication capabilities), the session layer (e.g., using Real-Time Transport Protocol (RTP), Point-To-Point Tunneling Protocol (PPTP), or any other suitable session layer protocols or communication capabilities), the transport layer (e.g., using User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), or any other suitable transport layer protocols or communication capabilities), the network layer (e.g., using Internet Protocol (IP), Internet Control Message Protocol (ICMP), or any other suitable network layer protocols or communication capabilities), the data link layer (e.g., using Generic Framing Procedure (GFP), Asynchronous Transfer Mode (ATM), or any other suitable data link layer protocols or communication capabilities), or the physical layer (e.g., using Synchronous Optical Network (SON), Passive Optical Network (PON), or any other suitable physical layer protocols or communication capabilities).
  • The LB 130 is configured to provide stateless load balancing of TCP connections established between the client OSs 112 and the server OSs 122, such that the TCP connections of the client OSs 112 are statelessly balanced across the servers 120. The LB 130 is configured to receive TCP connection requests from client OSs 112 of clients 110 and to dynamically distribute the TCP connection requests and, thus, the TCP connections, across the servers 120. The LB 130 also is configured to ensure that packets for a given TCP connection of a client OS 112 consistently go to the server 120 selected to handle the TCP connection request and with which the TCP connection is established for the client OS 112. In this manner, LB 130 is configured to support application layer communications for the application of the ACs 115 and the ASs 125 using TCP and any other suitable communication protocols (e.g., using various layers of the OSI model of communication layers).
  • The LB 130 is configured to provide various functions related to stateless load balancing of TCP connections across the servers 120. In at least some embodiments, LB 130 may be configured to perform stateless load balancing of TCP connections across the servers 120 based on server configuration information for servers 120, including updating the server configuration information for the servers 120 in response to changes associated with the servers 120 (e.g., new server 120 added, existing server 120 failed or removed, or the like) such that changes to the servers 120 supporting TCP connections may be detected and, thus, TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the servers 120. In at least some embodiments, LB 130 may be configured to statelessly recognize TCP keep-alive packets (e.g., in order to distinguish TCP keep-alive packets from other types of TCP packets), such that the different packet types may be appropriately handled by the LB 130 (e.g., filtering TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections). The LB 130 may be configured to provide various other related functions in support of stateless balancing of TCP connections across the servers 120.
  • The LB 130 includes a processor 132 and a memory 133 communicatively connected to processor 132. The memory 133 stores one or more stateless TCP connection load balancing programs 134 which may be retrieved from memory 133 by processor 132 and executed by processor 132 in order to provide functions for stateless load balancing of TCP connections as discussed herein. The memory 133 also stores server configuration information 135 which may be used by the stateless TCP connection load balancing program(s) 134 to provide functions for stateless load balancing of TCP connections as discussed herein. The memory stores one or more stateless TCP keep-alive packet recognition and filtering programs 136 which may be retrieved from memory 133 by processor 132 and executed by processor 132 in order to provide functions for stateless recognition and filtering of TCP keep-alive packets as discussed herein. The memory 133 may store any other programs or data which may be suitable for use in providing functions of LB 130 depicted and described herein.
  • The LB 130 may be implemented in any suitable manner. For example, the LB 130 may be implemented directly on hardware (e.g., as a one or more load balancer devices including one or more dedicated processors and one or more memories), using one or more virtual machines (VMs), or the like. For example, the LB 130 may be a physical server deployed in a dedicated data center. For example, the LB 130 may be a load balancer instance hosted on one or more virtual machines in a virtualized environment (e.g., in a dedicated data center, in a cloud-based arrangement, or the like). The LB 130 may be implemented and deployed in any other manner suitable for enabling LB 130 to provide the various functions depicted and described herein. The LB 130 has at least one address associated therewith (e.g., an IP address, Ethernet MAC address, or the like).
  • The LB 130 is stateless and its stateless nature may provide various advantages. For example, the stateless nature of LB 130 enables LB 130 to be deployed in various ways which enable the LB 130 to be scaled without requiring corresponding increases in memory. For example, the stateless nature of LB 130 enables LB 130 to recover from various events or conditions (e.g., temporary failures, being moved to a different host machine, or the like) without disrupting existing TCP connections. The LB 130, in at least some embodiments in which the bottleneck to scalability of LB 130 is network I/O throughput, may be deployed in a manner for overcoming (or at least lessening the impact of) network I/O throughput bottleneck (e.g., co-locating the stateless TCP connection load balancer with one or more other network functions which are memory or CPU bound).
  • As discussed herein, in at least some embodiments the LB 130 may be configured to perform stateless load balancing of TCP connections across the servers 120 based on server configuration information for servers 120, including updating the server configuration information for the servers 120 in response to changes associated with the servers 120 (e.g., new server 120 added, existing server 120 failed or removed, or the like) such that changes to the servers 120 supporting TCP connections may be detected and, thus, TCP connections may be appropriately handled (e.g., reconnected, terminated, or the like) based on the changes associated with the servers 120. It will be appreciated that at least some such embodiments are particularly well-suited for use in a cloud-based environment in which the set of servers 120 available to handle application processing requests from clients 110 may change dynamically (e.g., in a controlled manner based on changes in demand that may cause addition of new servers 120 or removal of existing servers 120, due to crashes of servers 120, due to network issues, or the like, as well as various combinations thereof), but also may be used in various other types of environments.
  • The LB 130 is configured to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110. The LB 120 may be configured to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110 using server configuration information that includes (1) a first array which maps potential hash values of a hash function used by the LB 130 to server index values associated with the servers 120 and (2) a second array which maps the server index values associated with the servers 120 to the addresses (e.g., IP, Ethernet, or the like) of the servers 120. It will be appreciated that although primarily depicted and described with respect to use of two arrays to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110, LB 130 may be configured to use fewer or more arrays to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110. It will be appreciated that although primarily depicted and described with respect to use of arrays to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110, LB 130 may be configured to use any other suitable type(s) of data structure(s) to manage the set of servers 120 available for use in load balancing TCP connections of the clients 110.
  • The LB 130 maintains the first array which maps (1) potential hash values of a hash function used by the LB 130 to (2) server index values associated with the servers 120. The first array has a length A (i.e., supports A entries for mapping potential hash values of the hash function used by the LB 130 to the server index values associated with the servers 120. The hash may be computed over one or more header fields of TCP packets to be received and processed by LB 130 (e.g., over one or more of the source IP address (IPv4 or IPv6), the client source port, or the server destination port). The LB 130 may be configured to balance TCP connections across the servers 120 evenly or based on weightings of the servers 120. In either case, respective numbers of entries of the first array may be assigned to respective servers 120 in a manner for achieving the desired balancing of TCP connections across the servers 120. The various possibilities for configurations of the first array may be better understood with respect to the following example.
  • In a first example for a configuration of the first array, the first array includes sixty-four (64) entries for handling mappings to server indices of four (4) servers 120. In this example, the first, second, third, and fourth servers 120 are all weighted the same, such that the four servers 120 are expected to handle the same number of TCP connections. In this example, each of the four servers 120 will have sixteen (16) of the sixty-four entries of the first array associated therewith (e.g., sixteen entries including one or more different hash values may be mapped to a first server index value of the first server 120, sixteen entries including one or more different hash values may be mapped to a second server index value of the second server 120, sixteen entries including one or more different hash values may be mapped to a third server index value of the third server 120, and sixteen entries including one or more different hash values may be mapped to a fourth server index value of the second server 120).
  • In a second example for a configuration of the first array, the first array includes a number of entries for handling mappings to server indices of four servers 120 where the first, second, third, and fourth servers have weights of 2, 1, 1, and 1, respectively, such that the first server 120 is expected to handle twice the number of TCP connections as each of the second, third, and fourth servers 120. In this example, a value of ten (10) may be used for length A, such that the first server 120 has four entries in which four hash values map to a first server index value of the first server 120, the second server 120 has two entries in which two hash values map to a second server index value of the second server 120, the third server 120 has two entries in which two hash values map to a third server index value of the third server 120, and the fourth server 120 has two entries in which two hash values map to a fourth server index value of the fourth server 120. Similarly, in this example, a value of two hundred may be used for A, such that the first server 120 has eighty (80) entries in which eighty hash values map to a first server index value of the first server 120, the second server 120 has forty entries in which forty hash values map to a second server index value of the second server 120, the third server 120 has forty entries in which forty hash values map to a third server index value of the third server 120, and the fourth server 120 has forty entries in which forty hash values map to a fourth server index value of the fourth server 120.
  • Thus, it will be appreciated that the first array may be configured using any suitable weights of servers 120, any suitable numbers of different hash values supported by the hash function, any suitable numbers of hash values used for the respective servers 120, any suitable numbers of entries A of the first array, or the like. It also will be appreciated that the hash values associated with a given server 120 may be the same or different for the given server 120 (e.g., depending on the total number of possible hash values possible given the hash function used, the header field(s) used to compute the hash values, the number of potential values for the header field(s) used to compute the hash values, or the like, as well as various combinations thereof). It will be appreciated that the total number of entries A of the first mapping may depend on the total number of possible hash values possible given the hash function used, the header field(s) used to compute the hash values, the number of potential values for the header field(s) used to compute the hash values, or the like, as well as various combinations thereof). In at least some embodiments, the total number of entries A of the first array may be chosen in a manner tending to increase the number of combinations of server weights that distribute evenly across the first array (e.g., A=2*3=6 entries would work well for two servers with allowed server weights of 1 or 2 since the first array may be arranged such that (1) the two servers are given three entries each (e.g., where both servers have a server weight of 1 or both servers have a server weight of 2) or (2) one of the servers (with a weight of 2) is given four entries and the other of the servers (with a weight of 1) is given two entries).
  • The LB 130 maintains the second array which maps the server index values associated with the servers 120 to the addresses (e.g., IP, Ethernet, or the like) of the servers 120. In the case in which a server 120 has a single server index value associated therewith, the second array may include a single entry for the server 120 which maps that server index value to the address of the server 120. In the case in which a server 120 has multiple server index values associated therewith, the second array may include one or more entries for the server 120 which map those server index value to the address of the server 120.
  • The servers 120 and LB 130 may be configured to provide various functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120. The LB 130 is configured to receive and process a TCP SYN packet from a client 110, to form thereby a modified TCP SYN packet, in a manner for enabling LB 130 to statelessly control which of the servers 120 will handle the TCP connection for the client 110 (an exemplary embodiment is depicted and described with respect to FIG. 2). The server 120 selected to handle the TCP connection for the client 110 is configured to receive and process the modified TCP SYN packet from LB 130 in a manner for enabling LB 130 to statelessly control consistent delivery of TCP packets for the TCP connection to the server 120 selected to handle the TCP connection for the client 110 (an exemplary embodiment is depicted and described with respect to FIG. 3). The LB 130 is configured to receive additional TCP packets for the TCP connection from the client 110 and to statelessly control consistent delivery of TCP packets for the TCP connection to the server 120 selected to handle the TCP connection for the client 110 assuming that the server 120 selected to handle the TCP connection for the client 110 has not changed (an exemplary embodiment is depicted and described with respect to FIG. 4). The servers 120 and LB 130 may be configured to provide various other functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120, as discussed in additional detail below.
  • FIG. 2 depicts one embodiment of a method for processing a TCP SYN packet of a client at a load balancer to form a modified TCP SYN packet for a server selected by the load balancer to provide the TCP connection for the client. Thus, it will be appreciated that the steps of method 200 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 200 may be performed contemporaneously or in a different order than presented in FIG. 2.
  • At step 201, method 200 begins.
  • At step 210, a TCP SYN packet is received from a client. The TCP packet has only the SYN flag set and, thus, is a TCP SYN packet. The TCP SYN packet includes a source address field that includes a client address of the client which sent the TCP SYN packet and a destination address field which includes an address of the load balancer.
  • At step 220, a hash value is computed for the TCP SYN packet based on one or more fields of the TCP SYN packet. The one or more fields may include one or more of source address (e.g., source IP address), source port, destination address, destination port, or the like. The hash value is computed using a hash function that is used as the basis for generating entries of the first array that is maintained by the load balancer.
  • At step 230, a server is selected using the hash value as a key into server mapping information maintained by the load balancer. Namely, the server may be selected by using the hash value as a key into the first array in order to identify the server index of one of the servers to be used to provide the TCP connection for the client (and, thus, to which the TCP SYN packet is to be routed). The server is selected from among a plurality of servers available to handle the TCP connection for the client.
  • At step 240, a server address of the server is determined based on the server mapping information. Namely, the server address of the server may be determined by using the server index of the selected server as a key into the second array which includes mappings of server indices to server addresses. The server address of the server may be any suitable type of address (e.g., an IPv4 address, an IPv6 address, an Ethernet MAC address, a SIP URI, or any other suitable type of address).
  • At step 250, a modified TCP SYN packet is formed based on the received TCP SYN packet.
  • The modified TCP SYN packet may be formed by modifying the received TCP SYN packet to form the modified TCP SYN packet or generating the modified TCP SYN packet.
  • The modified TCP SYN packet includes a source address field that includes an address of the load balancer and a destination address field which includes the server address of the server.
  • The modified TCP SYN packet also includes the client address of the client. The client address of the client may be inserted in any suitable location within the modified TCP SYN packet, such as within the ACK field of the modified TCP SYN packet (e.g., for an IPv4 address of the client), within a TCP option header field of the modified TCP SYN packet (e.g., for an IPv6 address of the client), within a trailer field of the modified TCP SYN packet, or the like. The inclusion of the client address facilitates stateless control over the TCP connection by the load balancer.
  • The modified TCP SYN packet may include one or more timestamps. For example, the one or more timestamps may include one or more of a hardware timestamp generated at the time the TCP SYN packet was received from the network, the current time as determined by a hardware or software clock, a logical clock value which increases monotonically, or the like. The LB 130 may insert the one or more timestamps into the modified TCP SYN packet by inserting a standard TCP timestamp option field (e.g., as defined by RFC 1323), modifying a received timestamp header from client 110, inserting a custom TCP option header, insert the timestamp header into the payload of the SYN packet, or the like, as well as various combinations thereof. More generally, LB 130 may use any field(s) or method(s) suitable for communicating the one or more timestamp values to the server 120.
  • The modified TCP SYN packet may include the n bits of the server index of the selected server. The n bits of the server index may be inserted into the modified TCP SYN packet at any suitable location (e.g., in the upper n bits of the sequence number of the TCP SYN packet, in n bits of a timestamp value inserted as a TCP option header of the TCP SYN packet, or the like). The n bits of the server index of the selected server may be used by the server to replace the upper n bits of its initial sequence number (e.g., as discussed with respect to FIG. 3). In at least some embodiments, the value of n may be constant within the system (e.g., the value of n is hardcoded into the load balancer and the server, such that the load balancer does not dynamically modify the number of servers over which TCP connections may be load balanced). In at least some embodiments, the value of n may be dynamic within the system (e.g., the value of n is not hardcoded into the load balancer or the server, such that the load balancer may be configured to dynamically modify the number of servers over which TCP connections may be load balanced). In at least some embodiments in which the value of n may be dynamic within the system, the modified TCP SYN packet also may include the size of the n-bit server index (i.e., the value of n), such that the size of the n-bit server index is available for use by the server in replacing the upper n bits of its initial sequence number with the n bits of the n-bit server index. The size of the n-bit server index may be inserted into the modified TCP SYN packet in any suitable location. An advantage of at least some such embodiments is that the server addresses need not be unique in any n bits (e.g., useful when fixed Ethernet MAC addresses and certain other address types are used). Another advantage of at least some such embodiments is that it is expected to be more efficient to compare n bits from the ACK field of a TCP packet with the server index value found based on the hash value calculated for the TCP packet (instead of comparing n bits from the server address, which may require a second memory lookup to the second array of the server configuration information), as discussed hereinabove and depicted and described with respect to FIG. 4. It is noted that, in at least some such embodiments, when a first server fails and a second server takes the place of the failed first server, the load balancer uses a different server index for the second server rather than only replacing the address of the first server with the address of the second server (such that subsequently received TCP keep-alive packets from TCP connections to the first server will properly detect that the server has changed, because the server index comparison yields a difference).
  • The modified TCP SYN packet may include an indication to the server that the server is to insert n bits of a server address of the server into the TCP SYN+ACK packet that the server sends in response to receiving the TCP SYN packet from the load balancer. The address of the server may include an IPv4 address of the server, an IPv6 address of the server, an Ethernet address of the server, or any other suitable address of the server.
  • At step 260, the modified TCP SYN packet is propagated toward the server. The processing of the modified TCP SYN packet by the server may be performed as depicted and described with respect to FIG. 3.
  • At step 299, method 200 ends.
  • It will be appreciated that, although primarily depicted and described with respect to an embodiment in which server selection for TCP connection load balancing is performed based on one or more fields of the TCP SYN packet, in at least some embodiments, server selection for TCP connection load balancing may be performed based on server performance information associated with one or more servers of the set of servers available for selection. The server performance information for a server may include information indicative of the current load on the server, response time information associated with the server (e.g., average response time, maximum response time, or the like), or the like, as well as various combinations thereof. The server performance information may be obtained by the load balancer based on feedback from the servers that is inserted into TCP SYN+ACK packet sent from the servers to clients via the load balancer (e.g., as described with respect to FIG. 3). The server performance information may be obtained by the load balancer in any other suitable manner. The server performance information may be maintained by the load balancer as a separate set of information, as part of the server configuration information maintained by the load balancer, or the like, as well as various combinations thereof. The load balancer may use the server performance information for load balancing of TCP connections in place or in addition to use of one or more fields of the TCP SYN packet.
  • FIG. 3 depicts one embodiment of a method for processing a TCP SYN packet of a load balancer at a server selected by the load balancer to provide a TCP connection for a client. Thus, it will be appreciated that the steps of method 300 may be performed by a server (e.g., a server 120 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 300 may be performed contemporaneously or in a different order than presented in FIG. 3.
  • At step 301, method 300 begins.
  • At step 310, a TCP SYN packet is received from a load balancer. The server is not immediately aware that a modified TCP SYN packet has been received (as opposed to an unmodified TCP SYN packet that may have been routed to the server without traversing the load balancer). In the case of a modified TCP packet, the modified TCP packet may be generated by the load balancer as depicted and described with respect to FIG. 2.
  • At step 320, a determination is made as to whether the TCP SYN packet is an unmodified TCP SYN packet (i.e., not sent by the load balancer) or a modified TCP SYN packet (i.e., sent by the load balancer).
  • The server may determine whether the TCP SYN packet is an unmodified TCP SYN packet or a modified TCP SYN packet based on information regarding the manner in which the load balancer processes TCP SYN packets to form modified TCP SYN packets (e.g., the location within the modified TCP packet at which the load balancer inserts the client address of the client).
  • For example, in an embodiment in which the load balancer forms a modified TCP SYN packet by adding the client address to the ACK field, a determination that the ACK field includes a value of zero results in a determination that the TCP SYN packet is an unmodified TCP SYN packet whereas a determination that the ACK field includes a non-zero value results in a determination that the TCP SYN packet is a modified TCP SYN packet.
  • Similarly, for example, in an embodiment in which the load balancer forms a modified TCP SYN packet by adding the client address in a TCP options field, a determination that the TCP SYN packet does not include a TCP options field results in a determination that the TCP SYN packet is an unmodified TCP SYN packet whereas a determination that the TCP SYN packet does include a TCP options field results in a determination that the TCP SYN packet is a modified TCP SYN packet.
  • It will be appreciated that multiple types of such determinations may need to be made (e.g., where multiple client types (e.g., IPv4 and IPv6 clients) are supported and different types of modifications are made to TCP SYN packets at the load balancer for the different client types). For example, a determination that the ACK field of the TCP SYN packet includes a value of zero may not immediately result in a determination that the TCP SYN packet is an unmodified TCP SYN packet; rather an additional check may need to be performed to determine whether the TCP SYN packet includes a TCP options field which might be used by an IPv6 client but not an IPv4 client. Similarly, for example, a determination that the TCP SYN packet does not include a TCP options field may not immediately result in a determination that the TCP SYN packet is an unmodified TCP SYN packet; rather an additional check may need to be performed to determine whether the ACK field of the TCP SYN packet includes a value of zero or a non-zero value. It will be appreciated that the order in which multiple such determinations are made may be selected based on the type of modification to the TCP SYN packet that is expected to be more prevalent.
  • If the TCP SYN packet is an unmodified TCP SYN packet, method 300 proceeds to step 330. If the TCP SYN packet is a modified TCP SYN packet, method 300 proceeds to step 340.
  • At step 330, the unmodified TCP SYN packet is processed and a TCP SYN+ACK packet is generated based on the unmodified TCP SYN packet. The unmodified TCP SYN packet is processed using packet processing that is typically performed by a server for a TCP SYN packet. The typical processing of a TCP SYN packet and associated generation of a TCP SYN+ACK packet by a server will be understood by one skilled in the art. From step 330, method 300 proceeds to step 350.
  • At step 340, the modified TCP SYN packet is processed and a TCP SYN+ACK packet is generated based on the modified TCP SYN packet. The modified TCP SYN packet is processed using packet processing that is typically performed by a server for a TCP SYN packet, but with at least one exception that the TCP SYN+ACK packet includes an identifier of the server (e.g., n bits of an address of the server, the n-bit server index of the server, or the like).
  • In at least some embodiments, the server replaces the upper n bits of its initial sequence number with the n bits of its own server address (e.g., IPv4 address, IPv6 address, Ethernet address, or the like), thereby leaving 32-n bits for the initial sequence number. The server also may clear the next upper two bits of its randomly generated initial sequence number (to delay the moment at which the sequence number wraps into the n upper bits), thereby leaving 32-n-2 bits for the initial sequence number. It is noted that the number of bits for the initial sequence number may be reduced to 24-n-2 random bits if TCP SYN cookies are used. The server may replace the upper n bits of its initial sequence number with the n bits of its own server address based on an indication detected in the TCP SYN packet. From step 340, method 300 proceeds to step 350.
  • In at least some embodiments, the server replaces the upper n bits of its initial sequence number with the n bits of its own server index (from server configuration information maintained on the load balancer). The server may determine the n bits of its own server index from the modified TCP SYN packet received from the load balancer (e.g., inserted into the modified TCP SYN packet by the load balancer, as discussed with respect to method 200 of FIG. 2). As discussed with respect to method 200 of FIG. 2, the value of n may be constant or dynamic within the system. In at least some embodiments in which the value of n may be dynamic within the system, the server may determine the size of the n-bit server index (i.e., the value of n) from the modified TCP SYN packet received from the load balancer for use by the server in replacing the upper n bits of its initial sequence number with the n bits of the n-bit server index. The size of the n-bit server index may be determined from any suitable location within the modified TCP SYN packet (which may depend on placement of the size of the n-bit server index within the modified TCP SYN packet by the load balancer, as depicted and described with respect to FIG. 2). As described with respect to FIG. 2, various advantages may be realized from use of the n-bit server index (e.g., the server addresses need not be unique in any n bits, it is expected to be more efficient to compare n bits from the ACK field of a TCP packet with the server index value found based on the hash value calculated for the TCP packet, or the like). It is noted that, in at least some such embodiments, when a first server fails and a second server takes the place of the failed first server, the load balancer uses a different server index for the second server such that the change from the first server to the second server can be detected at the load balancer when subsequent keep-alive packets are received at the load balancer. It will be appreciated that, although primarily depicted and described with respect to embodiments in which the server replaces the upper n bits of its initial sequence number with the n bits of its own server index, in at least some embodiments the server may instead use a different field of the TCP SYN+ACK packet (e.g., the timestamp option header or any other suitable field) to store the n bits of its own server index, thereby avoiding the constraint on the maximum number of bytes which may be sent by the server due to use of part of the server sequence number to convey then bits of the server index of the server.
  • In at least some embodiments, the server copies information from the modified TCP SYN packet into the TCP SYN+ACK packet. The server may copy the client address of the client from the modified TCP SYN packet into the TCP SYN+ACK packet. The server may copy one or more timestamps from the modified TCP SYN packet into the TCP SYN+ACK packet. The server may copy information from the modified TCP SYN packet into the TCP SYN+ACK packet using one or more option headers.
  • In at least some embodiments, the server inserts performance-indicative information for the server into the TCP SYN+ACK packet for the TCP connection. The performance-indicative information for the server includes information which may be used by the load balancer to determine server performance information for the server. The server performance information for a server may include information indicative of the current load on the server, response time information associated with the server (e.g., average response time, maximum response time, or the like), or the like, as well as various combinations thereof. Similarly, the performance-indicative information for the server that is included within TCP SYN+ACK packet for the TCP connection may include a current server load value of the server (e.g., as a value indicative of a percentage, 0%-100%, of the current server system load) for use by the load balancer in determining the information indicative of the current load on the server, a timestamp for use by the load balancer in determining a response time of the server for the TCP connection where the response time of the server for the TCP connection may then be used by the load balancer in determining response time information associated with the server, or the like. The load balancer may receive performance-indicative information for a set of servers in TCP SYN+ACK packets received from the set of servers and use the performance-indicative information to update server performance information maintained by the load balancer (e.g., by updating server performance information maintained by the load balancer separate from the server configuration information maintained by the load balancer, by modifying weights assigned to the servers in the server configuration information maintained by the load balancer, or the like). The load balancer may use the server performance information maintained by the load balancer to perform load balancing of TCP connections across the set of servers (e.g., as a basis for server selection within the context of method 200 of FIG. 2).
  • At step 350, the TCP SYN+ACK packet is propagated toward the load balancer.
  • At step 399, method 300 ends.
  • FIG. 4 depicts one embodiment of a method for processing TCP packets of a TCP connection of a client at a load balancer in a manner for statelessly ensuring delivery of packets server selected by the load balancer to provide the TCP connection for the client. Thus, it will be appreciated that the steps of method 400 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 400 may be performed contemporaneously or in a different order than presented in FIG. 4.
  • At step 401, method 400 begins.
  • At step 410, a TCP packet is received from a client. The TCP packet does not have the SYN flag set and, thus, is a TCP packet other than a TCP SYN packet (and, thus, should be sent to the same server 120 to which the corresponding TCP SYN packet was sent, if possible). The TCP packet is associated with a TCP connection. The TCP packet includes a source address field that includes a client address of the client which sent the TCP packet and a destination address field which includes an address of the load balancer. The TCP packet also includes an n-bit identifier of the server (e.g., n bits of an address of the server, n-bit server index of the server, or the like) inserted by the client based on the modified TCP SYN+ACK packet received at the client from the load balancer (e.g., based on the modified TCP SYN+ACK packet generated as depicted and described with respect to method 300 of FIG. 3). As discussed herein, the n-bit identifier of the server may be included within the TCP packet in the ACK field or in any other suitable location within the TCP packet.
  • At step 420, a hash value is computed for the TCP packet based on one or more fields of the TCP packet. The one or more fields may include one or more of source address (e.g., source IP address), source port, destination address, destination port, or the like. The hash value is computed using a hash function that is used as the basis for generating entries of the first array that is maintained by the load balancer as well as for computing hash values when TCP SYN packets are received. The use of a consistent hash in this manner is meant to ensure that, when possible, the TCP packets of a TCP connection are consistently routed to the same server selected for the TCP connection when the first hash is computed in response to the TCP SYN packet.
  • At step 430, a server is identified using the hash value as a key into server mapping information maintained by the load balancer. Namely, the server may be identified by using the hash value as a key into the first array in order to identify the server index of one of the servers to which the TCP packet is to be routed.
  • At step 440, a server address of the server is determined based on the server mapping information. Namely, the server address of the server may be determined by using the server index of the selected server as a key into the second array which includes mappings of server indices to server addresses.
  • At step 450, a comparison is performed for determining whether the server of the TCP connection has changed. In at least some embodiments, in which the modified TCP SYN+ACK packet generated by the server includes n bits of the server address as the upper n bits of the initial server sequence number, the upper n bits of the server sequence number from the received TCP packet and the corresponding n bits of the server address determined based on the server mapping information maintained at the load balancer (namely, from the first and second arrays) are compared. In at least some embodiments, in which the modified TCP SYN+ACK packet generated by the server includes the n bits of the server index (e.g., as the upper n bits of the initial server sequence number, within a timestamp option header, or the like), the n bits of the server index from the received TCP packet (again, e.g., as the upper n bits of the server sequence number, within a timestamp option header, or the like), and the corresponding n bits of the server index determined based on the server mapping information maintained at the load balancer (namely, from the first array) are compared. If the compared bits match (a more likely scenario), the server of the TCP connection has not changed (since the TCP SYN packet for the TCP connection was processed and initial server selection was performed by the load balancer). If the compared bits do not match (a less likely scenario), the server of the TCP connection has changed (e.g., due to one or more events or conditions which may cause modifications to the server configuration information maintained by the load balancer).
  • At step 460, a determination as to whether the server of the TCP connection is the same or different based on the comparison of the upper n bits of the server sequence number and the corresponding n bits of the server address. If the server of the TCP connection is the same, method 400 proceeds to step 470. If the server of the TCP connection is different, method 400 proceeds to step 480.
  • At step 470, the TCP packet is forwarded toward the server. Although not included within the scope of method 400, it will be appreciated that the server receives the TCP packet from the load balancer and initiates appropriate processing of the TCP packet. The server may process the TCP packet in any suitable manner, which may result in generation of an associated TCP response packet by the server. The server may propagate the TCP response packet to the client indirectly via the load balancer or directly without traversing the load balancer. It will be appreciated that sending TCP response packets directly from the server to the client avoids overhead and delay of processing such TCP response packets at the load balancer. The server may be configured to use direct forwarding of TCP response packets to the client by configuring the server to accept traffic from a common IP address associated with the load balancer without responding to Address Resolution Protocol (ARP) requests for that IP address. From step 470, method 400 proceeds to step 499, where method 400 ends.
