Ultra Monkey: High Availability and Load Balancing Solution for Linux [Monkey]
English | Japanese
Top | About | Mirrors | History | Contacts
News Archive | Papers | Ultra Monkey L7 [offsite]

Ultra Monkey 3 : Download | Installation | Configuration || Linux Virtual Server | Linux-HA | Ldirectord


IP Address Takeover

If a machine, or service running on a machine, becomes unavailable, it is often useful to substitute another machine. The substitute machine is often referred to as a hot stand-by. In the simplest case, IP address takeover involves two machines, each with their own IP address that, are used for administrative access. In addition, there is a virtual IP address that is accessed by end-users. The virtual IP address will be assigned to one of the servers, the master.

Interface Management

IP address takeover begins with the hot stand-by bringing up an interface for the virtual IP address. This is most conveniently done by adding the virtual IP address an existing interface, although a dedicated interface may also be used. Once the address has been added, the hot stand-by is able to accept traffic, and answer ARP requests for the virtual IP address. This does not, however, ensure that all traffic for the virtual IP address will be received by the hot stand-by, as traffic will continue to be sent to the the master host until the ARP caches other hosts and routers on the network expire. To expediate fail-over a technique known as gratuitous ARP is used.

Gratuitous ARP

Usually ARP works as follows. Host A sends out an ARP request for the hardware address of an IP address on host B. Host B sees the request and sends an ARP reply containing the hardware address for the interface with the IP address in question. Host A then records the hardware address in its ARP cache so it doesn't have to do an ARP request and wait for a reply each time it wants to send a packet. Entries in an ARP cache typically expire after about two minutes. For more information on ARP, please see RFC 826 [offsite].

[ARP]
Typical ARP Usage

A gratuitous ARP is an ARP reply when there was no ARP request. If the ARP reply is addressed to the broadcast hardware address then all hosts on the LAN will receive the ARP reply and refresh their ARP cache. Similarly, if a host sends an ARP request for itself then all hosts on the LAN will refresh their ARP caches using the source hardware address of this request. As some hardware only accepts packets sent using one of these methods, despite the behaviour being defined in RFC 2002 (Section 4.6) [offsite], both types of packages are sent to try and maximise the number of hosts that take notice. It turns out that very few types of equipment ignore both types of gratuitous ARP, unless specifically configured to do so.

[Response Based Gratuitous ARP]
Response Based Gratuitous ARP

 

[Request Based Gratuitous ARP]
Request Based Gratuitous ARP

Reversing IP Address Takeover

To relinquish an address obtained through IP address takeover the interface for the virtual address should be taken down. Furthermore, to ensure a rapid transition, gratuitous ARP should be issued with the hardware address of the interface on the master host with the virtual address. Depending on the service, it may be better to reverse the roles of the hot stand-by and master once the failed master comes back on line, rather than undoing fail-over. To do this effectively the hosts will need to negotiate ownership of the virtual IP address, ideally using a heartbeat protocol.

Unfriendly Networks

Gratuitous ARP can be used to maliciously take over the IP address of a machine. Because of this, some routers and switches ignore, or can be configured to ignore gratuitous ARP. On a given network, this may or may not be an issue, but for IP address takeover to be successful, the equipment must be configured to accept gratuitous ARP or flush the ARP caches as necessary. Other than this there are no known problems with using gratuitous ARP and, hence, IP address takeover on both switched and non-switched ethernet networks.


Copyright © 2000-2005, Horms
Last Updated: Sat Mar 4 16:33:57 2006 +0900

Debian is a registered trademark of Software in the Public Interest, Inc.
Red Hat, the Red Hat Shadowman logo and Fedora are registered trademarks of Red Hat, Inc.
Red Hat may also be refered to as RedHat on this site.
Linux is a registered trademark of Linus Torvalds.
All other trademarks are the property of their respective owners.