CN100356308C - Method for realizing network virtual magnetic disk - Google Patents

Method for realizing network virtual magnetic disk Download PDF

Info

Publication number
CN100356308C
CN100356308C CNB2005101017320A CN200510101732A CN100356308C CN 100356308 C CN100356308 C CN 100356308C CN B2005101017320 A CNB2005101017320 A CN B2005101017320A CN 200510101732 A CN200510101732 A CN 200510101732A CN 100356308 C CN100356308 C CN 100356308C
Authority
CN
China
Prior art keywords
client
server
network interface
interface card
publicly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005101017320A
Other languages
Chinese (zh)
Other versions
CN1776591A (en
Inventor
余波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2005101017320A priority Critical patent/CN100356308C/en
Publication of CN1776591A publication Critical patent/CN1776591A/en
Application granted granted Critical
Publication of CN100356308C publication Critical patent/CN100356308C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a method for realizing a network virtual magnetic disk. The virtual magnetic disk is arranged in a client/server system and is composed of a public area and a private area. The method comprises the following steps: a client captures an interrupt and generates a virtual magnetic disk and sends a read-write request for a sector of the virtual disk to a server through operating hardware of a network card. The server obtains an ID number of the network card from a local network card, operates the hardware of the network card for reading the request from the client, calls a relevant interrupt to access the public area and the private area based on the request so as to complete the request of the client and sends a result to the client through operating the hardware of the network card. For the software of the server is realized in a mode of PCIROM, and all codes are in a BIOS chip of a main board or in a BOOTROM of the network card, the method of the present invention has the advantages of extremely high reliability, reduced expenditure of resources, such as a CPU, memories, a hard disk, etc. by a general PC operating system, and full play of hardware performance.

