EP1741258A2 - Method for redundant data management in computer networks - Google Patents

Method for redundant data management in computer networks

Info

Publication number
EP1741258A2
EP1741258A2 EP05716920A EP05716920A EP1741258A2 EP 1741258 A2 EP1741258 A2 EP 1741258A2 EP 05716920 A EP05716920 A EP 05716920A EP 05716920 A EP05716920 A EP 05716920A EP 1741258 A2 EP1741258 A2 EP 1741258A2
Authority
EP
European Patent Office
Prior art keywords
network
application programs
computers
address
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05716920A
Other languages
German (de)
French (fr)
Inventor
Richard Ostrcil
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Solutions and Networks GmbH and Co KG
Original Assignee
Siemens AG
Nokia Siemens Networks GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG, Nokia Siemens Networks GmbH and Co KG filed Critical Siemens AG
Publication of EP1741258A2 publication Critical patent/EP1741258A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/35Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function

Definitions

  • the invention relates to a method for redundant data storage in a computer network, in which data are stored consistently on at least two computers in a network.
  • Computer networks have developed in recent years into an important communication medium through which a multitude of services are offered.
  • the world's best-known computer network is the Internet, as the totality of all interconnected networks that use the Internet Protocol IP as the transport protocol is called.
  • the Internet Protocol IP is responsible for the connectionless transport of data from a sender - possibly over several networks - to the recipient, whereby neither error detection nor error correction takes place.
  • Transport protocols such as the Transmission Control Protocol TCP or User Datagram Protocol UDP are based on the Internet protocol.
  • the Transmission Control Protocol TCP is a connection-oriented transport protocol that enables a logical, secure full-duplex point-to-point connection. It ensures that data packets are error-free and in the desired order underlying network can be transmitted according to the Internet Protocol IP.
  • the User Datagram Protocol UDP enables connectionless point-to-point communication.
  • the individual data packets (datagrams) are independent of each other.
  • the transfer is not secured. This means that data packets can be lost and that the order of reception does not have to match the order of transmission. A possible backup of the
  • UDP is generally used for simple services that expect a simple response (a datagram) to a simple request (a datagram).
  • World Wide Web WWW World Wide Web WWW
  • Audio sequences, still images and films can include ⁇ s using WWW browser, a local front-end software.
  • the World Wide Web is based on the client / server principle, on which all important applications on the Internet, in addition to the WWW, FTP or news are based.
  • applications designed according to the client-server principle use a client program that exchanges data with a specific service computer in the network - the server.
  • the server is usually for the
  • the Internet servers are operated either by commercial or non-commercial organizations, such as universities, which offer various online services, i.e. information services (weather reports, train schedules, news services) and communication services (e-mail, chat, forums), which are implemented using appropriate application programs.
  • information services weather reports, train schedules, news services
  • communication services e.g., chat, forums
  • An essential criterion for the quality of a service offered is the probability with which a potential user can also use the service, the corresponding measure - which results from the downtime during a certain observation period - the so-called availability of this service has a significant influence on the service User satisfaction and thus the success of the respective service.
  • the invention has for its object to provide an improved method for redundant data storage in computer networks. According to the invention, this is done with a method for redundant data storage in computer networks, in which data are stored consistently on at least two computers, the data storage provided
  • Application programs of the at least two computers have a matching address identifier, which these application programs have as part of a virtual subnet of a computer network, and the mutually independent computers have routing functions via which the application programs are accessed.
  • Transport protocols the Transmission Control Protocol TCP or the User Datagram Protocol UDP are used.
  • the addressing in the computer network N shown is carried out according to the Internet Protocol Version 4 by the so-called IP (Internet Protocol) address, which uniquely identifies each network participant on level 3 of the OSI layer model, that is to say on a logical level.
  • IP Internet Protocol
  • the IP address is a 32-bit word which has a first area which is used for addressing the network and a second area by means of which the computer in the network is identified.
  • the size of the two areas is standardized, we differentiate between 5 classes of IP addresses: - Class A networks with 7 bit network addressing and 24 bit for the subscriber address, - Class B networks with 14 bit network addressing and 16 bit subscriber addressing, - Class C networks with 21 bit network addressing and 8 bit subscriber address. - Class D for addressing within the network with 28 bit subscriber addresses and the class E reserved for research purposes
  • the class of the IP address is shown in the leading bits, addresses of class A can be recognized by the fact that the leading bit has the value 0, class B by the value 10 of the two leading bits, class C by 110 of the first three bits, etc ,
  • the routers of a network need the information about the address class in order to filter out the information about the address of the target network from the IP address of a target subscriber using the so-called netmask. While the network addresses are managed globally, the subscriber addresses are managed locally by the respective network operator. The latter also has the option of structuring his network by dividing it into subnets by assigning the subscriber addresses without using additional network numbers. To do this, the subscriber portion of the IP address is divided into a - subnetwork address and the - actual participant address divided.
  • the IP address is then structured in three parts, it includes the network address, the subnet address and the actual subscriber address.
  • a network of address class B is given as a simple example, in which the IP address has the binary number 10 in the leading two bits and a further 14 bits for the address of the network.
  • the subscriber addressing part of 16 bits provided for this network class is in turn divided into an 8 bit part for addressing the subnets SN1, ... SN 25, ..., SN 255 and an 8 bit element for addressing the subscribers TN in the subnets.
  • IP address In the generally used 4 octet notation of the IP addresses, in which the individual bytes (8 bits) are represented by decimal numerical values and separated by dots, a typical IP address looks as follows:
  • the address of the network N itself is 172.16.0.0.
  • the 254 possible nodes TN in the subnet SN 25 with the address 172.16.25.0 then have the following addresses: 172.16.25.1, ..., 172.16.25.254
  • the data to be kept redundant are now stored on two mutually independent computers R1, R2 of the network N. stored consistently, with data matching between the redundant units being ensured using known methods. It is possible that the two computers R1, R2 belong to a network N of an operator or different interconnected networks of different operators.
  • the associated application programs of the two computers are assigned a matching address identifier, which these application programs are part of a virtual one
  • subnet SN 25 of a computer network N such as the number 172.16.25.0.
  • the application program runs on a computer in this subnet SN 25, for example on a computer with the address 172.16.25.1.
  • This virtual subnet SN 25 is logically connected to the overall network via two routers.
  • the two mutually independent computers R1, R2, which, among other things, contain the application programs provided for the redundant and consistent storage of the data, are designed as routers, via which only the application programs - the virtual subnet - are accessed.
  • the other routers of the networks contain in their entirety
  • Routing tables therefore indicate that addresses of type 172.16.25.XXX, which relate to the virtual subnet SN 25, can only be reached via one of the two routers mentioned.
  • the entry in the routing table of the other routers contains the network address 172.16.25.0
  • Network mask 255.255.255.0 the cost of the route to this subnet and the interface through which this network N can be reached.
  • All data packets with these destination addresses therefore get to one of the two routers and are sent from this to the corresponding application program with the associated memory area forwarded.
  • the network N is equipped with a dynamic routing method, when one of the two application programs is occupied, the next request is automatically routed to the cheapest free memory area. If the two routers, via which the virtual subnet SN 25 can be reached, can be reached via equally expensive routes, one router is selected at random and thus a load sharing is carried out.
  • the present exemplary embodiment describes the use of the invention in a computer network N with addressing according to IP protocol version 4, but the invention can also be used advantageously, for example, with IP protocol version 6. Likewise, the application of the invention is possible for all common transport protocols based on IP, such as TCP or UDP.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Multi Processors (AREA)
  • Hardware Redundancy (AREA)

Abstract

The invention relates to a method for redundant data management in computer networks, wherein data is consistently stored in at least two computers (R1, R2). The invention is characterized in that the data management application programs used for the at least two computers have a coinciding address identification, which said application programs have as component of a virtual sub-network (SN 25) of a computer network (N). The computers are independent of one another and have routing functions by means of which the application programs are accessed. This makes it possible to implement redundant data management in a simple manner that is invisible for the user.

Description

Beschreibungdescription
Verfahren zur redundanten Datenhaltung in Computernetzwerken Technisches GebietProcess for redundant data storage in computer networks Technical field
Die Erfindung betrifft ein Verfahren zur redundanten Datenhaltung in einem Computernetzwerk, bei dem Daten auf zumindest zwei Rechnern eines Netzwerkes konsistent gespeichert werden.The invention relates to a method for redundant data storage in a computer network, in which data are stored consistently on at least two computers in a network.
Stand der TechnikState of the art
Computernetzwerke haben sich in den letzten Jahren zu einem bedeutenden Kommunikationsmedium entwickelt, über welches eine Vielzahl von Diensten angeboten wird. Das weltweit bekannteste Computernetzwerk ist das Internet, wie die Gesamtheit aller miteinander verbundenen und das Internet Protokoll IP als Transportprotokoll nutzenden Netze bezeichnet wird.Computer networks have developed in recent years into an important communication medium through which a multitude of services are offered. The world's best-known computer network is the Internet, as the totality of all interconnected networks that use the Internet Protocol IP as the transport protocol is called.
Das Internet Protokoll IP ist auf Ebene 3 des OSI- Schichtenmodells für den verbindungslosen Transport von Daten von einem Sender - gegebenenfalls über mehrere Netze - zum Empfänger zuständig, wobei weder Fehlererkennung noch Fehlerkorrektur erfolgt.At level 3 of the OSI layer model, the Internet Protocol IP is responsible for the connectionless transport of data from a sender - possibly over several networks - to the recipient, whereby neither error detection nor error correction takes place.
Auf dem Internet Protokoll setzen Transport Protokolle wie das Transmission Control Protocol TCP oder User Datagram Protocol UDP auf.Transport protocols such as the Transmission Control Protocol TCP or User Datagram Protocol UDP are based on the Internet protocol.
Das Transmission Control Protocol TCP ist ein verbindungsorientiertes Transportprotokoll, welches eine logische, sichere Vollduplex Punkt-zu-Punkt Verbindung ermöglicht. Es stellt dabei sicher, dass Datenpakete fehlerfrei und in der gewünschten Reihenfolge über ein darunter liegendes Netz nach dem Internet Protokoll IP übertragen werden.The Transmission Control Protocol TCP is a connection-oriented transport protocol that enables a logical, secure full-duplex point-to-point connection. It ensures that data packets are error-free and in the desired order underlying network can be transmitted according to the Internet Protocol IP.
Das User Datagram Protocol UDP ermöglicht eine verbindungslose Punkt-zu-Punkt Kommunikation. Die einzelnen Datenpakete (Datagramme) sind dabei voneinander unabhängig. Die Übertragung ist nicht gesichert. Dies bedeutet, dass Datenpakete verloren gehen können und dass die Empfangsreihenfolge nicht mit der Sendereihenfolge übereinstimmen muss. Eine allfällige Sicherung desThe User Datagram Protocol UDP enables connectionless point-to-point communication. The individual data packets (datagrams) are independent of each other. The transfer is not secured. This means that data packets can be lost and that the order of reception does not have to match the order of transmission. A possible backup of the
Datentransports hat, falls es erforderlich ist, auf der Applikationsebene zu erfolgen. UDP wird im Allgemeinen für einfache Dienste verwendet, bei denen auf eine einfache Anfrage (ein Datagramm) eine einfache Antwort (ein Datagramm) erwartet wird.If necessary, data transport must take place at the application level. UDP is generally used for simple services that expect a simple response (a datagram) to a simple request (a datagram).
Eine der beliebtesten Anwendungen des Internets ist das World Wide Web WWW, das mittels Hyperlinks den einfachen Zugriff auf multimediale Daten entfernter WWW-Server ermöglicht. Betrachtet und dargestellt werden die Daten, die Texte,One of the most popular applications of the Internet is the World Wide Web WWW, which enables easy access to multimedia data from remote WWW servers using hyperlinks. The data, the texts,
Audiosequenzen, Standbilder und Filme umfassen können, ιs mittels WWW-Browser, einer lokalen Frontend Software. Das World Wide Web beruht auf dem Client/Server Prinzip, auf dem alle wichtigen Anwendungen im Internet, neben WWW auch FTP oder News basieren.Audio sequences, still images and films can include ιs using WWW browser, a local front-end software. The World Wide Web is based on the client / server principle, on which all important applications on the Internet, in addition to the WWW, FTP or news are based.
Nach dem Client-Server Prinzip gestaltete Anwendungen verwenden auf der Benutzerseite ein Clientprogramm, das mit einem bestimmten Dienstrechner im Netz - dem Server - Daten austauscht. Der Server ist dabei in der Regel für dieOn the user side, applications designed according to the client-server principle use a client program that exchanges data with a specific service computer in the network - the server. The server is usually for the
Datenhaltung zuständig, während der Client die Präsentation dieser Daten und die Interaktion mit dem Benutzer übernimmt. Dazu bedienen sich Client und Server eines genau definierten Protokolls .Data management, while the client takes over the presentation of this data and the interaction with the user. The client and server use a precisely defined protocol for this.
Betrieben werden die Server des Internets entweder von kommerziellen oder auch nicht kommerziellen Organisationen, wie z.B. Universitäten, die verschiedene Online-Dienste, also Informationsdienste (Wetterbericht, Zugfahrpläne, Nachrichtendienste) und Kommunikationsdienste (E-Mail, Chat, Foren) anbieten, welche mittels entsprechenden Anwendungsprogrammen realisiert werden.The Internet servers are operated either by commercial or non-commercial organizations, such as universities, which offer various online services, i.e. information services (weather reports, train schedules, news services) and communication services (e-mail, chat, forums), which are implemented using appropriate application programs.
Ein wesentliches Kriterium für die Qualität eines angebotenen Dienstes ist die Wahrscheinlichkeit, mit der ein potentieller Benutzer den Dienst auch nutzen kann, die entsprechende Maßzahl - welche sich aus der Störzeit während einer bestimmten Beobachtungsdauer ergibt - die sogenannte Verfügbarkeit dieses Dienstes, hat maßgeblichen Einfluss auf die Zufriedenheit der Benutzer und damit auf den Erfolg des jeweiligen Dienstes.An essential criterion for the quality of a service offered is the probability with which a potential user can also use the service, the corresponding measure - which results from the downtime during a certain observation period - the so-called availability of this service has a significant influence on the service User satisfaction and thus the success of the respective service.
Zur Erhöhung der Verfügbarkeit besteht daher oftmals die Forderung, Dienste bzw. die jeweils zugrundeliegenden Daten gegen Ausfälle der maßgeblichen Hardwarekomponenten des Computernetzes, also der Rechner und der Verbindungen abzusichern. Dies geschieht üblicherweise durch redundante ζiatenhaltung auf mehreren voneinander unabhängigen Rechnern eines Netzwerkes. Dazu ist es beispielsweise aus dem Beitrag „FPGA-based load balancer for Internet Servers, Harik,L., Kayssi, A."; erschienen in Microelectronics, The 14th International Conference on 2002-ICM bekannt, mittels sogenanntem „Load Balancer" eintreffende Nachrichten auf unterschiedliche Server zu verteilen. Der „Load Balancer" bildet dabei einen „Single point of failure", d.h. bei Ausfall des „Load Balancers" selbst ist keiner der nachfolgenden Server erreichbar.To increase availability, there is therefore often the requirement to protect services or the respective underlying data against failures of the relevant hardware components of the computer network, that is to say the computers and the connections. This is usually done by maintaining redundant data on several independent computers in a network. For this purpose, it is known, for example, from the article “FPGA-based load balancer for Internet Servers, Harik, L., Kayssi, A.”; published in Microelectronics, The 14th International Conference on 2002-ICM, by means of so-called “load balancers” to be distributed to different servers. The "load balancer" forms a "single point of failure", i.e. if the "load balancer" itself fails, none of the following servers can be reached.
Darstellung der ErfindungPresentation of the invention
Der Erfindung liegt die Aufgabe zugrunde, ein verbessertes Verfahren zur redundanten Datenhaltung in Computernetzen anzugeben. Erfindungsgemäß geschieht dies mit einem Verfahren zur redundanten Datenhaltung in Computernetzwerken, bei dem Daten auf zumindest zwei Rechnern konsistent gespeichert werden, wobei die für die Datenhaltung vorgesehenenThe invention has for its object to provide an improved method for redundant data storage in computer networks. According to the invention, this is done with a method for redundant data storage in computer networks, in which data are stored consistently on at least two computers, the data storage provided
Anwendungsprogramme der zumindest zwei Rechner eine übereinstimmende Adresskennung aufweisen, welche diese Anwendungsprogramme als Bestandteil eines virtuellen Subnetzes eines Computernetzwerkes aufweist und wobei die voneinander unabhängigen Rechner Routingfunktionen aufweisen, über welche der Zugriff auf die Anwendungsprogramme erfolgt.Application programs of the at least two computers have a matching address identifier, which these application programs have as part of a virtual subnet of a computer network, and the mutually independent computers have routing functions via which the application programs are accessed.
Die Erfindung ist besonders vorteilhaft beiThe invention is particularly advantageous in
Computernetzwerken anwendbar, bei denen die Kommunikation auf dem Internet Protokoll beruht, und bei denen alsComputer networks applicable, in which the communication is based on the Internet protocol, and in which as
Transportprotokolle das Transmission Control Protocol TCP oder das User Datagram Protocol UDP angewendet werden.Transport protocols, the Transmission Control Protocol TCP or the User Datagram Protocol UDP are used.
Günstig ist es weiterhin, wenn durch entsprechende Gestaltung der Routingfunktion eine Zugriffsrangfolge auf die für die Datenhaltung vorgesehenen Anwendungsprogramme festgelegt wird.It is also expedient if, by appropriately designing the routing function, an access ranking to the application programs provided for data storage is specified.
Kurzbeschreibung der ZeichnungBrief description of the drawing
Die Erfindung wird anhand einer Figur näher erläutert, welche in einer schematischen Darstellung die Adressierung in einem beispielhaften Computernetzwerk zeigt.The invention is explained in more detail with reference to a figure, which shows the addressing in an exemplary computer network in a schematic representation.
Ausführung der ErfindungImplementation of the invention
Die Adressierung im dargestellten Computernetzwerk N erfolgt nach dem Internet-Protokoll Version 4 durch die sogenannte IP (Internet-Protokoll) -Adresse, die jeden Netzteilnehmer auf Ebene 3 des OSI-Schichtenmodelles, also auf einer logischen Ebene eindeutig kennzeichnet. Die IP-Adresse ist nach dem Internet-Protokoll Version 4 ein 32-Bit-Wort, welches einen ersten Bereich aufweist, der zur Adressierung des Netzes herangezogen wird, und einen zweiten Bereich, mittels dem der Rechner im Netz identifiziert wird.The addressing in the computer network N shown is carried out according to the Internet Protocol Version 4 by the so-called IP (Internet Protocol) address, which uniquely identifies each network participant on level 3 of the OSI layer model, that is to say on a logical level. According to the Internet Protocol Version 4, the IP address is a 32-bit word which has a first area which is used for addressing the network and a second area by means of which the computer in the network is identified.
Die Größe der beiden Bereiche ist normiert, wir unterscheiden 5 Klassen von IP-Adressen: - Klasse A Netze mit 7 bit Netzadressierung und 24 bit für die Teilnehmeradresse, - Klasse B Netze mit 14 bit Netzadressierung und 16 bit Teilnehmeradressierung, - Klasse C Netze mit 21 bit Netzadressierung und 8 bit Teilnehmeradresse . - Klasse D für die Adressierung innerhalb des Netzes mit 28 bit Teilnehmeradressen und der für Forschungszwecke reservierten - Klasse EThe size of the two areas is standardized, we differentiate between 5 classes of IP addresses: - Class A networks with 7 bit network addressing and 24 bit for the subscriber address, - Class B networks with 14 bit network addressing and 16 bit subscriber addressing, - Class C networks with 21 bit network addressing and 8 bit subscriber address. - Class D for addressing within the network with 28 bit subscriber addresses and the class E reserved for research purposes
Die Klasse der IP-Adresse ist in den führenden bits dargestellt, Adressen der Klasse A sind dadurch erkenntlich, dass das führende bit den Wert 0 aufweist, Klasse B durch den Wert 10 der beiden führenden bits, Klasse C durch 110 der drei ersten bits usw.The class of the IP address is shown in the leading bits, addresses of class A can be recognized by the fact that the leading bit has the value 0, class B by the value 10 of the two leading bits, class C by 110 of the first three bits, etc ,
Die Information über die Adressklasse benötigen die Router eines Netzwerkes um mit Hilfe der sogenannten Netzmaske aus der IP-Adresse eines Zielteilnehmers die Information über die Adresse des Zielnetzes herauszufiltern. Während die Netzadressen global verwaltet werden, erfolgt die Verwaltung der Teilnehmeradressen lokal durch den jeweiligen Netzbetreiber. Dieser hat dabei auch die Möglichkeit, durch entsprechende Vergabe der Teilnehmeradressen sein Netz durch Unterteilung in Subnetze zu strukturieren, ohne zusätzliche Netznummern zu verwenden. Dazu wird der Teilnehmeranteil der IP-Adresse in eine - Subnetzwerkadresse und die - eigentliche Teilnehmeradresse unterteilt.The routers of a network need the information about the address class in order to filter out the information about the address of the target network from the IP address of a target subscriber using the so-called netmask. While the network addresses are managed globally, the subscriber addresses are managed locally by the respective network operator. The latter also has the option of structuring his network by dividing it into subnets by assigning the subscriber addresses without using additional network numbers. To do this, the subscriber portion of the IP address is divided into a - subnetwork address and the - actual participant address divided.
Die IP-Adresse ist dann dreiteilig aufgebaut, sie umfasst die Netzwerkadresse, die Subnetzadresse und die eigentliche Teilnehmeradresse.The IP address is then structured in three parts, it includes the network address, the subnet address and the actual subscriber address.
Als einfaches Beispiel sei ein Netz der Adressklasse B angegeben, bei dem die IP-Adresse die Binärzahl 10 in den führenden beiden bits und weitere 14 bits für die Adresse des Netzes aufweist. Der bei dieser Netzwerkklasse vorgesehene Teilnehmeradressierungsteil von 16 bit wird wiederum unterteilt in einen 8 bit Teil zur Adressierung der Subnetze SN1, ...SN 25, ..., SN 255 und in ein 8 bit Element zur Adressierung der Teilnehmer TN in den Subnetzen. Damit können maximal 254 Subnetze mit jeweils 254 Teilnehmern adressiert werden .A network of address class B is given as a simple example, in which the IP address has the binary number 10 in the leading two bits and a further 14 bits for the address of the network. The subscriber addressing part of 16 bits provided for this network class is in turn divided into an 8 bit part for addressing the subnets SN1, ... SN 25, ..., SN 255 and an 8 bit element for addressing the subscribers TN in the subnets. A maximum of 254 subnets with 254 participants each can be addressed.
In der allgemein üblichen 4 Oktett-Schreibweise der IP- Adressen, bei der die einzelnen Bytes (8 bit) durch dezimal numerische Werte dargestellt und durch Punkte getrennt werden, sieht eine typische IP-Adresse wie folgt aus:In the generally used 4 octet notation of the IP addresses, in which the individual bytes (8 bits) are represented by decimal numerical values and separated by dots, a typical IP address looks as follows:
172.16.115.54172.16.115.54
Die Adresse des Netzes N selbst beträgt dabei 172.16.0.0.The address of the network N itself is 172.16.0.0.
Diese umfasst bis zu 254 Subnetze SN1, ...SN 25, ..., SN 255 mit den AdressenThis includes up to 254 subnets SN1, ... SN 25, ..., SN 255 with the addresses
172.16.1.0, ...,172.16.254.0.172.16.1.0, ..., 172.16.254.0.
Die 254 möglichen Teilnehmer TN in dem Subnetz SN 25 mit der Adresse 172.16.25.0 weisen dann folgende Adressen auf: 172.16.25.1 ,...,172.16.25.254The 254 possible nodes TN in the subnet SN 25 with the address 172.16.25.0 then have the following addresses: 172.16.25.1, ..., 172.16.25.254
Erfindungsgemäß werden nun auf zwei voneinander unabhängigen Rechnern Rl, R2 des Netzes N die redundant zu haltenden Daten konsistent gespeichert, wobei der Datenabgleich zwischen den redundanten Einheiten mit bekannten Verfahren sichergestellt wird. Dabei ist es möglich, dass die beiden Rechner Rl, R2 einem Netz N eines Betreibers oder aber verschiedenen miteinander verbundenen Netzen unterschiedlicher Betreiber angehören.According to the invention, the data to be kept redundant are now stored on two mutually independent computers R1, R2 of the network N. stored consistently, with data matching between the redundant units being ensured using known methods. It is possible that the two computers R1, R2 belong to a network N of an operator or different interconnected networks of different operators.
Den zugehörigen Anwendungsprogrammen der zwei Rechner wird eine übereinstimmende Adresskennung zugeordnet, welche diese Anwendungsprogramme als Bestandteil eines virtuellenThe associated application programs of the two computers are assigned a matching address identifier, which these application programs are part of a virtual one
Subnetzes SN 25 eines Computernetzwerkes N ausweist, wie beispielsweise die Nummer 172.16.25.0. Das Anwendungsprogramm läuft aus Sicht des Benutzers auf einem Rechner in diesem Subnetz SN 25, zum Beispiel auf einem Rechner mit der Adresse 172.16.25.1.Identifies subnet SN 25 of a computer network N, such as the number 172.16.25.0. From the user's point of view, the application program runs on a computer in this subnet SN 25, for example on a computer with the address 172.16.25.1.
Dieses virtuelle Subnetz SN 25 ist über zwei Router logisch mit dem Gesamtnetz verbunden. Dazu sind die beiden voneinander unabhängigen Rechner Rl, R2, welche unter anderem die für die redundante und konsistente Speicherung der Daten vorgesehenen Anwendungsprogramme enthalten , als Router ausgestaltet, über welche ausschließlich der Zugriff auf die Anwendungsprogramme - das virtuelle Subnetz - erfolgt.This virtual subnet SN 25 is logically connected to the overall network via two routers. For this purpose, the two mutually independent computers R1, R2, which, among other things, contain the application programs provided for the redundant and consistent storage of the data, are designed as routers, via which only the application programs - the virtual subnet - are accessed.
Die übrigen Router der Netzwerke enthalten in ihrenThe other routers of the networks contain in their
Routingtabellen daher einen Hinweis, dass Adressen des Typs 172.16.25.XXX, die ja das virtuelle Subnetz SN 25 betreffen, nur über einen der beiden genannten Router erreichbar sind. Der Eintrag in der Routingtabelle der übrigen Router enthält in diesem Beispiel die Netzwerkadresse 172.16.25.0, dieRouting tables therefore indicate that addresses of type 172.16.25.XXX, which relate to the virtual subnet SN 25, can only be reached via one of the two routers mentioned. In this example, the entry in the routing table of the other routers contains the network address 172.16.25.0
Netzwerkmaske 255.255.255.0, die Kosten für den Weg zu diesem Subnetz und das Interface, über das dieses Netz N erreichbar ist.Network mask 255.255.255.0, the cost of the route to this subnet and the interface through which this network N can be reached.
Alle Datenpakete mit diesen Zieladressen gelangen daher an einen der beiden Router und werden von diesem an das entsprechende Anwendungsprogramm mit dem jeweils zugehörigen Speicherbereich weitergeleitet.All data packets with these destination addresses therefore get to one of the two routers and are sent from this to the corresponding application program with the associated memory area forwarded.
Wenn das Netz N, wie allgemein üblich mit einem dynamischen Routingverfahren ausgestattet ist, wird bei Belegung eines der beiden Anwendungsprogramme automatisch die nächste Anfrage zu dem jeweils günstigsten freien Speicherbereich geroutet. Sind die beiden Router, über die das virtuelle Subnetz SN 25 erreicht werden kann, über gleich teure Wege erreichbar, so wird ein Router zufällig ausgewählt und damit eine Lastaufteilung vorgenommen.If the network N, as is generally the case, is equipped with a dynamic routing method, when one of the two application programs is occupied, the next request is automatically routed to the cheapest free memory area. If the two routers, via which the virtual subnet SN 25 can be reached, can be reached via equally expensive routes, one router is selected at random and thus a load sharing is carried out.
Bei einem Netz mit einem statischen Routingverfahren muß eine entsprechende Lastaufteilung bei der Festlegung der Routingtabellen erfolgen.In the case of a network with a static routing method, a corresponding load distribution must take place when defining the routing tables.
Das gegenständliche Ausführungsbeispiel beschreibt den Einsatz der Erfindung bei einem Computernetzwerk N mit einer Adressierung nach IP-Protokoll Version 4, die Erfindung ist aber beispielsweise auch bei IP -Protokoll Version 6 vorteilhaft einsetzbar. Ebenso ist die Anwendung der Erfindung für alle gebräuchlichen auf IP aufsetzenden Transportprotokolle wie TCP oder UDP möglich.The present exemplary embodiment describes the use of the invention in a computer network N with addressing according to IP protocol version 4, but the invention can also be used advantageously, for example, with IP protocol version 6. Likewise, the application of the invention is possible for all common transport protocols based on IP, such as TCP or UDP.
Bei Anwendung des TCP-Protokolles muss allerdings sichergestellt werden, dass der Zugriff jeweils über einen bestimmten Router erfolgt. Dies kann beispielsweise über die Kostenfunktionalität dynamischer Routingfunktionen erfolgen. When using the TCP protocol, however, it must be ensured that the access takes place via a specific router. This can be done, for example, using the cost functionality of dynamic routing functions.

Claims

Patentansprüche claims
1. Verfahren zur redundanten Datenhaltung in Computernetzwerken, bei dem Daten auf zumindest zwei Rechnern konsistent gespeichert werden, dadurch gekennzeichnet, dass die für die Datenhaltung vorgesehenen Anwendungsprogramme der zumindest zwei Rechner (Rl, R2)eine übereinstimmende Adresskennung aufweisen, welche diese Anwendungsprogramme als Bestandteil eines virtuellen Subnetzes (SN 25) eines Computernetzwerkes (N) aufweist und dass die voneinander unabhängigen Rechner Routingfunktionen aufweisen über welche der Zugriff auf die Anwendungsprogramme erfolgt .1. A method for redundant data storage in computer networks, in which data is consistently stored on at least two computers, characterized in that the application programs provided for the data storage of the at least two computers (Rl, R2) have a matching address identifier, which these application programs are part of has virtual subnet (SN 25) of a computer network (N) and that the mutually independent computers have routing functions via which the application programs are accessed.
2. Verfahren nach Anspruch 1 dadurch gekennzeichnet, dass die Kommunikation in den Computernetzwerken (N) auf dem Internet Protokoll beruht. 2. The method according to claim 1, characterized in that the communication in the computer networks (N) is based on the Internet protocol.
3. Verfahren nach Anspruch 2 dadurch gekennzeichnet, dass für die Kommunikation im Computernetzwerk überdies das Transmission Control Protocol genutzt wird.3. The method according to claim 2, characterized in that the transmission control protocol is also used for communication in the computer network.
4. Verfahren nach Anspruch 2 dadurch gekennzeichnet, dass für die Kommunikation im Computernetzwerk überdies das User Datagram Protocol genutzt wird.4. The method according to claim 2, characterized in that the user datagram protocol is also used for communication in the computer network.
5. Verfahren nach einem der Ansprüche 1 bis 4, dadurch gekennzeichnet, dass durch entsprechende Gestaltung der Routingfunktion eine Zugriffsrangfolge auf die für die Datenhaltung vorgesehenen Anwendungsprogramme festgelegt wird. 5. The method according to any one of claims 1 to 4, characterized in that an access ranking to the application programs provided for data storage is determined by appropriate design of the routing function.
EP05716920A 2004-03-23 2005-03-04 Method for redundant data management in computer networks Withdrawn EP1741258A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102004014195A DE102004014195B3 (en) 2004-03-23 2004-03-23 Redundant data storage method for use in a computer network, whereby independent computers for information storage are contained in a virtual sub-network and connected to a controlling application via their own routing function
PCT/EP2005/050980 WO2005093573A2 (en) 2004-03-23 2005-03-04 Method for redundant data management in computer networks

Publications (1)

Publication Number Publication Date
EP1741258A2 true EP1741258A2 (en) 2007-01-10

Family

ID=34745453

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05716920A Withdrawn EP1741258A2 (en) 2004-03-23 2005-03-04 Method for redundant data management in computer networks

Country Status (4)

Country Link
US (1) US20070136468A1 (en)
EP (1) EP1741258A2 (en)
DE (1) DE102004014195B3 (en)
WO (1) WO2005093573A2 (en)

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6470389B1 (en) * 1997-03-14 2002-10-22 Lucent Technologies Inc. Hosting a network service on a cluster of servers using a single-address image
WO2000052906A1 (en) * 1999-03-05 2000-09-08 At & T Corporation System, method and apparatus for network service load and reliability management
JP4189076B2 (en) * 1999-03-26 2008-12-03 株式会社東芝 Fault tolerant computer system
US6618377B1 (en) * 1999-03-30 2003-09-09 Cisco Technology, Inc. Flexible scheduling of network devices within redundant aggregate configurations
WO2001035601A1 (en) * 1999-11-10 2001-05-17 Rainfinity, Inc. Distributed traffic controlling system and method for network data
JP2001211190A (en) * 2000-01-25 2001-08-03 Hitachi Ltd Device and method for managing communication
US6944662B2 (en) * 2000-08-04 2005-09-13 Vinestone Corporation System and methods providing automatic distributed data retrieval, analysis and reporting services
US20030154236A1 (en) * 2002-01-22 2003-08-14 Shaul Dar Database Switch enabling a database area network
US7062517B2 (en) * 2002-08-14 2006-06-13 Hitachi, Ltd. Method and apparatus for centralized computer management
US7334218B2 (en) * 2002-09-02 2008-02-19 International Business Machines Corporation Method for adaptively assigning of data management applications to data objects
JP2004173136A (en) * 2002-11-22 2004-06-17 Fujitsu Ltd Network management device
US7779368B2 (en) * 2004-10-30 2010-08-17 Hewlett-Packard Development Company, L.P. Systems and methods for presenting managed data
US20060095705A1 (en) * 2004-10-30 2006-05-04 James Wichelman Systems and methods for data storage management
US8886778B2 (en) * 2005-04-29 2014-11-11 Netapp, Inc. System and method for proxying network management protocol commands to enable cluster wide management of data backups

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2005093573A2 *

Also Published As

Publication number Publication date
WO2005093573A3 (en) 2006-04-27
DE102004014195B3 (en) 2005-08-11
WO2005093573A2 (en) 2005-10-06
US20070136468A1 (en) 2007-06-14

Similar Documents

Publication Publication Date Title
DE69935138T2 (en) System and method for optimizing the performance and availability of a DHCP service
DE60225192T2 (en) DYNAMIC PORT CONFIGURATION OF A NETWORK DEVICE
DE60311297T2 (en) COMMON PORT ADDRESSING IN A ROUTER THAT AGAINST NAT & NAT-PT GATEWAY
DE69827201T2 (en) Method and system for server-network switch-multiple connection
DE60029430T2 (en) MULTI-SENDABLE ADDRESS RESOLUTION LOG
DE69726701T2 (en) Method for transferring connection management information in World Wide Web requests and responses
DE69838269T2 (en) Method and device for detecting, correcting and rejecting corrupted data packets in a data transmission cable system
DE69924478T2 (en) APPARATUS AND METHOD FOR NETWORK TRANSLATION AS AN EXTERNAL SERVICE IN THE ACCESS SERVER OF A SERVICE PROVIDER
DE69836673T2 (en) Method and apparatus for configuring a network node to be itself gateway
DE102005035201B4 (en) Network node unit and method for forwarding data packets
DE10022431A1 (en) Integrated IP network allows simultaneous access to the same cabling and hardware for telephone, video, television, data etc. IP networks providing considerable hardware savings
EP0998100B1 (en) Method to configure an internet protocol network
DE60208990T2 (en) Method for distinguishing participants of a communication system, communication system and communication device
DE60304704T2 (en) Network system, routers and network setup procedures
DE602004006786T2 (en) Sort addresses in a domain name server
WO2007147424A1 (en) Device and method for address mapping
EP1421766A1 (en) Pre- processing of nat addresses
WO2005093573A2 (en) Method for redundant data management in computer networks
EP2171943B1 (en) Method for routing service messages
EP1081921B1 (en) Method for allocating IP-addresses in communication networks
EP1623559B1 (en) Method for data exchange between network elements in networks with differing address ranges
WO2012130263A1 (en) Method for addressing messages in a computer network
DE102005039343B4 (en) Method for transmitting data packets and data processing unit
EP3515034A1 (en) Method, devices, computer-readable media and systems for establishing certified connections with end devices in a local area network
DE10251906B4 (en) Method and arrangement for the inventory of network components connected to a network

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060822

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): DE FR GB

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS S.P.A.

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20091001