CN106648957A - Operating system backup and recovery method and system - Google Patents
Operating system backup and recovery method and system Download PDFInfo
- Publication number
- CN106648957A CN106648957A CN201510747494.4A CN201510747494A CN106648957A CN 106648957 A CN106648957 A CN 106648957A CN 201510747494 A CN201510747494 A CN 201510747494A CN 106648957 A CN106648957 A CN 106648957A
- Authority
- CN
- China
- Prior art keywords
- operating system
- backup
- recovery
- partition
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Hardware Redundancy (AREA)
Abstract
The embodiment of the invention discloses an operating system backup and recovery method. The method comprises the steps that an operating system backup and recovery system obtains strategic configuration, and a terminal list is determined according to the strategic configuration; the terminal list is sent to an IP network; before the operating system is guided, an operating system main control end service is polled through the IP network, and an operating instruction is obtained; the operation corresponding to the operating instruction is executed. The embodiment of the invention further discloses an operating system backup and recovery system.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of backup of operating system and restoration methods and it is
System.
Background technology
In personal computer (PC, personal computer) use in existing LAN, to guarantee group
Interior software, network environment secure context are knitted, each tissue is generally regularly recovered to operating system, mesh
Front conventional reforestation practices include in the following manner:Method using operating system is reinstalled, empty user number
According to, storage is formatted, and cover type is carried out to system reinstall;Using clone technology, by operating system
Original image is preserved on a memory, periodically by One-key recovery type software or the recovery software that dispatches from the factory, will
Clone mirror picture is covered on system disk;PC is started using external storage, and by original image, that is, is preserved outside
In portion's storage or storage inside, cover on system disk;Using hardware modes such as Recovery cards, open every time
By operating system recovery to original state after dynamic.
However, there is problems with the operating system recovery mode of existing technology:For long-range recovery side
Formula, if being placed on storage inside by mirror image is recovered, is easily changed by PC user, causes the version for recovering
Problem;To prevent operating system mirror image from being changed, need to dispose the storage of outer mirror picture in LAN, its is extensive
The multiple time is long, affects local area network communication.
The content of the invention
To solve above-mentioned technical problem, the embodiment of the present invention provide a kind of backup of operating system and restoration methods and
System, the hiding preservation that operating system is internally stored ensures the safety of backup image, and realizes remote
Process control operating system is backed up and recovered.
The technical scheme is that what is be achieved in that:
The embodiment of the present invention provides a kind of operating system backup and restoration methods, and methods described includes:
Acquisition strategy is configured, and determines terminal list according to the strategy configuration;
The terminal list is sent to IP network;
Before booting operating system, serviced by operating system master control end described in IP network poll, obtain operation
Instruction;
Perform operation corresponding with the operational order.
Further, the acquisition strategy configuration, and terminal list is determined according to the strategy configuration;Send
The terminal list to IP network, including:
Backup policy configuration is obtained, and back-up terminals list is determined according to backup policy configuration;
The back-up terminals list is sent to IP network.
Further, the acquisition strategy configuration, and terminal list is determined according to the strategy configuration;Send
The terminal list to IP network, including:
Recovery policy configuration is obtained, is determined according to recovery policy configuration and is recovered terminal list;
The recovery terminal list is sent to IP network.
Further, when the operational order is backup instruction, the execution is corresponding with the backup instruction
Backup operation, including:
Hidden partition is set to change state, operating system partition is covered into the hidden partition;
After the completion of the operating system partition covers the hidden partition, the hidden partition is set for not
Can change can not read states, and continue to complete booting operating system.
Further, the operational order is to recover during instruction, and the execution is corresponding with the recovery instruction
Recovery operation, including:
Setting hidden partition is readable state, and the hidden partition is covered into operating system partition;
After the completion of the hidden partition covers operating system partition, the hidden partition is set to repair
Change can not read states, and continue to complete booting operating system.
The embodiment of the present invention provides a kind of operating system backup and recovery system, and the system includes:Concentrate control
Molding block, main control end communication module, controlled end communication module, Backup and Restore module;Wherein,
The centralized control module, for acquisition strategy configuration, and determines terminal row according to the strategy configuration
Table;
The main control end communication module, for sending the terminal list to IP network;
The controlled end communication module, for before booting operating system, by operating described in IP network poll
System master end services, and obtains operational order;
The Backup and Restore module, for performing operation corresponding with the operational order.
Further, the centralized control module, for obtaining backup policy configuration, and according to the backup
Strategy configuration determines back-up terminals list;
The main control end communication module, for sending the back-up terminals list to IP network.
