Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

What is VIP ( Virtual IP ) and WIP (Wide IP)?

Posted on 2011-09-27
5
26,526 Views
1 Endorsement
Last Modified: 2012-05-12
Hello, I would like to understand what is VIP ( Virtual IP ) and WIP (Wide IP)? and how do we use it with the load balancer. Please give me some reference to understand it more. Thanks!
1
Comment
Question by:beer9
  • 2
  • 2
5 Comments
 
LVL 16

Accepted Solution

by:
Blaz earned 250 total points
ID: 36714898
VIP is a network address that is not the (primary) address of a physical network card. In the case of load balancing the VIP usually refers to the address that the client receives via DNS and connects to. The connections to this VIP address are actually intercepted by a (local) load balancing device which forwards the request to appropriate IP - end-point server (based on availability, load etc.).

I believe WIP is term used by F5 company, other term can be "global IP". It is actually VIP taken one step further - it is the address of the global load balancing device/service which redirect traffic to appropriate VIP - local load balancing device (based on availability, load, topology etc.).


http://support.dell.com/support/edocs/SOFTWARE/pebigip/3dns_admin.pdf
http://download.oracle.com/docs/cd/E11035_01/wls100/cluster/config_F5_in_MAN_WAN.html
0
 
LVL 19

Expert Comment

by:jools
ID: 36714906
http://en.m.wikipedia.org/wiki/Virtual_IP_address

I can't seem to paste a link for wip using my mobile.:-(
0
 
LVL 19

Assisted Solution

by:jools
jools earned 250 total points
ID: 36714914
0
 

Author Comment

by:beer9
ID: 36902840
Thanks for the link,.. I would like to understand more on how the transaction between a VIP and all the hosts it represents happens. Please provide some link/documentation in order to understand it more. Thanks!
0
 
LVL 16

Expert Comment

by:Blaz
ID: 36903649
It depends on the technology you want to use - there are many.

As far as I know there are at least two general types:
- all the servers have assigned VIP and all receive every request - then they have an algorithm to determine which server will respond to the request (Microsoft NLB works like this for example - http://technet.microsoft.com/en-us/library/bb742455.aspx)

- A seperate server (load balancing device) has the VIP assigned. When receiving a request it determines to which server it will forward request and then forwards it to that server only (the mentioned F5 company uses this principle - http://www.radharc.com/whitepapers/Server_Load_Balancing.pdf)

0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Computers missing from Windows Explorer Networks 10 124
Setup static routes for IP address in CentOS 2 66
Measure data download 2 115
VPS for routing recomendations 3 64
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question