Delivering the best continuity for non-connection oriented services

Posted by Admin | 18 March, 2020 | Technical

Did you know that Relianoid implements different techniques to provide higher performance and high scale for non-connection oriented and real-time services like UDP (User Datagram Protocol), SIP (Session Initiation Protocol), VoIP (Voice over IP), VPN (Virtual Private Network), SYSLOG (System Logging Protocol), DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol) among others?

Due to the nature and requirements of all those protocols the different techniques that the Relianoid technology uses are the following:

1. sNAT/dNAT: For application layer protocols that require some negotiation between clients and backends, it supports address translation according to application layer information (like SIP) that requires connection tracking systems. The connection can be transparent (the real server knows the client IP address) or not. This load balancing could achieve several hundred thousand packets per second.

2. Stateless dNAT: Address translation with transparency using fast path and without connection tracking which provides very high performance for real-time services hiding the local infrastructure. This method is able to move a few million packets per second without concern. This new load balancing technique has been designed by the Relianoid Team especially for real-time UDP protocols although TCP is also possible to be used.

3. DSR: High performance load balancing at layer 2 using a fast path in order to provide the best performance. Some backends configurations are required before using this technique. Several million packets are able to be handled by Relianoid using this load balancing method.

With all these methods designed and implemented by Relianoid Team to scale non-connection oriented services with the best performance. Let’s try Relianoid.

SHARE ON:

Related Blogs

Posted by reluser | 08 May 2024
The distinction between penetration testing and vulnerability scanning is often blurred. However, understanding their nuanced disparities is crucial for organizations to tailor their security strategies effectively. While both methodologies contribute…
24 LikesComments Off on Key differences between Pen Testing & Vulnerability Scanning
Posted by reluser | 22 March 2024
Load balancing is crucial for building reliable distributed systems, optimizing workload allocation across various computing resources like computers, clusters, and network links. Its aim is to enhance resource utilization, maximize…
68 LikesComments Off on Deep dive into Network Load Balancing and Proxying
Posted by reluser | 25 October 2023
In our current digital landscape, where websites and applications need to be available 24/7, load balancers play a crucial role in distributing traffic across multiple servers to ensure optimal performance…
46 LikesComments Off on The Pain Points of Load Balancers and How RELIANOID Solves Them