Further, the centralized control module, for obtaining recovery policy configuration, according to the recovery plan
Slightly configuration determines recovery terminal list;
The main control end communication module, for sending the recovery terminal list to IP network.
Further, when the operational order is backup instruction, the Backup and Restore module is hidden for arranging
Subregion is hidden for state can be changed, operating system partition is covered into the hidden partition;It is additionally operable to as the behaviour
Cover after the completion of the hidden partition as system partitioning, the hidden partition is set to change unreadable
State, and continue to complete booting operating system.
Further, the operational order is to recover during instruction, and the Backup and Restore module is hidden for arranging
Tibetan subregion is readable state, and the hidden partition is covered into operating system partition;It is additionally operable to be hidden when described
Subregion is covered after the completion of operating system partition, the hidden partition is set for can not change can not read states,
And continue to complete booting operating system.
The embodiment of the present invention provides a kind of backup of operating system and restoration methods and system, operating system backup and
Recovery system acquisition strategy is configured, and determines terminal list according to the strategy configuration;Send the terminal row
Table is to IP network;Before booting operating system, serviced by operating system master control end described in IP network poll,
Obtain operational order;Perform operation corresponding with the operational order.Operation system provided in an embodiment of the present invention
System backup and restoration methods and system, the hiding preservation that operating system is internally stored ensures backup image
Safety, by booting operating system before, using trawl performance obtain backup or recover instruction, by operation system
The mode that the data of system subregion and hidden partition are mutually covered, realizes that remote control operation system is backed up and recovered.
Description of the drawings
Fig. 1 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet one;
Fig. 2 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet two;
Fig. 3 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet three;
Fig. 4 is system backup provided in an embodiment of the present invention and recovery system structural representation one;
Fig. 5 is system backup provided in an embodiment of the present invention and recovery system structural representation two.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by.
Embodiment one
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in figure 1, the system backup
Can include with restoration methods:
Step 101, operating system backup and recovery system acquisition strategy configuration, and according to the strategy configuration
Determine terminal list.
Specifically, operating system backup and recovery system can carry out system backup operation, it is also possible to be
System recovery operation.When operating system backup and recovery system carry out system backup to be operated, the strategy configuration
For backup policy configuration;It is described when operating system backup and recovery system can carry out system resumes operation
Strategy is configured to recovery policy configuration.Terminal list can be understood as target controlled end address, according to the target
The system backup of controlled end address function and recovery system can determine the controlled end that needs are backed up or recovered.
When a kind of possible implementation, operating system backup and recovery system carry out backup operation, operation system
System backup and recovery system obtain backup policy and configure, such as controlled end of certain time point, certain range address,
And back-up terminals list is determined according to backup policy configuration.
When a kind of possible implementation, operating system backup and recovery system carry out recovery operation, operation system
System backup and recovery system obtain recovery policy and configure, such as controlled end of certain time point, certain range address,
And recovery terminal list is determined according to backup policy configuration.
Specifically, operating system backup and recovery system are built in main control end server and are served by, management group
The backup of all PC in knitmesh network and recovery configuring and strategy, can with self-defined different range, it is different when
Between section backup and recovery policy, it is thus possible to accomplish that organizational resources maximally utilize rate, application can pass through
B/S or C/S are supplied to manager.
It should be noted that Browser/Server Mode (B/S, Browser/Server) is WEB rising
A kind of network structure pattern afterwards, web browser is the topmost application software of client.This pattern system
One client, the core that systemic-function is realized is focused on server.As long as installing in client computer
One browser (Browser), such as Netscape Navigator or Internet Explorer, server is installed
The data bases such as SQL Server, Oracle, MYSQL.Browser is carried out by Web Server with data base
Data interaction.
Client-server structure (C/S structures, Client/Server Structs) is software system system knot
Structure, by it the advantage of two ends hardware environment can be made full use of, by task be reasonably allocated to Client ends and
Server ends are realizing.At present most of application software systems are all the double-layer structures of Client/Server forms,
Because present software application system is to distributed Web application developments, Web and Client/Server
Using can be carried out same Business Processing, using different module shared logic components;Therefore, it is internal
And outside user can access new and existing application system, by existing application system in patrol
Collecting can expand new application system.
Step 102, operating system backup and recovery system send the terminal list to IP network.
Specifically, operating system backup and recovery system set up IP serve ports, issue eventually to all controlled ends
End list.When operating system backup and recovery system carry out system backup to be operated, the terminal list is standby
Part terminal list;When operating system backup and recovery system can carry out system resumes operation, the terminal
List is recovery terminal list.
