EP1741258A2 - Method for redundant data management in computer networks - Google Patents
Method for redundant data management in computer networksInfo
- Publication number
- EP1741258A2 EP1741258A2 EP05716920A EP05716920A EP1741258A2 EP 1741258 A2 EP1741258 A2 EP 1741258A2 EP 05716920 A EP05716920 A EP 05716920A EP 05716920 A EP05716920 A EP 05716920A EP 1741258 A2 EP1741258 A2 EP 1741258A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- application programs
- computers
- address
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000013523 data management Methods 0.000 title abstract description 5
- 230000006870 function Effects 0.000 claims abstract description 6
- 238000013500 data storage Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012937 correction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
Definitions
- the invention relates to a method for redundant data storage in a computer network, in which data are stored consistently on at least two computers in a network.
- Computer networks have developed in recent years into an important communication medium through which a multitude of services are offered.
- the world's best-known computer network is the Internet, as the totality of all interconnected networks that use the Internet Protocol IP as the transport protocol is called.
- the Internet Protocol IP is responsible for the connectionless transport of data from a sender - possibly over several networks - to the recipient, whereby neither error detection nor error correction takes place.
- Transport protocols such as the Transmission Control Protocol TCP or User Datagram Protocol UDP are based on the Internet protocol.
- the Transmission Control Protocol TCP is a connection-oriented transport protocol that enables a logical, secure full-duplex point-to-point connection. It ensures that data packets are error-free and in the desired order underlying network can be transmitted according to the Internet Protocol IP.
- the User Datagram Protocol UDP enables connectionless point-to-point communication.
- the individual data packets (datagrams) are independent of each other.
- the transfer is not secured. This means that data packets can be lost and that the order of reception does not have to match the order of transmission. A possible backup of the
- UDP is generally used for simple services that expect a simple response (a datagram) to a simple request (a datagram).
- World Wide Web WWW World Wide Web WWW
- Audio sequences, still images and films can include ⁇ s using WWW browser, a local front-end software.
- the World Wide Web is based on the client / server principle, on which all important applications on the Internet, in addition to the WWW, FTP or news are based.
- applications designed according to the client-server principle use a client program that exchanges data with a specific service computer in the network - the server.
- the server is usually for the
- the Internet servers are operated either by commercial or non-commercial organizations, such as universities, which offer various online services, i.e. information services (weather reports, train schedules, news services) and communication services (e-mail, chat, forums), which are implemented using appropriate application programs.
- information services weather reports, train schedules, news services
- communication services e.g., chat, forums
- An essential criterion for the quality of a service offered is the probability with which a potential user can also use the service, the corresponding measure - which results from the downtime during a certain observation period - the so-called availability of this service has a significant influence on the service User satisfaction and thus the success of the respective service.
- the invention has for its object to provide an improved method for redundant data storage in computer networks. According to the invention, this is done with a method for redundant data storage in computer networks, in which data are stored consistently on at least two computers, the data storage provided
- Application programs of the at least two computers have a matching address identifier, which these application programs have as part of a virtual subnet of a computer network, and the mutually independent computers have routing functions via which the application programs are accessed.
- Transport protocols the Transmission Control Protocol TCP or the User Datagram Protocol UDP are used.
- the addressing in the computer network N shown is carried out according to the Internet Protocol Version 4 by the so-called IP (Internet Protocol) address, which uniquely identifies each network participant on level 3 of the OSI layer model, that is to say on a logical level.
- IP Internet Protocol
- the IP address is a 32-bit word which has a first area which is used for addressing the network and a second area by means of which the computer in the network is identified.
- the size of the two areas is standardized, we differentiate between 5 classes of IP addresses: - Class A networks with 7 bit network addressing and 24 bit for the subscriber address, - Class B networks with 14 bit network addressing and 16 bit subscriber addressing, - Class C networks with 21 bit network addressing and 8 bit subscriber address. - Class D for addressing within the network with 28 bit subscriber addresses and the class E reserved for research purposes
- the class of the IP address is shown in the leading bits, addresses of class A can be recognized by the fact that the leading bit has the value 0, class B by the value 10 of the two leading bits, class C by 110 of the first three bits, etc ,
- the routers of a network need the information about the address class in order to filter out the information about the address of the target network from the IP address of a target subscriber using the so-called netmask. While the network addresses are managed globally, the subscriber addresses are managed locally by the respective network operator. The latter also has the option of structuring his network by dividing it into subnets by assigning the subscriber addresses without using additional network numbers. To do this, the subscriber portion of the IP address is divided into a - subnetwork address and the - actual participant address divided.
- the IP address is then structured in three parts, it includes the network address, the subnet address and the actual subscriber address.
- a network of address class B is given as a simple example, in which the IP address has the binary number 10 in the leading two bits and a further 14 bits for the address of the network.
- the subscriber addressing part of 16 bits provided for this network class is in turn divided into an 8 bit part for addressing the subnets SN1, ... SN 25, ..., SN 255 and an 8 bit element for addressing the subscribers TN in the subnets.
- IP address In the generally used 4 octet notation of the IP addresses, in which the individual bytes (8 bits) are represented by decimal numerical values and separated by dots, a typical IP address looks as follows:
- the address of the network N itself is 172.16.0.0.
- the 254 possible nodes TN in the subnet SN 25 with the address 172.16.25.0 then have the following addresses: 172.16.25.1, ..., 172.16.25.254
- the data to be kept redundant are now stored on two mutually independent computers R1, R2 of the network N. stored consistently, with data matching between the redundant units being ensured using known methods. It is possible that the two computers R1, R2 belong to a network N of an operator or different interconnected networks of different operators.
- the associated application programs of the two computers are assigned a matching address identifier, which these application programs are part of a virtual one
- subnet SN 25 of a computer network N such as the number 172.16.25.0.
- the application program runs on a computer in this subnet SN 25, for example on a computer with the address 172.16.25.1.
- This virtual subnet SN 25 is logically connected to the overall network via two routers.
- the two mutually independent computers R1, R2, which, among other things, contain the application programs provided for the redundant and consistent storage of the data, are designed as routers, via which only the application programs - the virtual subnet - are accessed.
- the other routers of the networks contain in their entirety
- Routing tables therefore indicate that addresses of type 172.16.25.XXX, which relate to the virtual subnet SN 25, can only be reached via one of the two routers mentioned.
- the entry in the routing table of the other routers contains the network address 172.16.25.0
- Network mask 255.255.255.0 the cost of the route to this subnet and the interface through which this network N can be reached.
- All data packets with these destination addresses therefore get to one of the two routers and are sent from this to the corresponding application program with the associated memory area forwarded.
- the network N is equipped with a dynamic routing method, when one of the two application programs is occupied, the next request is automatically routed to the cheapest free memory area. If the two routers, via which the virtual subnet SN 25 can be reached, can be reached via equally expensive routes, one router is selected at random and thus a load sharing is carried out.
- the present exemplary embodiment describes the use of the invention in a computer network N with addressing according to IP protocol version 4, but the invention can also be used advantageously, for example, with IP protocol version 6. Likewise, the application of the invention is possible for all common transport protocols based on IP, such as TCP or UDP.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Hardware Redundancy (AREA)
- Multi Processors (AREA)
Abstract
Description
Beschreibungdescription
Verfahren zur redundanten Datenhaltung in Computernetzwerken Technisches GebietProcess for redundant data storage in computer networks Technical field
Die Erfindung betrifft ein Verfahren zur redundanten Datenhaltung in einem Computernetzwerk, bei dem Daten auf zumindest zwei Rechnern eines Netzwerkes konsistent gespeichert werden.The invention relates to a method for redundant data storage in a computer network, in which data are stored consistently on at least two computers in a network.
Stand der TechnikState of the art
Computernetzwerke haben sich in den letzten Jahren zu einem bedeutenden Kommunikationsmedium entwickelt, über welches eine Vielzahl von Diensten angeboten wird. Das weltweit bekannteste Computernetzwerk ist das Internet, wie die Gesamtheit aller miteinander verbundenen und das Internet Protokoll IP als Transportprotokoll nutzenden Netze bezeichnet wird.Computer networks have developed in recent years into an important communication medium through which a multitude of services are offered. The world's best-known computer network is the Internet, as the totality of all interconnected networks that use the Internet Protocol IP as the transport protocol is called.
Das Internet Protokoll IP ist auf Ebene 3 des OSI- Schichtenmodells für den verbindungslosen Transport von Daten von einem Sender - gegebenenfalls über mehrere Netze - zum Empfänger zuständig, wobei weder Fehlererkennung noch Fehlerkorrektur erfolgt.At level 3 of the OSI layer model, the Internet Protocol IP is responsible for the connectionless transport of data from a sender - possibly over several networks - to the recipient, whereby neither error detection nor error correction takes place.
