Method and device for protecting business in cluster system
A business protection and trunking system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of heavy communication burdens in trunking systems and threats to normal business operation, reducing complexity, improving efficiency, and reducing data volume. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] see figure 1 , this embodiment provides a method for service protection in a cluster system, including:
[0032] 101: Deploy the active service and the standby service on the two logical nodes respectively;
[0033] 102: Select two available physical nodes from the physical node resource pool containing 1+N physical nodes, and map the logical nodes deploying the active service and the standby service to the two available physical nodes respectively, where N is a natural number and N is greater than 1;
[0034] 103: Back up the service data running on the physical node corresponding to the logical node on which the active service is deployed to the physical node corresponding to the logical node on which the backup service is deployed.
[0035] In this embodiment, the virtual node mapping technology is used to perform 1:1 backup of business data on the physical nodes corresponding to the two logical nodes, and the mapped physical nodes can be selected from the physical...
Embodiment 2
[0037] see figure 2 , this embodiment provides a method for service protection in a cluster system, including:
[0038] 201: Virtualize two logical nodes, assign communication addresses to the two logical nodes, enable the upper layer application to communicate with the corresponding physical node through the communication address of the logical node, and deploy the main service and backup on the two logical nodes respectively business;
[0039] Wherein, the deployed main service or backup service may specifically be BGP (Border Gateway Protocol, Border Gateway Protocol), OSPF (Open Shortest Path First, Open Shortest Path First), etc., which are not limited in this embodiment.
[0040] 202: Obtain physical node information, and form a physical node resource pool for logical nodes from corresponding physical nodes;
[0041] In this embodiment, it is assumed that the physical node resource pool includes 1+N physical nodes, and other physical nodes can be added dynamically. W...
Embodiment 3
[0066] see Figure 5 , this embodiment provides a device for service protection in a cluster system, including:
[0067] The service deployment module 301 is used to deploy the active service and the standby service on the two logical nodes respectively;
[0068] The mapping module 302 is configured to select two available physical nodes from a physical node resource pool containing 1+N physical nodes, and map logical nodes deploying active services and standby services to two available physical nodes, respectively, N is a natural number and N is greater than 1;
[0069] The backup module 303 is configured to back up the service data running on the physical node corresponding to the logical node deploying the active service to the physical node corresponding to the logical node deploying the backup service.
[0070] Wherein, the service deployment module 301 is further configured to assign communication addresses to the two virtual logical nodes, so that the upper layer appl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