It should be noted that the agreement (IP, Internet Protocol) interconnected between network is computer network
Network is connected with each other the agreement for being communicated, referred to as net association.In the internet, it can make connection on the net
All computer networks realize the set of rule being in communication with each other, it is stipulated that computer is communicated on the internet
When the rule that should observe.IP address is referred to as internet address or Internet addresses, is for only
The logical address of computer on one mark the Internet.Every networked computer depends on IP address to identify oneself.
Procotol (IP) be on network information from computer pass to another computer method or
Person's agreement.Every computer (main frame) at least has an IP address by itself and other meters on network on network
Calculation machine is differentiated.When you send or when receiving information, for example, an Email Information or a webpage,
Information is divided into several fritters, referred to as packet.Each packet contains the net of sender and receiver
Network address.Gateway computer has read destination address, and packet continues to arrive next neighbouring gateway photograph forward
Example reads destination address, so goes ahead by network, until a gateway confirms that this packet belongs to
Its most close to or computer in the range of it.Finally enter directly into the computer of its specified address.Because
One information is divided into many packets, and if necessary, each packet can pass through the different road of network
Footpath sends.Packet can be reached according to different order when sending with them.Procotol (IP) is only
Deliver them.Transmission control protocol (TCP) is only can return them as former state according to correct sequential combination.
IP is a connectionless protocol, and this is meant that between the terminal of communication without continuous connection.Often
Individual packet, in transmission over networks, does not have mutual as an independent unit for processing between these units
Contact.Packet can be placed on correct position and be because TCP, specify that packet order in information
Connection oriented protocol.
Step 103, operating system are backed up and recovery system is before booting operating system, by IP network poll
The operating system master control end service, obtains operational order.
Specifically, operating system backup and recovery system set up IP serve ports, issue to all controlled ends and refer to
Order, receives controlled end and accesses and obtain corresponding instruction.Operating system is backed up and the run time of recovery system exists
Before booting operating system, its integrated network drives and IP configuration modules, supports before into operating system
By IP network to main control end query statement information.Wherein, the operational order can be backup instruction or extensive
Multiple instruction.
It should be noted that the bootup process of operating system is to will be stored in the static operating system on hard disk
In being loaded into internal memory, and start to perform the process of operating system.The whole bootup process of operating system should be from
Establish the beginning on computer by cable, comprise the following steps:Upper electricity, self-inspection, bootload sector, loading operating system,
Operation operating system.After system Power-On Self-Test passes through, hard disk is reset, basic input output system
(BIOS, Basic Input Output System) is by the boot sequence specified according to user from floppy disk, hard disk
Or CD-ROM drive is started.As a example by from hard disk startup, MBR is read in internal memory by system bios.So
Afterwards, main bootstrap program is given by control, then checks the state of partition table, the subregion of searching activity.Most
Afterwards, control is given the leader record of active partition by main bootstrap program, by leader record loading operation system
System.Concrete detailed booting operating system process can check related art, and embodiment of the present invention here is not
Repeat again.
Wherein, BIOS is one group of program being cured in computer on mainboard on a rom chip, and it is protected
Self-check program and system self-triggered program after program, the start of the most important basic input and output of computer is deposited,
It can from CMOS read-write system arrange specifying information, its major function is to provide the bottom for computer
, most direct hardware setting and control.
Wherein, poll (Polling) is the mode how a kind of CPU decision-makings provide peripheral equipment service, and
Claim " program control import and export " (Programmed I/O).The concept of polling method is to send inquiry by CPU timings,
Sequentially inquire whether each peripheral equipment needs it to service, have to give and service, service is inquired again down after terminating
One periphery, then constantly goes round and begins again.
Step 104, operating system backup and recovery system perform operation corresponding with the operational order.
Specifically, operating system backup and recovery system divide hidden partition in PC storage insides, preserve
The backup of operating system mirror image, it is invisible to operating system, only after specified sign position is set,
Digital independent and write can be carried out, to the safety for guaranteeing to back up file.Operating system is backed up and restorer
System arranges hidden partition flag bit according to operational order, and hidden partition is read or write operation, uses
To realize the backup of operating system and recover function.
Wherein, the operational order can be backup instruction or recovery instruction.
When the operational order is backup instruction, operating system backup and recovery system are obtained after backup instruction,
Hidden partition is set first to change state, operating system partition is covered into hidden partition, complete to cover
Afterwards, hidden partition is set for can not change can not read states, and continue to complete booting operating system, backed up
Into.
When the operational order is to recover instruction, operating system backup and recovery system are obtained and recovered after instruction,
It is readable state to arrange hidden partition first, and hidden partition is covered into operating system partition, is hidden when described
Subregion is covered after the completion of operating system partition, arrange hidden partition for can not change can not read states, and after
It is continuous to complete booting operating system, recover to complete.
It is hidden that system backup provided in an embodiment of the present invention and restoration methods realize that operating system internally stores
Hide and preserve, ensure the safety of backup image, and realize in service end according to IP address, MAC Address
Deng strategic planning remote recovery plan, and the controlled PC of remotely control carries out remote backup and recovery.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored
Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby
Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range
Control operation system backup and recovery.
Embodiment two
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in Fig. 2 the system backup
Can include with restoration methods:
Step 201, operating system backup and recovery system obtain backup policy configuration, and according to the backup
Strategy configuration determines back-up terminals list.
Specifically, operating system backup and recovery system obtain backup policy configuration, according to what is configured in application
Backup policy, such as certain time point, the controlled end of certain range address, it is determined that the back-up terminals list that should be issued.
Terminal list can be understood as target controlled end address, according to the target controlled end address function system backup and
Recovery system can determine the controlled end that needs are backed up.
Step 202, operating system backup and recovery system send the back-up terminals list to IP network.
Specifically, back-up terminals list is published to IP network by operating system backup and recovery system, and wait is received
Control end poll.Wherein, poll is to send inquiry by CPU timings, whether sequentially inquires each peripheral equipment
Need it to service, have to give and service, next periphery is inquired again in service after terminating, then constantly gone round and begun again.
Step 203, operating system are backed up and recovery system is before booting operating system, by IP network poll
The operating system master control end service, obtains backup instruction.
Specifically, operating system backup and recovery system controlled end PC start, before booting operating system,
Operating system is backed up and recovery system is serviced by IP network polling master end, obtains backup instruction.
Step 204, operating system backup and recovery system arrange hidden partition to change state, will operate
System partitioning covers the hidden partition;Complete when the operating system partition covers the hidden partition
Afterwards, the hidden partition is set for can not change can not read states, and continue to complete booting operating system.
Specifically, operating system backup and recovery system are obtained after backup instruction, hidden partition is arranged first and is
State can be changed, operating system partition is covered into hidden partition, after completing to cover, arranging hidden partition is
Can not change can not read states, and continue to complete booting operating system, backup is completed.
It is hidden that system backup provided in an embodiment of the present invention and restoration methods realize that operating system internally stores
Hide and preserve, ensure the safety of backup image, and realize in service end according to IP address, MAC Address
Deng strategic planning remote recovery plan, and the controlled PC of remotely control carries out remote backup and recovery.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored
Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby
Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range
Control operation system backup and recovery.
Embodiment three
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in figure 3, the system backup
Can include with restoration methods:
Step 301, operating system backup and recovery system obtain recovery policy configuration, according to the recovery plan
Slightly configuration determines recovery terminal list.
Specifically, operating system backs up the recovery policy with recovery system according to configuration in application, for example, certain
The controlled end of time point, certain range address, it is determined that the recovery terminal list that should be issued, recovering terminal list can
To be interpreted as target controlled end address, can according to the target controlled end address function system backup and recovery system
To determine the controlled end for needing to recover.
Specifically, the centralized control module of operating system backup and recovery system is deployed on main control server,
Monitored in LAN by SOCKET LISTEN, after the polling message that controlled end is sent is received,
The information such as the IP address according to controlled end, with reference to the rule in profiles/configurations data base, to controlled end
Send operational order.
Wherein, SOCKET LISTEN can create monitoring connection, be monitored in LAN, specifically such as
It is lower described:
Listen () function is the connection for creating a socket and monitoring application, specific as follows:
#include<winsock.h>
int PASCAL FAR listen(SOCKET s,int backlog);
S:For one describing word for having bundled not connected socket of mark.
backlog:Etc. the greatest length of queue to be connected.
In order to receive connection, the describing word of a socket is first created with socket (), then with listen ()
The one standby daily record of connection establishment for creating socket and entering for application, then just can be connect with accept ()
It is connected to.Listen () is only applicable to support the socket of connection, such as SOCK_STREAM types.
Socket s is identified in a kind of " variations " pattern, the connection request of application entrance, and wait in line by
Receive.This function is particularly well-suited to while there is the server of multiple connection requests;If when a connection please
When asking arrival, queue is full, then client will receive a WSAECONNREFUSED mistake.
When without available describing word, listen () function is still attempted to normally work.It still receives request
Until queue is emptying.When there is available describing word, a follow-up listen () or accept () calls meeting
Queue is refilled according to current or last " standby daily record ", if possible, will recover to monitor Shen
The connection request that please be enter.