Auf dem Internet Protokoll setzen Transport Protokolle wie das Transmission Control Protocol TCP oder User Datagram Protocol UDP auf.Transport protocols such as the Transmission Control Protocol TCP or User Datagram Protocol UDP are based on the Internet protocol.
Das Transmission Control Protocol TCP ist ein verbindungsorientiertes Transportprotokoll, welches eine logische, sichere Vollduplex Punkt-zu-Punkt Verbindung ermöglicht. Es stellt dabei sicher, dass Datenpakete fehlerfrei und in der gewünschten Reihenfolge über ein darunter liegendes Netz nach dem Internet Protokoll IP übertragen werden.The Transmission Control Protocol TCP is a connection-oriented transport protocol that enables a logical, secure full-duplex point-to-point connection. It ensures that data packets are error-free and in the desired order underlying network can be transmitted according to the Internet Protocol IP.
Das User Datagram Protocol UDP ermöglicht eine verbindungslose Punkt-zu-Punkt Kommunikation. Die einzelnen Datenpakete (Datagramme) sind dabei voneinander unabhängig. Die Übertragung ist nicht gesichert. Dies bedeutet, dass Datenpakete verloren gehen können und dass die Empfangsreihenfolge nicht mit der Sendereihenfolge übereinstimmen muss. Eine allfällige Sicherung desThe User Datagram Protocol UDP enables connectionless point-to-point communication. The individual data packets (datagrams) are independent of each other. The transfer is not secured. This means that data packets can be lost and that the order of reception does not have to match the order of transmission. A possible backup of the
Datentransports hat, falls es erforderlich ist, auf der Applikationsebene zu erfolgen. UDP wird im Allgemeinen für einfache Dienste verwendet, bei denen auf eine einfache Anfrage (ein Datagramm) eine einfache Antwort (ein Datagramm) erwartet wird.If necessary, data transport must take place at the application level. UDP is generally used for simple services that expect a simple response (a datagram) to a simple request (a datagram).
Eine der beliebtesten Anwendungen des Internets ist das World Wide Web WWW, das mittels Hyperlinks den einfachen Zugriff auf multimediale Daten entfernter WWW-Server ermöglicht. Betrachtet und dargestellt werden die Daten, die Texte,One of the most popular applications of the Internet is the World Wide Web WWW, which enables easy access to multimedia data from remote WWW servers using hyperlinks. The data, the texts,
Audiosequenzen, Standbilder und Filme umfassen können, ιs mittels WWW-Browser, einer lokalen Frontend Software. Das World Wide Web beruht auf dem Client/Server Prinzip, auf dem alle wichtigen Anwendungen im Internet, neben WWW auch FTP oder News basieren.Audio sequences, still images and films can include ιs using WWW browser, a local front-end software. The World Wide Web is based on the client / server principle, on which all important applications on the Internet, in addition to the WWW, FTP or news are based.
Nach dem Client-Server Prinzip gestaltete Anwendungen verwenden auf der Benutzerseite ein Clientprogramm, das mit einem bestimmten Dienstrechner im Netz - dem Server - Daten austauscht. Der Server ist dabei in der Regel für dieOn the user side, applications designed according to the client-server principle use a client program that exchanges data with a specific service computer in the network - the server. The server is usually for the
Datenhaltung zuständig, während der Client die Präsentation dieser Daten und die Interaktion mit dem Benutzer übernimmt. Dazu bedienen sich Client und Server eines genau definierten Protokolls .Data management, while the client takes over the presentation of this data and the interaction with the user. The client and server use a precisely defined protocol for this.
Betrieben werden die Server des Internets entweder von kommerziellen oder auch nicht kommerziellen Organisationen, wie z.B. Universitäten, die verschiedene Online-Dienste, also Informationsdienste (Wetterbericht, Zugfahrpläne, Nachrichtendienste) und Kommunikationsdienste (E-Mail, Chat, Foren) anbieten, welche mittels entsprechenden Anwendungsprogrammen realisiert werden.The Internet servers are operated either by commercial or non-commercial organizations, such as universities, which offer various online services, i.e. information services (weather reports, train schedules, news services) and communication services (e-mail, chat, forums), which are implemented using appropriate application programs.
Ein wesentliches Kriterium für die Qualität eines angebotenen Dienstes ist die Wahrscheinlichkeit, mit der ein potentieller Benutzer den Dienst auch nutzen kann, die entsprechende Maßzahl - welche sich aus der Störzeit während einer bestimmten Beobachtungsdauer ergibt - die sogenannte Verfügbarkeit dieses Dienstes, hat maßgeblichen Einfluss auf die Zufriedenheit der Benutzer und damit auf den Erfolg des jeweiligen Dienstes.An essential criterion for the quality of a service offered is the probability with which a potential user can also use the service, the corresponding measure - which results from the downtime during a certain observation period - the so-called availability of this service has a significant influence on the service User satisfaction and thus the success of the respective service.
Zur Erhöhung der Verfügbarkeit besteht daher oftmals die Forderung, Dienste bzw. die jeweils zugrundeliegenden Daten gegen Ausfälle der maßgeblichen Hardwarekomponenten des Computernetzes, also der Rechner und der Verbindungen abzusichern. Dies geschieht üblicherweise durch redundante ζiatenhaltung auf mehreren voneinander unabhängigen Rechnern eines Netzwerkes. Dazu ist es beispielsweise aus dem Beitrag „FPGA-based load balancer for Internet Servers, Harik,L., Kayssi, A."; erschienen in Microelectronics, The 14th International Conference on 2002-ICM bekannt, mittels sogenanntem „Load Balancer" eintreffende Nachrichten auf unterschiedliche Server zu verteilen. Der „Load Balancer" bildet dabei einen „Single point of failure", d.h. bei Ausfall des „Load Balancers" selbst ist keiner der nachfolgenden Server erreichbar.To increase availability, there is therefore often the requirement to protect services or the respective underlying data against failures of the relevant hardware components of the computer network, that is to say the computers and the connections. This is usually done by maintaining redundant data on several independent computers in a network. For this purpose, it is known, for example, from the article “FPGA-based load balancer for Internet Servers, Harik, L., Kayssi, A.”; published in Microelectronics, The 14th International Conference on 2002-ICM, by means of so-called “load balancers” to be distributed to different servers. The "load balancer" forms a "single point of failure", i.e. if the "load balancer" itself fails, none of the following servers can be reached.
Darstellung der ErfindungPresentation of the invention
Der Erfindung liegt die Aufgabe zugrunde, ein verbessertes Verfahren zur redundanten Datenhaltung in Computernetzen anzugeben. Erfindungsgemäß geschieht dies mit einem Verfahren zur redundanten Datenhaltung in Computernetzwerken, bei dem Daten auf zumindest zwei Rechnern konsistent gespeichert werden, wobei die für die Datenhaltung vorgesehenenThe invention has for its object to provide an improved method for redundant data storage in computer networks. According to the invention, this is done with a method for redundant data storage in computer networks, in which data are stored consistently on at least two computers, the data storage provided
Anwendungsprogramme der zumindest zwei Rechner eine übereinstimmende Adresskennung aufweisen, welche diese Anwendungsprogramme als Bestandteil eines virtuellen Subnetzes eines Computernetzwerkes aufweist und wobei die voneinander unabhängigen Rechner Routingfunktionen aufweisen, über welche der Zugriff auf die Anwendungsprogramme erfolgt.Application programs of the at least two computers have a matching address identifier, which these application programs have as part of a virtual subnet of a computer network, and the mutually independent computers have routing functions via which the application programs are accessed.
Die Erfindung ist besonders vorteilhaft beiThe invention is particularly advantageous in
Computernetzwerken anwendbar, bei denen die Kommunikation auf dem Internet Protokoll beruht, und bei denen alsComputer networks applicable, in which the communication is based on the Internet protocol, and in which as
Transportprotokolle das Transmission Control Protocol TCP oder das User Datagram Protocol UDP angewendet werden.Transport protocols, the Transmission Control Protocol TCP or the User Datagram Protocol UDP are used.
Günstig ist es weiterhin, wenn durch entsprechende Gestaltung der Routingfunktion eine Zugriffsrangfolge auf die für die Datenhaltung vorgesehenen Anwendungsprogramme festgelegt wird.It is also expedient if, by appropriately designing the routing function, an access ranking to the application programs provided for data storage is specified.
Kurzbeschreibung der ZeichnungBrief description of the drawing
Die Erfindung wird anhand einer Figur näher erläutert, welche in einer schematischen Darstellung die Adressierung in einem beispielhaften Computernetzwerk zeigt.The invention is explained in more detail with reference to a figure, which shows the addressing in an exemplary computer network in a schematic representation.
Ausführung der ErfindungImplementation of the invention
Die Adressierung im dargestellten Computernetzwerk N erfolgt nach dem Internet-Protokoll Version 4 durch die sogenannte IP (Internet-Protokoll) -Adresse, die jeden Netzteilnehmer auf Ebene 3 des OSI-Schichtenmodelles, also auf einer logischen Ebene eindeutig kennzeichnet. Die IP-Adresse ist nach dem Internet-Protokoll Version 4 ein 32-Bit-Wort, welches einen ersten Bereich aufweist, der zur Adressierung des Netzes herangezogen wird, und einen zweiten Bereich, mittels dem der Rechner im Netz identifiziert wird.The addressing in the computer network N shown is carried out according to the Internet Protocol Version 4 by the so-called IP (Internet Protocol) address, which uniquely identifies each network participant on level 3 of the OSI layer model, that is to say on a logical level. According to the Internet Protocol Version 4, the IP address is a 32-bit word which has a first area which is used for addressing the network and a second area by means of which the computer in the network is identified.
Die Größe der beiden Bereiche ist normiert, wir unterscheiden 5 Klassen von IP-Adressen: - Klasse A Netze mit 7 bit Netzadressierung und 24 bit für die Teilnehmeradresse, - Klasse B Netze mit 14 bit Netzadressierung und 16 bit Teilnehmeradressierung, - Klasse C Netze mit 21 bit Netzadressierung und 8 bit Teilnehmeradresse . - Klasse D für die Adressierung innerhalb des Netzes mit 28 bit Teilnehmeradressen und der für Forschungszwecke reservierten - Klasse EThe size of the two areas is standardized, we differentiate between 5 classes of IP addresses: - Class A networks with 7 bit network addressing and 24 bit for the subscriber address, - Class B networks with 14 bit network addressing and 16 bit subscriber addressing, - Class C networks with 21 bit network addressing and 8 bit subscriber address. - Class D for addressing within the network with 28 bit subscriber addresses and the class E reserved for research purposes
Die Klasse der IP-Adresse ist in den führenden bits dargestellt, Adressen der Klasse A sind dadurch erkenntlich, dass das führende bit den Wert 0 aufweist, Klasse B durch den Wert 10 der beiden führenden bits, Klasse C durch 110 der drei ersten bits usw.The class of the IP address is shown in the leading bits, addresses of class A can be recognized by the fact that the leading bit has the value 0, class B by the value 10 of the two leading bits, class C by 110 of the first three bits, etc ,
Die Information über die Adressklasse benötigen die Router eines Netzwerkes um mit Hilfe der sogenannten Netzmaske aus der IP-Adresse eines Zielteilnehmers die Information über die Adresse des Zielnetzes herauszufiltern. Während die Netzadressen global verwaltet werden, erfolgt die Verwaltung der Teilnehmeradressen lokal durch den jeweiligen Netzbetreiber. Dieser hat dabei auch die Möglichkeit, durch entsprechende Vergabe der Teilnehmeradressen sein Netz durch Unterteilung in Subnetze zu strukturieren, ohne zusätzliche Netznummern zu verwenden. Dazu wird der Teilnehmeranteil der IP-Adresse in eine - Subnetzwerkadresse und die - eigentliche Teilnehmeradresse unterteilt.The routers of a network need the information about the address class in order to filter out the information about the address of the target network from the IP address of a target subscriber using the so-called netmask. While the network addresses are managed globally, the subscriber addresses are managed locally by the respective network operator. The latter also has the option of structuring his network by dividing it into subnets by assigning the subscriber addresses without using additional network numbers. To do this, the subscriber portion of the IP address is divided into a - subnetwork address and the - actual participant address divided.
Die IP-Adresse ist dann dreiteilig aufgebaut, sie umfasst die Netzwerkadresse, die Subnetzadresse und die eigentliche Teilnehmeradresse.The IP address is then structured in three parts, it includes the network address, the subnet address and the actual subscriber address.
Als einfaches Beispiel sei ein Netz der Adressklasse B angegeben, bei dem die IP-Adresse die Binärzahl 10 in den führenden beiden bits und weitere 14 bits für die Adresse des Netzes aufweist. Der bei dieser Netzwerkklasse vorgesehene Teilnehmeradressierungsteil von 16 bit wird wiederum unterteilt in einen 8 bit Teil zur Adressierung der Subnetze SN1, ...SN 25, ..., SN 255 und in ein 8 bit Element zur Adressierung der Teilnehmer TN in den Subnetzen. Damit können maximal 254 Subnetze mit jeweils 254 Teilnehmern adressiert werden .A network of address class B is given as a simple example, in which the IP address has the binary number 10 in the leading two bits and a further 14 bits for the address of the network. The subscriber addressing part of 16 bits provided for this network class is in turn divided into an 8 bit part for addressing the subnets SN1, ... SN 25, ..., SN 255 and an 8 bit element for addressing the subscribers TN in the subnets. A maximum of 254 subnets with 254 participants each can be addressed.
In der allgemein üblichen 4 Oktett-Schreibweise der IP- Adressen, bei der die einzelnen Bytes (8 bit) durch dezimal numerische Werte dargestellt und durch Punkte getrennt werden, sieht eine typische IP-Adresse wie folgt aus:In the generally used 4 octet notation of the IP addresses, in which the individual bytes (8 bits) are represented by decimal numerical values and separated by dots, a typical IP address looks as follows:
172.16.115.54172.16.115.54
Die Adresse des Netzes N selbst beträgt dabei 172.16.0.0.The address of the network N itself is 172.16.0.0.
Diese umfasst bis zu 254 Subnetze SN1, ...SN 25, ..., SN 255 mit den AdressenThis includes up to 254 subnets SN1, ... SN 25, ..., SN 255 with the addresses
172.16.1.0, ...,172.16.254.0.172.16.1.0, ..., 172.16.254.0.
Die 254 möglichen Teilnehmer TN in dem Subnetz SN 25 mit der Adresse 172.16.25.0 weisen dann folgende Adressen auf: 172.16.25.1 ,...,172.16.25.254The 254 possible nodes TN in the subnet SN 25 with the address 172.16.25.0 then have the following addresses: 172.16.25.1, ..., 172.16.25.254
Erfindungsgemäß werden nun auf zwei voneinander unabhängigen Rechnern Rl, R2 des Netzes N die redundant zu haltenden Daten konsistent gespeichert, wobei der Datenabgleich zwischen den redundanten Einheiten mit bekannten Verfahren sichergestellt wird. Dabei ist es möglich, dass die beiden Rechner Rl, R2 einem Netz N eines Betreibers oder aber verschiedenen miteinander verbundenen Netzen unterschiedlicher Betreiber angehören.According to the invention, the data to be kept redundant are now stored on two mutually independent computers R1, R2 of the network N. stored consistently, with data matching between the redundant units being ensured using known methods. It is possible that the two computers R1, R2 belong to a network N of an operator or different interconnected networks of different operators.
Den zugehörigen Anwendungsprogrammen der zwei Rechner wird eine übereinstimmende Adresskennung zugeordnet, welche diese Anwendungsprogramme als Bestandteil eines virtuellenThe associated application programs of the two computers are assigned a matching address identifier, which these application programs are part of a virtual one
Subnetzes SN 25 eines Computernetzwerkes N ausweist, wie beispielsweise die Nummer 172.16.25.0. Das Anwendungsprogramm läuft aus Sicht des Benutzers auf einem Rechner in diesem Subnetz SN 25, zum Beispiel auf einem Rechner mit der Adresse 172.16.25.1.Identifies subnet SN 25 of a computer network N, such as the number 172.16.25.0. From the user's point of view, the application program runs on a computer in this subnet SN 25, for example on a computer with the address 172.16.25.1.
Dieses virtuelle Subnetz SN 25 ist über zwei Router logisch mit dem Gesamtnetz verbunden. Dazu sind die beiden voneinander unabhängigen Rechner Rl, R2, welche unter anderem die für die redundante und konsistente Speicherung der Daten vorgesehenen Anwendungsprogramme enthalten , als Router ausgestaltet, über welche ausschließlich der Zugriff auf die Anwendungsprogramme - das virtuelle Subnetz - erfolgt.This virtual subnet SN 25 is logically connected to the overall network via two routers. For this purpose, the two mutually independent computers R1, R2, which, among other things, contain the application programs provided for the redundant and consistent storage of the data, are designed as routers, via which only the application programs - the virtual subnet - are accessed.
Die übrigen Router der Netzwerke enthalten in ihrenThe other routers of the networks contain in their
Routingtabellen daher einen Hinweis, dass Adressen des Typs 172.16.25.XXX, die ja das virtuelle Subnetz SN 25 betreffen, nur über einen der beiden genannten Router erreichbar sind. Der Eintrag in der Routingtabelle der übrigen Router enthält in diesem Beispiel die Netzwerkadresse 172.16.25.0, dieRouting tables therefore indicate that addresses of type 172.16.25.XXX, which relate to the virtual subnet SN 25, can only be reached via one of the two routers mentioned. In this example, the entry in the routing table of the other routers contains the network address 172.16.25.0
Netzwerkmaske 255.255.255.0, die Kosten für den Weg zu diesem Subnetz und das Interface, über das dieses Netz N erreichbar ist.Network mask 255.255.255.0, the cost of the route to this subnet and the interface through which this network N can be reached.
Alle Datenpakete mit diesen Zieladressen gelangen daher an einen der beiden Router und werden von diesem an das entsprechende Anwendungsprogramm mit dem jeweils zugehörigen Speicherbereich weitergeleitet.All data packets with these destination addresses therefore get to one of the two routers and are sent from this to the corresponding application program with the associated memory area forwarded.
Wenn das Netz N, wie allgemein üblich mit einem dynamischen Routingverfahren ausgestattet ist, wird bei Belegung eines der beiden Anwendungsprogramme automatisch die nächste Anfrage zu dem jeweils günstigsten freien Speicherbereich geroutet. Sind die beiden Router, über die das virtuelle Subnetz SN 25 erreicht werden kann, über gleich teure Wege erreichbar, so wird ein Router zufällig ausgewählt und damit eine Lastaufteilung vorgenommen.If the network N, as is generally the case, is equipped with a dynamic routing method, when one of the two application programs is occupied, the next request is automatically routed to the cheapest free memory area. If the two routers, via which the virtual subnet SN 25 can be reached, can be reached via equally expensive routes, one router is selected at random and thus a load sharing is carried out.
Bei einem Netz mit einem statischen Routingverfahren muß eine entsprechende Lastaufteilung bei der Festlegung der Routingtabellen erfolgen.In the case of a network with a static routing method, a corresponding load distribution must take place when defining the routing tables.
Das gegenständliche Ausführungsbeispiel beschreibt den Einsatz der Erfindung bei einem Computernetzwerk N mit einer Adressierung nach IP-Protokoll Version 4, die Erfindung ist aber beispielsweise auch bei IP -Protokoll Version 6 vorteilhaft einsetzbar. Ebenso ist die Anwendung der Erfindung für alle gebräuchlichen auf IP aufsetzenden Transportprotokolle wie TCP oder UDP möglich.The present exemplary embodiment describes the use of the invention in a computer network N with addressing according to IP protocol version 4, but the invention can also be used advantageously, for example, with IP protocol version 6. Likewise, the application of the invention is possible for all common transport protocols based on IP, such as TCP or UDP.
Bei Anwendung des TCP-Protokolles muss allerdings sichergestellt werden, dass der Zugriff jeweils über einen bestimmten Router erfolgt. Dies kann beispielsweise über die Kostenfunktionalität dynamischer Routingfunktionen erfolgen. When using the TCP protocol, however, it must be ensured that the access takes place via a specific router. This can be done, for example, using the cost functionality of dynamic routing functions.
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004014195A DE102004014195B3 (en) | 2004-03-23 | 2004-03-23 | Redundant data storage method for use in a computer network, whereby independent computers for information storage are contained in a virtual sub-network and connected to a controlling application via their own routing function |
PCT/EP2005/050980 WO2005093573A2 (en) | 2004-03-23 | 2005-03-04 | Method for redundant data management in computer networks |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1741258A2 true EP1741258A2 (en) | 2007-01-10 |
Family
ID=34745453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05716920A Withdrawn EP1741258A2 (en) | 2004-03-23 | 2005-03-04 | Method for redundant data management in computer networks |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070136468A1 (en) |
EP (1) | EP1741258A2 (en) |
DE (1) | DE102004014195B3 (en) |
WO (1) | WO2005093573A2 (en) |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6470389B1 (en) * | 1997-03-14 | 2002-10-22 | Lucent Technologies Inc. | Hosting a network service on a cluster of servers using a single-address image |
AU3394000A (en) * | 1999-03-05 | 2000-09-21 | At & T Corporation | System, method and apparatus for network service load and reliability management |
JP4189076B2 (en) * | 1999-03-26 | 2008-12-03 | 株式会社東芝 | Fault tolerant computer system |
US6618377B1 (en) * | 1999-03-30 | 2003-09-09 | Cisco Technology, Inc. | Flexible scheduling of network devices within redundant aggregate configurations |
AU4347600A (en) * | 1999-11-10 | 2001-06-06 | Rainfinity, Inc. | Distributed traffic controlling system and method for network data |
JP2001211190A (en) * | 2000-01-25 | 2001-08-03 | Hitachi Ltd | Communication management device and communication management method |
US6944662B2 (en) * | 2000-08-04 | 2005-09-13 | Vinestone Corporation | System and methods providing automatic distributed data retrieval, analysis and reporting services |
US20030154236A1 (en) * | 2002-01-22 | 2003-08-14 | Shaul Dar | Database Switch enabling a database area network |
US7062517B2 (en) * | 2002-08-14 | 2006-06-13 | Hitachi, Ltd. | Method and apparatus for centralized computer management |
US7334218B2 (en) * | 2002-09-02 | 2008-02-19 | International Business Machines Corporation | Method for adaptively assigning of data management applications to data objects |
JP2004173136A (en) * | 2002-11-22 | 2004-06-17 | Fujitsu Ltd | Network management device |
US7779368B2 (en) * | 2004-10-30 | 2010-08-17 | Hewlett-Packard Development Company, L.P. | Systems and methods for presenting managed data |
US20060095705A1 (en) * | 2004-10-30 | 2006-05-04 | James Wichelman | Systems and methods for data storage management |
US8886778B2 (en) * | 2005-04-29 | 2014-11-11 | Netapp, Inc. | System and method for proxying network management protocol commands to enable cluster wide management of data backups |
-
2004
- 2004-03-23 DE DE102004014195A patent/DE102004014195B3/en not_active Expired - Fee Related
-
2005
- 2005-03-04 US US10/593,684 patent/US20070136468A1/en not_active Abandoned
- 2005-03-04 EP EP05716920A patent/EP1741258A2/en not_active Withdrawn
- 2005-03-04 WO PCT/EP2005/050980 patent/WO2005093573A2/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO2005093573A2 * |
Also Published As
Publication number | Publication date |
---|---|
US20070136468A1 (en) | 2007-06-14 |
WO2005093573A3 (en) | 2006-04-27 |
DE102004014195B3 (en) | 2005-08-11 |
WO2005093573A2 (en) | 2005-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69935138T2 (en) | System and method for optimizing the performance and availability of a DHCP service | |
DE60225192T2 (en) | DYNAMIC PORT CONFIGURATION OF A NETWORK DEVICE | |
DE10084639B4 (en) | Automatic determination of nodes assigned to a virtual subnet | |
DE10022431B4 (en) | Integrated IP network | |
DE60311297T2 (en) | COMMON PORT ADDRESSING IN A ROUTER THAT AGAINST NAT & NAT-PT GATEWAY | |
DE69827201T2 (en) | Method and system for server-network switch-multiple connection | |
DE60029430T2 (en) | MULTI-SENDABLE ADDRESS RESOLUTION LOG | |
DE69924478T2 (en) | APPARATUS AND METHOD FOR NETWORK TRANSLATION AS AN EXTERNAL SERVICE IN THE ACCESS SERVER OF A SERVICE PROVIDER | |
DE69838269T2 (en) | Method and device for detecting, correcting and rejecting corrupted data packets in a data transmission cable system | |
DE60302994T2 (en) | Multicast router with translation function of protocols according to any-source multicast and source-specific multicast | |
DE69836673T2 (en) | Method and apparatus for configuring a network node to be itself gateway | |
EP0998100B1 (en) | Method to configure an internet protocol network | |
DE102015004668A1 (en) | DIVISIONAL NETWORK ADDRESS TRANSLATION | |
DE60208990T2 (en) | Method for distinguishing participants of a communication system, communication system and communication device | |
DE602004006786T2 (en) | Sort addresses in a domain name server | |
WO2007147424A1 (en) | Device and method for address mapping | |
WO2003028340A1 (en) | Pre- processing of nat addresses | |
WO2005093573A2 (en) | Method for redundant data management in computer networks | |
EP2171943B1 (en) | Method for routing service messages | |
EP1081921B1 (en) | Method for allocating IP-addresses in communication networks | |
EP1623559B1 (en) | Method for data exchange between network elements in networks with differing address ranges | |
WO2012130263A1 (en) | Method for addressing messages in a computer network | |
DE102005039343B4 (en) | Method for transmitting data packets and data processing unit | |
EP3515034A1 (en) | Method, devices, computer-readable media and systems for establishing certified connections with end devices in a local area network | |
DE69837608T2 (en) | Internet access methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060822 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS S.P.A. |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20091001 |