Description

A kind of implementation method of network virtual magnetic disk
Technical field
The present invention relates to a kind of computer network method, in particular a kind of implementation method of based on network virtual disk.
Background technology
No disc system on the market has much now.But come to divide according to the employed technology of the BOOTROM of their clients and to have only three kinds: RPL, PXE, EHD (Alpine this).Characteristics are as follows separately:
The RPL technology: server uses NOVELL, WINNT, operating systems such as WIN2000.Use the IPX/SPX agreement.Pass through to send the broadcast search server during client terminal start-up.The C dish of client is a network disk, and what transmit between client and server is file request.During as certain file of client-requested, the data that server just will belong to this document send to client.Therefore can not carry out subregion, the operation of non-file read-write types such as format on this dish;
The PXE technology: server uses operating systems such as WIN2000.Use TCP/IP and IPX/SPX agreement.Pass through to send the broadcast search server during client terminal start-up.The C dish of client is a network disk, and what transmit between client and server is file request.Therefore can not carry out subregion, the operation of non-file read-write types such as format on this dish;
The EHD technology: server uses DOS622, operating systems such as DOS7.Use self-defining EDI agreement.Pass through to send the broadcast search server during client terminal start-up.Non-file read-write type operations such as its virtual disk can format, but its simulation of sector-level completely, it can not simulate Master boot sector, and its server can only simulate the virtual disk of FAT16 and FAT32;
As for the NXD technology: server uses LINUX operating system.Non-file read-write type operations such as its virtual disk can format, but do not know whether can accomplish sector-level simulation completely.Its startup also is based upon on the PXE basis, thus also can be during client terminal start-up by sending the broadcast search server, and ICP/IP protocol also is bound to use.
The employed server of above technology all is based upon on the universal PC operating system.So to having relatively high expectations of hardware resource, be subjected to easily virus or user the operation influence and break down.And more complicated is set, need the user that certain computer basic is arranged.All can send broadcasting with search server during their client terminal start-up, not only influence performance but also be easy to generate broadcast storm.
Summary of the invention
The object of the present invention is to provide a kind of implementation method of network virtual magnetic disk, realize not producing in a kind of server embedding and the client terminal start-up process network virtual magnetic disk of broadcasting, and described virtual disk can arbitrarily expand capacity and need not any setting.
Technical scheme of the present invention is as follows:
A kind of implementation method of network virtual magnetic disk, it is arranged in the client and server system, and described virtual disk is made up of publicly-owned district and privately owned district; May further comprise the steps:
1.1 the client intercept interrupt generates a virtual disk, and will send to server by operation network interface card hardware to the sector read-write requests of virtual disk, the network interface card identifier of server obtains from local network interface card;
1.2 the request that server operation network interface card hardware reads client, and visit publicly-owned district and privately owned district according to the request call respective interrupt finishing the request of client, and sends to client by operation network interface card hardware;
1.3 the publicly-owned district of described server stores publicly-owned sector; Its privately owned district preserves the privately owned sector of each client, is used to preserve the private data that publicly-owned sector was carried out modification;
1.4 described client is passed through the result that operation network interface card hardware obtains server process, and the result is returned to the requestor.
Described method, wherein, server system software is realized with the form of hardware initialization code.
Described method, wherein, described server also is provided with a serial ports switches set, is used for being provided with and monitor server.
Described method, wherein, the network interface card setup code of described client is intercepted and captured disk and is interrupted, and will all intercept and capture all requests of described virtual disk, to simulate described virtual disk.
Described method, wherein, described publicly-owned district and privately owned district are realized by two independent hard disks, are set to publicly-owned dish and privately owned dish respectively.
Described method wherein, is also preserved the system data of corresponding each client in the described privately owned dish, logging on client number, client login record.
Described method wherein, is preserved server network interface card identification number in the network interface card memory cell of described client.
Described method, wherein, described client is used self-defining non-standard communication agreement with communicating by letter of described server.
The implementation method of a kind of network virtual magnetic disk provided by the present invention, because server software is realized with the form of PCIROM, all codes are all in mainboard BIOS chip or network interface card BOOTROM, has high reliability, reduced universal PC operating system to CPU, internal memory, the consumption of resources such as hard disk performs to the limit with hardware performance; The user of need not simple to operate has computer basic, can arbitrarily expand capacity and need not any setting; Thoroughly avoided broadcast storm; Can simulate the virtual disk of any file system; Use self-defining non-standard communication agreement, avoided complicated agreement package to the influence of system performance and with existing network in conflicting aspect the agreement, make system stability efficient.
Description of drawings
Fig. 1 is server described read operation procedure chart under the use pattern of the inventive method;
Fig. 2 is server described write operation procedure chart under the use pattern of the inventive method;
Fig. 3 is server described search server operating process figure under the use pattern of the inventive method;
Fig. 4 is the circuit diagram of the serial ports switches set of the inventive method;
Fig. 5 is the privately owned dish data storage synoptic diagram of the inventive method;
Fig. 6 is the client login record schematic diagram data of the inventive method;
Fig. 7 is privately owned district of the client of the inventive method and included list item district and data area data structure synoptic diagram thereof.
Embodiment
Below preferred embodiment of the present invention is described in detail.
The implementation method of network virtual magnetic disk of the present invention, it comprises that concrete steps are as follows:
1 client rs PC IROM intercept interrupt INT13 generates a virtual disk, and will send to server by direct control network interface card hardware to the sector read-write requests of virtual disk.The server network interface card obtains from local network interface card EEPROM for ID number;
2 server PCIROM at first obtain its mode of operation and reflect its duty by a serial ports switches set.Direct control network interface card hardware reads the request of client then, and visits publicly-owned dish and privately owned dish according to the INT13 of request call mainboard BIOS, to finish the request of client.At last the result is sent to client by direct control network interface card hardware;