  • At step 480, a TCP response packet is sent toward the client without forwarding the TCP packet to the server. The TCP response packet may be a TCP Reset (RST) packet for causing the client to close the TCP connection and initiate a TCP reconnection, a TCP FIN packet for causing the client to close the TCP connection without initiating a TCP reconnection, or any other suitable type of TCP response packet. Although not included within the scope of method 400, it will be appreciated that the client receives the TCP response packet from the load balancer and initiates appropriate processing of the TCP response packet. From step 480, method 400 proceeds to step 499, where method 400 ends.
  • At step 499, as noted above, method 400 ends.
  • The servers 120 and LB 130 also may be configured to provide various additional functions in support of stateless load balancing by LB 130 of TCP connections between the clients 110 and the servers 120.
  • The server 120 may be configured to monitor the TCP sequence number for the TCP connection with client 110. The server 120 in response to a determination that the TCP sequence number for the TCP connection with client 110 is within a threshold number of bits of the maximum TCP sequence number which may be supported (namely, 2(32-n)) closes the TCP connection with the client 110 in order to avoid a situation in which the TCP sequence number for the TCP connection overflows into the upper n bits used for the address of the server 120. This implies that a maximum of 2(32-n) bytes can be sent by the server 120 over the TCP connection with the client 110 (as well as for any other TCP connection to the server 120. It will be appreciated that this is not expected to be a problem for many types of applications in which a relatively small number of bytes are sent via the underlying TCP connection, such as Session Initiation Protocol (SIP) signaling of WebRTC calls, smartmeter clients reporting measured values to server where the servers only acknowledge reception of the bytes without sending associated responses, or the like). It also will be appreciated that the application being supported by the TCP connection may be configured to handle a failing TCP connection by reconnecting (i.e., the TCP sequence number overflow condition would only be a specific case of a “failure” which might cause initiation of a TCP reconnection). Furthermore, it will be appreciated that such TCP sequence number overflow condition prevention and handling may only be applicable for TCP connections that are load balanced by LB 130 (e.g., for which the associated TCP SYN packet included a non-zero ACK field).
  • As discussed herein, communication system 100 may be dynamic in that various types of events may result in changes to the server configuration information used by LB 130 to balance TCP connections across the servers 120. For example, server configuration information used by LB 130 to balance TCP connections across the servers 120 may change as a result of changes to server weights of existing servers 120, addition of one or more new servers 120 to communication system 100, unavailability of one or more existing servers 120 within communication system 100 (e.g., due to one or more of a failure(s) of an existing server(s) 120, a removal(s) of an existing server(s) 120, or the like), or the like, as well as various combinations thereof. The LB 130 is configured to continue to be able to perform load balancing of TCP connections while accommodating various types of changes associated with the set of servers 120 across which TCP connections may be balanced.
  • The LB 130 may be configured to, in response to an indication of availability of a new server 120 in the communication system 100, update its server configuration information (e.g., its mapping of A entries in the first array, updating the mapping of one or more server indices for the new server 120 to the address of the new server 120 in the second array, or the like). The LB 130 may update the first array in a manner tending to minimize the number of entries of the first array that are changed, because any client 110 that has a TCP connection that hashes to one of the changed entries of the first array may have to (1) reconnect from the server 120 to which they were connected to a new server 120 indicated by the changed entry of the first array or (2) terminate the TCP connection without reconnecting. However, since LB 130 is stateless, LB 130 does not know the correct TCP sequence number for the TCP connection and, thus, cannot proactively send a TCP RST packet or a TCP FIN packet to the client 110 until it first receives a packet from the client 110. In other words, this reconnection or termination by a client 110 for the TCP connection will not occur until the next time that a data packet or keep-alive packet is received from the client 110 at the LB 130 for that TCP connection. As such, given that different clients 110 having TCP connections which are to be reconnected to the new server 120 may be expected to have a relatively evenly distribution across the keep-alive interval of the application supported by the new server 120, it is expected that the arrival of TCP reconnection requests of the clients 110 to the new server 120 (for reconnecting existing TCP connections of the client 110 to the new server 120 based on the change to the first array of LB 130) will be relatively evenly distributed across the keep-alive interval, thereby resulting in a relatively smooth window during which the new server 120 receives TCP reconnection requests from the clients 110 and, thus, a relatively smooth transition of the TCP connections to the new server 120. As a result, the fact that the LB 130 is stateless may help to ensure a relatively smooth transition of the TCP connections to the new server 120. In at least some embodiments, in order to further reduce the impact of the addition of the new server 120, LB 130 may be configured to ignore (drop) one or more keep-alive packets received for one or more TCP connections impacted by the addition of the new server 120 (e.g., TCP connections that hash to one of the changed entries of the first array), rather than responding to the associated client(s) 110 with TCP RST or TCP FIN packets, so as to rate-limit the arrival of TCP connections to the new server 120 and, thus, avoid overloading the new server 120. It will be appreciated that, although primarily described with respect to embodiments in which a single new server 120 becomes available within communication system 100, in at least some embodiments multiple new servers 120 may become available within communication system 100 at or about the same time, such that the existing TCP connections that hash to one of the changed entries of the first array may be distributed across the multiple new servers 120.
  • The LB 130 may be configured to, in response to an indication of unavailability of an existing server 120 in the communication system 100 (e.g., the existing server 120 has failed, the existing server 120 has been dynamically removed, a TCP RST packet has been received from the existing server 120 or from another network element, or the like), update its server configuration information 135 (e.g., updating its mapping of A entries in the first array, removing the mapping of one or more server indices for the existing server 120 to the address of the existing server 120 in the second array, or the like). The LB 130 may update the first array in a manner tending to minimize the number of entries of the first array that are changed, because any client 110 that has a TCP connection that hashes to one of the changed entries of the first array may have to (1) reconnect from the server 120 to which they were connected to a different server 120 indicated by the changed entry of the first array or (2) terminate the TCP connection without reconnecting. However, since LB 130 is stateless, LB 130 does not know the correct TCP sequence number for the TCP connection and, thus, cannot send a TCP RST packet or a TCP FIN packet to the client 110 until it first receives a packet from the client 110. In other words, this reconnection or termination by a client 110 for the TCP connection will not occur until the next time that a data packet or keep-alive packet is received from the client 110 at the LB 130 for that TCP connection. In this situation, however, the existing TCP connections of the server 120 that has become unavailable may be distributed across the remaining servers 120, such that the additional load on the remaining servers 120 is not expected to be an issue (as opposed to the situation in which a new server(s) 120 becomes available and existing TCP connections of a potentially large number of existing servers 120 are all offloaded onto the relatively small number of new servers 120). Thus, it will be appreciated that mechanisms relied upon in the case in which a new server(s) 120 becomes available within communication system 100 may not be necessary (although they may still be used) for the case in which an existing server(s) 120 becomes unavailable within communication system 100.
  • FIG. 5 depicts one embodiment of a method for use by a load balancer in managing server configuration information of a set of servers for use in supporting stateless load balancing of TCP connections across the set of servers. Thus, it will be appreciated that the steps of method 500 may be performed by the load balancer (e.g., LB 130 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 500 may be performed contemporaneously or in a different order than presented in FIG. 5. At step 501, method 500 begins. At step 510, one or more changes associated with the set of servers are detected. The one or more changes may include a change in weights of the servers, addition of one or more new servers to the set of servers, an error condition associated with one or more servers in the set of servers, failure of one or more servers in the set of servers, removal of one or more servers from the set of servers, or the like. At step 520, server configuration information for the set of servers is modified based on the one or more changes associated with the set of servers. At step 599, method 500 ends. It will be appreciated that method 500 may represent various embodiments related to management of server configuration for use in stateless load balancing of TCP connections across a set of servers.
  • As described above, a change in configuration of the servers 120 (e.g., change in server weights of the servers 120, additional of a new server(s) 120, unavailability of an existing server(s) 120, or the like) results in a change to the server configuration information that is used by LB 130 to perform load balancing of TCP connections across the servers 120. In at least some embodiments, LB 130 maintains multiple server configurations in memory 133 (rather than simply updating the server configuration information based on the latest configuration of servers 120 and forgetting about the previous configurations of servers 120). The LB 130 also may maintain timestamps for the multiple server configurations (e.g., timestamps indicative of times at which the server configuration changes were made). For example, LB 130 may maintain the x most recent server configurations (or any other suitable combination of multiple server configurations). In at least some such embodiments, upon receiving a TCP packet, LB 130 iteratively performs the check to determine whether the server has changed, using the server configuration information of one or more of the multiple server configurations (e.g., in an order from most recent to least recent), until (a) a match is found or (b) the multiple server configurations have been considered in determining whether the server has changed and a match has not been found for any of the multiple server configurations. For example, within a given iteration, LB 130 may identify a server using the server configuration information of the currently selected server configuration, determine an address of the identified server, and compare the n-bit identified of the server from the TCP packet to the n-bit identified of the server determined from the server configuration information of the currently selected server configuration. It will be appreciated that these steps correspond to steps 430-450 of method 400 of FIG. 4, and, thus, that method 400 of FIG. 4 may be modified to support this type of iterative checking for server changes based on multiple server configurations maintained by LB 130. These types of embodiments allow LB 130 to maintain TCP connections across configuration changes, and to dynamically adjust weights without forcing clients to reconnect existing connections.
  • Referring back to FIG. 1, it will be appreciated that, as discussed hereinabove with respect to FIG. 1, various applications may utilize TCP keep-alive packets. For example, TCP keep-alive packets may be utilized for applications in which relatively few data packets are expected to be sent and, thus, the TCP connection would timeout in the absence of use of the TCP keep-alive packets. For example, TCP keep-alive packets may be utilized for preventing any Network Address Translation (NAT) device(s) on the path between the client and the server from timing out. It will be appreciated that TCP keep-alive packets also may be used for various other purposes.
  • In at least some situations, it may be desirable to filter TCP keep-alive packets at some point in the network that is between the client and server ends of a TCP connection, so as to reduce the number of TCP keep-alive packets that need to traverse the entire path between the client and server ends of the TCP connection and to reduce the processing overhead on the server end of the TCP connection for processing of the TCP keep-alive packets.
  • In at least some such situations, a proxy device that is disposed between two ends of a TCP connection may be used as a proxy for TCP keep-alive packets, where the proxy device is configured to filter TCP keep-alive packets sent from clients such that the TCP keep-alive packets are not forwarded to the associated servers while also issuing TCP keep-alive packets to servers on behalf of clients.
  • In at least some embodiments, LB 130 may be configured to operate as a proxy for TCP keep-alive packets exchanged between clients 110 and servers 120, thereby reducing the amount of TCP keep-alive packets sent from LB 130 to the servers 120 and reducing the processing overhead on the servers 120 for processing of TCP keep-alive packets from the clients 110. The LB 130 may operate as a proxy for TCP keep-alive packets exchanged between clients 110 and servers 120 by recognizing and filtering TCP keep-alive packets received from the clients 110 for TCP connections supported by the servers 120.
  • In at least some embodiments, LB 130 is configured to statelessly recognize TCP keep-alive packets (e.g., in order to distinguish TCP keep-alive packets from other types of TCP packets), such that the different TCP packet types may be appropriately handled by the LB 130 (e.g., filtering TCP keep-alive packets in a manner for reducing the number of TCP keep-alive packets exchanged end-to-end on TCP connections, while allowing other TCP packet types to be forwarded to the appropriate servers 120 such that the associated TCP connections are not impacted).
  • In general, TCP keep-alive packets may have different characteristics for different TCP implementations (e.g., as described in RFC 1122). For example, TCP keep-alive packets for a TCP connection typically have (1) a payload of zero bytes (e.g., for LINUX-based OSs) or a payload of one byte (e.g., for WINDOWS-based OSs) and (2) a server sequence number for the server 120 of the TCP connection that is one less than the client sequence number of the client 110 of the TCP connection. Furthermore, TCP keep-alive packets also may have characteristics that are the same as or similar to characteristics of one or more other types of TCP packets (e.g., in certain TCP implementations, TCP ACK packets, TCP data packets, and TCP keep-alive packets may have empty payloads), such that it may be difficult to distinguish TCP keep-alive packets from one or more other types of TCP packets. Accordingly, in at least some embodiments, LB 130 may be configured to recognize TCP keep-alive packets in a reliable manner such that LB 130 may properly filter such TCP keep-alive packets without incorrectly filtering other types of TCP packets (e.g., TCP ACK packets, TCP data packets with 0-byte payloads, and the like) which should not be filtered due to the fact that such filtering may disturb the associated TCP connections for which the other types of TCP packets are sent.
  • The LB 130 may be configured, based on information indicative of one or more characteristics of TCP keep-alive packets for a TCP implementation, to support recognition of TCP keep-alive packets for that TCP implementation.
  • In at least some embodiments, one or more of the clients 110 may be WINDOWS-based clients (e.g., having a WINDOWS-based client OS 112). In at least some WINDOWS-based TCP implementations, a TCP keep-alive packet includes a one-byte payload of “\0”. Thus, in at least some embodiments, LB 130 may be configured to determine whether a received TCP packet is a TCP keep-alive packet (as opposed to some other type of TCP packet) when the TCP packet includes a one-byte payload. For example, LB 130 may be configured to determine a length of the payload of a received TCP packet, determine whether the payload of the TCP packet includes a value of “\0” (or other appropriate value) based on a determination that the length of the payload of the TCP packet is one byte, and determine whether the TCP packet is a TCP keep-alive packet based on the determination as to whether the payload of the TCP packet has a value of “\0” (e.g., identify the TCP packet as being a TCP keep-alive packet when the payload of the TCP packet has a value of “\0” or identify the TCP packet as a being a TCP packet other than a TCP keep-alive packet when the payload of the TCP packet has a value other than “\0”).
  • In at least some embodiments, one or more of the clients 110 may be LINUX-based clients (e.g., having a LINUX-based client OS 112). In at least some LINUX-based TCP implementations, a TCP keep-alive packet includes an empty payload. However, as noted above, some other types of TCP packets also may have empty payloads (e.g., a TCP ACK packet, a TCP data packet with a 0-byte payload, or the like), such that reliable recognition of TCP keep-alive packets for LINUX-based clients is expected to be more difficult than reliable recognition of TCP keep-alive packets for WINDOWS-based clients. Thus, in at least some embodiments, for a given TCP connection between a client 110 and a server 120 via LB 130, the server 120 and LB 130 may be configured to cooperate in a manner for enabling the LB 130 to recognize TCP keep-alive packets on the TCP connection and, thus, to distinguish TCP keep-alive packets on the TCP connection (e.g., to be filtered by LB 130) from other types of TCP packets on the TCP connection (e.g., to be forwarded by the LB 130 to the server 120 for the client 110).
  • In general, for a TCP implementation in which TCP keep-alive packets include an empty payload, the reliable recognition of TCP keep-alive packets by LB 130 for a TCP connection between a client 110 and a server 120 via the LB 130 is provided via configuration of the server 120 and the LB 130 in a manner that enables the LB 130 to recognize TCP keep-alive packets of the TCP connection. In at least some embodiments, recognition of TCP keep-alive packets by LB 130 may be supported by: (1) configuring the server 120 and the LB 130 to support a parity rule indicative that a first parity (odd or even) is associated with TCP keep-alive packets and a second parity (odd or even, but different than the first parity) is associated with other types of TCP packets (e.g., at those types of TCP packets which may have zero-byte payloads and, thus, may be mistaken by the load balancer for TCP keep-alive packets, (2) configuring the server 120 to evaluate various conditions based on received TCP packets and, where necessary, to manipulate TCP packets sent by the server 120, in order to maintain the parity rule agreed to by the server 120 and the LB 130 for recognition of TCP keep-alive packets, and (3) configuring LB 130 to evaluate various conditions based on received TCP packets in order for determining whether the received TCP packets are TCP keep-alive packets or TCP packets other than TCP keep-alive packets. It will be appreciated that the parity rule configured on the server 120 and the LB 130 may dictate the conditions used by the server 120 and the LB 130 for supporting recognition of TCP keep-alive packets by the LB 130. More detailed descriptions of these and various other related embodiments follow.
