CN1307822C - Method for serially implementing data backup of multiple device - Google Patents

Method for serially implementing data backup of multiple device Download PDF

Info

Publication number
CN1307822C
CN1307822C CNB021441146A CN02144114A CN1307822C CN 1307822 C CN1307822 C CN 1307822C CN B021441146 A CNB021441146 A CN B021441146A CN 02144114 A CN02144114 A CN 02144114A CN 1307822 C CN1307822 C CN 1307822C
Authority
CN
China
Prior art keywords
backup
bam
configuration
data
numbered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021441146A
Other languages
Chinese (zh)
Other versions
CN1486023A (en
Inventor
雷海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB021441146A priority Critical patent/CN1307822C/en
Publication of CN1486023A publication Critical patent/CN1486023A/en
Application granted granted Critical
Publication of CN1307822C publication Critical patent/CN1307822C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a method for serially implementing the data backup of multiple devices, which belongs to the technical field of data communication. The method comprises the following steps that firstly, configuration information is read from configuration files; according to space which is set, BAM information is obtained from a data base, a queue is established, and simultaneously, a timer for detecting backup states is started up; a first BAM without a backup in the queue is taken out and backup operation tasks are created; according to the BAM information, a user logs in and carries out identity authentication, if false, a mark as a backup failure is made, if true, the backup operation tasks are initialized and backup operation is executed; the steps are repeated until a processing is completed. The method of the present invention provides the proper range of input data in all occasions when data needs inputting and has strong reliability. Severe user authentication for data collocation is carried out and relevant operation records are taken so that the method has high safety.

Description

Serial realizes the method for many device data backups
Technical field
The present invention relates to the method that a kind of serial realizes many device data backups, belong to data communication technology field.
Background technology
Access server is after paying the user, and the user has carried out relevant configuration according to the service needed of oneself to these equipment, and these configurations are kept in the access server.Usually, for guaranteeing the correctness of configuration, these configurations all must be undertaken by the attendant, and also can carry out some modifications in user's use afterwards.Cause losing of configuration data for fear of going wrong when the Back Administration Module (Background AdministrationModule) of access server later on, just current database need be backed up, in order to using during the recovery configuring data future.And, will not carry out data backup for some statisticss that comprise in the database on the BAM, to reduce memory space and to reduce taking of Internet resources.
Existing data back up method is as follows:
In order to back up the configuration data on the BAM, adopted based on Simple Network Management Protocol (SimpleNetworkManagementProtocol, hereinafter to be referred as SNMP): provide related administrative information storehouse (ManagementInformationBase) for data backup specially, when needs carry out data backup, the application program of webmaster is to specifying BAM and appointed object sign (ObjectIDentifier, hereinafter to be referred as OID) issue the SNMP read operation, after SNMP agency on the BAM receives the SNMP read request and confirms as the OID of Backup Data, from database, read the table data that need preservation, and send response message for the webmaster application program; Subsequently, the webmaster application requests is set up the terminal document transmission and is connected, and by the terminal document delivery means, BAM reports network management workstation with data, thereby finishes backup operation.During recovery, data transmission direction gets final product conversely.
The shortcoming of above-mentioned configuration data automatic backup method based on SNMP is:
1) fail safe is relatively poor: present application realizes based on the SNMP front page mostly, and snmp protocol utilizes connectionless User Datagram Protoco (UDP) to transmit data, except that the SNMP third edition has the safety check, simple authentication and access control only are provided, destroyed by malicious attacker easily, for example intercepting message sends false information, directly device parameter is made amendment etc.
2) efficient is lower: at first, in the SNMP front page protocol Data Unit, as long as there is a variable to make mistakes, just think whole protocol Data Unit processing failure will cause the inconsistent of webmaster and proxy data like this, also reduced treatment effeciency simultaneously; Secondly, SNMP is not suitable for retrieving big data block, because SNMP does not support the data block of fixed structure is operated; At last, each variable in snmp protocol data cell can only corresponding OID operation, and when therefore traveling through a plurality of proxy database, chronic, efficient was lower when a plurality of equipment were backed up.
Summary of the invention
The objective of the invention is to propose the method that a kind of serial realizes many device data backups, overcome the poor stability of prior art, transmit the low shortcoming of data efficiency, with reach regularly, accurately, backup configuration data and reduce the purpose of the shared Internet resources of Backup Data reliably.
The serial that the present invention proposes realizes the method for many device data backups, comprises following each step:
1, from configuration file, reads configuration information;
2, at interval, from database, obtain the information of the Backend Administration Module (being called for short BAM) managed, set up the BAM formation, start one simultaneously and check BAM backup instances timer according to the setting of configuration file;
3, take out first BAM that does not back up in the above-mentioned formation, and create the backup operation task;
4, according to the information of above-mentioned BAM, login this BAM, carry out authentication, if checking is not passed through, make " backup failure " mark, change step (6), if checking is passed through, carry out next step;
5,, and carry out backup operation to execution backup operation task initialization;
6, by checking BAM backup instances timer, find out the next BAM creation task in the described formation, repeating step (3) (4) (5) is up to all BAM in the formation are disposed.
In the said method, BAM information comprises IP address, login username and the password of BAM.
In the said method, login authentication is undertaken by man-machine interaction verbal order (hereinafter to be referred as MML).
In the said method, also comprise the process of a monitoring BACKUP TIME, comprise the steps:
1, during initialization, creates supervision poll timer;
2, whether regular check arrives BACKUP TIME;
3, behind the arrival BACKUP TIME, create the backup operation task.
In the time of above-mentioned monitoring BACKUP TIME, also to check the process of the backup instances of BAM, may further comprise the steps:
When 1, arriving BACKUP TIME, supervision poll timer creation is checked the timer of BAM backup instances;
2, according to the time interval of setting, this timer is checked the backup instances of BAM in the formation;
3, after all BAM backups finish in the formation, delete this timer.
In the said method, after BAM logins successfully, check whether the disk remaining space of network management workstation is lower than the value of regulation, if, the backup file before then deleting.
Backup operation in the said method comprises the steps:
1, the network management workstation in configuration information is deposited under the catalogue of file, creates one with the IP address of this BAM and the catalogue of BACKUP TIME name;
2,, revise the above-mentioned relevant parameter in the MML backup command, and carry out the MML backup command according to network management workstation IP address and the backup file deposit position on network management workstation in the configuration information; 3, as if backup failure, then the backup instances with BAM is designated " backup failure ";
4, if back up successfully, then the backup instances to BAM is carried out record in database, comprises the IP address information of the corresponding directory name of record, BACKUP TIME, BAM.
The serial that the present invention goes out to propose realizes the method for many device data backups, order realizes data backup based on MML, backup efficient and fail safe have been improved, and can make backup tasks issue with the storage of Backup Data separately, the separation of duties that helps webmaster work, reasonable distribution network management workstation resource.The layering processing that utilizes monitor task and execute the task and realize the self-timing backup: monitor task is in the upper strata, handles regularly, judges whether to carry out backup operation according to certain criterion; Execute the task and only manage the enforcement of backup operation, function is well defined, the code efficiency height.Serialization of the present invention transmits data in time and expands, and utilizes the prolongation of time, has reduced taking Internet resources.The inventive method has adopted the automatic deletion of Backup Data, has reduced taking disk space.Therefore the advantage of the inventive method is: need import the occasion of data at all, all provide the correct scope of input data, make the user have only the choice, and can not optionally import data, so good reliability.Because data configuration all will influence the operation of equipment or user's online, therefore must carry out strict user rs authentication, and do relevant operation note, so fail safe is good.
Description of drawings
Fig. 1 is a data backup flow chart of the present invention.
Embodiment
The serial that the present invention proposes realizes the method for many device data backups, and its flow process at first reads configuration information as shown in Figure 1 from configuration file, and configuration information can be following content:
The configuration item numbering Implication
1 The poll-interval of supervision poll timer
2 Remanence disk space lower limit, if be lower than this value, the Backup Data before just deleting
3 Once Shan Chu backup number of times for example, is set to 1, and the All Files of parameter is once backed up in deletion when then satisfying the deletion condition
4 The deposit position of backup file on network management workstation
5 The time of the backup operation of setting
6 Deposit the Internet protocol address (InternetProtocol below checks the IP address) of the work station of backup file
7 Carry out the user name of the operation of backup
8 The man-machine interaction verbal order that is used to back up
9 Check the timer time interval of backup instances
From configuration file, read configuration information then; According to the setting of configuration file at interval, from database, obtain the information of the BAM that managed, set up the BAM formation; Take out first BAM that does not back up in the above-mentioned formation, and check whether the disk remaining space of network management workstation is lower than the value of regulation, if, the backup file before then deleting, and create the backup operation task; According to the information of BAM, login this BAM, carry out authentication, do not pass through as if checking, make " backup failure " mark, if checking is passed through,, and carry out backup operation then to execution backup operation task initialization; By checking BAM backup instances timer, find out the next BAM creation task in the described formation, repeat above process, up to all BAM in the formation are disposed.
Above-mentioned BAM information comprises IP address, login username and the password of BAM.
Login authentication can be undertaken by MML.
In said process, can also monitor Status of Backups simultaneously, when its process is initialization, create supervision poll timer; Whether regular check arrives BACKUP TIME; After creating backup tasks, create the backup operation task.
The above-mentioned network management workstation of backup operation process need in configuration information deposited under the catalogue of file, creates one with the IP address of this BAM and the catalogue of BACKUP TIME name; According to network management workstation IP address and the backup file deposit position on network management workstation in the configuration information, revise the above-mentioned relevant parameter in the MML backup command, and carry out the MML backup command; If backup failure, then the backup instances with BAM is designated " backup failure "; If back up successfully, then the backup instances to BAM is carried out record in database, comprises the IP address information of the corresponding directory name of record, BACKUP TIME, BAM.
Too short in order to prevent user configured polling time interval, supervision poll timer will be checked the backup instances sign of each BAM in the formation, if the backup instances of all BAM sign all is " backup finishes ", then create formation again; Otherwise, just do not rebuild formation, and directly start regularly next time.
Supervise the poll timer each blanking time and compare,, then do not do anything if do not arrive BACKUP TIME with the backup operation time (above-mentioned configuration item 5) of setting; If the time arrives, then from database, inquire about the BAM that network management workstation is managed, obtain IP address, login username and the password of BAM; For all BAM set up a formation, backup operation is subsequently carried out according to the order of each BAM in formation; Too short in order to prevent user configured polling time interval, supervision poll timer will be checked the backup instances sign of each BAM in the formation, if the backup instances of all BAM sign all is " backup finishes ", then create formation again; Otherwise, just do not rebuild formation, and directly start regularly next time.
Take out and not carry out first BAM of backup operation in the formation, carry out the MML order of login; If login is unsuccessful, then the backup instances of this BAM of mark is designated failure, so that later retry; If login successfully, then the chkdsk remaining space (with configuration item 2 relatively) and the backup operation number of times of data-base recording, see whether need to delete before the file of backup---can avoid like this causing the unrestricted growth that disk resource is taken because of back-up job; If the backup operation number of times surpasses set point, perhaps the disk remaining space is lower than the setting lower limit, then the file that produces of the backup number of times of the number (configuration item 3) set of deletion and the historical record of revising database; Otherwise, do not delete.
The task of backup operation is carried out in initialization, and carries out backup operation: whether the catalogue (configuration item 4 is set) that the inspection network management workstation is deposited file exists, and if there is no, just sets up this catalogue; Create a catalogue then, and set up catalogue (as backup 0: 0: 0 on the 22nd August in 2002, then catalogue by name 20020822000000) below, realize depositing in a organized way of Backup Data with the time name that is accurate to second with the IP address name of BAM; According to the network management workstation IP address of configuration item 6 and the backup path of configuration item 4, revise MML order (configuration item 8) the network management workstation IP address of Backup Data and the parameter of backup path, and carry out this MML order; The backup instances of revising this BAM is designated " backing up ".
After this order that is finished, check execution result, if success then the backup instances of revising BAM is designated " backup finishes ", and in the historical duplicated record table of database, add a record, write down the IP address information of corresponding directory name backup, BACKUP TIME, BAM, use when being used to delete backup file; Otherwise, revise backup instances and be designated " backup failure ".Subsequently, it is deleted to execute the task, and the recording operation daily record.
In the Timing Processing of supervision poll timer, also comprise and create the timer of checking the BAM backup instances: according to the time interval of setting (configuration item 9 is set), this timer is made regular check in the whether formation all BAM and is all backed up and finish, and taking out not have the BAM of execution to back up; If all BAM have backed up, reexamine whether backup failure is arranged, the taking-up formation is carried out, when the frequency of failure arrives the number of retries of regulation, revise backup instances and be designated " backup finishes " (can make exit condition simple like this, just judge whether the backup instances sign all is " backup finishes "); Finish if all BAM back up, this timer is just deleted self.At this moment, an automated back-up ground cycle has finished.
Supervision poll timer is still turning round again and again, waits for the arrival in next back-up processing cycle.

Claims (8)

1, a kind of serial realizes the method for many device data backups, it is characterized in that this method comprises following each step:
(1) from configuration file, reads configuration information;
(2) at interval, from database, obtain the information of the Back Administration Module managed, set up the BAM formation according to the setting of configuration file;
(3) take out first BAM that does not back up in the above-mentioned formation, and create the backup operation task;
(4) according to the information of above-mentioned BAM, login this BAM, carry out authentication, if checking is not passed through, make " backup failure " mark, change step (6), if checking is passed through, carry out next step;
(5), and carry out backup operation to execution backup operation task initialization;
(6) this task of deletion was found out the next BAM creation task in the described formation after backup finished, and repeating step (3) (4) (5) is up to all BAM in the formation are disposed.
2, the method for claim 1 is characterized in that wherein said BAM information comprises IP address, login username and the password of BAM.
3, method as claimed in claim 2 is characterized in that wherein the login authentication described in (4) step is undertaken by man-machine interaction verbal order MML.
4, the method for claim 1 is characterized in that also comprising a process of monitoring BACKUP TIME, comprises the steps:
(1) during initialization, creates supervision poll timer;
(2) whether regular check arrives BACKUP TIME.
5, method as claimed in claim 4 is characterized in that also comprising the process of checking the BAM backup instances, may further comprise the steps:
When (1) arriving BACKUP TIME, supervision poll timer creation is checked the timer of BAM backup instances;
(2) according to the time interval of setting, this timer is checked the backup instances of BAM in the formation;
(3) after all BAM backups finish in the formation, delete this timer.
6, the method for claim 1 is characterized in that in (4) step, after BAM logins successfully, checked whether the disk remaining space of network management workstation is lower than the value of regulation, if, the backup file before then deleting.
7, the method for claim 1 is characterized in that wherein the backup operation in (5) step comprises the steps:
(1) network management workstation in configuration information is deposited under the catalogue of file, creates one with the IP address of this BAM and the catalogue of BACKUP TIME name;
(2), revise the above-mentioned relevant parameter in the MML backup command, and carry out the MML backup command according to network management workstation IP address and the backup file deposit position on network management workstation in the configuration information;
(3) as if backup failure, then the backup instances with BAM is designated " backup failure ";
(4) if back up successfully, then the backup instances to BAM is carried out record in database, comprises the IP address information of the corresponding directory name of record, BACKUP TIME, BAM.
8, the method for claim 1 is characterized in that wherein the configuration information of configuration file is:
Configuration item is numbered 1 its implication: the poll-interval of supervision poll timer;
Configuration item is numbered 2 its implications: remanence disk space lower limit;
Configuration item is numbered 3 its implications: Shan Chu backup number of times once;
Configuration item is numbered 4 its implications: backup file is deposited the position on network management workstation
Put;
Configuration item is numbered 5 its implications: the time of the backup operation of setting;
Configuration item is numbered 6 its implications: the Internet protocol address of depositing the work station of backup file;
Configuration item is numbered 7 its implications: the user name of carrying out the operation of backup;
Configuration item is numbered 8 its implications: the man-machine interaction verbal order that is used to back up;
Configuration item is numbered 9 its implications: check that the backup instances timer time at interval.
CNB021441146A 2002-09-28 2002-09-28 Method for serially implementing data backup of multiple device Expired - Fee Related CN1307822C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021441146A CN1307822C (en) 2002-09-28 2002-09-28 Method for serially implementing data backup of multiple device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021441146A CN1307822C (en) 2002-09-28 2002-09-28 Method for serially implementing data backup of multiple device

Publications (2)

Publication Number Publication Date
CN1486023A CN1486023A (en) 2004-03-31
CN1307822C true CN1307822C (en) 2007-03-28

Family

ID=34148399

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021441146A Expired - Fee Related CN1307822C (en) 2002-09-28 2002-09-28 Method for serially implementing data backup of multiple device

Country Status (1)

Country Link
CN (1) CN1307822C (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100461167C (en) * 2005-06-06 2009-02-11 华为技术有限公司 Universal database automatic unloading method and system
CN100456295C (en) * 2006-06-20 2009-01-28 华为技术有限公司 Method and device for maintaining data system
CN101136773B (en) * 2007-03-05 2011-12-28 中兴通讯股份有限公司 Backup and recovery method of network element configuring data
CN101119242B (en) * 2007-09-03 2011-03-02 中兴通讯股份有限公司 Communication system cluster method, device and cluster service system applying the same
CN102541945B (en) * 2010-12-31 2014-04-09 联芯科技有限公司 Multi-file copying method for terminal and terminal
CN102148711B (en) * 2011-04-08 2013-12-18 瑞斯康达科技发展股份有限公司 Backup method and system for network device
CN107453920A (en) * 2017-09-01 2017-12-08 上海斐讯数据通信技术有限公司 The method and system of data backup between a kind of router
CN111104255A (en) * 2019-11-29 2020-05-05 浪潮(北京)电子信息产业有限公司 Intelligent timing cloud backup method, device, equipment and storage medium
CN112968970B (en) * 2021-02-26 2023-04-07 杭州迪普信息技术有限公司 Configuration information backup method and device and network equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06268098A (en) * 1993-03-17 1994-09-22 Oki Electric Ind Co Ltd Manufacture of semiconductor integrated circuit device
WO1994022088A1 (en) * 1993-03-16 1994-09-29 Ht Research, Inc. Multiple computer system
US5973722A (en) * 1996-09-16 1999-10-26 Sony Corporation Combined digital audio/video on demand and broadcast distribution system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994022088A1 (en) * 1993-03-16 1994-09-29 Ht Research, Inc. Multiple computer system
JPH06268098A (en) * 1993-03-17 1994-09-22 Oki Electric Ind Co Ltd Manufacture of semiconductor integrated circuit device
US5973722A (en) * 1996-09-16 1999-10-26 Sony Corporation Combined digital audio/video on demand and broadcast distribution system

Also Published As

Publication number Publication date
CN1486023A (en) 2004-03-31

Similar Documents

Publication Publication Date Title
CN106844198B (en) Distributed dispatching automation test platform and method
EP1384349B1 (en) System and method for configuration of network resources
CN110647580A (en) Distributed container cluster mirror image management main node, slave node, system and method
US20160026938A1 (en) System and method of mobile check-in and cloud system thereof
CN101610173B (en) Method and network management server for implementing data collocation on multi-network elements
US20020069367A1 (en) Network operating system data directory
US20100088197A1 (en) Systems and methods for generating remote system inventory capable of differential update reports
EP3480686B1 (en) Data processing method, cluster manager, resource manager and data processing system
EP1950931A1 (en) Devices, system and method for distributing and synchronizing service data
CN1307822C (en) Method for serially implementing data backup of multiple device
CN109062690A (en) A kind of request responding method, server, medium and system
CN106469068A (en) The dispositions method of application program and system
CN111382985A (en) To-do message integrated pushing system and working method
CN111240812A (en) Task execution method and device
CN108804248B (en) Automatic verification method for real-time protection data of volume
CN113778461A (en) Method and system for realizing automatic application deployment
CN106657388A (en) Service activation method, server and industrial computer
CN112351106B (en) Service grid platform containing event grid and communication method thereof
WO2016091141A1 (en) Method and apparatus for information collection
US10674337B2 (en) Method and device for processing operation for device peripheral
CN109194695A (en) Gate verification method, system and computer readable storage medium
CN112134734B (en) Configuration method and device of network equipment
MXPA04008004A (en) Method and apparatus for two-phase commit in data distribution to a web farm.
CN109507922B (en) Port data acquisition method based on intelligent Internet of things
CN112749948A (en) Information processing method and device for project management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070328

Termination date: 20150928

EXPY Termination of patent right or utility model