Method for realizing network virtual magnetic disk

A virtual disk and network virtualization technology, applied in the field of computer networks, can solve problems such as high hardware resource requirements, easy broadcast storms, and performance impacts, and achieve stable and efficient systems, avoid broadcast storms, and high reliability.

Inactive Publication Date: 2006-05-24
余波
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the requirements for hardware resources are high, and it is easy to be affected by viruses or user operations and cause failures.
And the setting is more complicated, requiring the user to have a certain computer foundation
When their clients start, they will send out broadcasts to search for servers, which affects performance and is prone to broadcast storms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network virtual magnetic disk
  • Method for realizing network virtual magnetic disk
  • Method for realizing network virtual magnetic disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Preferred embodiments of the present invention are described in detail below.

[0031] The realization method of network virtual disk of the present invention, it comprises concrete steps as follows:

[0032] 1. The client PCIROM intercepts the interrupt INT13 to generate a virtual disk, and sends the sector read and write request to the server by directly operating the network card hardware. The server network card ID number is obtained from the local network card EEPROM;

[0033] 2. The server PCIROM first obtains its working mode through a serial port switch group and reflects its working state. Then directly operate the network card hardware to read the client's request, and call the INT13 of the motherboard BIOS to access the public disk and private disk according to the request, so as to complete the client's request. Finally, the result is sent to the client by directly operating the network card hardware;

[0034] 3 The server has two hard disks, which are di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The virtual disk composed of public area and private area is setup in client / server system. The method includes following steps: capturing an interrupt, the client end generates a virtual disk, and sends read-write request on sector of the virtual disk to the server through operating hardware of network card. ID number of network card in server can be obtained from local network card. Operating hardware of network card, server reads request from client end. Based on request, the server calls relevant interrupt to access public area and private area in order to complete the request from client end and send result to the client end through operating hardware of network card. Software of server is realized in PCIROM form, and all codes are in BIOS chip on main board or in BOOTROM of network card. Thus, the method possesses high reliability. The invention reduces resource expenditure of CPU, memory, and hard disc by PC operation system so as to give full play to performance of hardware.

Description

technical field [0001] The invention relates to a computer network method, in particular to a method for realizing a network-based virtual disk. Background technique [0002] There are many diskless systems on the market today. However, there are only three types according to the technology used by the BOOTROM of their clients: RPL, PXE, and EHD (Alpine). Their respective characteristics are as follows: [0003] RPL technology: The server uses NOVELL, WINNT, WIN2000 and other operating systems. Use the IPX / SPX protocol. The client searches for servers by sending a broadcast when it starts up. The C disk of the client is a network disk, and file requests are transmitted between the client and the server. When a client requests a file, the server sends the data belonging to the file to the client. Therefore, non-file reading and writing operations such as partitioning and formatting cannot be performed on this disk; [0004] PXE technology: the server uses WIN2000 and o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06H04L12/00H04L29/06
Inventor 余波
Owner 余波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products