> The hash algorithm uses the source IP address, the destination IP address, 
> the Protocol field and the Incoming Interface Index in order to generate a 
> key. 

Thanks David. How is chosen the next-hop with this generate key? I am looking 
for this algorithm.

Regards,
Samuel



-----Message d'origine-----
De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Envoyé : jeudi 17 juillet 2008 10:55
À : Gay,S,Samuel,JPECS R; juniper-nsp@puck.nether.net
Objet : RE: [j-nsp] Load balancing: hash algorithm


Hi,

The hash algorithm uses the source IP address, the destination IP address, the 
Protocol field and the Incoming Interface Index in order to generate a key. 

Regards
David 

-----Message d'origine-----
De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] De la part de [EMAIL 
PROTECTED] Envoyé : jeudi 17 juillet 2008 10:46 À : juniper-nsp@puck.nether.net 
Objet : [j-nsp] Load balancing: hash algorithm

Hi Group,

Do you know how work hash algorithm used in load balancing (only layer-3)? Is 
there some documentation about it?

Thanks,
Samuel 

_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net 
https://puck.nether.net/mailman/listinfo/juniper-nsp

*********************************
This message and any attachments (the "message") are confidential and intended 
solely for the addressees. 
Any unauthorised use or dissemination is prohibited.
Messages are susceptible to alteration. 
France Telecom Group shall not be liable for the message if altered, changed or 
falsified.
If you are not the intended addressee of this message, please cancel it 
immediately and inform the sender.
********************************
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to