CN106648957A - Operating system backup and recovery method and system - Google Patents

Operating system backup and recovery method and system Download PDF

Info

Publication number
CN106648957A
CN106648957A CN201510747494.4A CN201510747494A CN106648957A CN 106648957 A CN106648957 A CN 106648957A CN 201510747494 A CN201510747494 A CN 201510747494A CN 106648957 A CN106648957 A CN 106648957A
Authority
CN
China
Prior art keywords
operating system
backup
recovery
partition
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510747494.4A
Other languages
Chinese (zh)
Inventor
柯伯栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Anhui Co Ltd
Original Assignee
China Mobile Group Anhui Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Anhui Co Ltd filed Critical China Mobile Group Anhui Co Ltd
Priority to CN201510747494.4A priority Critical patent/CN106648957A/en
Publication of CN106648957A publication Critical patent/CN106648957A/en
Pending legal-status Critical Current

Links

Landscapes

  • Hardware Redundancy (AREA)

Abstract

The embodiment of the invention discloses an operating system backup and recovery method. The method comprises the steps that an operating system backup and recovery system obtains strategic configuration, and a terminal list is determined according to the strategic configuration; the terminal list is sent to an IP network; before the operating system is guided, an operating system main control end service is polled through the IP network, and an operating instruction is obtained; the operation corresponding to the operating instruction is executed. The embodiment of the invention further discloses an operating system backup and recovery system.

