Data backup method and application processing system
A technology for data backup and application processing, applied in digital transmission systems, transmission systems, data exchange networks, etc., to solve problems such as incompleteness, message loss, data backup, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Embodiment 1, a kind of data backup method, refer to image 3 , including the following steps:
[0025] A1. Make an identifiable mark on the received message.
[0026] The logical unit that performs this operation can be called a message distribution module, which is used to receive messages sent by other modules that need to be processed. The so-called identifiable mark is used to distinguish messages, and any method that can be recognized by the application module can be used, such as numbering, adding a time stamp, and the like.
[0027] Based on the role of distinction, the tags used need to ensure uniqueness within a certain time range, so that the tags of the messages cached in the processing module (main and backup modules) are not repeated, and an algorithm can be designed according to the needs of the actual system to ensure the tags An optional way is to use a number as a mark, the so-called number is a combination of the start time of the message distributi...
Embodiment 2
[0042] Embodiment two, a kind of data backup method, refer to Figure 4 , compared with Embodiment 1, this embodiment adds the processing of sending a response message by the active module, which is applicable to the processing situation of an application that needs to return a response. Including the following steps:
[0043] B1. Make an identifiable mark on the received message.
[0044] B2. Send the marked messages to the active module and the standby module respectively.
[0045] Figure 4 The sending to the active module is marked as B2a, and the sending to the standby module is marked as B2b.
[0046] B3a. The active module processes the received marked message.
[0047] B3b. The standby module caches the received marked message.
[0048] B4. The active module sends the data that needs to be backed up by the standby module and the tag of the corresponding message bound to the standby module.
[0049] B5a. The active module sends a response message corresponding to ...
Embodiment 3
[0053] Embodiment three, a kind of data backup method, refer to Figure 5 , compared with Embodiment 1, this embodiment adds the processing of sending a response message by the standby module, which is applicable to the application processing situation that needs to return a response. Including the following steps:
[0054] C1. Make an identifiable mark on the received message.
[0055] C2. Send the marked messages to the active module and the standby module respectively.
[0056] Figure 5 The sending to the active module is recorded as C2a, and the sending to the standby module is recorded as C2b.
[0057] C3a. The active module processes the received marked message.
[0058] C3b. The standby module caches the received marked message.
[0059] C4. The active module sends the processing result of the message and the tag binding of the corresponding message to the standby module.
[0060] In this embodiment, the processing result of the message sent by the active module ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 