How Do I Use Hash Algorithms to Implement Load Balancing?
The typical load balancing process includes input (traffic and valid packet fields), processing (calculation using the hash algorithm), and output (forwarding traffic out through the corresponding outbound interface based on the hash result). The hash result directly affects the load balancing effect. As such, how to use the hash algorithm is particularly important in load balancing deployment.
Figure 1 Hash calculation process

How Do I Handle Uneven Load Balancing Among Eth-Trunk Member Interfaces?
Normally, traffic is load balanced over multiple member links after an Eth-Trunk is deployed for load balancing. If traffic is transmitted over only one link or load balanced over some links, but not all links of an Eth-Trunk, uneven load balancing occurs. If traffic is heavily loaded on a single link, services may be affected.
If traffic is unevenly load balanced among Eth-Trunk member links, rectify the fault according to the following procedure:
Checking Whether the Number of Eth-Trunk Member Interfaces Is the nth Power of 2
Checking Whether an Inter-Device Eth-Trunk Is Configured for a Stack
Checking Whether Hash Polarization Occurs
Checking Whether the Traffic Type Matches the Load Balancing Mode
Following document describes What Can I Do If an Eth-Trunk Unevenly Load Balances Traffic.
https://support.huawei.com/enterprise/en/doc/EDOC1100209558