3 servers have two hard disks, are divided into publicly-owned dish and privately owned dish.Publicly-owned dish is as publicly-owned district (have only one, use for all clients).Privately owned dish maintains system data, logging on client number, the privately owned district of client login record and each client (one of each client is used by this client).Publicly-owned district stores publicly-owned sector, and privately owned district stores each client was carried out modification to publicly-owned sector privately owned sector.Described virtual disk is made of jointly described publicly-owned sector and described privately owned sector;
4 client rs PC IROM pass through the result that direct control network interface card hardware obtains server process, and the result is returned to the requestor.
Below be a preferred embodiment of apparatus of the present invention:
Server adopts: hardware: an IBM PC compatible has two hard disks (publicly-owned dish and privately owned dish), a common network interface card, the gauge tap group that is connected on the serial ports, i.e. a serial ports switches set.Publicly-owned dish is common hard disk, supports the LBA pattern, and capacity is greater than 8.4GB.Privately owned dish is common hard disk, supports the LBA pattern, and capacity is greater than 8.4GB.
Reservation is used after being in first sector of privately owned dish, as shown in Figure 5.Nybble is preserved the number clients of having logined before second sector.Since per 8 bytes of the 16th byte is a list item, wherein preceding 4 bytes are that (network interface card of same manufacturers produce has only back three byte differences for low 4 bytes of client NIC ID, and not have size in the C language be the data type of three bytes or six bytes, be convenient low 4 bytes of getting of programming), back 4 bytes have made the data block number of using up for this client in its privately owned district.The list item number is by the manageable maximum number clients decision of this system, as shown in Figure 6.
All the other sectors are divided into N privately owned district (one of each client) by the manageable maximum number clients of this system, each is privately owned divides into list item district (each list item 4 byte) and data field (sector of the Nth power with 2 is a piece, be divided into N piece), as shown in Figure 7.Each list item is mapped a piece in the privately owned district and a piece in the publicly-owned district.As: the value of the 2nd list item is 3 in the 1st privately owned district, then expression respective sectors in actual the 2nd data block that should read and write in the 1st privately owned district when the sector in No. 3 pieces of No. 1 read-write on client side virtual disk.
The data store organisation example is as follows: establishing block size is 16 sectors, and when client when to read LBA number (since 0) be 20 sector, server is a place piece number with 20/ (dividing exactly) 16=1; 20% (getting surplus) 16=4 is the sector offset amount in the piece, supposes that the list item district thes contents are as follows in the privately owned district of this client:
5 3 1 ……………………… 7
Then to find list item in the list item district be that 1 item is in the list item district the 3rd to server, and then server sends to client with the 4th sectors of data in the 3rd in the data field and gets final product.
If list item is 1 can not find in the list item district, illustrate that this client do not carry out modification to No. 20 sectors of publicly-owned dish, then directly read No. 20 sectors and its data are sent to client from publicly-owned dish.
Serial ports switches set signal is as Fig. 4, each pin that uses and title thereof as follows:
Pin1:DCD (Data Carrier Detection) data carrier detects;
Pin4:DTR (Data Terminator Ready) data terminal is prepared;
Pin5:SGND (Sign Ground) signal ground;
Pin6:DSR (Data Set Ready) data set is prepared;
Pin7:RTS (Request To Send) asks to send;
Pin8:CTS (Clear To Send) clear to send.
Wherein, first K switch 1 is a pushbutton switch; Second switch K2 is a single-pole double-throw switch (SPDT); The 3rd K switch 3 is a single-pole double-throw switch (SPDT).Two light emitting diode D1 and the D2 RTS that is connected in parallel is used for the display server state.
Software program is placed among mainboard BIOS chip or the network interface card BOOTROM with the form of PCIROM, realizes following steps by intercepting and capturing INT19:
1 with DTR be changed to high level (+12V);
2 with RTS be changed to high level (+12V).Light emitting diode D1 conducting this moment is luminous and D2 ends, expression server operate as normal.In program operation process, anyly RTS is changed to when wrong low level (12V), light emitting diode D2 conducting is luminous and D1 ends, and expression is broken down when running into;
3 detect CTS, if second switch K2 is CTS and DTR connection, CTS be high level then server work in Installation Modes, otherwise work in the use pattern;
4 detect DSR, invalid when server works in Installation Modes, when being in the use pattern if the 3rd K switch 3 with DSR and DTR connection, DSR be high level then server work in automatic recovery pattern, otherwise work in normal mode;
5 installation INT0C are the serial ports interrupt handler, the DCD state will be changed trigger the IRQ3 interrupt line, call INT0C, and this step is changed to shutdown flag effectively.When program major cycle body is masked as and will refreshes buffer zone, closing server then when effective detecting this;
6 disk parameters that obtain publicly-owned dish are provided with the back and use;
7 initialization buffer zones;
8 enter program major cycle body.
Program major cycle body works in use pattern or Installation Modes according to server, is divided into two kinds of different situations.
Step at Installation Modes comprises:
1 reads client-requested;
If 2 read requests are directly from publicly-owned dish reading of data; If write request directly writes data publicly-owned dish; If remove request, do not have any operation; If obtain the disk parameter request, directly publicly-owned dish disk parameter is issued clients corresponding; If the search server request, send server network interface card ID number;
3 detect shutdown flag, if closing server effectively then; The circulation above-mentioned steps.
Step under the use pattern comprises:
1 reads client-requested;
If 2 read requests, flow process are as shown in Figure 1, it comprises following concrete steps:
2.1 judge by read data whether in buffer zone.Be then to jump to 2.7, otherwise jump to 2.2;
2.2 whether disconnected buffer data is dirty.Be then to jump to 2.3, otherwise jump to 2.6;
2.3 whether piece is in privately owned district under judging dirty data.Be then to jump to 2.5, otherwise jump to 2.4;
Also used the piece number to add one in the privately owned district of this client 2.4 in the privately owned district of this client, add a list item;
2.5 the data in the buffer zone are write the privately owned district of this client and the dirty sign of clear buffer;
2.6 judge by read data whether in the privately owned district of this client.Be then data to be read buffer zone from privately owned district, otherwise data are read buffer zone from publicly-owned district;
2.7 corresponding data in the buffer zone is sent to client.
If 3 write requests: flow process is seen shown in Figure 2, described write operation may further comprise the steps:
3.1 judge and to treat that write data is whether in buffer zone.Be then to jump to 3.7, otherwise jump to 3.2;
3.2 judge whether buffer data is dirty.Be then to jump to 3.3, otherwise jump to 3.6;
3.3 whether piece is in privately owned district under judging dirty data.Be then to jump to 3.5, otherwise jump to 3.4;
Also used the piece number to add one in the privately owned district of this client 3.4 in the privately owned district of this client, add a list item;
3.5 the data in the buffer zone are write the privately owned district of this client and the dirty sign of clear buffer;
3.6 call the 2nd described read operation of step raw data is read buffer zone;
3.7 with treating that write data covers corresponding raw data in the buffer zone, and buffer zone is designated as dirty.
If 4 remove request: with all private data full scale clearances of this client in the buffer zone, the piece of the use number of this client is put 0.
If 5 obtain the disk parameter request: directly publicly-owned dish disk parameter being issued client, check then whether server is operated in automatic recovery pattern, is then to this client executing clear operation;
If 6 search server requests: flow process is seen shown in Figure 3, described search server operation may further comprise the steps:
6.1 judge the login record that whether has this client in the privately owned dish, in this way process ends;
6.2 otherwise, judge whether to reach maximum number clients, process ends in this way;
6.3 otherwise the logging on client number adds 1, and adds the login record of this client, process ends then.
7 detect shutdown flag, if effectively then refresh buffer zone, closing server then;
8 forward the 1st step of major cycle of this flow process to.
Below be specific operation process: set the server mode of operation with second switch K2 and the 3rd K switch 3, the power switch POWER ON by mainboard starts shooting then.If server operate as normal then light emitting diode D1 conducting is luminous and D2 ends, if the luminous D1 of D2 conducting is by then representing server failure.When normally moving, presses server 1 closing server of K switch, if can only realize shutdown by the power switch POWER ON of mainboard behind the server failure.
The function of each mode of operation of server is as follows:
Installation Modes: the virtual disk of client is exactly publicly-owned dish under this pattern.To the modification of virtual disk as seen to all clients.The user can directly carry out subregion from client to publicly-owned dish with this pattern, format, and GHOST installs multiple operating system, copies data, operations such as install software.
The use pattern: the virtual disk of client is made of jointly publicly-owned sector on the publicly-owned dish and the privately owned sector in the privately owned district under this pattern.Modification to virtual disk is only unaffected to visible other clients of this client.
Automatically removing pattern: when server in Installation Modes following time, this pattern is invalid.When server in use pattern following time, the privately owned district of client will be eliminated when client starts next time, being used for Internet bar etc. does not need the user to preserve the occasion of private data.
Being exemplified as of client: hardware: an IBM PC compatible, be with a common network interface card.Hard disk, CD-ROM drive or floppy drive are not essential.
Software program is placed among mainboard BIOS chip or the network interface card BOOTROM with the form of PCIROM, realizes following steps by intercepting and capturing INT19:
1 internal memory [0040:0013] is sentenced KB is that the main memory size of unit reduces and the corresponding value of this PCIROM size, copies the content of this PCIROM to the main memory top and realizes residently, jumps to relevant position, main memory top then and continues to move;
2 read the keyboard input;
3 if the user presses ' Q ' key and then recovers the value that internal memory [0040:0013] is located, and recovers INT19, calls INT19 and withdraws from this program;
4 preserve former INT13 vector and new vector are set, and the disk number that internal memory [0040:0075] is located adds one;
5 if the user presses ' S ' key then by network interface card send server searching request, obtains network interface card ID number of server and is kept in the eeprom chip of network interface card;
6 read in server network interface card ID from EEPROM;
7 press ' C ' key as if the user then sends the request of removing, removes the privately owned district data of this client;
8 send the disk parameter request, obtain the disk parameter of virtual disk, use for new INT13;
9 if the user press ' L ' key then virtual disk number be true disk number+80H (last disk), recover INT19, call INT19 and withdraw from this program;
10 virtual disks number are 80H (first disk), internal memory [0000:7C00] is read in its first sector locate and jump to this place and begin from virtual disk pilot operationp system.
Wherein, the 4th the step described new interrupt INT 13 finish following work in client:
Each function when DL equals virtual disk is achieved as follows
AH=00H returns: AH=0 CF=0
AH=01H returns: AH=0 CF=0[0040:0074]=0
AH=02H returns: AH=0 CF=0 calls and reads the sector function
AH=03H returns: AH=0 CF=0 calls and writes the sector function
AH=04H returns: AH=0 CF=0
AH=05H returns: AH=0 CF=0
AH=08H returns: the true disk number of AH=0 CF=0 CX=FFFFH DH=FEH DL=+1
AH=09H returns: AH=0 CF=0
AH=0CH returns: AH=0 CF=0
AH=0DH returns: AH=0 CF=0
AH=10H returns: AH=0 CF=0
AH=11H returns: AH=0 CF=0
AH=14H returns: AH=0 CF=0
AH=15H returns: AX=03 CF=0 CX:DX=FB0400H
AH=41H returns: AH=21H CF=0 BX=AA55H CX=1
AH=42H returns: AH=0 CF=0 calls and reads the sector function
AH=43H returns: AH=0 CF=0 calls and writes the sector function
AH=44H returns: AH=0 CF=0
AH=47H returns: AH=0 CF=0
AH=48H calls and obtains the disk parameter function
Read the sector function and will read sector requests and send to server, and read corresponding data and return to calling program from server.Unsuccessful then do not return;
Write that the sector function will be write sector requests and corresponding data sends to server.Get nowhere and do not return;
Obtain the disk parameter function described disk parameter of the 8th step is returned to calling program.
When DL is not equal to virtual disk, will recover its real DL value and call former INT13 code.
Client operation mainly comprises: when client terminal start-up, carry out different operating according to the difference of input key assignments, following key assignments is the specific implementation of the embodiment of the invention only, is not limited to adopt other key assignments.
Q: do not generate virtual disk and start the operating system with normal mode.
S:, obtain network interface card ID number of server and be kept in the eeprom chip of network interface card by network interface card send server searching request.Use for the first time maybe need change server the time in client, will find server by this function.And client will obtain from the EEPROM of this locality network interface card ID number of server in the later use, thus during normal use can not produce any broadcasting, thus avoided broadcast storm.
C: send the request of removing, remove the privately owned district data of this client.Usually on the publicly-owned dish of server a cover is housed all, many covers can certainly be installed, available operating system and required application software.All renewal operations to virtual disk that the user is in use done all are kept in the privately owned district of this client.Destroyed the system of own correspondence as the user after, can use this function that institute is done to upgrade cancellation with the recovery system original state.
L: generate virtual disk, and it is last disk.Calling former INT19 starts the operating system.The user can use this function from local vectoring computer, then virtual disk is carried out action required (subregion, format, copies data etc.).
Not having any key presses: generate virtual disk, and it is first disk and from this disk pilot operationp system.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection domain of claims of the present invention.

Claims (8)

  1. The implementation method of 1 one kinds of network virtual magnetic disks, it is arranged in the client and server system, and described virtual disk is made up of publicly-owned dish and privately owned dish; May further comprise the steps:
    1.1 the client intercept interrupt generates a virtual disk, and will send to server by operation network interface card hardware to the sector read-write requests of virtual disk, use for the first time when maybe needing to change server in client, by network interface card send server searching request, the network interface card identifier of acquisition server also is kept among the EEPROM of client NIC, and the network interface card identifier of server obtains from client NIC;
    1.2 the request that server operation network interface card hardware reads client, and visit publicly-owned dish and privately owned dish according to the request call respective interrupt finishing the request of client, and sends to client by operation network interface card hardware;
    1.3 the publicly-owned sector of publicly-owned disk storage on the server; Privately owned dish on the server is preserved the privately owned sector of each client, is used to preserve the private data that publicly-owned sector was carried out modification;
    1.4 described client is passed through the result that operation network interface card hardware obtains server process, and the result is returned to the requestor.
  2. 2 methods according to claim 1 is characterized in that, server system software is realized with the form of hardware initialization code.
  3. 3 methods according to claim 1 is characterized in that, described server also is provided with a serial ports switches set, are used for being provided with and monitor server.
  4. 4 methods according to claim 1 is characterized in that, the network interface card setup code of described client is intercepted and captured disk and interrupted, and will all intercept and capture all requests of described virtual disk, to simulate described virtual disk.
  5. 5 methods according to claim 1 is characterized in that, described publicly-owned dish and privately owned dish are realized by two independent hard disks, be set to publicly-owned dish and privately owned dish respectively.
  6. 6 methods according to claim 5 is characterized in that, also preserve system data in the described privately owned dish, logging on client number, client login record.
  7. 7 methods according to claim 1 is characterized in that, preserve server network interface card identification number in the network interface card storer of described client.
  8. 8 methods according to claim 1 is characterized in that, described client is used self-defining non-standard communication agreement with communicating by letter of described server.
CNB2005101017320A 2005-11-21 2005-11-21 Method for realizing network virtual magnetic disk Expired - Fee Related CN100356308C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101017320A CN100356308C (en) 2005-11-21 2005-11-21 Method for realizing network virtual magnetic disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101017320A CN100356308C (en) 2005-11-21 2005-11-21 Method for realizing network virtual magnetic disk

Publications (2)

Publication Number Publication Date
CN1776591A CN1776591A (en) 2006-05-24
CN100356308C true CN100356308C (en) 2007-12-19

Family

ID=36766146

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101017320A Expired - Fee Related CN100356308C (en) 2005-11-21 2005-11-21 Method for realizing network virtual magnetic disk

Country Status (1)

Country Link
CN (1) CN100356308C (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5964886A (en) * 1998-05-12 1999-10-12 Sun Microsystems, Inc. Highly available cluster virtual disk system
CN1540524A (en) * 2003-10-31 2004-10-27 清华大学 Method for accessing distributed and virtualized storage in local network
CN1645321A (en) * 2004-01-20 2005-07-27 顺昱科技股份有限公司 Apparatus and method for managing and transporting virtual disks over a network to networked stations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5964886A (en) * 1998-05-12 1999-10-12 Sun Microsystems, Inc. Highly available cluster virtual disk system
CN1540524A (en) * 2003-10-31 2004-10-27 清华大学 Method for accessing distributed and virtualized storage in local network
CN1645321A (en) * 2004-01-20 2005-07-27 顺昱科技股份有限公司 Apparatus and method for managing and transporting virtual disks over a network to networked stations

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
利用虚拟存储技术 实现网络资源共享 刘全刚,郑明.高等职业教育.天津职业大学学报,第13卷第4期 2004 *
用PXE技术构建NT-98无盘工作站 郁建政.电脑知识与技术 2004 *

Also Published As

Publication number Publication date
CN1776591A (en) 2006-05-24

Similar Documents

Publication Publication Date Title
TWI752066B (en) Method and device for processing read and write requests
CN101166116B (en) System and method for operating system installation on a diskless computing platform
US10445258B1 (en) Method for creation of device drivers and device objects for peripheral devices
US8185961B2 (en) Network system, method for controlling access to storage device, management server, storage device, log-in control method, network boot system, and method of accessing individual storage unit
CN100595778C (en) Method and apparatus for identifying virus document
US8281303B2 (en) Dynamic ejection of virtual devices on ejection request from virtual device resource object within the virtual firmware to virtual resource driver executing in virtual machine
CN101963929B (en) The method preserving/resume work scene
CN1241120C (en) Method for backing up and recovering data in hard disk of computer
WO2006015949A1 (en) A prioritization system
US20070094472A1 (en) Method for persistent mapping of disk drive identifiers to server connection slots
US20090271432A1 (en) Template-based development of servers
CN105393255A (en) Process evaluation for malware detection in virtual machines
US10999266B2 (en) Secret keys management in a virtualized data-center
JP2009536375A (en) ISCSI boot drive system and method for an extensible internet engine
WO2009070673A1 (en) Methods and apparatus for locating an unauthorized virtual machine
CN103513940A (en) Method for on-line extension of disk size of virtual machine and virtual system console
CN102833344A (en) Local boot mapping file-based diskless computer boot method
US20050160256A1 (en) [remote boot method and device thereof and server device using remote boot method]
CN108228308A (en) The monitoring method and device of virtual machine
CN115098038A (en) Method, device and medium for binding mounted directory
CN101183411A (en) Method for scanning and killing computer virus
CN100356308C (en) Method for realizing network virtual magnetic disk
CN111915811A (en) Method and equipment for controlling cabinet access by multiple hosts
US9529740B1 (en) Method for creation of a device driver for a peripheral device
US20110289146A1 (en) Method and apparatus allowing scan of data storage device from remote server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071219

Termination date: 20101121