Description

A kind of operating system backup and restoration methods and system
Technical field
The present invention relates to field of computer technology, more particularly to a kind of backup of operating system and restoration methods and it is System.
Background technology
In personal computer (PC, personal computer) use in existing LAN, to guarantee group Interior software, network environment secure context are knitted, each tissue is generally regularly recovered to operating system, mesh Front conventional reforestation practices include in the following manner:Method using operating system is reinstalled, empty user number According to, storage is formatted, and cover type is carried out to system reinstall;Using clone technology, by operating system Original image is preserved on a memory, periodically by One-key recovery type software or the recovery software that dispatches from the factory, will Clone mirror picture is covered on system disk;PC is started using external storage, and by original image, that is, is preserved outside In portion's storage or storage inside, cover on system disk;Using hardware modes such as Recovery cards, open every time By operating system recovery to original state after dynamic.
However, there is problems with the operating system recovery mode of existing technology:For long-range recovery side Formula, if being placed on storage inside by mirror image is recovered, is easily changed by PC user, causes the version for recovering Problem;To prevent operating system mirror image from being changed, need to dispose the storage of outer mirror picture in LAN, its is extensive The multiple time is long, affects local area network communication.
The content of the invention
To solve above-mentioned technical problem, the embodiment of the present invention provide a kind of backup of operating system and restoration methods and System, the hiding preservation that operating system is internally stored ensures the safety of backup image, and realizes remote Process control operating system is backed up and recovered.
The technical scheme is that what is be achieved in that:
The embodiment of the present invention provides a kind of operating system backup and restoration methods, and methods described includes:
Acquisition strategy is configured, and determines terminal list according to the strategy configuration;
The terminal list is sent to IP network;
Before booting operating system, serviced by operating system master control end described in IP network poll, obtain operation Instruction;
Perform operation corresponding with the operational order.
Further, the acquisition strategy configuration, and terminal list is determined according to the strategy configuration;Send The terminal list to IP network, including:
Backup policy configuration is obtained, and back-up terminals list is determined according to backup policy configuration;
The back-up terminals list is sent to IP network.
Further, the acquisition strategy configuration, and terminal list is determined according to the strategy configuration;Send The terminal list to IP network, including:
Recovery policy configuration is obtained, is determined according to recovery policy configuration and is recovered terminal list;
The recovery terminal list is sent to IP network.
Further, when the operational order is backup instruction, the execution is corresponding with the backup instruction Backup operation, including:
Hidden partition is set to change state, operating system partition is covered into the hidden partition;
After the completion of the operating system partition covers the hidden partition, the hidden partition is set for not Can change can not read states, and continue to complete booting operating system.
Further, the operational order is to recover during instruction, and the execution is corresponding with the recovery instruction Recovery operation, including:
Setting hidden partition is readable state, and the hidden partition is covered into operating system partition;
After the completion of the hidden partition covers operating system partition, the hidden partition is set to repair Change can not read states, and continue to complete booting operating system.
The embodiment of the present invention provides a kind of operating system backup and recovery system, and the system includes:Concentrate control Molding block, main control end communication module, controlled end communication module, Backup and Restore module;Wherein,
The centralized control module, for acquisition strategy configuration, and determines terminal row according to the strategy configuration Table;
The main control end communication module, for sending the terminal list to IP network;
The controlled end communication module, for before booting operating system, by operating described in IP network poll System master end services, and obtains operational order;
The Backup and Restore module, for performing operation corresponding with the operational order.
Further, the centralized control module, for obtaining backup policy configuration, and according to the backup Strategy configuration determines back-up terminals list;
The main control end communication module, for sending the back-up terminals list to IP network.
Further, the centralized control module, for obtaining recovery policy configuration, according to the recovery plan Slightly configuration determines recovery terminal list;
The main control end communication module, for sending the recovery terminal list to IP network.
Further, when the operational order is backup instruction, the Backup and Restore module is hidden for arranging Subregion is hidden for state can be changed, operating system partition is covered into the hidden partition;It is additionally operable to as the behaviour Cover after the completion of the hidden partition as system partitioning, the hidden partition is set to change unreadable State, and continue to complete booting operating system.
Further, the operational order is to recover during instruction, and the Backup and Restore module is hidden for arranging Tibetan subregion is readable state, and the hidden partition is covered into operating system partition;It is additionally operable to be hidden when described Subregion is covered after the completion of operating system partition, the hidden partition is set for can not change can not read states, And continue to complete booting operating system.
The embodiment of the present invention provides a kind of backup of operating system and restoration methods and system, operating system backup and Recovery system acquisition strategy is configured, and determines terminal list according to the strategy configuration;Send the terminal row Table is to IP network;Before booting operating system, serviced by operating system master control end described in IP network poll, Obtain operational order;Perform operation corresponding with the operational order.Operation system provided in an embodiment of the present invention System backup and restoration methods and system, the hiding preservation that operating system is internally stored ensures backup image Safety, by booting operating system before, using trawl performance obtain backup or recover instruction, by operation system The mode that the data of system subregion and hidden partition are mutually covered, realizes that remote control operation system is backed up and recovered.
Description of the drawings
Fig. 1 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet one;
Fig. 2 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet two;
Fig. 3 is system backup provided in an embodiment of the present invention and restoration methods schematic flow sheet three;
Fig. 4 is system backup provided in an embodiment of the present invention and recovery system structural representation one;
Fig. 5 is system backup provided in an embodiment of the present invention and recovery system structural representation two.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, it is fully described by.
Embodiment one
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in figure 1, the system backup Can include with restoration methods:
Step 101, operating system backup and recovery system acquisition strategy configuration, and according to the strategy configuration Determine terminal list.
Specifically, operating system backup and recovery system can carry out system backup operation, it is also possible to be System recovery operation.When operating system backup and recovery system carry out system backup to be operated, the strategy configuration For backup policy configuration;It is described when operating system backup and recovery system can carry out system resumes operation Strategy is configured to recovery policy configuration.Terminal list can be understood as target controlled end address, according to the target The system backup of controlled end address function and recovery system can determine the controlled end that needs are backed up or recovered.
When a kind of possible implementation, operating system backup and recovery system carry out backup operation, operation system System backup and recovery system obtain backup policy and configure, such as controlled end of certain time point, certain range address, And back-up terminals list is determined according to backup policy configuration.
When a kind of possible implementation, operating system backup and recovery system carry out recovery operation, operation system System backup and recovery system obtain recovery policy and configure, such as controlled end of certain time point, certain range address, And recovery terminal list is determined according to backup policy configuration.
Specifically, operating system backup and recovery system are built in main control end server and are served by, management group The backup of all PC in knitmesh network and recovery configuring and strategy, can with self-defined different range, it is different when Between section backup and recovery policy, it is thus possible to accomplish that organizational resources maximally utilize rate, application can pass through B/S or C/S are supplied to manager.
It should be noted that Browser/Server Mode (B/S, Browser/Server) is WEB rising A kind of network structure pattern afterwards, web browser is the topmost application software of client.This pattern system One client, the core that systemic-function is realized is focused on server.As long as installing in client computer One browser (Browser), such as Netscape Navigator or Internet Explorer, server is installed The data bases such as SQL Server, Oracle, MYSQL.Browser is carried out by Web Server with data base Data interaction.
Client-server structure (C/S structures, Client/Server Structs) is software system system knot Structure, by it the advantage of two ends hardware environment can be made full use of, by task be reasonably allocated to Client ends and Server ends are realizing.At present most of application software systems are all the double-layer structures of Client/Server forms, Because present software application system is to distributed Web application developments, Web and Client/Server Using can be carried out same Business Processing, using different module shared logic components;Therefore, it is internal And outside user can access new and existing application system, by existing application system in patrol Collecting can expand new application system.
Step 102, operating system backup and recovery system send the terminal list to IP network.
Specifically, operating system backup and recovery system set up IP serve ports, issue eventually to all controlled ends End list.When operating system backup and recovery system carry out system backup to be operated, the terminal list is standby Part terminal list;When operating system backup and recovery system can carry out system resumes operation, the terminal List is recovery terminal list.
It should be noted that the agreement (IP, Internet Protocol) interconnected between network is computer network Network is connected with each other the agreement for being communicated, referred to as net association.In the internet, it can make connection on the net All computer networks realize the set of rule being in communication with each other, it is stipulated that computer is communicated on the internet When the rule that should observe.IP address is referred to as internet address or Internet addresses, is for only The logical address of computer on one mark the Internet.Every networked computer depends on IP address to identify oneself.
Procotol (IP) be on network information from computer pass to another computer method or Person's agreement.Every computer (main frame) at least has an IP address by itself and other meters on network on network Calculation machine is differentiated.When you send or when receiving information, for example, an Email Information or a webpage, Information is divided into several fritters, referred to as packet.Each packet contains the net of sender and receiver Network address.Gateway computer has read destination address, and packet continues to arrive next neighbouring gateway photograph forward Example reads destination address, so goes ahead by network, until a gateway confirms that this packet belongs to Its most close to or computer in the range of it.Finally enter directly into the computer of its specified address.Because One information is divided into many packets, and if necessary, each packet can pass through the different road of network Footpath sends.Packet can be reached according to different order when sending with them.Procotol (IP) is only Deliver them.Transmission control protocol (TCP) is only can return them as former state according to correct sequential combination. IP is a connectionless protocol, and this is meant that between the terminal of communication without continuous connection.Often Individual packet, in transmission over networks, does not have mutual as an independent unit for processing between these units Contact.Packet can be placed on correct position and be because TCP, specify that packet order in information Connection oriented protocol.
Step 103, operating system are backed up and recovery system is before booting operating system, by IP network poll The operating system master control end service, obtains operational order.
Specifically, operating system backup and recovery system set up IP serve ports, issue to all controlled ends and refer to Order, receives controlled end and accesses and obtain corresponding instruction.Operating system is backed up and the run time of recovery system exists Before booting operating system, its integrated network drives and IP configuration modules, supports before into operating system By IP network to main control end query statement information.Wherein, the operational order can be backup instruction or extensive Multiple instruction.
It should be noted that the bootup process of operating system is to will be stored in the static operating system on hard disk In being loaded into internal memory, and start to perform the process of operating system.The whole bootup process of operating system should be from Establish the beginning on computer by cable, comprise the following steps:Upper electricity, self-inspection, bootload sector, loading operating system, Operation operating system.After system Power-On Self-Test passes through, hard disk is reset, basic input output system (BIOS, Basic Input Output System) is by the boot sequence specified according to user from floppy disk, hard disk Or CD-ROM drive is started.As a example by from hard disk startup, MBR is read in internal memory by system bios.So Afterwards, main bootstrap program is given by control, then checks the state of partition table, the subregion of searching activity.Most Afterwards, control is given the leader record of active partition by main bootstrap program, by leader record loading operation system System.Concrete detailed booting operating system process can check related art, and embodiment of the present invention here is not Repeat again.
Wherein, BIOS is one group of program being cured in computer on mainboard on a rom chip, and it is protected Self-check program and system self-triggered program after program, the start of the most important basic input and output of computer is deposited, It can from CMOS read-write system arrange specifying information, its major function is to provide the bottom for computer , most direct hardware setting and control.
Wherein, poll (Polling) is the mode how a kind of CPU decision-makings provide peripheral equipment service, and Claim " program control import and export " (Programmed I/O).The concept of polling method is to send inquiry by CPU timings, Sequentially inquire whether each peripheral equipment needs it to service, have to give and service, service is inquired again down after terminating One periphery, then constantly goes round and begins again.
Step 104, operating system backup and recovery system perform operation corresponding with the operational order.
Specifically, operating system backup and recovery system divide hidden partition in PC storage insides, preserve The backup of operating system mirror image, it is invisible to operating system, only after specified sign position is set, Digital independent and write can be carried out, to the safety for guaranteeing to back up file.Operating system is backed up and restorer System arranges hidden partition flag bit according to operational order, and hidden partition is read or write operation, uses To realize the backup of operating system and recover function.
Wherein, the operational order can be backup instruction or recovery instruction.
When the operational order is backup instruction, operating system backup and recovery system are obtained after backup instruction, Hidden partition is set first to change state, operating system partition is covered into hidden partition, complete to cover Afterwards, hidden partition is set for can not change can not read states, and continue to complete booting operating system, backed up Into.
When the operational order is to recover instruction, operating system backup and recovery system are obtained and recovered after instruction, It is readable state to arrange hidden partition first, and hidden partition is covered into operating system partition, is hidden when described Subregion is covered after the completion of operating system partition, arrange hidden partition for can not change can not read states, and after It is continuous to complete booting operating system, recover to complete.
It is hidden that system backup provided in an embodiment of the present invention and restoration methods realize that operating system internally stores Hide and preserve, ensure the safety of backup image, and realize in service end according to IP address, MAC Address Deng strategic planning remote recovery plan, and the controlled PC of remotely control carries out remote backup and recovery.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range Control operation system backup and recovery.
Embodiment two
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in Fig. 2 the system backup Can include with restoration methods:
Step 201, operating system backup and recovery system obtain backup policy configuration, and according to the backup Strategy configuration determines back-up terminals list.
Specifically, operating system backup and recovery system obtain backup policy configuration, according to what is configured in application Backup policy, such as certain time point, the controlled end of certain range address, it is determined that the back-up terminals list that should be issued. Terminal list can be understood as target controlled end address, according to the target controlled end address function system backup and Recovery system can determine the controlled end that needs are backed up.
Step 202, operating system backup and recovery system send the back-up terminals list to IP network.
Specifically, back-up terminals list is published to IP network by operating system backup and recovery system, and wait is received Control end poll.Wherein, poll is to send inquiry by CPU timings, whether sequentially inquires each peripheral equipment Need it to service, have to give and service, next periphery is inquired again in service after terminating, then constantly gone round and begun again.
Step 203, operating system are backed up and recovery system is before booting operating system, by IP network poll The operating system master control end service, obtains backup instruction.
Specifically, operating system backup and recovery system controlled end PC start, before booting operating system, Operating system is backed up and recovery system is serviced by IP network polling master end, obtains backup instruction.
Step 204, operating system backup and recovery system arrange hidden partition to change state, will operate System partitioning covers the hidden partition;Complete when the operating system partition covers the hidden partition Afterwards, the hidden partition is set for can not change can not read states, and continue to complete booting operating system.
Specifically, operating system backup and recovery system are obtained after backup instruction, hidden partition is arranged first and is State can be changed, operating system partition is covered into hidden partition, after completing to cover, arranging hidden partition is Can not change can not read states, and continue to complete booting operating system, backup is completed.
It is hidden that system backup provided in an embodiment of the present invention and restoration methods realize that operating system internally stores Hide and preserve, ensure the safety of backup image, and realize in service end according to IP address, MAC Address Deng strategic planning remote recovery plan, and the controlled PC of remotely control carries out remote backup and recovery.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range Control operation system backup and recovery.
Embodiment three
The embodiment of the present invention provides a kind of system backup and restoration methods, as shown in figure 3, the system backup Can include with restoration methods:
Step 301, operating system backup and recovery system obtain recovery policy configuration, according to the recovery plan Slightly configuration determines recovery terminal list.
Specifically, operating system backs up the recovery policy with recovery system according to configuration in application, for example, certain The controlled end of time point, certain range address, it is determined that the recovery terminal list that should be issued, recovering terminal list can To be interpreted as target controlled end address, can according to the target controlled end address function system backup and recovery system To determine the controlled end for needing to recover.
Specifically, the centralized control module of operating system backup and recovery system is deployed on main control server, Monitored in LAN by SOCKET LISTEN, after the polling message that controlled end is sent is received, The information such as the IP address according to controlled end, with reference to the rule in profiles/configurations data base, to controlled end Send operational order.
Wherein, SOCKET LISTEN can create monitoring connection, be monitored in LAN, specifically such as It is lower described:
Listen () function is the connection for creating a socket and monitoring application, specific as follows:
#include<winsock.h>
int PASCAL FAR listen(SOCKET s,int backlog);
S:For one describing word for having bundled not connected socket of mark.
backlog:Etc. the greatest length of queue to be connected.
In order to receive connection, the describing word of a socket is first created with socket (), then with listen () The one standby daily record of connection establishment for creating socket and entering for application, then just can be connect with accept () It is connected to.Listen () is only applicable to support the socket of connection, such as SOCK_STREAM types. Socket s is identified in a kind of " variations " pattern, the connection request of application entrance, and wait in line by Receive.This function is particularly well-suited to while there is the server of multiple connection requests;If when a connection please When asking arrival, queue is full, then client will receive a WSAECONNREFUSED mistake.
When without available describing word, listen () function is still attempted to normally work.It still receives request Until queue is emptying.When there is available describing word, a follow-up listen () or accept () calls meeting Queue is refilled according to current or last " standby daily record ", if possible, will recover to monitor Shen The connection request that please be enter.
Step 302, operating system backup and recovery system send the recovery terminal list to IP network.
Specifically, operating system backup and recovery system are published to IP network by terminal list is recovered, and wait is received Control end poll.
Specifically, the GRUB guiding modules increased income can be adopted to be customized.GRUB can be supported from net Network is guided, as long as opening network support options during compiling, in reference source file directory `netboot/README.netboot.In order to from netboot, it is only necessary in two services of network settings, move State IP configuration service and TFTP are serviced, and dynamic IP configuration service can be BOOTP, DHCP or RARP Server.
Then, be respectively directed to different server Bs OOTP, tri- kinds of servers of DHCP or RARP any one Operation bootp, dhcp, rarp.If all settings are errorless, GRUB will provide IP, IP subnet masks IP The IP address of the IP and gateway of netmask and tftp server.GRUB can also read operation system text The configuration file of part system, obtains the IP and gateway mask of operating system configuration, so as to realize that operating system is drawn Leading distributes IP address and is communicated with main control end.
It should be noted that GRUB (GRand Unified Bootloader) is one from GNU projects Multiple operating system startup program.GRUB is the realization for starting specification more, and it allows user to calculate Possess multiple operating systems in machine simultaneously, and select to wish the operating system of operation in computer starting. GRUB can be used for the different kernels on selection operation system partitioning, it can also be used to start to these kernel transmission Parameter.GRUB is a multiple operating systems startup manager, for guiding different system, such as windows, linux。
Boot protocol (BOOTP, Bootstrap Protocol) is a kind of BOOT strapping Protocol, based on IP/UDP Agreement, also referred to as Bootstrap Protocol, are the predecessors of DHCP protocol.BOOTP is used for the local of non-disk workstation In net, non-disk workstation can be allowed to obtain IP address from a central server.By BOOTP agreements Can be the non-disk workstation distribution dynamic IP addressing in LAN, so there is no need to manager and go as each User goes to arrange static ip address.
DHCP (DHCP, Dynamic Host Configuration Protocol) is one The procotol of LAN, is worked using udp protocol, mainly there is two purposes:To internal network or network Service supplier's automatic IP address allocation, to user or internal network manager as to all computers work The means of central management.DHCP method be generally applied in large-scale LAN environment, and Main Function is collection In management, distribution IP address, make the main frame in network environment dynamically obtain IP address, Gateway The information such as address, dns server address.
Reverse address resolution protocol (RARP, Reverse Address Resolution Protocol) allows local The physical machine of net asks its IP address from the ARP table or caching of gateway server.Network manager A table is created in LAN gateway router with mapped physical address (MAC) and corresponding IP Address.When a new machine is arranged, its RARP client program is needed to the RARP on router The corresponding IP address of server request.Assume in the routing table already provided with a record, RARP services Device will return IP address to machine, and this machine will be stored to use in the future.
TFTP (TFTP, Trivial File Transfer Protocol) is TCP/IP protocol suite In one be used for carrying out the agreement of simple files transmission between clients and a server.
Step 303, operating system are backed up and recovery system is before booting operating system, by IP network poll The operating system master control end service, obtains and recovers instruction.
Specifically, operating system backup and recovery system controlled end PC start, before booting operating system, behaviour Make system backup and recovery system to service by IP network polling master end, obtain and recover instruction.Wherein, take turns Inquiry be by CPU timing send inquiry, sequentially inquire whether each peripheral equipment needs it to service, have i.e. to Give service, service to inquire again next periphery after terminating, then constantly go round and begin again.
Specifically, operating system backup and recovery system are customized using GRUB, and communications protocol adopts SOCKET Message, after sending polling message to main control end, if the IP address of controlled end and available machine time meet main control end The production plan of configuration, then main control end can return corresponding operational order, controlled end GRUB according to instruct into The corresponding operation of row.
It should be noted that SOCKET is commonly referred to as " socket ", for describing IP address and port, It is the handle of a communication chain, can be used to realize the communication between different virtual machine or different computers. Main frame on Internet has typically run multiple service softwares, while providing several services.Every kind of service is all beaten A Socket is opened, and is tied in a port, different ports correspond to different services.
It is readable state that step 304, operating system backup and recovery system arrange hidden partition, will be described hidden Hide subregion and cover operating system partition;After the completion of the hidden partition covers operating system partition, if Put the hidden partition for can not change can not read states, and continue to complete booting operating system.
Specifically, operating system backup and recovery system are obtained and recovered after instruction, hidden partition is arranged first and is Readable state, by hidden partition operating system partition is covered, when the hidden partition covers operating system After the completion of subregion, hidden partition is set for can not change can not read states, and continue to complete booting operating system, Recovery is completed.
Exemplary, operating system backup can be entered with recovery system using the disk operating software of ghost classes Row customized development, improves data manipulation efficiency, can reach the speed of 800MB per minute.
Operating system backup provided in an embodiment of the present invention and restoration methods, it is hidden that operating system is internally stored Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range Control operation system backup and recovery.
Example IV
The embodiment of the present invention provides a kind of operating system backup and recovery system 1, as shown in figure 4, the system System includes:Centralized control module 10, main control end communication module 11, controlled end communication module 12, backup are extensive Multiple module 13;Wherein,
The centralized control module 10, for acquisition strategy configuration, and determines terminal according to the strategy configuration List;
The main control end communication module 11, for sending the terminal list to IP network;
The controlled end communication module 12, for before booting operating system, by IP network polling master End service, obtains operational order;
The Backup and Restore module 13, for performing operation corresponding with the operational order.
Specifically, as shown in figure 5, operating system backup and recovery system include main control end and controlled end;Institute Main control end is stated including centralized control module 10, main control end communication module 11.The controlled end can include controlled End communication module 12, Backup and Restore module 13, internal memory operations system partitioning 14, storage inside are hidden Subregion 15.
Specifically, the backup and recovery of all controlled PC that centralized control module is used in management tissue network Configuration and strategy.Controlled end communication module for controlled end command reception module, the fortune of controlled end communication module The row time, before operating system boot its integrated network drove and IP configuration modules, supported entering operation By IP network to main control end query statement information before system.Main control end communication module sets up IP service ends Mouthful, can to all controlled ends issue instruct, can also receive controlled end access and obtain it is corresponding operation refer to Order.Backup and recovery module can arrange hidden partition flag bit according to command request, and to hidden partition Read or write operation, to realize the backup of operating system and recover function.
Further, the centralized control module 10, for obtaining backup policy configuration, and according to described standby Part strategy configuration determines back-up terminals list;
The main control end communication module 11, for sending the back-up terminals list to IP network.
Further, the centralized control module 10, for obtaining recovery policy configuration, according to the recovery Strategy configuration determines recovery terminal list;
The main control end communication module 11, for sending the recovery terminal list to IP network.
Further, when the operational order is backup instruction, the Backup and Restore module 13, for arranging Operating system partition is covered the hidden partition by hidden partition to change state;It is additionally operable to when described Operating system partition is covered after the completion of the hidden partition, and arranging the hidden partition can not to change Read states, and continue to complete booting operating system.
Further, when the operational order is instructed to recover, the Backup and Restore module 13, for arranging Hidden partition is readable state, and the hidden partition is covered into operating system partition;It is additionally operable to when described hidden Hide subregion to cover after the completion of operating system partition, the hidden partition is set for can not change can not read states, And continue to complete booting operating system.
Specifically, operating system backup provided in an embodiment of the present invention and the understanding of recovery system may be referred to reality The operating system backup and the explanation of restoration methods of example one to embodiment three are applied, the present embodiment will not be described here.
Operating system backup provided in an embodiment of the present invention and recovery system, it is hidden that operating system is internally stored Hide preserve, ensure backup image safety, by booting operating system before, using trawl performance obtain it is standby Part recovers instruction, and the mode that the data of operating system partition and hidden partition are mutually covered is realized long-range Control operation system backup and recovery.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can using hardware embodiment, software implementation or with reference to software and The form of the embodiment of hardware aspect.And, the present invention can be adopted and wherein include calculating at one or more Computer-usable storage medium (including but not limited to disk memory and the optical storage of machine usable program code Device etc.) on implement computer program form.
The present invention is with reference to method according to embodiments of the present invention, equipment (system) and computer program Flow chart and/or block diagram describing.It should be understood that can be by computer program instructions flowchart and/or side The knot of each flow process and/or square frame and flow chart and/or the flow process in block diagram and/or square frame in block diagram Close.Can provide these computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or The processor of other programmable data processing devices is producing a machine so that by computer or other can The instruction of the computing device of programming data processing equipment is produced for realizing in one flow process or multiple of flow chart The device of the function of specifying in one square frame of flow process and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices In the computer-readable memory for working in a specific way so that in being stored in the computer-readable memory Instruction produces the manufacture for including command device, and the command device is realized in one flow process of flow chart or multiple streams The function of specifying in one square frame of journey and/or block diagram or multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing devices, made Obtain and series of operation steps performed on computer or other programmable devices to produce computer implemented process, So as to the instruction performed on computer or other programmable devices is provided for realizing in one flow process of flow chart Or specify in one square frame of multiple flow processs and/or block diagram or multiple square frames function the step of.
The above, only presently preferred embodiments of the present invention is not intended to limit the protection model of the present invention Enclose.

Claims (10)

1. a kind of operating system is backed up and restoration methods, it is characterised in that methods described includes:
Acquisition strategy is configured, and determines terminal list according to the strategy configuration;
The terminal list is sent to IP network;
Before booting operating system, serviced by operating system master control end described in IP network poll, obtain operation Instruction;
Perform operation corresponding with the operational order.
2. operating system according to claim 1 is backed up and restoration methods, it is characterised in that described to obtain Tactful configuration is taken, and terminal list is determined according to the strategy configuration;The terminal list is sent to IP network, Including:
Backup policy configuration is obtained, and back-up terminals list is determined according to backup policy configuration;
The back-up terminals list is sent to IP network.
3. operating system according to claim 1 is backed up and restoration methods, it is characterised in that described to obtain Tactful configuration is taken, and terminal list is determined according to the strategy configuration;The terminal list is sent to IP network, Including:
Recovery policy configuration is obtained, is determined according to recovery policy configuration and is recovered terminal list;
The recovery terminal list is sent to IP network.
4. operating system according to claim 2 is backed up and restoration methods, it is characterised in that the behaviour When work instruction is backup instruction, execution backup operation corresponding with the backup instruction, including:
Hidden partition is set to change state, operating system partition is covered into the hidden partition;
After the completion of the operating system partition covers the hidden partition, the hidden partition is set for not Can change can not read states, and continue to complete booting operating system.
5. operating system according to claim 3 is backed up and restoration methods, it is characterised in that the behaviour Make instruction for recover instruction when, the execution and it is described recovery the corresponding recovery operation of instruction, including:
Setting hidden partition is readable state, and the hidden partition is covered into operating system partition;
After the completion of the hidden partition covers operating system partition, the hidden partition is set to repair Change can not read states, and continue to complete booting operating system.
6. a kind of operating system is backed up and recovery system, it is characterised in that the system includes:Centralized Control Module, main control end communication module, controlled end communication module, Backup and Restore module;Wherein,
The centralized control module, for acquisition strategy configuration, and determines terminal row according to the strategy configuration Table;
The main control end communication module, for sending the terminal list to IP network;
The controlled end communication module, for before booting operating system, by operating described in IP network poll System master end services, and obtains operational order;
The Backup and Restore module, for performing operation corresponding with the operational order.
7. operating system according to claim 6 is backed up and recovery system, it is characterised in that
The centralized control module is for obtaining backup policy configuration and true according to backup policy configuration Determine back-up terminals list;
The main control end communication module, for sending the back-up terminals list to IP network.
8. operating system according to claim 6 is backed up and recovery system, it is characterised in that
The centralized control module, for obtaining recovery policy configuration, determines according to recovery policy configuration Recover terminal list;
The main control end communication module, for sending the recovery terminal list to IP network.
9. operating system according to claim 7 is backed up and recovery system, it is characterised in that the behaviour When work instruction is backup instruction, the Backup and Restore module, for arranging hidden partition for state can be changed, Operating system partition is covered into the hidden partition;Be additionally operable to when the operating system partition cover it is described After the completion of hidden partition, the hidden partition is set for can not change can not read states, and continue to complete operation System guides.
10. operating system according to claim 8 is backed up and recovery system, it is characterised in that described To recover during instruction, the Backup and Restore module is readable state for arranging hidden partition to operational order, The hidden partition is covered into operating system partition;It is additionally operable to when the hidden partition covers operating system After the completion of subregion, the hidden partition is set for can not change can not read states, and continue to complete operating system Guiding.
CN201510747494.4A 2015-11-03 2015-11-03 Operating system backup and recovery method and system Pending CN106648957A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510747494.4A CN106648957A (en) 2015-11-03 2015-11-03 Operating system backup and recovery method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510747494.4A CN106648957A (en) 2015-11-03 2015-11-03 Operating system backup and recovery method and system

Publications (1)

Publication Number Publication Date
CN106648957A true CN106648957A (en) 2017-05-10

Family

ID=58851424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510747494.4A Pending CN106648957A (en) 2015-11-03 2015-11-03 Operating system backup and recovery method and system

Country Status (1)

Country Link
CN (1) CN106648957A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990191A (en) * 2019-11-01 2020-04-10 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data recovery method and system based on mirror image storage
CN111382006A (en) * 2018-12-27 2020-07-07 中国移动通信集团四川有限公司 Recovery method, device, equipment and medium of operating system
CN112416657A (en) * 2020-12-09 2021-02-26 成都傲梅科技有限公司 System cloning method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516355B2 (en) * 2004-11-05 2009-04-07 Broadcom Corporation Method and computer program product for backing up and restoring online system information
CN101901171A (en) * 2009-05-27 2010-12-01 同方股份有限公司 Using method of computer data backup and restore software
CN102110029A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 System backup and restoration method
US8291178B2 (en) * 2008-12-08 2012-10-16 Apacer Technology Inc. Machine-implemented method for categorizing storage media, and machine-implemented method for storing target codes
CN103455387A (en) * 2012-05-30 2013-12-18 深圳市祈飞科技有限公司 Method and system for backing up and restoring operation system in UEFI (united extensible firmware interface) BIOS (basic input /output system)
CN104699559A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Distributed data backup method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516355B2 (en) * 2004-11-05 2009-04-07 Broadcom Corporation Method and computer program product for backing up and restoring online system information
US8291178B2 (en) * 2008-12-08 2012-10-16 Apacer Technology Inc. Machine-implemented method for categorizing storage media, and machine-implemented method for storing target codes
CN101901171A (en) * 2009-05-27 2010-12-01 同方股份有限公司 Using method of computer data backup and restore software
CN102110029A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 System backup and restoration method
CN103455387A (en) * 2012-05-30 2013-12-18 深圳市祈飞科技有限公司 Method and system for backing up and restoring operation system in UEFI (united extensible firmware interface) BIOS (basic input /output system)
CN104699559A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Distributed data backup method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
任斌: "用镜像文件和隐藏分区简化操作系统的安装", 《信息技术》 *
唐国栋: "重装系统又一法", 《大众硬件》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382006A (en) * 2018-12-27 2020-07-07 中国移动通信集团四川有限公司 Recovery method, device, equipment and medium of operating system
CN110990191A (en) * 2019-11-01 2020-04-10 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data recovery method and system based on mirror image storage
CN110990191B (en) * 2019-11-01 2022-06-17 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data recovery method and system based on mirror image storage
CN112416657A (en) * 2020-12-09 2021-02-26 成都傲梅科技有限公司 System cloning method

Similar Documents

Publication Publication Date Title
EP3622695B1 (en) Cloud modification of modular applications running on local devices
CN104636189B (en) Virtual machine deployment system and method based on Xen
CN103064742B (en) A kind of automatic deployment system and method for hadoop cluster
CN110719209B (en) Cluster network configuration method, system, equipment and readable storage medium
CN103703724A (en) Resource payment method
CN107170474A (en) Expansible the storage box, computer implemented method and computer readable storage means
CN112671578B (en) SRIOV virtual network configuration method and related device
CN106789327A (en) The automatic method and system that host is added for cloud platform
CN111880902A (en) Pod creation method, device, equipment and readable storage medium
CN104468574A (en) Dynamic IP address acquisition method, system and device for virtual machines
CN104767649A (en) Bare metal server deployment method and device
CN103534987B (en) For the method and system of configuration virtual network configuration
CN106911779A (en) A kind of cloud platform virtual machine obtains IP method and devices
CN105117293A (en) Windows system environment automatic deployment method and automatic deployment system
CN103441867A (en) Method for updating internal network resource allocation of virtual machine
CN111198696B (en) OpenStack large-scale deployment method and system based on bare computer server
CN106899477A (en) The construction method and device of physical machine in cloud computing platform
CN106657444A (en) Method and device for configuring IP address of BMC
CN109067599A (en) A kind of method and device for disposing cluster
US9983867B2 (en) Software image provisioning and charging system
CN104468791A (en) Private cloud IaaS platform construction method
CN106648957A (en) Operating system backup and recovery method and system
US8819200B2 (en) Automated cluster node configuration
CN108989123A (en) A kind of server configuration method and device
CN109756359A (en) The method and remote server and network system of auto-initiation network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication