Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for protecting business in cluster system

A business protection and trunking system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of heavy communication burdens in trunking systems and threats to normal business operation, reducing complexity, improving efficiency, and reducing data volume. Effect

Active Publication Date: 2014-04-02
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] With the increase of N, the data that backup nodes need to back up, especially the dynamically changing business data, presents an explosive increase, the communication burden of the cluster system is heavy, and the normal operation of the business is threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting business in cluster system
  • Method and device for protecting business in cluster system
  • Method and device for protecting business in cluster system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 1 , this embodiment provides a method for service protection in a cluster system, including:

[0032] 101: Deploy the active service and the standby service on the two logical nodes respectively;

[0033] 102: Select two available physical nodes from the physical node resource pool containing 1+N physical nodes, and map the logical nodes deploying the active service and the standby service to the two available physical nodes respectively, where N is a natural number and N is greater than 1;

[0034] 103: Back up the service data running on the physical node corresponding to the logical node on which the active service is deployed to the physical node corresponding to the logical node on which the backup service is deployed.

[0035] In this embodiment, the virtual node mapping technology is used to perform 1:1 backup of business data on the physical nodes corresponding to the two logical nodes, and the mapped physical nodes can be selected from the physical...

Embodiment 2

[0037] see figure 2 , this embodiment provides a method for service protection in a cluster system, including:

[0038] 201: Virtualize two logical nodes, assign communication addresses to the two logical nodes, enable the upper layer application to communicate with the corresponding physical node through the communication address of the logical node, and deploy the main service and backup on the two logical nodes respectively business;

[0039] Wherein, the deployed main service or backup service may specifically be BGP (Border Gateway Protocol, Border Gateway Protocol), OSPF (Open Shortest Path First, Open Shortest Path First), etc., which are not limited in this embodiment.

[0040] 202: Obtain physical node information, and form a physical node resource pool for logical nodes from corresponding physical nodes;

[0041] In this embodiment, it is assumed that the physical node resource pool includes 1+N physical nodes, and other physical nodes can be added dynamically. W...

Embodiment 3

[0066] see Figure 5 , this embodiment provides a device for service protection in a cluster system, including:

[0067] The service deployment module 301 is used to deploy the active service and the standby service on the two logical nodes respectively;

[0068] The mapping module 302 is configured to select two available physical nodes from a physical node resource pool containing 1+N physical nodes, and map logical nodes deploying active services and standby services to two available physical nodes, respectively, N is a natural number and N is greater than 1;

[0069] The backup module 303 is configured to back up the service data running on the physical node corresponding to the logical node deploying the active service to the physical node corresponding to the logical node deploying the backup service.

[0070] Wherein, the service deployment module 301 is further configured to assign communication addresses to the two virtual logical nodes, so that the upper layer appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for protecting business in a cluster system, belonging to the field of the cluster system. The method comprises the following steps: respectively deploying primary business and spare business on two logic nodes; selecting two available physical nodes from a physical node resource pool containing 1+N physical nodes, and respectively mapping the logic node deployed with the primary business and the spare business to two available physical nodes; and backuping business data operated on the physical node corresponding to the logic node deployed with the primary business to the physical node corresponding to the logic node deployed with the spare business. The device comprises a business deploying module, a mapping module and a spare module. According to the virtual node mapping technology, the amount of data required backuping under the 1: N protection mode is greatly reduced, the network only supporting the 1:1 protection mode in upper-layer application can be better compatible, the upper-layer application has constant communication address for bottom-layer nodes, so that complexity for communication addressing is lowered, and communication addressing efficiency is improved.

Description

technical field [0001] The invention relates to the field of cluster systems, in particular to a method and device for service protection in the cluster system. Background technique [0002] With the increasing scale of the modern Internet, the requirements for core routers located at the core of the network are getting higher and higher, but the forwarding capacity and board size of single-frame routers are gradually approaching the limit. In recent years, the multi-chassis cluster system has become an inevitable trend in the development of core routers. [0003] Reliability is one of the most important indicators of core routers, and cross-chassis service protection can greatly improve service reliability. Therefore, in the cluster mode, how to realize cross-chassis service protection among multiple chassis becomes a problem that the cluster system must solve. [0004] At present, a business protection mode commonly used in cluster systems in the industry is the 1:N prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/711H04L29/12H04L29/08H04L45/247H04L45/243
Inventor 王鹏赵大赫吴小前胡杰晖钱骁
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More