  • The server 120 is configured to select the initial server sequence number for a TCP connection in a particular way that will enable LB 130 to distinguish between a 0-byte TCP keep-alive packet on the TCP connection and other types of 0-byte TCP packets which may be exchanged using the TCP connection (e.g., the 0-byte ACK packet sent by the client 110, a 0-byte data packet which may be sent by the client 110, or the like). An exemplary embodiment is depicted and described with respect to FIG. 6.
  • FIG. 6 depicts one embodiment of a method for selecting the initial server sequence number for a TCP connection in a manner enabling a load balancer to recognize TCP keep-alive packets on the TCP connection. It will be appreciated that the steps of method 600 may be performed by a server (e.g., a server 120 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 600 may be performed contemporaneously or in a different order than presented in FIG. 6.
  • At step 601, method 600 begins.
  • At step 610, a TCP SYN packet is received. The TCP SYN packet includes an initial client sequence number for the TCP connection.
  • At step 620, a parity of the initial client sequence number for the TCP connection is determined
  • At step 630, an initial server sequence number is selected for the TCP connection based the parity of the initial client sequence number for the TCP connection and a parity rule supported by the server and the load balancer.
  • For example, if the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be odd, then the initial server sequence number is selected to have an odd parity if the parity of the initial client sequence number is odd and is selected to have an even parity if the parity of the initial client sequence number is even. In other words, the initial server sequence number is selected to have the same parity as the least significant bit (LSB, bit#0) of the initial client sequence number from the TCP SYN packet.
  • For example, if the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be even, then the initial server sequence number is selected to have an even parity if the parity of the initial client sequence number is odd and is selected to have an odd parity if the parity of the initial client sequence number is even. In other words, the initial server sequence number is selected to have the inverse parity of the LSB (bit#0) of the initial client sequence number from the TCP SYN packet.
  • For example, the server 120 may select the initial server sequence number, a 32 bit number, as follows: [<n lowest bits of address of server 120><32-n-1 arbitrary bits><parity bit (bit 0)>].
  • At step 640, a TCP SYN+ACK packet including the initial server sequence number is generated.
  • At step 650, the TCP SYN+ACK packet is propagated toward the load balancer. It will be appreciated that the TCP SYN+ACK packet including the initial server sequence number also is ultimately propagated from the load balancer to the client, such that the server 120 is able to control the parity of the sum of the SEQ and ACK fields generated by the client 110 via control over the initial server sequence number and control over the amount of response bytes it sends.
  • At step 699, method 600 ends.
  • Referring back to FIG. 1, the server 120 is configured to perform processing in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client 110 will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet. An exemplary embodiment is depicted and described with respect to FIG. 7.
  • FIG. 7 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a server in a manner for enabling a load balancer to recognize TCP keep-alive packets on the TCP connection. It will be appreciated that the steps of method 700 may be performed by a server (e.g., a server 120 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 700 may be performed contemporaneously or in a different order than presented in FIG. 7.
  • At step 701, method 700 begins.
  • At step 710, the server receives a TCP packet of a TCP connection. The TCP packet includes a sequence number field (SEQ) including a client sequence number (client-seq) and an acknowledgment field (ACK) including a client acknowledgement number (client-ack). The TCP packet has an associated data length.
  • At step 720, the server determines the length of the TCP response packet to be sent from the server to the client in response to the received TCP packet.
  • At step 730, the server calculates the next client sequence number (client-seq') for the next TCP response to be sent by the client in response to the TCP response packet to be sent from the server to the client. The server calculates the next client sequence number client-seq' as a sum of the client sequence number of the received TCP packet (client-seq) and a data length of the received TCP packet.
  • At step 740, the server calculates the next client acknowledgment number (client-ack') for the next TCP response to be sent by the client in response to the TCP response packet to be sent from the server to the client. The server calculates the next client acknowledgment number client-ack' as a sum of the client acknowledgement number of the received TCP packet (client-ack) and the length of the TCP response packet to be sent by the server (before any associated manipulation which may be performed by the server).
  • At step 750, the server determines the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client. The server determines the parity of the next TCP response packet to be sent by the client based on the next client sequence number (client-seq') for the next TCP response packet to be sent by the client and the next client acknowledgment number (client-ack') for the next TCP response packet to be sent by the client. In at least some embodiments, the server determines the parity of the next TCP response packet to be sent by the client using the test ((LSB of client-seq'+LSB of client-ack') & 1).
  • At step 760, the server determines whether to manipulate the TCP response packet to be sent from the server to the client. The server determines whether to manipulate the TCP response packet to be sent from the server to the client based on a determination as to whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client (again, before any associated manipulation which may be performed by the server) will be improperly recognized by the load balancer as a TCP keep-alive packet. The server determines whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client will be improperly recognized by the load balancer as a TCP keep-alive packet based on the parity of the next TCP response packet to be sent by the client and a parity rule used by the server and the load balancer. The parity rule indicates an expected parity of a TCP keep-alive packet (e.g., an indication as to whether even or odd parity indicates a TCP keep-alive packet). The server determines whether the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client will be improperly recognized by the load balancer as a TCP keep-alive packet by determining whether the parity of the next TCP response packet to be sent by the client matches the expected parity of the TCP keep-alive packet. The server, based on a determination that the parity of the next TCP response packet to be sent by the client does not match the expected parity of the TCP keep-alive packet, generates the TCP response without manipulation of the TCP response (illustratively, method 700 proceeds to step 770). The server, based on a determination that the parity of the next TCP response packet to be sent by the client matches the expected parity of the TCP keep-alive packet, generates the TCP response including manipulating the TCP response (illustratively, method 700 proceeds to step 780).For example, assume that the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be odd (1). If the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client is even, the load balancer will not improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet and, thus, method 700 proceeds to step 770 since no manipulation of the TCP response packet of the server is needed. If the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client is odd, the load balancer would improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet without manipulation of the TCP response of the server and, thus, method 700 proceeds to step 780 such that manipulation of the TCP response packet of the server may be performed.
  • For example, assume that the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be even (0). If the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client is odd, the load balancer will not improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet and, thus, method 700 proceeds to step 770 since no manipulation of the TCP response packet of the server is needed. If the parity of the next TCP response packet to be sent by the client in response to the TCP response packet to be sent from the server to the client is even, the load balancer will improperly recognize the next TCP response packet to be sent by the client as a TCP keep-alive packet without manipulation of the TCP response of the server and, thus, method 700 proceeds to step 780 such that manipulation of the TCP response packet of the server may be performed.
  • At step 770, the server generates the TCP response packet without manipulating the TCP response packet. The typical manner in which such a TCP response packet may be generated will be understood by one skilled in the art. From step 770, method 700 proceeds to step 790.
  • At step 780, the server generates the TCP response including a manipulation of the TCP response of the server such that the next TCP response packet to be sent by the client in response to the TCP response of the server is not incorrectly identified as a TCP keep-alive packet. The server may manipulate the TCP response by padding the TCP response with one or more bytes. The server may pad the TCP packet with one or more bytes in any suitable manner, which may depend on the application being supported by the TCP connection. The server may choose the location and contents of the padding byte(s) such that the application layer protocol is not impacted. For example, if the application protocol is HTTP or SIP, a custom header could be inserted having a length of an odd number of bytes (like “X:p\r\n”, which is 5 bytes). For example, a whitespace character (e.g., space—ASCII 0x20—or newline—ASCII 0x0a) may be appended to an XML message (e.g., as used by XMPP or HTML response bodies) without changing the semantics of the XML message. Various other protocols may have various other options for padding of one or more bytes (although at least some such protocols may require other modifications in order to support addition of one or more padding bytes). The padding of the TCP packet by the server 120 may be performed in any suitable manner. In at least some embodiments, in which the application layer protocol is known by the TCP stack of the server, the TCP stack of the server may perform the padding of the TCP packet in a manner that is transparent to the application layer protocol. In at least some embodiments, in which the application layer protocol is not known by the TCP stack of the server or it is required or desired that the padding not be performed by the TCP stack of the server, the TCP stack of the server may provide TCP packet padding information to the application for use by the application to perform the padding of the TCP packet (e.g., a hint as to whether the application needs to send an odd or even number of bytes as response). In at least some embodiments, padding of the TCP packet may be performed at the application layer without the application layer requiring TCP packet padding information from the TCP stack of the server. From step 770, method 700 proceeds to step 790.
  • At step 790, the server propagates the TCP response packet toward the load balancer. It will be appreciated that the TCP response packet also is ultimately propagated from the load balancer to the client.
  • At step 799, method 700 ends.
  • Referring back to FIG. 1, the LB 130 is configured to receive a TCP packet and determine whether or not the TCP packet is a TCP keep-alive packet (as opposed to some other type of TCP packet). An exemplary embodiment is depicted and described with respect to FIG. 8.
  • FIG. 8 depicts one embodiment of a method for processing a TCP packet of a TCP connection at a load balancer for determining whether the TCP packet is a TCP keep-alive packet. It will be appreciated that the steps of method 800 may be performed by a load balancer (e.g., LB 130 depicted and described with respect to FIG. 1). It will be appreciated that, although primarily depicted and described as being performed serially, at least a portion of the steps of method 800 may be performed contemporaneously or in a different order than presented in FIG. 8.
  • At step 801, method 800 begins.
  • At step 810, a TCP packet is received. The TCP packet includes a sequence number field (SEQ) including a client sequence number (client-seq) and an acknowledgment field (ACK) including a client acknowledgment number (client-ack).
  • At step 820, a determination is made as to whether the TCP packet has an empty payload (i.e., the length of the payload of the TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet, a TCP data packet with an empty payload, or a TCP keep-alive packet. If a determination is made that the TCP packet does not have an empty payload, method 800 proceeds to step 850, at which point the TCP packet is processed in a manner for handling TCP packets other than TCP keep-alive packets. If a determination is made that the TCP packet does have an empty payload, method 800 proceeds to step 830 such that additional processing may be performed for determining whether the TCP packet is a TCP keep-alive packet.
  • At step 830, the parity of the TCP packet is determined. The parity of the TCP packet may be determined based on the client sequence number (client-seq) and the client acknowledgment number (client-ack). The parity of the TCP packet may be determined based on ((LSB of client-seq+LSB of client-ack) & 1).
  • At step 840, a determination is made as to whether the TCP packet is a TCP keep-alive packet based on the parity of the TCP packet and a parity rule supported by the load balancer and the server. The parity rule is indicative as to whether the parity of TCP keep-alive packets is to be odd (0) or even (1). For example, if the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be odd, then the packet is identified as being a TCP keep-alive packet if the parity of the TCP packet is odd and is not identified as being a TCP keep-alive packet if the parity of the TCP packet is even. Similarly, for example, if the parity rule supported by the server and the load balancer indicates that the parity for TCP keep-alive packets is to be even, then the packet is identified as being a TCP keep-alive packet if the parity of the TCP packet is even and is not identified as being a TCP keep-alive packet if the parity of the TCP packet is odd. It will be appreciated that the server may be configured to use a similar parity test for determining whether the load balancer will improperly recognize a next TCP response to be sent by the client as a TCP keep-alive packet and, thus, to determine whether or not the next TCP response packet sent by the server is to be manipulated (e.g., as depicted and described with respect to method 700 of FIG. 7). If the TCP packet is not a TCP keep-alive packet, method 800 proceeds to step 850. If the TCP packet is a TCP keep-alive packet, method 800 proceeds to step 860.
  • At step 850, the TCP packet is processed in a manner for handling TCP packets other than TCP keep-alive packets. For example, the TCP packet may be forwarded toward an appropriate server. For example, the TCP packet may be processed as depicted and described with respect to method 400 of FIG. 4. The TCP packet may be handled in any other suitable manner. From step 850, method 800 proceeds to step 899.
  • At step 860, the TCP keep-alive packet is processed in a manner for handling TCP keep-alive packets. For example, a corresponding TCP keep-alive response may be sent to the client without the TCP keep-alive packet being forwarded to the server. The TCP keep-alive packet may be handled in any other suitable manner. From step 860, method 800 proceeds to step 899.
  • At step 899, method 800 ends.
  • The operation of a server 120 and LB 130 in enabling LB 130 to recognize TCP keep-alive packets of a TCP connection between a client 110 and the server 120 may be better understood by considering a typical TCP packet exchange between the client 110 and the server 120 that traverses the LB 130. In this example, it is assumed that the parity rule maintained by the server 120 and the LB 130 indicates that odd parity is indicative of a TCP keep-alive packet (although it will be appreciated that the example could be modified for the case in which even parity is indicative of a TCP keep-alive packet).
  • The TCP connection starts with an initial three-way handshake as follows. The client 110 sends a TCP SYN packet including an initial client sequence number (denoted as client-seq) and an ACK value of “0”. The server 120 responds to the TCP SYN packet by sending a TCP SYN+ACK packet including an initial server sequence number (denoted as server-seq) and an ACK value equal to the initial client sequence number incremented by one (ACK=client-seq+1). The client 110 responds to the TCP SYN+ACK packet by sending a TCP ACK packet including a client sequence number that has been incremented by one (client-seq+1) and an ACK value equal to the initial server sequence number incremented by one (ACK=server-seq+1). The TCP ACK packet sent from the client 110 to the server 120 typically does not include any data (i.e., the payload is empty). The manner in which the LB 130 may operate on the three TCP packets of this initial three-way handshake is ignored for the moment.
  • As an example, assume that client 110 starts with an initial client sequence number of zero and that server 120 uses zeros for all bits except the parity bit. In this example, the initial three-way handshake for the TCP connection may be expressed as (shown here as 31:1 bits):
  • 1. client 110 sends TCP SYN with <client-seq=0, ack=0>
  • 2. server 120 sends TCP SYN+ACK with <server-seq=0:0, ack=1>
  • 3. client 110 sends TCP ACK with <client-seq=1, ack=0:1>.
  • The LB 130 receives the TCP ACK packet from client 110. The LB 130 is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP ACK packet has been received (as opposed to a TCP keep-alive packet or some other type of TCP packet). The LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet (as is the case), a TCP keep-alive packet, or a TCP data packet with an empty payload. The LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward the server 120).
  • In continuation of the above example, further assume that the client 110 then sends a 10-byte request packet and the server 120 responds with a 10-byte response packet. This TCP packet exchange may be expressed as (shown here as 31:1 bits):
      • 1. client 110 sends TCP PSH,ACK with <client-seq=1, ack=0:1> and 10 bytes of payload;
      • 2. server 120 sends PSH,ACK with <server-seq=0:1, ack=11> and 10 bytes of payload; and
      • 3. client 110 sends ACK with <client-seq=11, ack=11 (5:1)> and 0 bytes of payload.
  • The LB 130 receives the TCP ACK packet from client 110. The LB 130, again, is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP ACK packet has been received (as opposed to a TCP keep-alive packet or some other type of TCP packet). The LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet (as is the case), a TCP keep-alive packet, or a TCP data packet with an empty payload. The LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is zero such that LB 130 determines that the received TCP packet is not a TCP keep-alive packet and initiates appropriate handling of the received TCP packet (e.g., forwarding the TCP packet, in this case a TCP ACK packet, toward the server 120). Here, it is noted that, had the client 110 chosen to send an 11-byte payload (or any other odd amount of payload bytes), the server 120 would have had to manipulate its TCP response packet in a manner for preventing LB 130 from falsely identify the subsequent ACK packet from the client as a TCP keep-alive packet (e.g., manipulating itsTCP response such that it also includes an odd number of bytes).
  • In continuation of the above example, further assume that the client 110 then sends a TCP keep-alive packet. In general, if the TCP keep-alive feature is enabled for the TCP connection and the TCP connection remains idle for a (configurable) period of time, the TCP stack 113 of the client 110 will send the TCP keep-alive packet in order to verify that the TCP connection is still working. This TCP keep-alive packet may be expressed as:
      • 1. client 110 sends TCP keep-alive with <client-seq=11−1=10, ack=11> and 0 bytes of payload.
  • The LB 130 receives the TCP keep-alive packet from client 110. The LB 130, again, is not immediately aware of the type of TCP packet which has been received. Namely, LB 130 is not immediately aware that a TCP keep-alive packet has been received (as opposed to a TCP ACK packet or some other type of TCP packet). The LB 130 determines that the received TCP packet is empty (i.e., the length of the payload of the received TCP packet is zero), which indicates that the received TCP packet may be a TCP ACK packet, a TCP keep-alive packet (as is the case), or a TCP data packet with an empty payload. The LB 130 calculates the parity of the received TCP packet (e.g., using (LSB of client-seq+LSB of client-ack) & 1)) and uses the parity of the received TCP packet to determine whether or not the received TCP packet is a TCP keep-alive packet. In this case, the result of the calculation is one, such that LB 130 determines that the received TCP packet is a TCP keep-alive packet and initiates appropriate handling of the TCP packet (e.g., sending a TCP keep-alive response packet to the client 110 while also filtering the TCP keep-alive packet to prevent forwarding of the TCP keep-alive packet to the server 120).
  • It will be appreciated that the LB 130 may only need to be configured to identify TCP keep-alive packets for a specific type of TCP implementation. For example, where LB 130 performs stateless TCP load balancing for TCP connections of an application which may only may be used by LINUX-based clients (or other similar types of TCP implementations), LB 130 does not necessarily need to include logic for detecting TCP keep-alive packets for other types of TCP implementations (e.g., LB 130 may not perform any additional processing to check TCP packets having one-byte payloads). Similarly, for example, where LB 130 performs stateless TCP load balancing for TCP connections of an application which may only be used by WINDOWS-based clients (or other similar types of TCP implementations), LB 130 does not necessarily need to include logic for detecting TCP keep-alive packets for other types of TCP implementations (e.g., LB 130 may not perform any additional processing to check TCP packets having zero-byte payloads).
  • It will be appreciated that LB 130 may be configured to identify TCP keep-alive packets for other types of TCP implementations in which the TCP keep-alive packets may have other sets of characteristics associated therewith (e.g., other payload lengths, different types of payload values, other flag combinations, or the like, as well as various combinations thereof).
  • It will be appreciated that, although primarily depicted and described with respect to embodiments in which the server is configured to perform processing in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet, in at least some embodiments the processing that is performed in order to ensure that a TCP packet that is sent by the server 120 and which might trigger an associated TCP response packet from the client 110 will not cause the TCP response packet that is sent by the client 110 to be wrongly identified by LB 130 as being a TCP keep-alive packet when it is in fact not a TCP keep-alive packet may be performed by any other suitable element. For example, a stateful NAT gateway located between the server 120 and the client 110 might perform the required modification to the TCP response packet sent from the server 120 to the client 110.
  • It will be appreciated that, although primarily depicted and described with respect to embodiments in which the server of a TCP connection is configured to perform manipulation of TCP response packets of the server such that the next TCP response to be sent by the client in response to the TCP response of the server is not incorrectly identified as a TCP keep-alive packet, in at least some embodiments such manipulation by the server may not be needed if the client supports TCP timestamps (e.g., determined by the presence of a TCP timestamp option header in the SYN packet sent by client, as specified in RFC 1323). The server may be configured to identify that the client supports TCP timestamps and to add a timestamp option header to the TCP response packets that the server sends to the client, where one bit of the value inserted by the server (e.g., the LSB) is designated as a parity bit and set to an appropriate parity value based on the test ((LSB of client-seq'+LSB of client-ack') & 1) as previously discussed. The load balancer may be configured to first check for the presence of a timestamp option header in a received TCP packet and to then perform a test (((LSB of client-seq'+LSB of client-ack'+timestamp.ecr) & 1), where “timestamp.ecr” is the value of the ‘ecr’ field in the timestamp option header (which is set by the client 110 to be equal to the value of the timestamp last sent by server 120)). The load balancer 130 may then determine whether or not a received TCP packet is a TCP keep-alive packet based on the result of the test ((LSB of client-seq'+LSB of client-ack'+timestamp.ecr) & 1) and the parity rule supported by the load balancer 130 and the server 120.
  • It will be appreciated that at least some situations may arise in which one or more embodiments of the TCP keep-alive packet detection as depicted and described herein may result in false positives (i.e., false identification of a TCP packet as a TCP keep-alive packet when in fact it is not a TCP keep-alive packet). An example is when the server 120 sends a multi-segmented TCP response, because the associated client 110 may acknowledge every second TCP segment of the TCP response with a TCP packet having a 0-byte payload that might be wrongly identified by the load balancer 130 as being a TCP keep-alive packet, in which case the server 120 would not receive TCP window updates and, thus, may stop sending on the TCP connection.
  • In at least some embodiments, the potential false positive problem for multi-segmented TCP responses of a TCP connection may be avoided by configuring the server 120 to correct the parity of the TCP connection when the first server data segment of the TCP connection is sent by the server 120. In the case of a LINUX-based OS, for example, the LINUX-based OS typically sends a TCP response as (N*max-segment-size (MSS)) packets plus a final packet for the remainder of the TCP response, where MSS is typically even (e.g., 1460 or any other suitable value). In at least some embodiments, if the client 110 sends a TCP packet (e.g., a request) having an odd number of bytes, the first segment sent by the server 120 may be configured to include MSS-1 bytes in order to maintain even parity for the TCP connection, and then the rest of the data of the TCP response may be sent in the usual manner. In at least some embodiments, if the client 110 sends a TCP packet (e.g., a request) indicating an MSS that is even (e.g., 1460), the server 120 may be configured to instead use an odd value for the MSS (e.g., when the client 110 indicates that MSS=1460, the server uses MSS=1459); however, at least some such embodiments may depend on the client 110 not sending acknowledgments for every other data segment of the TCP response. It will be appreciated that the Network Interface Card (NIC) of the client 110 that is supporting the TCP connection may include a feature known as TCP Segmentation Offload (TSO), which may need to be disabled in order for the server 120 to be able to correct the size of the first server data segment of the TCP connection that is sent by the server 120.
  • In at least some embodiments, the potential false positive problem for multi-segmented TCP responses of a TCP connection may be avoided based on the advertised window size of the TCP connection. For example, the load balancer 130 may be configured to evaluate the advertised window size based on an assumption that a smaller advertised window size indicates that the TCP packet is less likely to be a TCP keep-alive packet. However, due to window scaling (which is typically only announced in the initial SYN/ACK exchange between the client 110 and the server 120) the absolute value of the advertized window size in individual packets of the TCP connection can be hard to interpret. In at least some embodiments, window scaling may be disabled on the client 110 in order to make the evaluation of the advertised window size of TCP packets more accurate, however, certain types of clients (e.g., WINDOWS-based clients) may still send 0-byte TCP ACK packets with a large window size (which might wrongly be identified as TCP keep-alive packets).
  • It will be appreciated that, although solutions to the potential false positive problem for multi-segmented TCP responses of a TCP connection are provided above, in at least some situations identification of false positives (e.g., filtering of 0-byte ACK packets) may be acceptable (e.g., for applications that use TCP responses that are smaller than the advertised window size of the client 110, since in many cases problems may not arise from identification of false positives as long as the TCP responses remain smaller than the advertised window size of the client 110).
  • It will be appreciated that use of TCP keep-alive packet detection and filtering may be advantageous for various types of applications and TCP implementations. It will be further appreciated that use of TCP keep-alive packet detection and filtering may be particularly advantageous for use by applications that send TCP keep-alive packets with a relatively high frequency (e.g., relative to transmission of TCP requests and responses via the TCP connections, relative to other applications, or the like). An example of one such application is an application that uses the WebSocket protocol, which is implemented in various browser versions, in which TCP keep-alive messages are sent every 45 seconds. This means that, every 45 seconds, an otherwise idle TCP connection sends a packet of at least 54 bytes (e.g., may be 55 bytes for a WINDOWS-based client, and may be more if timestamps are used). These relatively small packets can, in many cases, represent a significant percentage of the traffic on the TCP connection. For example, for a connection with a 2 BHCA (busy hour call attempts) traffic profile: (1) the connection would send 2*(REGISTER+INVITE+ACK+BYE), which is approximately 4000 bytes and (2) the keep-alive traffic is 3600/45−8 (periods in which the connection is not idle due to requests being sent)=72 packets of 54 bytes, for a total of 3888 bytes. Thus, in this example, the TCP keep-alive packets represent approximately 50% of the traffic exchanged on the TCP connection. Accordingly, use of embodiments of TCP keep-alive packet detection and filtering to handle such TCP keep-alive packets at the load balancer, rather than at the server, would reduce the bandwidth between the load balancer and the server by approximately 50%.
  • It will be appreciated that, although primarily depicted and described with respect to use of a single load balancer to statelessly balance TCP connections of clients across a set of servers, in at least some embodiments multiple load balancers may be used to statelessly balance TCP connections of clients across a set of servers (e.g., for improved performance, improved reliability, or the like). In at least some embodiments, a load balancer protection scheme may be used in order to protect against load balancer failures (e.g., a 1:1 protection scheme, a 1:N protection scheme, or the like). In at least some embodiments, in which a first load balancer fails and a second load balancer takes over load balancing responsibility for the first load balancer, the second load balancer may not have any historical information indicative of how TCP connections have been distributed across the set of servers used by the first load balancer to perform load balancing and, thus, may determine a new distribution based on the set of servers to be used by the second load balancer to perform load balancing (even though existing TCP connections were arranged according to the distribution of the first load balancer). In at least some embodiments, the second load balancer may, for a configurable period after startup or after beginning load balancing, enter a learning mode. The configurable period may be measured based on one or more of a number of packets processed before leaving the learning mode, a percentage of mapping entries to have been learned during the learning mode, a fixed time interval, or the like). In the learning mode, the second load balancer, rather than responding negatively to an incoming TCP keep-alive packet based on a determination that there is a mismatch between the server index of the TCP keep-alive packet (e.g., upper n bits of the sequence number or any other suitable encoding of server index within the TCP keep-alive packet) and the server index calculated by the second load balancer based on receipt of the TCP keep-alive packet, updates its mapping information with the mapping information from the TCP keep-alive packet (i.e., use of the existing server index from the TCP keep-alive packet) and forwards the TCP keep-alive packet to the server indicated by the server index included within the TCP keep-alive packet (rather than the computed server index). In this manner, using the learning mode, the second load balancer is able to reconstruct at least a portion of the load balancing configuration that the first load balancer was using from the TCP keep-alive packets that the second load balancer receives from the associated clients. In the learning mode, the second load balancer also may collect other types of information which also may have been collected by the first load balancer when the first load balancer was active (e.g., server response times, server load information, or the like, as well as various combinations thereof). In at least some embodiments, the second load balancer may transition from the learning mode to an operating mode in which the second load balancer will interpret a mismatch between the server index of the TCP keep-alive packet and the server index calculated by the second load balancer based on receipt of the TCP keep-alive packet as an indication that the server of the TCP connection has changed, as previously described. It will be appreciated that use of one or more such transition modes (e.g., the learning mode discussed above) may enable a more smooth transition between load balancers in various failover scenarios.
  • It will be appreciated that, although primarily depicted and described herein with respect to embodiments in which a load balancer is configured to provide various functions depicted and described herein, in at least some embodiments one or more of the functions presented herein may be provided by any suitable type of device(s) or element(s) configured to provide a load balancing function (e.g., a network device of a communication server provider, a device or element of a data center hosting one or more servers, or the like). It will be appreciated that, although primarily depicted and described herein with respect to embodiments in which a load balancer is configured to provide various functions depicted and described herein, in at least some embodiments one or more of the functions presented herein as being performed by a load balancer may be performed by one or more other types of devices or elements.
  • It will be appreciated that, although primarily depicted and described with respect to embodiments in which stateless handling of connections is performed for a specific type of connection (namely, for TCP connections), in at least some embodiments stateless handling of other types of connections may be supported. Various embodiments may be provided for supporting stateless management of connections of one or more other types of protocols (e.g., one or more other protocols at the transport layer of the OSI model, one or more other protocols at the transport layer of the IP Suite, one or more protocols at one or more other layers of the OSI model, one or more protocols at one or more other layers of the IP Suite, one or more other protocols which may have one or more characteristics derived from or similar to TCP, one or more other connection-oriented protocols which may be managed in a stateless manner using various embodiments presented herein, or the like, as well as various combinations thereof). Thus, various TCP-specific terms used herein may be read more generally. For example, references herein to TCP SYN packets may be read more generally as synchronization packets or synchronization messages, references herein to TCP SYN+ACK packets may be read more generally as synchronization+acknowledgment packets (or synchronization and acknowledgment) packets or synchronization+acknowledgment packets (or synchronization and acknowledgment) messages, references herein to TCP keep-alive packets may be read more generally as keep-alive packets or messages, and so forth. Various other protocol-specific terms used herein also may be read more generally in a similar manner. Thus, it will be appreciated that various embodiments depicted and described herein within the context of TCP may be provided within the context of various other types of protocols and environments.
  • FIG. 9 depicts a high-level block diagram of a computer suitable for use in performing functions described herein.
  • The computer 900 includes a processor 902 (e.g., a central processing unit (CPU) or other suitable processor(s)) and a memory 904 (e.g., random access memory (RAM), read only memory (ROM), and the like).
  • The computer 900 also may include a cooperating module/process 905. The cooperating process 905 can be loaded into memory 904 and executed by the processor 902 to implement functions as discussed herein and, thus, cooperating process 905 (including associated data structures) can be stored on a computer readable storage medium, e.g., RAM memory, magnetic or optical drive or diskette, and the like.
  • The computer 900 also may include one or more input/output devices 906 (e.g., a user input device (such as a keyboard, a keypad, a mouse, and the like), a user output device (such as a display, a speaker, and the like), an input port, an output port, a receiver, a transmitter, one or more storage devices (e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, and the like), or the like, as well as various combinations thereof).
  • It will be appreciated that computer 900 depicted in FIG. 9 provides a general architecture and functionality suitable for implementing functional elements described herein or portions of functional elements described herein. For example, the computer 900 provides a general architecture and functionality suitable for implementing one or more of a client 110, a portion of a client 110, a server 120, a portion of a server 120, load balancer 130, a portion of load balancer 130, or the like.
  • It will be appreciated that the functions depicted and described herein may be implemented in hardware or a combination of software and hardware, e.g., using a general purpose computer, via execution of software on a general purpose computer so as to provide a special purpose computer, using one or more application specific integrated circuits (ASICs) or any other hardware equivalents or suitable types of hardware, or the like, as well as various combinations thereof.
  • It will be appreciated that at least some of the method steps discussed herein may be implemented within hardware, for example, as circuitry that cooperates with the processor to perform various method steps. Portions of the functions/elements described herein may be implemented as a computer program product wherein computer instructions, when processed by a computer, adapt the operation of the computer such that the methods or techniques described herein are invoked or otherwise provided. Instructions for invoking the inventive methods may be stored in a tangible and non-transitory computer-readable storage medium, such as in fixed or removable media, within a memory within a computing device operating according to the instructions, or the like.
  • It will be appreciated that the term “or” as used herein refers to a non-exclusive “or” unless otherwise indicated (e.g., “or else” or “or in the alternative”).
  • It will be appreciated that, while the foregoing is directed to various embodiments of features present herein, other and further embodiments may be devised without departing from the basic scope thereof.

Claims (20)

What is claimed is:
1. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to:
send, from a client device, a client packet comprising a client sequence number and a client acknowledgment number;
receive, at the client device, a server response packet comprising padding information;
compute, by the client device based on the client sequence number and the padding information, a next client sequence number; and
send, from the client device, a client response packet comprising the next client sequence number.
2. The apparatus of claim 1, wherein the client packet is a synchronization packet, wherein the client sequence number is an initial client sequence number for a connection being requested by the client device.
3. The apparatus of claim 2, wherein the synchronization packet is a Transmission Control Protocol (TCP) synchronization (SYN) packet.
4. The apparatus of claim 1, wherein the server response packet is a synchronization acknowledgement packet.
5. The apparatus of claim 4, wherein the synchronization acknowledgement packet is a Transmission Control Protocol (TCP) synchronization+acknowledgement (SYN+ACK) packet.
6. The apparatus of claim 1, wherein the client packet is a client data packet comprising data to be communicated to a server via a connection between the client device and the server.
7. The apparatus of claim 6, wherein the server response packet is a server acknowledgment from the server acknowledging receipt of the client data packet.
8. The apparatus of claim 1, wherein the padding information is configured to manipulate computation of the next client sequence number by the client device.
9. The apparatus of claim 1, wherein the padding information comprises an odd number of bytes.
10. The apparatus of claim 1, wherein the padding information comprises a whitespace character.
11. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to:
receive, by a server from a client, a synchronization message for a transport layer connection between the client and the server, wherein the synchronization message comprises an initial client sequence number for the transport layer connection;
determine, by the server based on the synchronization message, whether the client supports transport layer timestamps; and
send, from the server toward the client based on a determination that the client supports timestamps, a server response packet including a timestamp option header.
12. The apparatus of claim 11, wherein, to determine whether the client supports transport layer timestamps, the processor is configured to:
determine whether the synchronization message includes a timestamp option header.
13. The apparatus of claim 11, wherein the server response packet further includes a value inserted by the server, wherein the value inserted by the server includes a parity bit.
14. The apparatus of claim 13, wherein the processor is configured to:
determine a value of the parity bit based on a client sequence number and a client acknowledgment number.
15. The apparatus of claim 11, wherein the synchronization message comprises a Transmission Control Protocol (TCP) SYN message and the server response packet comprises a TCP server response packet.
16. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to:
receive, by a server from a client, a client packet of a transport layer connection between the client and the server, the client packet having a client packet size;
generate, by the server based on the client packet, a server response for the client; and
segment, by the server based on the client packet size and a maximum segment size, the server response into a plurality of segments including a first segment and at least one additional segment.
17. The apparatus of claim 16, wherein, to segment the server response into the plurality of segments, the processor is configured to:
determine, based on the client packet size, whether to configure the first segment to have a first segment size smaller than the maximum segment size.
18. The apparatus of claim 16, wherein, to segment the server response into the plurality of segments, the processor is configured to:
configure the first segment based on the client packet size and the maximum segment size.
19. The apparatus of claim 18, wherein, to configure the first segment, the processor is configured to:
include, within the first segment, a smaller number of bytes than a number of bytes indicated by the maximum segment size.
20. The apparatus of claim 16, wherein the processor is configured to:
send, from the server toward the client, a first server response packet including the first segment.
US15/402,782 2013-05-06 2017-01-10 Stateless load balancing of connections Abandoned US20170149935A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/402,782 US20170149935A1 (en) 2013-05-06 2017-01-10 Stateless load balancing of connections

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/887,523 US9560126B2 (en) 2013-05-06 2013-05-06 Stateless load balancing of connections
US15/402,782 US20170149935A1 (en) 2013-05-06 2017-01-10 Stateless load balancing of connections

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/887,523 Continuation US9560126B2 (en) 2013-05-06 2013-05-06 Stateless load balancing of connections

Publications (1)

Publication Number Publication Date
US20170149935A1 true US20170149935A1 (en) 2017-05-25

Family

ID=51842123

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/887,523 Active 2035-04-01 US9560126B2 (en) 2013-05-06 2013-05-06 Stateless load balancing of connections
US15/402,782 Abandoned US20170149935A1 (en) 2013-05-06 2017-01-10 Stateless load balancing of connections

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/887,523 Active 2035-04-01 US9560126B2 (en) 2013-05-06 2013-05-06 Stateless load balancing of connections

Country Status (2)

Country Link
US (2) US9560126B2 (en)
WO (1) WO2014179875A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10425473B1 (en) * 2017-07-03 2019-09-24 Pure Storage, Inc. Stateful connection reset in a storage cluster with a stateless load balancer
US20200084130A1 (en) * 2018-09-07 2020-03-12 Qualcomm Incorporated Transmission control protocol timestamp rewriting
WO2020133603A1 (en) * 2018-12-27 2020-07-02 网宿科技股份有限公司 Dr mode protection method and device
US11159940B2 (en) * 2016-10-04 2021-10-26 Orange Method for mutual authentication between user equipment and a communication network

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736065B2 (en) 2011-06-24 2017-08-15 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
US8908698B2 (en) 2012-01-13 2014-12-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US9100277B2 (en) * 2012-08-28 2015-08-04 Alcatel Lucent Client credentials data structure and method of employing the same
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US9432305B1 (en) * 2013-06-26 2016-08-30 Amazon Technologies, Inc. Connection redistribution in load-balanced systems
US9769214B2 (en) * 2013-11-05 2017-09-19 Avaya Inc. Providing reliable session initiation protocol (SIP) signaling for web real-time communications (WEBRTC) interactive flows, and related methods, systems, and computer-readable media
CN104683435B (en) * 2013-11-27 2018-12-14 夏普株式会社 Network system keeps connection method, electronic equipment, server
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US9800662B2 (en) * 2014-07-16 2017-10-24 TUPL, Inc. Generic network trace with distributed parallel processing and smart caching
EP3059922A1 (en) * 2015-02-20 2016-08-24 Thomson Licensing Devices and methods for performing tcp handshakes
WO2016154841A1 (en) * 2015-03-30 2016-10-06 Telefonaktiebolaget Lm Ericsson (Publ) Load balancing
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10034201B2 (en) * 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US10917186B2 (en) * 2015-07-21 2021-02-09 Lg Electronics Inc. Broadcasting signal transmitting apparatus, broadcasting signal receiving apparatus, broadcasting signal transmitting method, and broadcasting signal receiving method
US10623319B1 (en) * 2015-09-28 2020-04-14 Amazon Technologies, Inc. Load rebalancing in a network-based system
EP3366005B1 (en) * 2015-10-22 2020-06-03 Deutsche Telekom AG Method for enhanced performance of a telecommunications network comprising at least one group of pooled mobility management entities, telecommunications network, pool of mobility management entities, program and computer program product
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
CN105553709B (en) * 2015-12-11 2018-08-17 中国人民解放军国防信息学院 Three machine backup method of regional complex management platform
US10671721B1 (en) * 2016-03-25 2020-06-02 Fireeye, Inc. Timeout management services
US10785255B1 (en) 2016-03-25 2020-09-22 Fireeye, Inc. Cluster configuration within a scalable malware detection system
US10476906B1 (en) 2016-03-25 2019-11-12 Fireeye, Inc. System and method for managing formation and modification of a cluster within a malware detection system
US10601863B1 (en) 2016-03-25 2020-03-24 Fireeye, Inc. System and method for managing sensor enrollment
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
US10523746B2 (en) * 2017-03-16 2019-12-31 Oracle International Corporation Coexistence of a synchronous architecture and an asynchronous architecture in a server
US10419532B2 (en) 2017-03-16 2019-09-17 Oracle International Corporation Asynchronous connection handling in a multi-threaded server
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
CN109104395B (en) * 2017-06-21 2022-08-23 亿阳安全技术有限公司 Method and device for scanning, discovering and identifying service of Internet assets
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
CN111108474A (en) * 2017-09-30 2020-05-05 英特尔公司 Techniques to manage accelerator resources through cloud resource managers
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
WO2019237363A1 (en) * 2018-06-15 2019-12-19 Nokia Technologies Oy Dynamic management of application servers on network edge computing device
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US20200028713A1 (en) * 2018-07-16 2020-01-23 Dwight L. Stewart Computer system having controller configured to create data tunnel based on device information
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
US10579432B1 (en) * 2018-08-13 2020-03-03 Twitter, Inc. Load balancing deterministically-subsetted processing resources using fractional loads
US11245753B2 (en) * 2018-08-17 2022-02-08 Fastly, Inc. User space redirect of packet traffic
CN109660626A (en) * 2018-12-29 2019-04-19 天翼电子商务有限公司 A kind of load-balancing method, system and load balancing monitoring client
CN109729104B (en) * 2019-03-19 2021-08-17 北京百度网讯科技有限公司 Client source address acquisition method, device, server and computer readable medium
US11349934B2 (en) * 2019-12-31 2022-05-31 Cloudflare, Inc. Opportunistic transmission control protocol (TCP) connection establishment
US11159652B2 (en) 2019-12-31 2021-10-26 Cloudflare, Inc. Transmission control protocol (TCP) intermediate device implementing a TCP fast open (TFO) connection
US11297110B2 (en) * 2020-04-08 2022-04-05 Arista Networks, Inc. Load balancing for control session and media session in a communication flow
CN113973086B (en) * 2020-07-07 2024-01-26 中移(苏州)软件技术有限公司 Data transmission method, device and storage medium
CN113726867B (en) * 2021-08-26 2024-04-30 杭州迪普科技股份有限公司 Message processing method, device and system
CN114090394B (en) * 2022-01-19 2022-04-22 山东卓朗检测股份有限公司 Distributed server cluster load abnormity analysis method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757248B1 (en) * 2000-06-14 2004-06-29 Nokia Internet Communications Inc. Performance enhancement of transmission control protocol (TCP) for wireless network applications
US7496662B1 (en) * 2003-05-12 2009-02-24 Sourcefire, Inc. Systems and methods for determining characteristics of a network and assessing confidence
US20110154488A1 (en) * 2009-12-23 2011-06-23 Roy Rajan Systems and methods for generating and managing cookie signatures for prevention of http denial of service in multi-core system
US20120243410A1 (en) * 2011-03-23 2012-09-27 Hughes Network Systems, Llc System and method for providing quality of service over dedicated local loop networks
US20120255022A1 (en) * 2011-03-30 2012-10-04 Ocepek Steven R Systems and methods for determining vulnerability to session stealing
US20140304798A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for http-body dos attack prevention with adaptive timeout
US20140301395A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for synchronizing mss and pmtu in ncore and cluster systems
US20150030028A1 (en) * 2011-12-30 2015-01-29 British Telecommunications Public Limited Company Obtaining information from data items
US20150237176A1 (en) * 2006-11-01 2015-08-20 Solarflare Communications, Inc. Driver level segmentation

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785704B1 (en) 1999-12-20 2004-08-31 Fastforward Networks Content distribution system for operation over an internetwork including content peering arrangements
US6836462B1 (en) 2000-08-30 2004-12-28 Cisco Technology, Inc. Distributed, rule based packet redirection
US7212527B2 (en) * 2001-05-09 2007-05-01 Intel Corporation Method and apparatus for communicating using labeled data packets in a network
US7231458B2 (en) 2001-12-27 2007-06-12 Nortel Networks Limited Method and apparatus for discovering client proximity using race type translations
US7644436B2 (en) * 2002-01-24 2010-01-05 Arxceo Corporation Intelligent firewall
US7088718B1 (en) 2002-03-19 2006-08-08 Cisco Technology, Inc. Server load balancing using IP option field approach to identify route to selected server
US7480737B2 (en) * 2002-10-25 2009-01-20 International Business Machines Corporation Technique for addressing a cluster of network servers
US7693050B2 (en) * 2005-04-14 2010-04-06 Microsoft Corporation Stateless, affinity-preserving load balancing
US8549146B2 (en) * 2010-01-28 2013-10-01 Telefonaktiebolaget L M Ericsson (Publ) Stateless forwarding of load balanced packets
US8676980B2 (en) * 2011-03-22 2014-03-18 Cisco Technology, Inc. Distributed load balancer in a virtual machine environment
US8817815B2 (en) * 2011-12-22 2014-08-26 Cisco Technology, Inc. Traffic optimization over network link
US8553552B2 (en) * 2012-02-08 2013-10-08 Radisys Corporation Stateless load balancer in a multi-node system for transparent processing with packet preservation
US8850002B1 (en) * 2012-07-02 2014-09-30 Amazon Technologies, Inc. One-to many stateless load balancing
US9553809B2 (en) * 2013-04-16 2017-01-24 Amazon Technologies, Inc. Asymmetric packet flow in a distributed load balancer

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757248B1 (en) * 2000-06-14 2004-06-29 Nokia Internet Communications Inc. Performance enhancement of transmission control protocol (TCP) for wireless network applications
US7496662B1 (en) * 2003-05-12 2009-02-24 Sourcefire, Inc. Systems and methods for determining characteristics of a network and assessing confidence
US20150237176A1 (en) * 2006-11-01 2015-08-20 Solarflare Communications, Inc. Driver level segmentation
US20110154488A1 (en) * 2009-12-23 2011-06-23 Roy Rajan Systems and methods for generating and managing cookie signatures for prevention of http denial of service in multi-core system
US20120243410A1 (en) * 2011-03-23 2012-09-27 Hughes Network Systems, Llc System and method for providing quality of service over dedicated local loop networks
US20120255022A1 (en) * 2011-03-30 2012-10-04 Ocepek Steven R Systems and methods for determining vulnerability to session stealing
US20150030028A1 (en) * 2011-12-30 2015-01-29 British Telecommunications Public Limited Company Obtaining information from data items
US20140304798A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for http-body dos attack prevention with adaptive timeout
US20140301395A1 (en) * 2013-04-06 2014-10-09 Citrix Systems, Inc. Systems and methods for synchronizing mss and pmtu in ncore and cluster systems

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11159940B2 (en) * 2016-10-04 2021-10-26 Orange Method for mutual authentication between user equipment and a communication network
US10425473B1 (en) * 2017-07-03 2019-09-24 Pure Storage, Inc. Stateful connection reset in a storage cluster with a stateless load balancer
US20200084130A1 (en) * 2018-09-07 2020-03-12 Qualcomm Incorporated Transmission control protocol timestamp rewriting
US10630568B2 (en) * 2018-09-07 2020-04-21 Qualcomm Incorporated Transmission control protocol timestamp rewriting
WO2020133603A1 (en) * 2018-12-27 2020-07-02 网宿科技股份有限公司 Dr mode protection method and device

Also Published As

Publication number Publication date
US20140330976A1 (en) 2014-11-06
US9560126B2 (en) 2017-01-31
WO2014179875A1 (en) 2014-11-13

Similar Documents

Publication Publication Date Title
US9560172B2 (en) Stateless recognition of keep-alive packets
US9560126B2 (en) Stateless load balancing of connections
US11271848B2 (en) Data transmission method, apparatus, and device
US10484518B2 (en) Dynamic port type detection
CN110313163B (en) Load balancing in distributed computing systems
US12095855B2 (en) Distributed resilient load-balancing for multipath transport protocols
US8375134B2 (en) Determining an efficient keep-alive interval for a network connection
US10313247B2 (en) System, method, and device for network load balance processing
US20150189009A1 (en) Distributed multi-level stateless load balancing
US8583831B2 (en) Thin client discovery
US10200277B2 (en) Influencing path selection during a multipath connection
US9954791B2 (en) Network interface selection for network connections
US20060221946A1 (en) Connection establishment on a tcp offload engine
US7561587B2 (en) Method and system for providing layer-4 switching technologies
US9357014B2 (en) Service-based networking
EP2692115B1 (en) Sctp endpoint migration
US11444882B2 (en) Methods for dynamically controlling transmission control protocol push functionality and devices thereof
US20080056263A1 (en) Efficient transport layer processing of incoming packets
US10536548B2 (en) Redundant network routing with proxy servers
US20240171504A1 (en) Multi-path architecture for hardware offloading
JP2015210793A (en) Processor, communication device, communication system, communication method and computer program
CN113132248A (en) Load balancing method, equipment and system

Legal Events

Date Code Title Description
AS Assignment

Owner name: ALCATEL-LUCENT CANADA INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VAN BEMMEL, JEROEN;REEL/FRAME:040936/0907

Effective date: 20130502

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION