Method and device for virtualizing tolerance intrusion based on cloud computing
A virtualization and cloud computing technology, applied in electrical components, transmission systems, etc., can solve problems such as difficult management, data loss, and impact on service availability, and achieve the effect of improving security and reducing consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] Such as figure 1 As shown, the method of virtualization tolerance intrusion based on cloud computing includes: the copy manager in the physical node creates 2F+1 copies when the system error tolerance copy capacity is F, and sets F+1 copies as active , the remaining F copies are in the pending state, the active copy is called the active copy, and the suspended state copy is called the passive copy, the copy manager receives the service request, and the F+1 active copies execute the For the above service request, the replica manager executes a majority voting algorithm to determine a correct result among F+1 execution results.
[0036] The correct result determined by the replica manager is returned to the user, and the realization of the whole process is transparent to the user.
[0037] Hypervisor is a very small software layer running on the hardware, that is, a virtual machine monitor; different domains are divided on the Hypervisor, in which service instances run i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 