Abstract
The paper takes the authentication gateway system for internal office network as the research object, for the performance bottleneck and single point of failure problem of the single authentication gateway deployed in the existing primary and standby modes, chooses an authentication gateway integration method based on CA certificate. The practical results show that: through implementing the authentication gateway cluster design and introducing load balancing mechanism, this method solves the performance, stability and single point of failure of the authentication gateway, and improves the resource utilization of the authentication gateway device. This method introduced in this paper can be used for reference for the network architecture optimization based on the server load balancing technology.
Highlights
In the early stage of the enterprise information construction, each application system is mostly deployed for single-node, and users can directly access the server address for oneto-one access
The number of application systems and office staff have increased greatly, which will inevitably lead to the increase of visitors, the performance and stability of the application system are facing great risks
(4) a single point of deployment:Each application system is currently deployed on a single machine, there’s performance and single point of failure risk
Summary
In the early stage of the enterprise information construction, each application system is mostly deployed for single-node, and users can directly access the server address for oneto-one access. With the rapid development of enterprise scale and internet technology, users have more visits to the server application system, and the server response speed is becoming faster. It’s necessary to consider use multiple servers when a single server is unable to handle the many access due to insufficient performance, the way is load balancing. Because the background application server adopts the single node deployment mode, there’s a single point of failure and great security risks. To ensure the safe and efficient operation, it’s necessary to improve the deployment architecture of server and network equipment, adopts a load balancing technology to optimize the current network architecture, so as to better meet the users' requirements for current business
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.