Step 302, operating system backup and recovery system send the recovery terminal list to IP network.
Specifically, operating system backup and recovery system are published to IP network by terminal list is recovered, and wait is received
Control end poll.
Specifically, the GRUB guiding modules increased income can be adopted to be customized.GRUB can be supported from net
Network is guided, as long as opening network support options during compiling, in reference source file directory
`netboot/README.netboot.In order to from netboot, it is only necessary in two services of network settings, move
State IP configuration service and TFTP are serviced, and dynamic IP configuration service can be BOOTP, DHCP or RARP
Server.
Then, be respectively directed to different server Bs OOTP, tri- kinds of servers of DHCP or RARP any one
Operation bootp, dhcp, rarp.If all settings are errorless, GRUB will provide IP, IP subnet masks IP
The IP address of the IP and gateway of netmask and tftp server.GRUB can also read operation system text
The configuration file of part system, obtains the IP and gateway mask of operating system configuration, so as to realize that operating system is drawn
Leading distributes IP address and is communicated with main control end.
It should be noted that GRUB (GRand Unified Bootloader) is one from GNU projects
Multiple operating system startup program.GRUB is the realization for starting specification more, and it allows user to calculate
Possess multiple operating systems in machine simultaneously, and select to wish the operating system of operation in computer starting.
GRUB can be used for the different kernels on selection operation system partitioning, it can also be used to start to these kernel transmission
Parameter.GRUB is a multiple operating systems startup manager, for guiding different system, such as windows,
linux。
Boot protocol (BOOTP, Bootstrap Protocol) is a kind of BOOT strapping Protocol, based on IP/UDP
Agreement, also referred to as Bootstrap Protocol, are the predecessors of DHCP protocol.BOOTP is used for the local of non-disk workstation
In net, non-disk workstation can be allowed to obtain IP address from a central server.By BOOTP agreements
Can be the non-disk workstation distribution dynamic IP addressing in LAN, so there is no need to manager and go as each
User goes to arrange static ip address.
DHCP (DHCP, Dynamic Host Configuration Protocol) is one
The procotol of LAN, is worked using udp protocol, mainly there is two purposes:To internal network or network
Service supplier's automatic IP address allocation, to user or internal network manager as to all computers work
The means of central management.DHCP method be generally applied in large-scale LAN environment, and Main Function is collection
In management, distribution IP address, make the main frame in network environment dynamically obtain IP address, Gateway
The information such as address, dns server address.
Reverse address resolution protocol (RARP, Reverse Address Resolution Protocol) allows local
The physical machine of net asks its IP address from the ARP table or caching of gateway server.Network manager
A table is created in LAN gateway router with mapped physical address (MAC) and corresponding IP
Address.When a new machine is arranged, its RARP client program is needed to the RARP on router
The corresponding IP address of server request.Assume in the routing table already provided with a record, RARP services
Device will return IP address to machine, and this machine will be stored to use in the future.
TFTP (TFTP, Trivial File Transfer Protocol) is TCP/IP protocol suite
In one be used for carrying out the agreement of simple files transmission between clients and a server.
Step 303, operating system are backed up and recovery system is before booting operating system, by IP network poll
The operating system master control end service, obtains and recovers instruction.
Specifically, operating system backup and recovery system controlled end PC start, before booting operating system, behaviour
Make system backup and recovery system to service by IP network polling master end, obtain and recover instruction.Wherein, take turns
Inquiry be by CPU timing send inquiry, sequentially inquire whether each peripheral equipment needs it to service, have i.e. to
Give service, service to inquire again next periphery after terminating, then constantly go round and begin again.
Specifically, operating system backup and recovery system are customized using GRUB, and communications protocol adopts SOCKET
Message, after sending polling message to main control end, if the IP address of controlled end and available machine time meet main control end
The production plan of configuration, then main control end can return corresponding operational order, controlled end GRUB according to instruct into
The corresponding operation of row.
It should be noted that SOCKET is commonly referred to as " socket ", for describing IP address and port,
It is the handle of a communication chain, can be used to realize the communication between different virtual machine or different computers.
Main frame on Internet has typically run multiple service softwares, while providing several services.Every kind of service is all beaten
A Socket is opened, and is tied in a port, different ports correspond to different services.
It is readable state that step 304, operating system backup and recovery system arrange hidden partition, will be described hidden
Hide subregion and cover operating system partition;After the completion of the hidden partition covers operating system partition, if
Put the hidden partition for can not change can not read states, and continue to complete booting operating system.
