CN112491747A - Application method of high-availability data exchange cluster - Google Patents
Application method of high-availability data exchange cluster Download PDFInfo
- Publication number
- CN112491747A CN112491747A CN202011338751.6A CN202011338751A CN112491747A CN 112491747 A CN112491747 A CN 112491747A CN 202011338751 A CN202011338751 A CN 202011338751A CN 112491747 A CN112491747 A CN 112491747A
- Authority
- CN
- China
- Prior art keywords
- message
- data exchange
- cluster
- haproxy
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/10—Packet switching elements characterised by the switching fabric construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0668—Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an application method of a high-availability data exchange cluster, which comprises the following steps: the source information system sends the message to a data exchange cluster A and carries out Hash check, the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling after the check is passed, sends the message to a message sender in the selected data exchange node and carries out Hash check, and the message sender sends the message to a data exchange cluster B after the check is passed; the HAproxy of the data exchange cluster B selects a data exchange node through a load balancing strategy of polling scheduling, sends the received message to a message receiver in the selected data exchange node and carries out Hash check, and after the check is passed, the message receiver forwards the message to a target information system and feeds back the state of the message to a message sender. The invention realizes high availability and reliability of data exchange among a plurality of data exchange clusters, and ensures the integrity and safety of data.
Description
Technical Field
The invention relates to a communication technology, in particular to an application method of a high-availability data exchange cluster.
Background
In an enterprise, with the continuous increase of information systems, the information systems working independently cause a large amount of redundant data and the repeated labor of business personnel, and the enterprise urgently needs to contact the information systems traversing the whole enterprise by establishing a data exchange platform to complete seamless sharing and data exchange among the systems in the enterprise.
With the conventional data exchange service of the stand-alone type, as the amount of exchange data increases, it will be difficult to satisfy the requirement in terms of availability. High availability and high reliability cannot be achieved simply by improving the hardware performance of a single machine, so a technical scheme adopting a multi-server cluster is needed.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides an application method of a high-availability data exchange cluster, which realizes high availability and reliability of data exchange among a plurality of data exchange clusters and ensures the integrity and safety of data.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
an application method of a high-availability data exchange cluster, wherein the data exchange cluster comprises a data exchange cluster A where a source information system is located and a data exchange cluster B where a destination information system is located, and the data exchange between the source information system and the destination information system comprises the following steps:
s1) the source information system sends the message to the data exchange cluster A, the data exchange cluster A carries out Hash check on the message, the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling after the check is passed, the message is sent to a message sender in the selected data exchange node and carries out Hash check, and the message sender sends the message to the data exchange cluster B after the check is passed;
s2) the HAproxy of the data exchange cluster B selects a data exchange node through the load balancing strategy of polling scheduling, sends the received message to the message receiver in the selected data exchange node and carries out Hash check, and after the check is passed, the message receiver forwards the message to the destination information system and feeds back the state of the message to the message sender.
Further, step S1) is preceded by a step of configuring a data exchange cluster, which specifically includes: the two data exchange clusters are respectively marked as a data exchange cluster A and a data exchange cluster B, each data exchange cluster comprises at least 4 physical machines, wherein 2 physical machines are provided with an HAproxy and are configured into a main cluster and a standby cluster, the other 2 physical machines are respectively configured into data exchange nodes, the HAproxy configures a load balancing strategy as a polling scheduling strategy, sets the scheduling weight of the data exchange nodes to be the same value, and configures health check URIs.
Further, step S1) specifically includes the following steps:
s11) the source information system sends the message to the virtual IP vipA provided by the HAproxy of the data exchange cluster A, the MD5 value of the message is compared with the message content MD5 value in the message to judge whether the message is tampered, if yes, the message exchange is stopped and the abnormal log is recorded, otherwise, the next step is carried out;
s12) the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling, and sends the message to the message sender in the selected data exchange node through a data exchange request;
s13) after receiving the data exchange request and obtaining the complete message, the message sender compares the MD5 value of the message with the message content MD5 value in the message to judge whether the message is tampered, if yes, the message exchange is stopped and the abnormal log is recorded, otherwise, the message sending record is saved and the message state is updated;
s14) the message sender sends the messages one by one to the virtual IP vipB provided by the HAProxy of the data exchange cluster B.
Further, in step S14), after the message sender sends the message, the message receiver is queried about the status of the sent message in a polling manner, and stops querying until the message is converted from the intermediate status to the final status, and updates the message sending record.
Further, step S2) specifically includes the following steps:
s21) the HAproxy of the data exchange cluster B selects a data exchange node through a load balancing strategy of polling scheduling, and sends the received message to a message receiver in the selected data exchange node through a data exchange request;
s22) after the message receiver receives the data exchange request and gets the complete message, compare MD5 value of the message with message content MD5 value in the message and judge whether the message is tampered, if yes, stop the message exchange and record the abnormal log, otherwise save the message receiving record and update the message state as registered, then feedback the state of the message to the message sender;
s23) the message receiver connects the target information system according to the APPID and sends the message to the target information system, and after sending, the message receiver updates the message state as downloaded and feeds back to the message sender.
Further, the step S1) and the step S2) further include a processing step when the data exchange node is down, specifically including: when the HAproxy of the data exchange cluster A and/or the data exchange cluster B queries a health detection URI to obtain a data exchange node with unavailable service, stopping sending a data exchange request to the data exchange node and storing a corresponding message of incomplete exchange into a database; and when the HAproxy query health detection URI of the data exchange cluster A and/or the data exchange cluster B acquires that the service of the data exchange node becomes available, querying the unfinished exchange information through the database, and recovering and forwarding the unfinished exchange information to the data exchange node through the data exchange request.
Compared with the prior art, the invention has the advantages that:
1. the invention enables the data exchange clusters to be expanded in an unlimited horizontal way by respectively configuring highly available HAproxy load balancing software in the plurality of data exchange clusters, and based on a health check mechanism of the HAproxy, the data exchange clusters can rapidly switch faults when the data exchange nodes are in fault, and can automatically recover the access to the original fault data exchange nodes when the faults are recovered, thereby realizing the high availability of the data exchange clusters;
2. the invention can carry out hash check on the message at each stage of receiving the message in the data exchange process, thereby ensuring the safety of the message in the exchange process, and after the data exchange nodes of the data exchange cluster are down and recovered, the exchange of the messages which are not exchanged is recovered through breakpoint continuous transmission, thereby ensuring the integrity of the messages in the exchange process.
Drawings
Fig. 1 is a schematic diagram of a data exchange cluster structure in the method according to the embodiment of the present invention.
Fig. 2 is a schematic diagram of a data exchange flow in the method according to the embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and specific preferred embodiments of the description, without thereby limiting the scope of protection of the invention.
The invention provides an application method of a high-availability data exchange cluster, as shown in fig. 1, the data exchange cluster in this embodiment includes a data exchange cluster a where a source information system is located and a data exchange cluster B where a destination information system is located, and the data exchange between the source information system and the destination information system includes the following steps:
s1) the source information system sends the message to the data exchange cluster A, the data exchange cluster A carries out Hash check on the message, the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling after the check is passed, the message is sent to a message sender in the selected data exchange node and carries out Hash check, and the message sender sends the message to the data exchange cluster B after the check is passed;
s2) the HAproxy of the data exchange cluster B selects a data exchange node through the load balancing strategy of polling scheduling, sends the received message to the message receiver in the selected data exchange node and carries out Hash check, and after the check is passed, the message receiver forwards the message to the destination information system and feeds back the state of the message to the message sender.
Through the steps, the embodiment configures the HAProxy load balancing software in each data exchange cluster for the multiple data exchange clusters, so that the data exchange clusters can be expanded in an infinite horizontal manner, and hash check is performed on the message at each stage of receiving the message in the data exchange process, thereby ensuring the safety of the message in the exchange process.
Step S1) of this embodiment further includes a step of configuring a data exchange cluster, which specifically includes: as shown in fig. 1, two data exchange clusters are respectively marked as a data exchange cluster a and a data exchange cluster B, each data exchange cluster includes at least 4 physical machines, wherein 2 physical machines are installed with HAProxy and Keepalived software, and the HAProxy is configured as a master/slave cluster service, in this embodiment, the HAProxy needs to be equipped with at least one slave machine to deal with emergencies such as hardware failure, power failure, and the like of a host; the method comprises the steps that other applications are not deployed on a physical machine running the HAProxy to ensure that the HAProxy monopolizes resources, meanwhile, faults of an operating system or machines are avoided from being caused by the other applications, in addition, 2 physical machines are respectively configured to be data exchange nodes, data exchange software is run, such as the data exchange node 1 and the data exchange node 2 shown in the figure 1, the HAProxy configuration forwards TCP requests to the data exchange node 1 and the data exchange node 2, the HAProxy configuration is a polling scheduling strategy, the scheduling weight of the data exchange nodes is set to be the same value, and health check URIs are configured.
The data exchange software in this embodiment is platform software written by Golang, and is suitable for various server platforms, and the data exchange software is composed of two parts, including a message sender SBOX and a message receiver DBOX. HAProxy and Keepalived are open-source load balancing software for building the main/standby clusters.
As shown in the left half of fig. 2, step S1) of this embodiment specifically includes the following steps:
s11) the source information system sends the message to the virtual IP vipA provided by the HAProxy of the data exchange cluster a, in this embodiment, an APPID is allocated to each information system, corresponding information system information is stored in the database, each message contains the APPID of the source information system, the APPID of the target information system, and the MD5 value of the message content, the data exchange cluster a compares the MD5 value of the message with the MD5 value of the message content in the message to determine whether the message is tampered, if not, it indicates that the message has been tampered, the message exchange is stopped and an exception log is recorded, otherwise, the next step is entered;
s12) the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling, and sends the message to the message sender SBOX of the data exchange software operated by the selected data exchange node through a data exchange request;
s13) after the SBOX receives the data exchange request and gets the complete message, comparing the MD5 value of the message with the message content MD5 value in the message to judge whether the message is tampered, if yes, stopping the message exchange and recording the abnormal log, otherwise, saving the message sending record and updating the message state;
s14) message sender SBOX sends messages one by one onto the virtual IP vipB provided by the HAProxy of data exchange cluster B.
Step S14) of this embodiment, after the message sender SBOX finishes sending the message, it queries the message receiver DBOX about the status of the sent message in a polling manner, and stops querying and updates the message sending record until the message is transitioned from the intermediate state to the final state.
As shown in the right half of fig. 2, step S2) of the present embodiment specifically includes the following steps:
s21) the HAproxy of the data exchange cluster B selects a data exchange node through a load balancing strategy of polling scheduling, and sends the received message to a message receiving party DBOX of data exchange software operated by the selected data exchange node through a data exchange request;
s22) after receiving the data exchange request and obtaining the complete message, the message receiver DBOX compares the MD5 value of the message with the message content MD5 value in the message to judge whether the message is tampered, if yes, the message exchange is stopped and the abnormal log is recorded, otherwise, the message receiving record is saved and the message state is updated to be registered, and then the state of the message is fed back to the message sender SBOX;
s23) the message receiver DBOX connects the target information system according to the APPID and sends the message to the target information system, after the sending, the message state is updated to be downloaded and fed back to the message sender SBOX.
In each message exchange of the data exchange cluster a, the data exchange node where the message sender SBOX is located, and the data exchange node where the message receiver DBOX is located, the message status is stored in the database, so as to facilitate the tracking and querying of the message, in this embodiment, step S1) and step S2) further include a processing step when the data exchange node is down, specifically including: when the HAproxy of the data exchange cluster A and/or the data exchange cluster B queries a health detection URI to obtain a data exchange node with unavailable service, stopping sending a data exchange request to the data exchange node and storing a corresponding message of incomplete exchange into a database; and when the HAproxy query health detection URI of the data exchange cluster A and/or the data exchange cluster B acquires that the service of the data exchange node becomes available, querying the unfinished exchange information through the database, and recovering and forwarding the unfinished exchange information to the data exchange node through the data exchange request.
Based on the health check mechanism of the HAproxy, when the data exchange nodes are in failure, the data exchange cluster can quickly perform fault switching, and when the failure is recovered, the access to the original failed data exchange nodes can be automatically recovered, so that the high availability of the data exchange cluster is realized, and meanwhile, after the data exchange nodes of the data exchange cluster are down and recovered, the incomplete exchange of the exchanged messages is recovered through breakpoint transmission, so that the integrity of the messages in the exchange process is ensured.
The foregoing is considered as illustrative of the preferred embodiments of the invention and is not to be construed as limiting the invention in any way. Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical spirit of the present invention should fall within the protection scope of the technical scheme of the present invention, unless the technical spirit of the present invention departs from the content of the technical scheme of the present invention.
Claims (6)
1. An application method of a high-availability data exchange cluster is characterized in that the data exchange cluster comprises a data exchange cluster A where a source information system is located and a data exchange cluster B where a destination information system is located, and the data exchange between the source information system and the destination information system comprises the following steps:
s1) the source information system sends the message to the data exchange cluster A, the data exchange cluster A carries out Hash check on the message, the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling after the check is passed, the message is sent to a message sender in the selected data exchange node and carries out Hash check, and the message sender sends the message to the data exchange cluster B after the check is passed;
s2) the HAproxy of the data exchange cluster B selects a data exchange node through the load balancing strategy of polling scheduling, sends the received message to the message receiver in the selected data exchange node and carries out Hash check, and after the check is passed, the message receiver forwards the message to the destination information system and feeds back the state of the message to the message sender.
2. The method for applying the highly available data exchange cluster according to claim 1, wherein step S1) is preceded by a step of configuring the data exchange cluster, which specifically includes: the two data exchange clusters are respectively marked as a data exchange cluster A and a data exchange cluster B, each data exchange cluster comprises at least 4 physical machines, wherein 2 physical machines are provided with an HAproxy and are configured into a main cluster and a standby cluster, the other 2 physical machines are respectively configured into data exchange nodes, the HAproxy configures a load balancing strategy as a polling scheduling strategy, sets the scheduling weight of the data exchange nodes to be the same value, and configures health check URIs.
3. The method for applying the highly available data exchange cluster according to claim 1, wherein step S1) specifically includes the following steps:
s11) the source information system sends the message to the virtual IP vipA provided by the HAproxy of the data exchange cluster A, the MD5 value of the message is compared with the message content MD5 value in the message to judge whether the message is tampered, if yes, the message exchange is stopped and the abnormal log is recorded, otherwise, the next step is carried out;
s12) the HAproxy of the data exchange cluster A selects a data exchange node through a load balancing strategy of polling scheduling, and sends the message to the message sender in the selected data exchange node through a data exchange request;
s13) after receiving the data exchange request and obtaining the complete message, the message sender compares the MD5 value of the message with the message content MD5 value in the message to judge whether the message is tampered, if yes, the message exchange is stopped and the abnormal log is recorded, otherwise, the message sending record is saved and the message state is updated;
s14) the message sender sends the messages one by one to the virtual IP vipB provided by the HAProxy of the data exchange cluster B.
4. The method for applying the high availability data exchange cluster according to claim 3, wherein in step S14), after the message sender sends the message, the message receiver is queried about the status of the sent message in a polling manner, and stops querying and updates the message sending record until the message is transitioned from the intermediate status to the final status.
5. The method for applying the highly available data exchange cluster according to claim 1, wherein step S2) specifically includes the following steps:
s21) the HAproxy of the data exchange cluster B selects a data exchange node through a load balancing strategy of polling scheduling, and sends the received message to a message receiver in the selected data exchange node through a data exchange request;
s22) after the message receiver receives the data exchange request and gets the complete message, compare MD5 value of the message with message content MD5 value in the message and judge whether the message is tampered, if yes, stop the message exchange and record the abnormal log, otherwise save the message receiving record and update the message state as registered, then feedback the state of the message to the message sender;
s23) the message receiver connects the target information system according to the APPID and sends the message to the target information system, and after sending, the message receiver updates the message state as downloaded and feeds back to the message sender.
6. The method for applying the highly available data exchange cluster according to claim 2, wherein the steps S1) and S2) further include a processing step when the data exchange node goes down, specifically including: when the HAproxy of the data exchange cluster A and/or the data exchange cluster B queries a health detection URI to obtain a data exchange node with unavailable service, stopping sending a data exchange request to the data exchange node and storing a corresponding message of incomplete exchange into a database; and when the HAproxy query health detection URI of the data exchange cluster A and/or the data exchange cluster B acquires that the service of the data exchange node becomes available, querying the unfinished exchange information through the database, and recovering and forwarding the unfinished exchange information to the data exchange node through the data exchange request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011338751.6A CN112491747B (en) | 2020-11-25 | 2020-11-25 | Application method of high-availability data exchange cluster |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011338751.6A CN112491747B (en) | 2020-11-25 | 2020-11-25 | Application method of high-availability data exchange cluster |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112491747A true CN112491747A (en) | 2021-03-12 |
CN112491747B CN112491747B (en) | 2022-06-14 |
Family
ID=74934754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011338751.6A Active CN112491747B (en) | 2020-11-25 | 2020-11-25 | Application method of high-availability data exchange cluster |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112491747B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475566A (en) * | 2013-07-10 | 2013-12-25 | 北京发发时代信息技术有限公司 | Real-time message exchange platform and distributed cluster establishment method |
CN105827719A (en) * | 2016-04-18 | 2016-08-03 | 宁波轩悦行电动汽车服务有限公司 | WEB user platform communication system and load balancing method and vehicle renting method |
CN106027409A (en) * | 2016-05-12 | 2016-10-12 | 深圳市恒扬数据股份有限公司 | Method and device for uniformly outputting load of switch |
CN107409096A (en) * | 2015-04-23 | 2017-11-28 | 思科技术公司 | Self-adapting load balances |
CN108712346A (en) * | 2018-05-16 | 2018-10-26 | 天津芯海创科技有限公司 | A kind of load balancing is from routing data exchange structure and method |
US10284541B1 (en) * | 2018-07-09 | 2019-05-07 | Capital One Services, Llc | System and method for generating enhanced distributed online registry |
CN109756892A (en) * | 2019-01-15 | 2019-05-14 | 安徽理工大学 | A method of network selection and data transmission encryption based on heterogeneous network |
CN110061929A (en) * | 2019-03-10 | 2019-07-26 | 天津大学 | For data center's load-balancing method of asymmetrical network |
CN110971698A (en) * | 2019-12-09 | 2020-04-07 | 北京奇艺世纪科技有限公司 | Data forwarding system, method and device |
CN111314491A (en) * | 2020-03-27 | 2020-06-19 | 北京尚医智信健康管理有限公司 | Cross-tenant data interaction method and device, server cluster and medium |
CN111711576A (en) * | 2020-06-30 | 2020-09-25 | 西安电子科技大学 | Controller load balancing system and method based on efficient switch migration |
CN111722930A (en) * | 2020-06-23 | 2020-09-29 | 恒为科技(上海)股份有限公司 | Data preprocessing system |
-
2020
- 2020-11-25 CN CN202011338751.6A patent/CN112491747B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475566A (en) * | 2013-07-10 | 2013-12-25 | 北京发发时代信息技术有限公司 | Real-time message exchange platform and distributed cluster establishment method |
CN107409096A (en) * | 2015-04-23 | 2017-11-28 | 思科技术公司 | Self-adapting load balances |
CN105827719A (en) * | 2016-04-18 | 2016-08-03 | 宁波轩悦行电动汽车服务有限公司 | WEB user platform communication system and load balancing method and vehicle renting method |
CN106027409A (en) * | 2016-05-12 | 2016-10-12 | 深圳市恒扬数据股份有限公司 | Method and device for uniformly outputting load of switch |
CN108712346A (en) * | 2018-05-16 | 2018-10-26 | 天津芯海创科技有限公司 | A kind of load balancing is from routing data exchange structure and method |
US10284541B1 (en) * | 2018-07-09 | 2019-05-07 | Capital One Services, Llc | System and method for generating enhanced distributed online registry |
CN109756892A (en) * | 2019-01-15 | 2019-05-14 | 安徽理工大学 | A method of network selection and data transmission encryption based on heterogeneous network |
CN110061929A (en) * | 2019-03-10 | 2019-07-26 | 天津大学 | For data center's load-balancing method of asymmetrical network |
CN110971698A (en) * | 2019-12-09 | 2020-04-07 | 北京奇艺世纪科技有限公司 | Data forwarding system, method and device |
CN111314491A (en) * | 2020-03-27 | 2020-06-19 | 北京尚医智信健康管理有限公司 | Cross-tenant data interaction method and device, server cluster and medium |
CN111722930A (en) * | 2020-06-23 | 2020-09-29 | 恒为科技(上海)股份有限公司 | Data preprocessing system |
CN111711576A (en) * | 2020-06-30 | 2020-09-25 | 西安电子科技大学 | Controller load balancing system and method based on efficient switch migration |
Also Published As
Publication number | Publication date |
---|---|
CN112491747B (en) | 2022-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107465721B (en) | Global load balancing method and system based on double-active architecture and scheduling server | |
KR100491541B1 (en) | A contents synchronization system in network environment and a method therefor | |
US6859889B2 (en) | Backup system and method for distributed systems | |
US7518983B2 (en) | Proxy response apparatus | |
US8856581B2 (en) | Method for resource information backup operation based on peer to peer network and peer to peer network thereof | |
US20050114352A1 (en) | Method and system for detecting a dead server | |
US20080183991A1 (en) | System and Method for Protecting Against Failure Through Geo-Redundancy in a SIP Server | |
CN106059791B (en) | Link switching method of service in storage system and storage device | |
CN112181660A (en) | High-availability method based on server cluster | |
CN113347037B (en) | Data center access method and device | |
CN112764956B (en) | Database exception handling system, database exception handling method and device | |
CN202870563U (en) | Distributed comprehensive monitoring system | |
CN111988347B (en) | Data processing method of board hopping machine system and board hopping machine system | |
CN111800484A (en) | Service anti-destruction replacing method for mobile edge information service system | |
EP3570169B1 (en) | Method and system for processing device failure | |
CN105323271B (en) | Cloud computing system and processing method and device thereof | |
CN112491747B (en) | Application method of high-availability data exchange cluster | |
CN117370316A (en) | High availability management method and device for database, electronic equipment and storage medium | |
CN100362484C (en) | Method of multi-computer back-up | |
US8438261B2 (en) | Failover scheme with service-based segregation | |
CN115794769A (en) | Method for managing high-availability database, electronic device and storage medium | |
CN114328033A (en) | Method and device for keeping service configuration consistency of high-availability equipment group | |
CN114422335A (en) | Communication method, communication device, server and storage medium | |
CN103716186B (en) | Artificial telephone traffic system with network fault tolerance capability and method thereof | |
CN111722988A (en) | Fault switching method and device for data space nodes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |