How does Load Balancing Work (F5 Load Balancing)

Posted on 2013-12-31
Last Modified: 2014-01-01
Anyone have experience with the F5?  What does load balancing do?  How does it work?
To me, the solution to load balancing is to buy another machine.  Why is buying a load balancer a better idea?
Question by:brothertruffle880
LVL 53

Assisted Solution

by:Will Szymkowski
Will Szymkowski earned 250 total points
ID: 39748731
Load balancing is used when you want to balance the load between 2 nodes. You have to have 2 machines by default to load balance. Simply setting up 2 nodes that are identical does not provide load balancing. This would simply be 2 identical nodes which are independent from each other. Using and F5 load balancer has intelligence behind it, meaning you have 2 or more nodes that use 1 logical IP called a (vip virtual IP).

The VIP is used as the connection point and then then VIP has a pool of nodes assigned to it. F5 can determine weather a service has gone down or a failure has happened. This is useful when you have clients connecting to a VIP which has 2 or more nodes. If one node fails the F5 load balancer detects this and can automatically redirect clients to the node that is online.

If you didn't have a load balancer clients could connect try and connect to the failed node and not get any further. This makes it seamless to the end user.

There are several other ways to manipulate a load balancer depending on your needs. Take a look at the below link which will provide more detail.


Accepted Solution

Jordan Medlen earned 250 total points
ID: 39748737
Aside from specifically F5, load balancers, now considered application delivery controllers help balance resources as well can provide high-availability for applications and content delivery.

Load balancing a website hosting content can extend the requests across multiple servers and can be done using DNS having multiple A records. The problem is that if a server has too many requests going to it, sucking up cpu and ram, DNS has no clue and may not provide every user with a great experience.

Load balancers, or application delivery controllers, on the other hand can perform health checks, as well as balance the load using different algorithms, from least weighted to round robin, etc.

These dedicated devices can be configured in high-availability mode as well, so if an ADC should fail, the other will continue to deliver access to whatever the configured application is.

Now the how. They work most typically by creating a "pool" of resources. Real servers are defined and placed in this "pool". Health checks are also defined so that as resources become unavailable, they can be pulled from the "pool". Now, defining those resources doesn't do us much good if we don't have a simple way to point to them. We do this by creating a VIP, or virtual IP address. We point DNS entries to this VIP and configure other applications to use this VIP as well. The ADC will then take requests to the VIP and distribute the requests among all servers define in the resource pool, based on whatever the configured algorithm is.

Lastly, there are a couple of ways that the real servers respond to the request. In many cases, NAT (network address translation) is configured, and the ADC acts as firewall or gateway device. The ADC can also sit off to the side, instead of inline, and servers can respond directly to client requests. This is called DSR, or direct server response. This is decided in the design phase, and can have great impact on the application you are implementing.

This is just a nutshell synopsis on load balancers, or ADCs (application delivery controllers). Hope this helps.

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The question appears often enough, how do I transfer my data from my old server to the new server while preserving file shares, share permissions, and NTFS permisions.  Here are my tips for handling such a transfer.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question