Specifically, operating system backup and recovery system are obtained and recovered after instruction, hidden partition is arranged first and is
Readable state, by hidden partition operating system partition is covered, when the hidden partition covers operating system
After the completion of subregion, hidden partition is set for can not change can not read states, and continue to complete booting operating system,
Recovery is completed.
Exemplary, operating system backup can be entered with recovery system using the disk operating software of ghost classes
Row customized development, improves data manipulation efficiency, can reach the speed of 800MB per minute.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored
Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby
Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range
Control operation system backup and recovery.
Example IV
The embodiment of the present invention provides a kind of operating system backup and recovery system 1, as shown in figure 4, the system
System includes:Centralized control module 10, main control end communication module 11, controlled end communication module 12, backup are extensive
Multiple module 13;Wherein,
The centralized control module 10, for acquisition strategy configuration, and determines terminal according to the strategy configuration
List;
The main control end communication module 11, for sending the terminal list to IP network;
The controlled end communication module 12, for before booting operating system, by IP network polling master
End service, obtains operational order;
The Backup and Restore module 13, for performing operation corresponding with the operational order.
Specifically, as shown in figure 5, operating system backup and recovery system include main control end and controlled end;Institute
Main control end is stated including centralized control module 10, main control end communication module 11.The controlled end can include controlled
End communication module 12, Backup and Restore module 13, internal memory operations system partitioning 14, storage inside are hidden
Subregion 15.
Specifically, the backup and recovery of all controlled PC that centralized control module is used in management tissue network
Configuration and strategy.Controlled end communication module for controlled end command reception module, the fortune of controlled end communication module
The row time, before operating system boot its integrated network drove and IP configuration modules, supported entering operation
By IP network to main control end query statement information before system.Main control end communication module sets up IP service ends
Mouthful, can to all controlled ends issue instruct, can also receive controlled end access and obtain it is corresponding operation refer to
Order.Backup and recovery module can arrange hidden partition flag bit according to command request, and to hidden partition
Read or write operation, to realize the backup of operating system and recover function.
Further, the centralized control module 10, for obtaining backup policy configuration, and according to described standby
Part strategy configuration determines back-up terminals list;
The main control end communication module 11, for sending the back-up terminals list to IP network.
Further, the centralized control module 10, for obtaining recovery policy configuration, according to the recovery
Strategy configuration determines recovery terminal list;
The main control end communication module 11, for sending the recovery terminal list to IP network.
Further, when the operational order is backup instruction, the Backup and Restore module 13, for arranging
Operating system partition is covered the hidden partition by hidden partition to change state;It is additionally operable to when described
Operating system partition is covered after the completion of the hidden partition, and arranging the hidden partition can not to change
Read states, and continue to complete booting operating system.
Further, when the operational order is instructed to recover, the Backup and Restore module 13, for arranging
Hidden partition is readable state, and the hidden partition is covered into operating system partition;It is additionally operable to when described hidden
Hide subregion to cover after the completion of operating system partition, the hidden partition is set for can not change can not read states,
And continue to complete booting operating system.
Specifically, operating system backup provided in an embodiment of the present invention and the understanding of recovery system may be referred to reality
The operating system backup and the explanation of restoration methods of example one to embodiment three are applied, the present embodiment will not be described here.
Operating system backup provided in an embodiment of the present invention and recovery system, it is hidden that operating system is internally stored
Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby
Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range
Control operation system backup and recovery.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can using hardware embodiment, software implementation or with reference to software and
The form of the embodiment of hardware aspect.And, the present invention can be adopted and wherein include calculating at one or more
Computer-usable storage medium (including but not limited to disk memory and the optical storage of machine usable program code
Device etc.) on implement computer program form.
The present invention is with reference to method according to embodiments of the present invention, equipment (system) and computer program
Flow chart and/or block diagram describing.It should be understood that can be by computer program instructions flowchart and/or side
The knot of each flow process and/or square frame and flow chart and/or the flow process in block diagram and/or square frame in block diagram
Close.Can provide these computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or
The processor of other programmable data processing devices is producing a machine so that by computer or other can
The instruction of the computing device of programming data processing equipment is produced for realizing in one flow process or multiple of flow chart
The device of the function of specifying in one square frame of flow process and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices
In the computer-readable memory for working in a specific way so that in being stored in the computer-readable memory
Instruction produces the manufacture for including command device, and the command device is realized in one flow process of flow chart or multiple streams
The function of specifying in one square frame of journey and/or block diagram or multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing devices, made
Obtain and series of operation steps performed on computer or other programmable devices to produce computer implemented process,
So as to the instruction performed on computer or other programmable devices is provided for realizing in one flow process of flow chart
Or specify in one square frame of multiple flow processs and/or block diagram or multiple square frames function the step of.
The above, only presently preferred embodiments of the present invention is not intended to limit the protection model of the present invention
Enclose.
Claims (10)
1. a kind of operating system is backed up and restoration methods, it is characterised in that methods described includes:
Acquisition strategy is configured, and determines terminal list according to the strategy configuration;
The terminal list is sent to IP network;
Before booting operating system, serviced by operating system master control end described in IP network poll, obtain operation
Instruction;
Perform operation corresponding with the operational order.
2. operating system according to claim 1 is backed up and restoration methods, it is characterised in that described to obtain
Tactful configuration is taken, and terminal list is determined according to the strategy configuration;The terminal list is sent to IP network,
Including:
Backup policy configuration is obtained, and back-up terminals list is determined according to backup policy configuration;
The back-up terminals list is sent to IP network.
3. operating system according to claim 1 is backed up and restoration methods, it is characterised in that described to obtain
Tactful configuration is taken, and terminal list is determined according to the strategy configuration;The terminal list is sent to IP network,
Including:
Recovery policy configuration is obtained, is determined according to recovery policy configuration and is recovered terminal list;
The recovery terminal list is sent to IP network.
4. operating system according to claim 2 is backed up and restoration methods, it is characterised in that the behaviour
When work instruction is backup instruction, execution backup operation corresponding with the backup instruction, including:
Hidden partition is set to change state, operating system partition is covered into the hidden partition;
After the completion of the operating system partition covers the hidden partition, the hidden partition is set for not
Can change can not read states, and continue to complete booting operating system.
5. operating system according to claim 3 is backed up and restoration methods, it is characterised in that the behaviour
Make instruction for recover instruction when, the execution and it is described recovery the corresponding recovery operation of instruction, including:
Setting hidden partition is readable state, and the hidden partition is covered into operating system partition;
After the completion of the hidden partition covers operating system partition, the hidden partition is set to repair
Change can not read states, and continue to complete booting operating system.
6. a kind of operating system is backed up and recovery system, it is characterised in that the system includes:Centralized Control
Module, main control end communication module, controlled end communication module, Backup and Restore module;Wherein,
The centralized control module, for acquisition strategy configuration, and determines terminal row according to the strategy configuration
Table;
The main control end communication module, for sending the terminal list to IP network;
The controlled end communication module, for before booting operating system, by operating described in IP network poll
System master end services, and obtains operational order;
The Backup and Restore module, for performing operation corresponding with the operational order.
7. operating system according to claim 6 is backed up and recovery system, it is characterised in that
The centralized control module is for obtaining backup policy configuration and true according to backup policy configuration
Determine back-up terminals list;
The main control end communication module, for sending the back-up terminals list to IP network.
8. operating system according to claim 6 is backed up and recovery system, it is characterised in that
The centralized control module, for obtaining recovery policy configuration, determines according to recovery policy configuration
Recover terminal list;
The main control end communication module, for sending the recovery terminal list to IP network.
9. operating system according to claim 7 is backed up and recovery system, it is characterised in that the behaviour
When work instruction is backup instruction, the Backup and Restore module, for arranging hidden partition for state can be changed,
Operating system partition is covered into the hidden partition;Be additionally operable to when the operating system partition cover it is described
After the completion of hidden partition, the hidden partition is set for can not change can not read states, and continue to complete operation
System guides.
10. operating system according to claim 8 is backed up and recovery system, it is characterised in that described
To recover during instruction, the Backup and Restore module is readable state for arranging hidden partition to operational order,
The hidden partition is covered into operating system partition;It is additionally operable to when the hidden partition covers operating system
After the completion of subregion, the hidden partition is set for can not change can not read states, and continue to complete operating system
Guiding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510747494.4A CN106648957A (en) | 2015-11-03 | 2015-11-03 | Operating system backup and recovery method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510747494.4A CN106648957A (en) | 2015-11-03 | 2015-11-03 | Operating system backup and recovery method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106648957A true CN106648957A (en) | 2017-05-10 |
Family
ID=58851424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510747494.4A Pending CN106648957A (en) | 2015-11-03 | 2015-11-03 | Operating system backup and recovery method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106648957A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990191A (en) * | 2019-11-01 | 2020-04-10 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Data recovery method and system based on mirror image storage |
CN111382006A (en) * | 2018-12-27 | 2020-07-07 | 中国移动通信集团四川有限公司 | Recovery method, device, equipment and medium of operating system |
CN112416657A (en) * | 2020-12-09 | 2021-02-26 | 成都傲梅科技有限公司 | System cloning method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7516355B2 (en) * | 2004-11-05 | 2009-04-07 | Broadcom Corporation | Method and computer program product for backing up and restoring online system information |
CN101901171A (en) * | 2009-05-27 | 2010-12-01 | 同方股份有限公司 | Using method of computer data backup and restore software |
CN102110029A (en) * | 2009-12-25 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | System backup and restoration method |
US8291178B2 (en) * | 2008-12-08 | 2012-10-16 | Apacer Technology Inc. | Machine-implemented method for categorizing storage media, and machine-implemented method for storing target codes |
CN103455387A (en) * | 2012-05-30 | 2013-12-18 | 深圳市祈飞科技有限公司 | Method and system for backing up and restoring operation system in UEFI (united extensible firmware interface) BIOS (basic input /output system) |
CN104699559A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Distributed data backup method and system |
-
2015
- 2015-11-03 CN CN201510747494.4A patent/CN106648957A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7516355B2 (en) * | 2004-11-05 | 2009-04-07 | Broadcom Corporation | Method and computer program product for backing up and restoring online system information |
US8291178B2 (en) * | 2008-12-08 | 2012-10-16 | Apacer Technology Inc. | Machine-implemented method for categorizing storage media, and machine-implemented method for storing target codes |
CN101901171A (en) * | 2009-05-27 | 2010-12-01 | 同方股份有限公司 | Using method of computer data backup and restore software |
CN102110029A (en) * | 2009-12-25 | 2011-06-29 | 中国长城计算机深圳股份有限公司 | System backup and restoration method |
CN103455387A (en) * | 2012-05-30 | 2013-12-18 | 深圳市祈飞科技有限公司 | Method and system for backing up and restoring operation system in UEFI (united extensible firmware interface) BIOS (basic input /output system) |
CN104699559A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Distributed data backup method and system |
Non-Patent Citations (2)
Title |
---|
任斌: "用镜像文件和隐藏分区简化操作系统的安装", 《信息技术》 * |
唐国栋: "重装系统又一法", 《大众硬件》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382006A (en) * | 2018-12-27 | 2020-07-07 | 中国移动通信集团四川有限公司 | Recovery method, device, equipment and medium of operating system |
CN110990191A (en) * | 2019-11-01 | 2020-04-10 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Data recovery method and system based on mirror image storage |
CN110990191B (en) * | 2019-11-01 | 2022-06-17 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Data recovery method and system based on mirror image storage |
CN112416657A (en) * | 2020-12-09 | 2021-02-26 | 成都傲梅科技有限公司 | System cloning method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3622695B1 (en) | Cloud modification of modular applications running on local devices | |
CN104636189B (en) | Virtual machine deployment system and method based on Xen | |
CN103064742B (en) | A kind of automatic deployment system and method for hadoop cluster | |
CN110719209B (en) | Cluster network configuration method, system, equipment and readable storage medium | |
CN103703724A (en) | Resource payment method | |
CN107170474A (en) | Expansible the storage box, computer implemented method and computer readable storage means | |
CN112671578B (en) | SRIOV virtual network configuration method and related device | |
CN106789327A (en) | The automatic method and system that host is added for cloud platform | |
CN111880902A (en) | Pod creation method, device, equipment and readable storage medium | |
CN104468574A (en) | Dynamic IP address acquisition method, system and device for virtual machines | |
CN104767649A (en) | Bare metal server deployment method and device | |
CN103534987B (en) | For the method and system of configuration virtual network configuration | |
CN106911779A (en) | A kind of cloud platform virtual machine obtains IP method and devices | |
CN105117293A (en) | Windows system environment automatic deployment method and automatic deployment system | |
CN103441867A (en) | Method for updating internal network resource allocation of virtual machine | |
CN111198696B (en) | OpenStack large-scale deployment method and system based on bare computer server | |
CN106899477A (en) | The construction method and device of physical machine in cloud computing platform | |
CN106657444A (en) | Method and device for configuring IP address of BMC | |
CN109067599A (en) | A kind of method and device for disposing cluster | |
US9983867B2 (en) | Software image provisioning and charging system | |
CN104468791A (en) | Private cloud IaaS platform construction method | |
CN106648957A (en) | Operating system backup and recovery method and system | |
US8819200B2 (en) | Automated cluster node configuration | |
CN108989123A (en) | A kind of server configuration method and device | |
CN109756359A (en) | The method and remote server and network system of auto-initiation network equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |