WO2006026402A2 - Method and system for providing high availability to computer applications - Google Patents

Method and system for providing high availability to computer applications Download PDF

Info

Publication number
WO2006026402A2
WO2006026402A2 PCT/US2005/030353 US2005030353W WO2006026402A2 WO 2006026402 A2 WO2006026402 A2 WO 2006026402A2 US 2005030353 W US2005030353 W US 2005030353W WO 2006026402 A2 WO2006026402 A2 WO 2006026402A2
Authority
WO
WIPO (PCT)
Prior art keywords
application
application program
recited
program
node
Prior art date
Application number
PCT/US2005/030353
Other languages
French (fr)
Other versions
WO2006026402A3 (en
Inventor
Ching-Yuk Paul Ngan
Sanjay D. Hortikar
Allan Havemose
Lauren Tewksbury
Vishwas Raman
Original Assignee
Availigent, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Availigent, Inc. filed Critical Availigent, Inc.
Priority to EP05792688A priority Critical patent/EP1719056A4/en
Publication of WO2006026402A2 publication Critical patent/WO2006026402A2/en
Publication of WO2006026402A3 publication Critical patent/WO2006026402A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2046Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant where the redundant components share persistent storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1405Saving, restoring, recovering or retrying at machine instruction level
    • G06F11/141Saving, restoring, recovering or retrying at machine instruction level for bus or memory accesses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1479Generic software techniques for error detection or fault masking
    • G06F11/1482Generic software techniques for error detection or fault masking by means of middleware or OS functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2002Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2023Failover techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2023Failover techniques
    • G06F11/2028Failover techniques eliminating a faulty processor or activating a spare
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2023Failover techniques
    • G06F11/203Failover techniques using migration

Definitions

  • High Availability (HA) for complex computer applications is a non- negotiable requirement for the Internet, corporate data centers, financial services, telecommunications, government systems and medical systems.
  • the effort involved in actually achieving such availability and reliability can be one of the most expensive and time-consuming aspects of application development and can even cause delay in deploying an application.
  • High Availability is provided through custom applications, custom operating systems or custom hardware, all of which are expensive and proprietary.
  • the present invention comprises a set of system-level high availability services for computer systems.
  • One embodiment of the invention functions in general terms like an extension of the operating system.
  • High Availability at the system-level, the invention enables high availability without requiring modifications to the applications or the operating system kernel.
  • the present invention implements high availability for stateless applications (for example, sendmail) and stateful applications (for example, Voice Over IP applications) automatically and transparently, without any application source code modifications.
  • the invention also provides a set of optional APIs that allow the application to have increased control as desired over the high availability that the invention provides.
  • the application being protected runs on a primary server and has one or more designated backup servers ready to take over in the event of a fault.
  • a system can be configured according to the invention with any number of server nodes upon which one or more application programs for a client can be executed.
  • a primary copy of the application runs on the first server, while a backup copy of the application awaits on a second server to be executed in response to an application failover procedure.
  • the primary and second copy of the application can be loaded on different servers, or even on the same server.
  • the invention provides layered high availability, with both system level and application level functionality and modules.
  • the application is under control of the application-level module which communicates with the system- level module.
  • the system-level module and application- level module are referred to herein, respectively, as an Availability Manager (Duration AM) and a Duration Interface (Duration IF).
  • the Duration IF contains the registration code for running and protecting the application. Communication links couple each of the Duration IFs to the local AM.
  • the Duration AM for each local system preferably couples to the system library layer and both a TCP control layer (i.e., TCPF) for managing the TCP connection state at the kernel level, and a kernel module (i.e., KState) for collecting kernel state information.
  • TCP control layer i.e., TCPF
  • KState kernel module
  • the above elements operate over an operating system, preferably an operating system such as a Linux, or other operating system providing sufficient process support.
  • the failover operations of the system are preferably controlled in response to a set of policies (i.e., Policy Files) coupled to each local system.
  • policies i.e., Policy Files
  • the invention implements stateless or stateful failover of an application from a primary server to its designated backup server if the application crashes or malfunctions on the primary server.
  • the failure is detected automatically and recovery is initiated automatically without any application involvement.
  • node means a processor running a single copy of an operating system and one or more applications.
  • the present invention provides user-controlled system management, automatic availability management, and publish/subscribe event management, including notification of faults and alarms.
  • Voice over IP VOIP
  • Session Initiation Protocol SIP
  • T Thhe invention can be practiced according to various aspects and e emmb boodd ii mmients, including, but not limited to, those described in the following aspects and embodiments which are described using phraseology which is generally similar to the claim language.
  • a method for achieving transparent integration of an application program with a high availability protection program comprises: (a) injecting registration code, transparently and automatically, into an application program during launch, without the need of modifying or recompiling the application program and without the need of a custom loader; (b) registering the application program automatically with the high availability protection program; (c) detecting a failure in the execution of the application program running on a primary server; and (d) executing the application program from one or more designated backup servers automatically in response to the failure.
  • a method, system, improvement or computer program for performing lossless migration of an application program from a primary node to a backup node and while being transparent to a client connected to the primary node over a TCP/IP connection can be implemented by: (a) loading a kernel module comprising a dummy device driver; (b) executing a checkpointing procedure for the application to invoke the kernel module for capturing the state of TCP connections that are open for that process and sending the connection state to the checkpointing procedure and to a backup server node in conjunction with application state; and (c) executing application restoration procedures to invoke the kernel module for restoring the backup server node to restore TCP connections in the exact state as they were in the primary server.
  • the kernel module hooks into the TCP/IP stack during checkpointing and restoration and freezes the entire connection and the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
  • a computer executable program for lossless migration of an application program from a primary node to a backup node which is transparent to a client connected to the primary node over a TCP/IP connection comprises: (a) a loadable kernel module comprising a dummy device driver; (b) an application checkpointing procedure configured for invoking the kernel module for capturing the state of all the open TCP connections for that process and communicating the connection states back to the checkpointing procedure and to a backup node along with the application state; and (c) an application restoration procedure configured for invoking the kernel module to restore all the TCP connections in the exact same state as they were in the primary node.
  • the kernel module hooks into the TCP/IP stack during checkpointing and restoration and freezes the entire connection and the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
  • a method, system, improvement and computer program for achieving transparent integration of an application program with a high availability protection infrastructure that transparently and automatically injects registration code (called "etJnitQ") into an application program during launch; wherein the application program automatically registers with the high availability protection program; wherein modification of the application program or application program recompilation is not required; and wherein a custom loader is not required.
  • un-registration of the application program from the high availability program is monitored and deemed a normal exit.
  • the registration code is contained in a duration interface layer (i.e., Duration IF) running in the applications process.
  • a method, system, improvement and/or computer program for maintaining a client connection to an application program in a multimode network comprising assigning a virtual IP address to one or more application programs hosted on a first node; wherein the virtual IP address is retained by an application program when the application program is migrated to a second node.
  • each the application program is assigned a unique virtual IP address.
  • one or more groups of application programs are assigned a unique virtual IP address.
  • assignment of a virtual IP address is transparent to an application program; and migration of an application program from the first node to the second node is transparent to a user.
  • Another aspect of the invention is a method, system, improvement and/or computer program that provides a mechanism to ensure that processes that comprise an application program are launched in the proper order, and with the proper timing constraints during recovery. In one embodiment, a mechanism is also provided to ensure that application programs are recovered in the proper order.
  • GUI graphical user interface
  • Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein user controllable launch of processes and applications is provided.
  • Another aspect of the invention is a method system, computer program, computer executable program, or improvement wherein user controllable stop of processes and applications is provided.
  • Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein storage checkpointing is provided.
  • Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein storage checkpointing synchronized with process checkpointing is provided.
  • Another aspect of the invention is a method, system, computer program, computer executable program, improvement as recited in any of the preceding claims, wherein profiling of running applications is provided to determine optimal policy settings.
  • FIG. 1 is a block diagram of a three-node system having three high availability (HA) protected applications according to an embodiment of the present invention.
  • FIG. 2 is a block program listing of the order in which the Linux operating system loads an application according to an aspect of the present invention, showing loading of operating system, libraries, and executable.
  • FIG. 3 is a flow diagram of the Linux operating system loading an application and its shared libraries according to an aspect of the invention, showing the events necessary to ensure transparency.
  • FIG. 4 is a block diagram of programming the internals of the TCP
  • FIG. 1 illustrates, by way of example, a system setup 10 with three nodes 12, 14, and 16 and three different applications 18, 20, and 22.
  • the primary copy of the first application App1 18 is on Nodei 12 and its backup copy 18' is on Node2 14.
  • the primary copy of application App220 is on Node2 14 and its backup copy 20' is on Nodei 12.
  • the primary copy of application App3 22 and its backup 22' copy are both on Node3 16.
  • the primary/backup relationship is indicated for Appi and App3 with block arrows 24 and 26 where the primary is at the beginning of the block arrow and the tip of the arrow points to the backup.
  • Availability Managers (Duration AM) 28a, 28b, and 28c are shown coupled to Duration Interfaces (Duration IF) 34a and 36a, 34b and 36b, and 34c and 36c, respectively, in which the registration code is contained for running the applications process.
  • Communication links 38a, 4Oa 1 38b, 40b, 38c, 40c are shown coupling corresponding local Duration AMs and Duration IFs.
  • Duration AMs for each local system are shown coupled to corresponding System Libs layers 42a through 42c. Also coupled to the Duration AM layers are corresponding TCPF modules 44a through 44c which manage the TCP connection state at the kernel level, and the kernel KState modules 46a through 46c which collect the above mentioned general kernel state. Corresponding Linux Kernels 48a through 48c are shown at each of the lower layers coupled to network 50. In addition, Policy Files (PF) 52a through
  • the system is configured to allow the application to register for High Availability services/protection in some manner. Similarly, the application is configured to provide an un-register process prior to terminating in order to indicate successful completion.
  • HA High Availability
  • FIG. 2 illustrates the loading process 70 of system libraries.
  • the operating system loads the shared system libraries 72, then the shared application libraries, and finally the application executable itself 74.
  • the figure describes the two steps of the Linux loader 76:
  • the invention provides HA services that are loaded and activated during step #1 ; namely, as a shared library.
  • HALib is used to refer to a group of libraries providing the core HA services, such as automatic registration, automatic un- registration, checkpointing, fault detection, virtual IP addresses, fault recovery, and the kernel module library interface.
  • Registration is provided in this embodiment by the JnitQ function of the shared HALib library.
  • the JnitQ function initializes the High Availability services for the application process and registers the process with the HA infrastructure. The initialization and registration occurs before any part of the application has been loaded.
  • the following is a pseudo code implementation of_init() as provided in the HALib. void _init()
  • the invention provides un-registration to handle the case where the application has finished processing and wants to do a "planned" exit. If the application crashes or faults through some other means, indicative of an
  • the invention ensures that the HA libraries are available and loaded prior to application launch. This is achieved for example, by utilizing the preload capabilities of the system loader. By preloading the HA libraries, the invention also enables the HA library to replace or enhance functionality in other shared libraries or system libraries.
  • the Linux loader enables preloading of libraries by use of the LDJPRELOAD environment variable.
  • the bash Unix shell facilitates a combination of all three steps above into one step.
  • An example command line to load App1 would be:
  • FIG. 3 illustrates steps according to an embodiment of the invention for providing fully transparent and automatic High Availability services by utilizing the three elements described above.
  • Represented by block 80 is pre-loading of HALib performed for each application, ensuring HA Services are loaded prior to the application.
  • automatic initialization is performed on the shared libraries as they are loaded by the system loader using standard JnitQ calls.
  • registration of exit_handler() is performed. Loading and execution of the application is performed in block 86.
  • Detecting that the application has failed is one of the core components in the invention.
  • Node faults are detected using heart-beats and general communication between the Duration AMs 28a through 28c (FIG. 1 ) on each node.
  • Duration AM 28a on Nodei 12 communicates and ensures operational integrity of all nodes that are failover targets for applications running on Nodei 28b.
  • the Duration AM 28a on Nodei 12 communicates with the Duration AM 28b on Node2 14 to ensure availability of App1 18.
  • the Duration AM 30 on Node2 14 communicates with the Duration AM 28a on Nodei 12 to ensure the availability of App220.
  • the AM 28c on Node3 16 does not communicate with other AMs, as App322 is protected locally on Node3 16 only.
  • Unplanned application exits are detected by the local AM on the system where the application is running when the communication link between the local AM and the Duration IF is broken. Referring to FIG. 1 for illustrative purposes, the communication link 38a for App1 18 goes between the local AM 28a and Duration IF 34a.
  • Application hangs are detected as the system is configured for performing health-checks on the system where the application is running. The health-check invokes some feature or component of the application and if an invalid result is produced, creates a fault event.
  • Health check can be any executable, script or macro that is capable of calculating and returning integer values of ⁇ 0, 1 , -1 , 2, -2 ⁇ and so forth.
  • the health-check is a binary executable that returns a value of zero if successful or non-zero if a fault is detected.
  • the health-check is a script that returns zero if successful or non-zero if a fault is detected.
  • each network interface card is assigned a unique IP address, and each computer has one or more NICs. Accordingly, the invention readily can be implemented over a TCP/IP based network.
  • the uniqueness of IP addresses on the network follows the following rules: (1 ) each IP address is different from all other IP addresses visible to the computer, and (2) the protocol supports having two or more IP addresses assigned to the same NIC.
  • the described NIC IP address is designated as NICJP. While the NICJP can be used to address the system, it ultimately belongs to the NIC in the system, not individual applications or other higher level components.
  • a network application listens on a port on a given IP address for incoming connections.
  • Using the NICJP as the contact IP for the application generally leads to problems, since the NICJP is bound to the hardware NIC in the system. If the application fails on the primary and has to be restored on the backup server, the NICJP will have to be moved, which is generally not possible without disrupting all other running programs, including the operating system, on the primary server.
  • the present invention addresses this fundamental issue by using a technique of Virtual IPs.
  • the invention assigns unique IP addresses for the individual application under protection. This application-specific IP address is referred to herein as a Virtual IP (VIP).
  • VIP Virtual IP
  • the Virtual IP is assigned, sometimes also called “aliased" herein, to a
  • conditions on this assignment process may include the following. If a group of applications all use the same VIP, all applications in the group have to run on the same system since each VIP is unique and only can be mapped to one
  • NIC If a group of applications all use the same VIP and one of the applications fails over to the backup location, the invention will automatically move the other members of the group to the backup location.
  • the invention removes the VIP_1 alias from the primary server and subsequently aliases VIP_1 to a NIC in the backup server. The application remains responsive on VIP_1 with the same port-number, wherein the failover is complete.
  • the invention renders the application location independent by utilizing
  • the invention ensures that the assignment of VIPs and re-assignment upon failover to a backup server is provided as a system level function, and therefore is transparent to the applications under HA protection.
  • Another aspect of the invention uses the VIP to determine if more than one copy of a given application is launched at any given time. If the invention detects two instances of a VIP, one of the duplicates of the application will be forcefully terminated.
  • the VIP For High Availability", the VIP is automatically and transparently moved with the application upon a failover, as part of the failover mechanisms. [0095] In the same manner, if the system administrator migrates an application, such as manually initiating a move of the application without a fault, the VIP are automatically and transparently moved. [0096] 1 1. Launch Order Of Multi-Process Applications.
  • a Multi-process application consists of multiple independent processes, each performing a part of the application.
  • the invention automatically tracks the processes as they are launched and maintains a data structure containing the launch history. This data structure is used upon failover and recovery to re-launch the processes in the correct order.
  • the invention allows the user to specify the launch order of processes as well, such as using the graphics management interface of the present invention.
  • the management interface can be used to order the process in the order of first-to-last to ensure any particular launch order.
  • one mode of the invention is configured to allow the user to specify the relative timing of the various processes, thereby ensuring a proper launch. [0098] 12.
  • DCT Duration Configuration Tool
  • a Duration Configuration Tool is provided to allow for easy configuration of applications and their associated policies, such as checkpointing options, health checks, node-lists, VIP addresses, etc.
  • DCT Duration Configuration Tool
  • the DCT also provides a live view of the current configuration and system status, including running nodes and applications.
  • applications can be launched and migrated, nodes rebooted or added, and fault reports reviewed.
  • TCP Connection Failover And Migration is provided to allow for easy configuration of applications and their associated policies, such as checkpointing options, health checks, node-lists, VIP addresses, etc.
  • FIG. 4 illustrates an example of a system configuration 90 showing connectivity between client 92 a primary server 94 and a backup server 96 over a communications medium 100, such as the Internet.
  • a client application 102 is shown which communicates with primary sever 94 through TCP/IP layers 104, 106 via the Internet 100, and ostensibly with backup server 96 after failover.
  • Primary server 94 is shown with a server application 108 coupled to Duration 1 10 as described herein above a TCP layer 1 16 and an
  • backup server 96 is shown with server application 1 12 coupled to Duration 1 14 above a TCP layer 120 and an IP layer 122.
  • server application 1 12 is shown with server application 1 12 coupled to Duration 1 14 above a TCP layer 120 and an IP layer 122.
  • FIG. 4 illustrates an example where a client application 102 is connected via TCP/IP 104, 106 on client system 92, to the primary server application 108 running in server 94.
  • TCP/IP traffic is delivered via connection 124, and arrives at the IP layer 1 18 at primary server 94 wherein it gets routed through the IP bridge 128, to the TCP layer 116, finally arriving at the server application 108 under control of Duration 1 10 on the primary.
  • bridge 128 For incoming network traffic, bridge 128 captures all internal state of TCP and IP and the forwards the network data to the TCP stack 1 16 and the Bridge 130 on backup server 96.
  • the network traffic On primary server 94 the network traffic is delivered by the TCP stack 1 16 to Duration 1 10 and server application 108.
  • the bridge 128 on Fig 4, is called TCPF (44a-44c) in FIG. 1.
  • the bridge 128 and Duration 110 coordinates when the state is captured. This coordination ensures that the state of the server application 108 is captured at the same time as the state of the TCP/IP connection in bridge 128.
  • the bridge 128 and Duration 1 10 on the primary server transmit the combined state of the server application 108 and the bridge 128 to the backup server 96. The combined state is shared between the bridge 130 on the backup, the backup server application 1 12, and Duration 1 14.
  • the system can be configured for the bridging actions according to the following.
  • the system can be configured for collecting the IP and TCP states for later use. For example the states can be loaded into a byte buffer which is transmitted to the backup, and stored in the byte buffer of the backup for future use.
  • the collected TCP state information preferably includes TCP sequence numbers and TCP window sizes.
  • the collection of IP and TCP state is preferably provided in a loadable kernel module.
  • the kernel modules are inserted as a bridge between IP and
  • the loadable kernel module is called from, for example, a system checkpointer, which makes the TCP/IP connection migration transparent and automatic.
  • An aspect of the invention is that the bridge module 128 sits within the IP layer 1 18 under TCP 1 16, wherein the TCP layer is unaware of the bridge and its migration functionality.
  • programming according to the invention is configured to "freeze" the networking connection to ensure no messages are being sent to, and processed by, the "old" primary while the backup is in the process of taking over.
  • the client side will experience a minor delay while the network connection is frozen. Generally the delay is less than a second, but could be larger depending on processor speed, memory, CPU utilization and other factors. Connection will automatically resume once the IP and TCP stacks have been restored to the state of the primary for the connections being protected.
  • the storage checkpointing procedure notifies the kernel module which captures the state of the open TCP connections for the checkpointing procedure.
  • Lossless Migration [00111] The invention combines the VIP and TCP Connection failover to provide lossless migration of applications with stateful client connections. If there are no stateful client TCP Connections the invention provides lossless migration without requiring TCP Connection migration. [00112] 15. Policy Management. [00113] One aspect of the invention addresses the issue of determining
  • the profiler monitors application execution, and builds a statistical description of the execution which is used for generating and/or recommending optimal settings.
  • the profiling process is preferably performed transparently and automatically, with no administrator intervention necessary.
  • the administrator can later select which of the recommended configuration changes to apply.
  • the invention can be configured for another mode, in which the administrator dynamically adjusts parameters on a live system.
  • this may include changing of heart-beat frequency, checkpointing interval, health- checks, start/stop/restart scripts, and so forth.
  • the invention supports starting and stopping of an application both as if it were launched from the command line and as if it were launched with scripts.
  • One aspect of the invention provides application launching that emulates launching the application from a command line.
  • One way of implementing this case is by configuring the command line arguments via the management interfaces and automatically forwarding them to the launched application via the Duration AM.
  • a number of different aspects can be implemented within an embodiment of the invention for starting and stopping. The following are provided by way of example and not limitation: (1 ) Launching the application in accord with the standard Linux START/RESTART/STOP launch and termination scripts. In this case the invention parses the START/RESTART/STOP scripts and interprets environment variable and configuration data for use by the invention.
  • the present invention comprises a system, apparatus and method of providing high availability services over a connection medium, or network, such as the Internet.
  • the system invention allows application programming and connection failover from a primary to a secondary server, as well as restoration.
  • An embodiment of programming is described for various layers within the system. It should be recognized that these descriptions are provided by way of example and that one of ordinary skill in the art can modify the implementation of the system without departing from the teachings of the present invention.
  • the description above contains many details, these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the presently preferred embodiments of this invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Hardware Redundancy (AREA)
  • Stored Programmes (AREA)

Abstract

A set of system-level high availability services for computer systems, including a service that that functions in general terms like an extension of the operating system. By providing High Availability (HA) at the system-level, modifications to the applications or the operating system kernel are not required.

Description

METHOD AND SYSTEM FOR PROVIDING HIGH AVAILABILITY TO COMPUTER APPLICATIONS
CROSS-REFERENCE TO RELATED APPLICATIONS
-5 [0001] This application claims priority from U.S. provisional application serial number 60/605,026 filed on August 26, 2004, incorporated herein by reference in its entirety.
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH 0 OR DEVELOPMENT
[0002] Not Applicable
INCORPORATION-BY-REFERENCE OF MATERIAL
SUBMITTED ON A COMPACT DISC 5 [0003] Not Applicable
NOTICE OF MATERIAL SUBJECT TO COPYRIGHT PROTECTION [0004] A portion of the material in this patent document is subject to copyright protection under the copyright laws of the United States and of other 0 countries. The owner of the copyright rights has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the United States Patent and Trademark Office publicly available file or records, but otherwise reserves all copyright rights whatsoever. The copyright owner does not hereby waive any of its rights to have this patent 5 document maintained in secrecy, including without limitation its rights pursuant to 37 C.F.R. § 1.14.
BACKGROUND OF THE INVENTION 1. Field of the Invention 0 [0005] This invention pertains generally to enterprise computer systems, embedded computer systems, and computer systems in general, and more particularly to methods, systems and procedures for providing high availability service and automatic fault detection and recovery for computer applications. 2. Description of Related Art
[0006] High Availability (HA) for complex computer applications is a non- negotiable requirement for the Internet, corporate data centers, financial services, telecommunications, government systems and medical systems. At the same time, the effort involved in actually achieving such availability and reliability can be one of the most expensive and time-consuming aspects of application development and can even cause delay in deploying an application. Typically, High Availability is provided through custom applications, custom operating systems or custom hardware, all of which are expensive and proprietary.
[0007] Therefore, there is a need for methods, systems and procedures for achieving high availability and reliability through a transparent and automatic software infrastructure, rather than through prolonged custom coding, lengthy development time and substantial expenditure.
BRIEF SUMMARY OF THE INVENTION
[0008] The present invention comprises a set of system-level high availability services for computer systems. One embodiment of the invention functions in general terms like an extension of the operating system. By providing High Availability at the system-level, the invention enables high availability without requiring modifications to the applications or the operating system kernel. [0009] By way of example, and not of limitation, the present invention implements high availability for stateless applications (for example, sendmail) and stateful applications (for example, Voice Over IP applications) automatically and transparently, without any application source code modifications. In one embodiment, the invention also provides a set of optional APIs that allow the application to have increased control as desired over the high availability that the invention provides.
[0010] According to an aspect of the invention, the application being protected runs on a primary server and has one or more designated backup servers ready to take over in the event of a fault. [0011] A system can be configured according to the invention with any number of server nodes upon which one or more application programs for a client can be executed. A primary copy of the application runs on the first server, while a backup copy of the application awaits on a second server to be executed in response to an application failover procedure. The primary and second copy of the application can be loaded on different servers, or even on the same server.
[0012] The invention provides layered high availability, with both system level and application level functionality and modules. The application is under control of the application-level module which communicates with the system- level module. By way of example, the system-level module and application- level module are referred to herein, respectively, as an Availability Manager (Duration AM) and a Duration Interface (Duration IF). The Duration IF contains the registration code for running and protecting the application. Communication links couple each of the Duration IFs to the local AM. The Duration AM for each local system preferably couples to the system library layer and both a TCP control layer (i.e., TCPF) for managing the TCP connection state at the kernel level, and a kernel module (i.e., KState) for collecting kernel state information. The above elements operate over an operating system, preferably an operating system such as a Linux, or other operating system providing sufficient process support. The failover operations of the system are preferably controlled in response to a set of policies (i.e., Policy Files) coupled to each local system.
[0013] By way of example, and not of limitation, the invention implements stateless or stateful failover of an application from a primary server to its designated backup server if the application crashes or malfunctions on the primary server. The failure is detected automatically and recovery is initiated automatically without any application involvement.
[0014] According to an aspect of the invention, there is a clean separation of the application logic from the high availability code. Application programmers can focus on writing their application code, rather than on writing high availability code, and an administrator can make applications highly available by simply configuring the desired settings, such as by using a graphical configuration tool implemented according to the invention. The result is that high availability applications are developed easily and deployed quickly without the necessity of custom coding.
[0015] According to another aspect of the invention, protection is provided against node faults, network faults and process faults. In this context, a
"node" means a processor running a single copy of an operating system and one or more applications. The present invention provides user-controlled system management, automatic availability management, and publish/subscribe event management, including notification of faults and alarms.
[0016] In various embodiments of the invention, features are provided that are useful for applications that must be highly available, including but not limited to:
[0017] (a) Stateful High Availability for Enterprise applications such as Web Servers, Application Servers, Email Servers, Databases and DNS Servers
Voice over IP (VOIP), Session Initiation Protocol (SIP), Streaming Media and Gaming Servers;
[0018] (b) Configurable protection levels;
[0019] (c) Local and Remote restart; [0020] (d) Local and Remote stateful restore;
[0021] (e) Transparent and coordinated multi-process and multi-threaded application checkpointing;
[0022] (f) Full and incremental checkpointing;
[0023] (g) Checkpoint to either local or shared disk; [0024] (h) Automatic and Transparent Fault Detection;
[0025] (i) Node fault detection;
[0026] G) Process fault detection;
[0027] (k) Process and application deadlock and hang protection through external health checks; [0028] (I) Automatic and Transparent Recovery;
[0029] (m) Automatic restart of failed processes;
[0030] (n) Automatic failover of failed nodes; [0031] (o) Automatic migration of processes to their home location after repair of failed node;
[0032] (P) Subscription-based fault notification;
[0033] (q) Auto-startup of application; [0034] (r) Start/Stop/Re-Start script support;
[0035] (S) Dynamic policy updates;
[0036] (t) Upgrades and provisioning; and
[0037] (U) User-controllable migration of processes.
[0038] T Thhe invention can be practiced according to various aspects and e emmb boodd ii mmients, including, but not limited to, those described in the following aspects and embodiments which are described using phraseology which is generally similar to the claim language. [0039] According to an aspect of the invention a method for achieving transparent integration of an application program with a high availability protection program comprises: (a) injecting registration code, transparently and automatically, into an application program during launch, without the need of modifying or recompiling the application program and without the need of a custom loader; (b) registering the application program automatically with the high availability protection program; (c) detecting a failure in the execution of the application program running on a primary server; and (d) executing the application program from one or more designated backup servers automatically in response to the failure. [0040] According to another aspect of the invention, a method, system, improvement or computer program for performing lossless migration of an application program from a primary node to a backup node and while being transparent to a client connected to the primary node over a TCP/IP connection, can be implemented by: (a) loading a kernel module comprising a dummy device driver; (b) executing a checkpointing procedure for the application to invoke the kernel module for capturing the state of TCP connections that are open for that process and sending the connection state to the checkpointing procedure and to a backup server node in conjunction with application state; and (c) executing application restoration procedures to invoke the kernel module for restoring the backup server node to restore TCP connections in the exact state as they were in the primary server. In one embodiment, the kernel module hooks into the TCP/IP stack during checkpointing and restoration and freezes the entire connection and the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
[0041] According to another aspect of the invention, a computer executable program for lossless migration of an application program from a primary node to a backup node which is transparent to a client connected to the primary node over a TCP/IP connection comprises: (a) a loadable kernel module comprising a dummy device driver; (b) an application checkpointing procedure configured for invoking the kernel module for capturing the state of all the open TCP connections for that process and communicating the connection states back to the checkpointing procedure and to a backup node along with the application state; and (c) an application restoration procedure configured for invoking the kernel module to restore all the TCP connections in the exact same state as they were in the primary node. In one embodiment, the kernel module hooks into the TCP/IP stack during checkpointing and restoration and freezes the entire connection and the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
[0042] According to another aspect of the invention, there is described a method, system, improvement and computer program for achieving transparent integration of an application program with a high availability protection infrastructure, that transparently and automatically injects registration code (called "etJnitQ") into an application program during launch; wherein the application program automatically registers with the high availability protection program; wherein modification of the application program or application program recompilation is not required; and wherein a custom loader is not required. In one embodiment, un-registration of the application program from the high availability program is monitored and deemed a normal exit. For example, in one embodiment the registration code is contained in a duration interface layer (i.e., Duration IF) running in the applications process.
[0043] According to another aspect of the invention, there is described a ) method, system, improvement and/or computer program for maintaining a client connection to an application program in a multimode network, comprising assigning a virtual IP address to one or more application programs hosted on a first node; wherein the virtual IP address is retained by an application program when the application program is migrated to a second node. In one mode each the application program is assigned a unique virtual IP address. In another mode, one or more groups of application programs are assigned a unique virtual IP address. In a preferred embodiment, assignment of a virtual IP address is transparent to an application program; and migration of an application program from the first node to the second node is transparent to a user. [0044] Another aspect of the invention is a method, system, improvement and/or computer program that provides a mechanism to ensure that processes that comprise an application program are launched in the proper order, and with the proper timing constraints during recovery. In one embodiment, a mechanism is also provided to ensure that application programs are recovered in the proper order. [0045] In accordance with a further aspect of the invention, there is described a method, system, improvement and/or computer program for providing a mechanism to configure the high availability characteristics of an application program through a graphical user interface (GUI) without requiring any modification or recompilation of the application program. The configuration data is contained in a "PF" (Policy File) local to each system.
[0046] Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein user controllable launch of processes and applications is provided. [0047] Another aspect of the invention is a method system, computer program, computer executable program, or improvement wherein user controllable stop of processes and applications is provided. [0048] Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein storage checkpointing is provided. [0049] Another aspect of the invention is a method, system, computer program, computer executable program, or improvement wherein storage checkpointing synchronized with process checkpointing is provided.
[0050] Another aspect of the invention is a method, system, computer program, computer executable program, improvement as recited in any of the preceding claims, wherein profiling of running applications is provided to determine optimal policy settings. [0051] Further aspects of the invention will be brought out in the following portions of the specification, wherein the detailed description is for the purpose of fully disclosing preferred embodiments of the invention without placing limitations thereon.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)
[0052] FIG. 1 is a block diagram of a three-node system having three high availability (HA) protected applications according to an embodiment of the present invention.
[0053] FIG. 2 is a block program listing of the order in which the Linux operating system loads an application according to an aspect of the present invention, showing loading of operating system, libraries, and executable. [0054] FIG. 3 is a flow diagram of the Linux operating system loading an application and its shared libraries according to an aspect of the invention, showing the events necessary to ensure transparency. [0055] FIG. 4 is a block diagram of programming the internals of the TCP
Connection Failover and Migration according to an aspect of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0056] Referring more specifically to the drawings, for illustrative purposes the present invention will be described in relation to FIG. 1 through FIG. 4. It will be appreciated that the system and apparatus of the invention may vary as to configuration and as to details of the constituent components, and that the method may vary as to the specific steps and sequence, without departing from the basic concepts as disclosed herein. [0057] 1. Introduction.
[0058] The context in which this invention is described is an application program which is running on a primary server with one or more designated backup servers. Without affecting the general case of multiple backups, the following describes scenarios with one primary and one backup per application. Multiple backups are handled in a similar manner as a single backup. As a shorthand notation, the invention will generally be referred to herein as "Duration" or "Duration module".
[0059] FIG. 1 illustrates, by way of example, a system setup 10 with three nodes 12, 14, and 16 and three different applications 18, 20, and 22. In this example, the primary copy of the first application App1 18 is on Nodei 12 and its backup copy 18' is on Node2 14. The primary copy of application App220 is on Node2 14 and its backup copy 20' is on Nodei 12. The primary copy of application App3 22 and its backup 22' copy are both on Node3 16. For the sake of illustration, the primary/backup relationship is indicated for Appi and App3 with block arrows 24 and 26 where the primary is at the beginning of the block arrow and the tip of the arrow points to the backup. [0060] Availability Managers (Duration AM) 28a, 28b, and 28c are shown coupled to Duration Interfaces (Duration IF) 34a and 36a, 34b and 36b, and 34c and 36c, respectively, in which the registration code is contained for running the applications process. Communication links 38a, 4Oa1 38b, 40b, 38c, 40c are shown coupling corresponding local Duration AMs and Duration IFs.
[0061] Duration AMs for each local system are shown coupled to corresponding System Libs layers 42a through 42c. Also coupled to the Duration AM layers are corresponding TCPF modules 44a through 44c which manage the TCP connection state at the kernel level, and the kernel KState modules 46a through 46c which collect the above mentioned general kernel state. Corresponding Linux Kernels 48a through 48c are shown at each of the lower layers coupled to network 50. In addition, Policy Files (PF) 52a through
52c are shown coupled to each local system. [0062] 2. Loading Of Applications And Shared Libraries.
[0063] In order for the invention to provide High Availability (HA) Services for a given application, the system is configured to allow the application to register for High Availability services/protection in some manner. Similarly, the application is configured to provide an un-register process prior to terminating in order to indicate successful completion.
[0064] Conventionally, creating a program that is "HA aware" has required that a programmer add custom code to the application followed by compilation and linking. However, as the "end user" of an application program does not have access to the source code, this mechanism only has limited functionality. [0065] The present invention, however, provides the HA functionality within a set of system-level services, such as provided in the form of shared libraries. Shared libraries are supported by all modern operating systems, such as
Linux, Unix, Windows, LynxOS, and Apple OS X. Shared libraries are initialized through standard calls, which are referred to herein as "_init()"\n the following description.
[0066] FIG. 2 illustrates the loading process 70 of system libraries. In this example, first the operating system loads the shared system libraries 72, then the shared application libraries, and finally the application executable itself 74.
By way of example, and not of limitation, the figure describes the two steps of the Linux loader 76:
1 . Loading and initialization of shared libraries 72, including system libraries such as glibc, and other shared libraries.
2. Loading of the application executable and calling _main() to start the application 74.
In this regard, it is important to note that the invention provides HA services that are loaded and activated during step #1 ; namely, as a shared library. In the description herein, the term HALib is used to refer to a group of libraries providing the core HA services, such as automatic registration, automatic un- registration, checkpointing, fault detection, virtual IP addresses, fault recovery, and the kernel module library interface. [0067] 3. Automatic Registration.
[0068] Registration is provided in this embodiment by the JnitQ function of the shared HALib library. The JnitQ function initializes the High Availability services for the application process and registers the process with the HA infrastructure. The initialization and registration occurs before any part of the application has been loaded. [0069] By way of example, and not of limitation, the following is a pseudo code implementation of_init() as provided in the HALib. void _init()
{
// register with HA services // initialize checkpointing // initialize fault detection // initialize Virtual IP addresses
// initialize kernel module interface
// initialize recovery services and other HA Services
// register exit handler
} [0070] As short-hand for the content of the _init() method above, the invention uses the name uet_init()". [0071] 4. Automatic Un-Reαistration.
[0072] The invention provides un-registration to handle the case where the application has finished processing and wants to do a "planned" exit. If the application crashes or faults through some other means, indicative of an
"unplanned" exit, then the system is configured to initiate recovery. [0073] By way of example, and not of limitation, the following is a pseudo code implementation of the exit_handler() as provided in HALib. void exit_handler(int exit code, void *arg) {
// un-register with HA Services // shut down of checkpointing // shut down of fault detection // shutdown of Virtual IP addresses // shutdown of kernel module interface // shutdown of other recovery services
}
[0074] 5. Pre-Loadinα Of Shared Libraries.
[0075] To ensure that the registration and un-registration is handled automatically every time an application is loaded, the invention ensures that the HA libraries are available and loaded prior to application launch. This is achieved for example, by utilizing the preload capabilities of the system loader. By preloading the HA libraries, the invention also enables the HA library to replace or enhance functionality in other shared libraries or system libraries. By way of example, and not limitation, the Linux loader enables preloading of libraries by use of the LDJPRELOAD environment variable.
Library HALib gets preloaded by setting LD_PRELOAD=l<iu\\ path>/HALib.so, exporting the LD PRELOAD environment variable, and then loading the application.
[0076] By way of example, and not limitation, the bash Unix shell facilitates a combination of all three steps above into one step. An example command line to load App1 would be:
> LD_PRELOAD=/<M\_path>/HALib.so App [0077] 6. Full Transparency.
[0078] FIG. 3 illustrates steps according to an embodiment of the invention for providing fully transparent and automatic High Availability services by utilizing the three elements described above. Represented by block 80 is pre-loading of HALib performed for each application, ensuring HA Services are loaded prior to the application. In block 82 automatic initialization is performed on the shared libraries as they are loaded by the system loader using standard JnitQ calls. In block 84 registration of exit_handler() is performed. Loading and execution of the application is performed in block 86. [0079] 7. Fault Detection.
[0080] Detecting that the application has failed is one of the core components in the invention. There are three general classes of faults that the invention protects against: 1. Node faults, where a server crashes or reboots;
2. Unplanned Application exits, where application exits unexpectedly; and
3. Application hangs, where application is non-functional or not performing correct operations. [0081] Node faults are detected using heart-beats and general communication between the Duration AMs 28a through 28c (FIG. 1 ) on each node. By way of example, and not limitation, Duration AM 28a on Nodei 12 communicates and ensures operational integrity of all nodes that are failover targets for applications running on Nodei 28b. By way of example, the Duration AM 28a on Nodei 12 communicates with the Duration AM 28b on Node2 14 to ensure availability of App1 18. The Duration AM 30 on Node2 14 communicates with the Duration AM 28a on Nodei 12 to ensure the availability of App220. The AM 28c on Node3 16 does not communicate with other AMs, as App322 is protected locally on Node3 16 only. [0082] Unplanned application exits are detected by the local AM on the system where the application is running when the communication link between the local AM and the Duration IF is broken. Referring to FIG. 1 for illustrative purposes, the communication link 38a for App1 18 goes between the local AM 28a and Duration IF 34a. [0083] Application hangs are detected as the system is configured for performing health-checks on the system where the application is running. The health-check invokes some feature or component of the application and if an invalid result is produced, creates a fault event. Health check can be any executable, script or macro that is capable of calculating and returning integer values of {0, 1 , -1 , 2, -2} and so forth. In one aspect of the invention, the health-check is a binary executable that returns a value of zero if successful or non-zero if a fault is detected. In another aspect of the invention, the health-check is a script that returns zero if successful or non-zero if a fault is detected.
[0084] 8. Virtual IP Addresses. [0085] The majority of modern networked computers use TCP/IP for network communication, wherein each network interface card (NIC) is assigned a unique IP address, and each computer has one or more NICs. Accordingly, the invention readily can be implemented over a TCP/IP based network. The uniqueness of IP addresses on the network follows the following rules: (1 ) each IP address is different from all other IP addresses visible to the computer, and (2) the protocol supports having two or more IP addresses assigned to the same NIC. In the following discussion the described NIC IP address is designated as NICJP. While the NICJP can be used to address the system, it ultimately belongs to the NIC in the system, not individual applications or other higher level components.
[0086] In general, a network application listens on a port on a given IP address for incoming connections. Using the NICJP as the contact IP for the application generally leads to problems, since the NICJP is bound to the hardware NIC in the system. If the application fails on the primary and has to be restored on the backup server, the NICJP will have to be moved, which is generally not possible without disrupting all other running programs, including the operating system, on the primary server.
[0087] The present invention addresses this fundamental issue by using a technique of Virtual IPs. The invention assigns unique IP addresses for the individual application under protection. This application-specific IP address is referred to herein as a Virtual IP (VIP). If the application fails on the primary and gets moved to the backup, the VIP simply gets moved with the application, thereby ensuring that clients communicating with the application on the VIP are not cognizant of the fact that the application was moved from the primary to the backup. While the clients generally have to reconnect to re¬ establish the connection, the reconnect transparently connects to the backup server, without the client being aware that the application was failed over. [0088] The Virtual IP is assigned, sometimes also called "aliased" herein, to a
NIC in the system, where the application is running. By way of example, conditions on this assignment process may include the following. If a group of applications all use the same VIP, all applications in the group have to run on the same system since each VIP is unique and only can be mapped to one
NIC. If a group of applications all use the same VIP and one of the applications fails over to the backup location, the invention will automatically move the other members of the group to the backup location. [0089] 9. Use Of Virtual IP Addresses For High Availability. [0090] By way of example, and not limitation, consider the scenario where an application uses VIP_1 on the primary server. If the application crashes and needs to be restored on the backup server, the invention removes the VIP_1 alias from the primary server and subsequently aliases VIP_1 to a NIC in the backup server. The application remains responsive on VIP_1 with the same port-number, wherein the failover is complete.
[0091] The invention renders the application location independent by utilizing
VIPs, since the application can be addressed independently of the server upon which it is running at any given point in time. The invention ensures that the assignment of VIPs and re-assignment upon failover to a backup server is provided as a system level function, and therefore is transparent to the applications under HA protection.
[0092] Another aspect of the invention uses the VIP to determine if more than one copy of a given application is launched at any given time. If the invention detects two instances of a VIP, one of the duplicates of the application will be forcefully terminated.
[0093] 10. Use Of Virtual IP Addresses For Migration.
[0094] As described under the previous section "Use Of Virtual IP Addresses
For High Availability", the VIP is automatically and transparently moved with the application upon a failover, as part of the failover mechanisms. [0095] In the same manner, if the system administrator migrates an application, such as manually initiating a move of the application without a fault, the VIP are automatically and transparently moved. [0096] 1 1. Launch Order Of Multi-Process Applications.
[0097] A Multi-process application consists of multiple independent processes, each performing a part of the application. Generally, when a multi-process application is launched a strict launch-order must be observed. The invention automatically tracks the processes as they are launched and maintains a data structure containing the launch history. This data structure is used upon failover and recovery to re-launch the processes in the correct order. In one mode, the invention allows the user to specify the launch order of processes as well, such as using the graphics management interface of the present invention. The management interface can be used to order the process in the order of first-to-last to ensure any particular launch order. In addition, one mode of the invention is configured to allow the user to specify the relative timing of the various processes, thereby ensuring a proper launch. [0098] 12. Duration Configuration Tool (DCT).lt will be appreciated that network and related operational settings for the invention can be entered in various conventional ways, since the invention is implemented in software. For example, a graphics user interface (GUI) could be provided to configure all the high availability characteristics for all applications. In another embodiment, access could be provided through a command line interface (CLI). Such interfaces would be easily implemented in software to provide access to the features described herein.
[0099] More particularly, a Duration Configuration Tool (DCT) is provided to allow for easy configuration of applications and their associated policies, such as checkpointing options, health checks, node-lists, VIP addresses, etc. When the administrator uses the DCT to make a change in the system, the changes are deployed by the Availability Managers on all the nodes. The DCT also provides a live view of the current configuration and system status, including running nodes and applications. In addition, applications can be launched and migrated, nodes rebooted or added, and fault reports reviewed. [00100] 13. TCP Connection Failover And Migration.
[00101] FIG. 4 illustrates an example of a system configuration 90 showing connectivity between client 92 a primary server 94 and a backup server 96 over a communications medium 100, such as the Internet. A client application 102 is shown which communicates with primary sever 94 through TCP/IP layers 104, 106 via the Internet 100, and ostensibly with backup server 96 after failover. Primary server 94 is shown with a server application 108 coupled to Duration 1 10 as described herein above a TCP layer 1 16 and an
IP layer 1 18. Similarly, backup server 96 is shown with server application 1 12 coupled to Duration 1 14 above a TCP layer 120 and an IP layer 122. [00102] It will be appreciated that maintaining connectivity is an important practical aspect of high availability. If a client application 102 at client 92 is connected through TCP/IP 104, 106 to an application 108 protected by the invention and a fault and recovery is initiated, then traditionally the TCP/IP network connection 124, 126 is lost. This is an artifact of how TCP/IP works: if the NICJP changes, the TCP/IP networking stack will disconnect, forcing a client reconnect. Alternatively, if the application is restarted, client connections also have to be re-established.
[00103] The invention addresses this issue by providing TCP/IP connection failover, thereby ensuring that client connections 124,126 are maintained across a migration of the server application from the primary to the backup. By way of example, and not limitation, FIG. 4 illustrates an example where a client application 102 is connected via TCP/IP 104, 106 on client system 92, to the primary server application 108 running in server 94. TCP/IP traffic is delivered via connection 124, and arrives at the IP layer 1 18 at primary server 94 wherein it gets routed through the IP bridge 128, to the TCP layer 116, finally arriving at the server application 108 under control of Duration 1 10 on the primary. For incoming network traffic, bridge 128 captures all internal state of TCP and IP and the forwards the network data to the TCP stack 1 16 and the Bridge 130 on backup server 96. On primary server 94 the network traffic is delivered by the TCP stack 1 16 to Duration 1 10 and server application 108. The bridge 128 on Fig 4, is called TCPF (44a-44c) in FIG. 1. [00104] On the primary server 94 the bridge 128 and Duration 110 coordinates when the state is captured. This coordination ensures that the state of the server application 108 is captured at the same time as the state of the TCP/IP connection in bridge 128. [00105] The bridge 128 and Duration 1 10 on the primary server transmit the combined state of the server application 108 and the bridge 128 to the backup server 96. The combined state is shared between the bridge 130 on the backup, the backup server application 1 12, and Duration 1 14.
[00106] The bridge 130 on backup server 96, with assistance from Duration
1 14 on backup server 96, stores copies of the TCP and IP stack state for use upon restoration of TCP/IP connections at the backup. The bridge 130 on backup server 96 in combination with the server application state, allows the Duration 1 14 on backup server 96 to perform a stateful migration of the server application from primary application execution 108 to a backup application execution 1 12 with preservation of client 92 TCP connections 124. [00107] By way of example, and not limitation, the system can be configured for the bridging actions according to the following. The system can be configured for collecting the IP and TCP states for later use. For example the states can be loaded into a byte buffer which is transmitted to the backup, and stored in the byte buffer of the backup for future use. The collected TCP state information preferably includes TCP sequence numbers and TCP window sizes. The collection of IP and TCP state is preferably provided in a loadable kernel module. The kernel modules are inserted as a bridge between IP and
TCP in the TCP/IP stack. The loadable kernel module is called from, for example, a system checkpointer, which makes the TCP/IP connection migration transparent and automatic. [00108] An aspect of the invention is that the bridge module 128 sits within the IP layer 1 18 under TCP 1 16, wherein the TCP layer is unaware of the bridge and its migration functionality. During migration from primary to backup, programming according to the invention is configured to "freeze" the networking connection to ensure no messages are being sent to, and processed by, the "old" primary while the backup is in the process of taking over. The client side will experience a minor delay while the network connection is frozen. Generally the delay is less than a second, but could be larger depending on processor speed, memory, CPU utilization and other factors. Connection will automatically resume once the IP and TCP stacks have been restored to the state of the primary for the connections being protected.
[00109] In one mode of the system storage checkpointing and synchronizing storage checkpointing with process checkpointing is performed. In one aspect the storage checkpointing procedure notifies the kernel module which captures the state of the open TCP connections for the checkpointing procedure. [00110] 14. Lossless Migration. [00111] The invention combines the VIP and TCP Connection failover to provide lossless migration of applications with stateful client connections. If there are no stateful client TCP Connections the invention provides lossless migration without requiring TCP Connection migration. [00112] 15. Policy Management. [00113] One aspect of the invention addresses the issue of determining
"optimal" settings for the various High Availability parameters by providing a "built-in" profiler. The profiler monitors application execution, and builds a statistical description of the execution which is used for generating and/or recommending optimal settings. The profiling process is preferably performed transparently and automatically, with no administrator intervention necessary.
According to one mode, the administrator can later select which of the recommended configuration changes to apply. The invention can be configured for another mode, in which the administrator dynamically adjusts parameters on a live system. By way of example, and not limitation, this may include changing of heart-beat frequency, checkpointing interval, health- checks, start/stop/restart scripts, and so forth. [00114] 16. Starting And Stopping Applications.
[00115] The invention supports starting and stopping of an application both as if it were launched from the command line and as if it were launched with scripts. One aspect of the invention provides application launching that emulates launching the application from a command line. One way of implementing this case is by configuring the command line arguments via the management interfaces and automatically forwarding them to the launched application via the Duration AM. [00116] A number of different aspects can be implemented within an embodiment of the invention for starting and stopping. The following are provided by way of example and not limitation: (1 ) Launching the application in accord with the standard Linux START/RESTART/STOP launch and termination scripts. In this case the invention parses the START/RESTART/STOP scripts and interprets environment variable and configuration data for use by the invention. (2) Launching the application (START) through a custom written executable, such as shell scripts, Perl scripts, expect scripts, php, and so forth. (3) Application restarting (RESTART) can be executed through a custom written executable, such as shell scripts, Perl scripts, expect scripts, php, and so forth. (4) Terminating the application (STOP) through a custom written executable, such as using shell scripts, Perl scripts, expect scripts, php, and so forth. (5) Performing an
"AutoStartup" in which the programming automatically launches HA services for pre-configured application upon initial booting or rebooting of the system. (6) Ensuring that the application with AutoStartup enabled only gets launched on the primary server, even if the backup server comes up first. [00117] 17. Conclusion.
[00118] The present invention comprises a system, apparatus and method of providing high availability services over a connection medium, or network, such as the Internet. The system invention allows application programming and connection failover from a primary to a secondary server, as well as restoration. An embodiment of programming is described for various layers within the system. It should be recognized that these descriptions are provided by way of example and that one of ordinary skill in the art can modify the implementation of the system without departing from the teachings of the present invention. [00119] Although the description above contains many details, these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the presently preferred embodiments of this invention. Therefore, it will be appreciated that the scope of the present invention fully encompasses other embodiments which may become obvious to those skilled in the art, and that the scope of the present invention is accordingly to be limited by nothing other than the appended claims, in which reference to an element in the singular is not intended to mean "one and only one" unless explicitly so stated, but rather "one or more." All structural and functional equivalents to the elements of the above-described preferred embodiment that are known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved by the present invention, for it to be encompassed by the present claims. Furthermore, no element, component, or method step in the present disclosure is intended to be dedicated to the public regardless of whether the element, component, or method step is explicitly recited in the claims. No claim element herein is to be construed under the provisions of 35 U. S. C. 112, sixth paragraph, unless the element is expressly recited using the phrase "means for."

Claims

CLAIMS What is claimed is:
1. A method for achieving transparent integration of an application program with a high availability protection program, comprising: injecting registration code, transparently and automatically, into an application program during launch; wherein said application program automatically registers with said high availability protection program; wherein modification of the application program or application program recompilation is not required; and wherein a custom loader is not required.
2. A method as recited in claim 1 , further comprising: monitoring unregistration of said application program from said high availability program; and
. designating said unregistration as a normal exit.
3. A method as recited in claim 1 , wherein said registration code comprises et_init().
4. In a high availability protection computer program, the improvement comprising: injecting registration code, transparently and automatically, into an application program during launch; wherein said application program automatically registers with said high availability protection program; wherein modification of the application program or application program recompilation is not required; and wherein a custom loader is not required.
5. An improvement as recited in claim 4, further comprising: monitoring unregistration of said application program from said high availability program; and designating said unregistration as a normal exit.
6. An improvement as recited in claim 4, wherein said registration code comprises et_init().
7. A computer program for transparently registering an application program with a high availability computer program, comprising a set of instructions stored on a media accessible by a computer and executable on said computer, wherein said computer program performs the steps comprising: injecting registration code, transparently and automatically, into an application program during launch; wherein said application program automatically registers with said high availability protection program; wherein modification of the application program or application program recompilation is not required; and wherein a custom loader is not required.
8. A computer program as recited in claim 7, wherein said program performs the steps further comprising: monitoring unregistration of said application program from said high availability program; and designating said unregistration as a normal exit.
9. A computer program method as recited in claim 7, wherein said registration code comprises et_init().
10. A method for maintaining a client connection to an application program in a multimode network, comprising: assigning a virtual IP address to one or more application programs hosted on a first node; wherein said virtual IP address is retained by an application program when said application program is migrated to a second node.
11. A method as recited in claim 10, wherein each said application program is assigned a unique virtual IP address.
12. A method as recited in claim 10, wherein one or more groups of application programs are assigned a unique virtual IP address.
13. A method as recited in claim 10: wherein assignment of a virtual IP address is transparent to an application program; and wherein migration of an application program from said first node to said second node is transparent to a user.
14. In a high availability computer system, the improvement comprising: assigning a virtual IP address to one or more application programs hosted on a first node; wherein said virtual IP address is retained by an application program when said application program is migrated to a second node.
15. An improvement as recited in claim 14, wherein each said application program is assigned a unique virtual IP address.
16. An improvement as recited in claim 14, wherein one or more groups of application programs are assigned a unique virtual IP address.
17. An improvement as recited in claim 14: wherein assignment of a virtual IP address is transparent to an application program; and wherein migration of an application program from said first node to said second node is transparent to a user.
18. A method for system management in a high availability computer program, comprising: providing a mechanism to ensure that processes that comprise an application program are launched in a proper order, and with the proper timing constraints during recovery.
19. A method as recited in claim 18, further comprising: providing a mechanism to ensure that application programs are recovered in the proper order.
20. A method as recited in claim 18, further comprising: providing a mechanism to configure the high availability characteristics of an application program through a user interface without requiring any modification or recompilation of the application program.
/
21. In a high availability computer program, the improvement comprising: a mechanism to ensure that processes that comprise an application program are launched in the proper order, and with the proper timing constraints during recovery.
22. An improvement as recited in claim 21 , further comprising: a mechanism to ensure that application programs are recovered in the proper order.
23. An improvement as recited in claim 21 , further comprising: a mechanism to configure the high availability characteristics of an application program through a user interface without requiring any modification or recompilation of the application program.
24. A method for lossless migration of an application program from a primary node to a backup node without replication which is transparent to a client connected to the primary node over a TCP/IP connection, comprising: providing a loadable kernel module comprising a dummy device driver; providing an application checkpointing procedure which invokes said kernel module; providing an application restoration procedure which invokes said kernel module; wherein, during checkpointing, the checkpointing procedure notifies the kernel module, and the kernel module captures the state of all the TCP connections that are open for that process in a byte buffer and sends the state to the checkpointing procedure; and sending the connection state to a backup node along with the application state; wherein, during restoration on the backup node, the restoration procedure invokes the kernel module with the saved byte buffer, and the kernel module uses the data in the byte buffer to restore all the TCP connections in the exact same state as they were in the primary node.
25. A method as recited in claim 24: wherein the kernel module hooks into the networking stack during checkpointing and restoration and freezes the entire connection; and wherein the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
26. A computer executable program for lossless migration of an application program from a primary node to a backup node without replication which is transparent to a client connected to the primary node over a TCP/IP connection, comprising: a loadable kernel module comprising a dummy device driver; an application checkpointing procedure which invokes said kernel module; an application restoration procedure which invokes said kernel module; wherein, during checkpointing, the checkpointing procedure notifies the kernel module, and the kernel module captures the state of all the TCP connections that are open for that process in a byte buffer and sends the state to the checkpointing procedure; wherein the checkpointing procedure sends the connection state to a backup node along with the application state; and wherein, during restoration on the backup node, the restoration procedure invokes the kernel module with the saved byte buffer, and the kernel module uses the data in the byte buffer to restore all the TCP connections in the exact same state as they were in the primary node.
27. A computer executable program as recited in claim 26: wherein the kernel module hooks into the networking stack during checkpointing and restoration and freezes the entire connection; and wherein the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
28. A method for achieving transparent integration of an application program with a high availability protection program, comprising: injecting registration code, transparently and automatically, into an application program during launch, without the need of modifying or recompiling the application program and without the need of a custom loader; registering said application program automatically with said high availability protection program; detecting a failure in the execution of said application program running on a primary server; and executing said application program from one or more designated backup servers automatically in response to said failure.
29. A method as recited in claim 28, further comprising: monitoring un registration of said application program from said high availability program; and designating said unregistration as a normal exit.
30. A method as recited in claim 28, further comprising managing high availability policy using an automatic profiler monitoring application execution, or in response to policy adjustments from an administrator.
31. A method as recited in claim 30, wherein said profiler monitors application execution, builds a statistical description of the execution and uses the statistical description for generating and/or recommending optimal settings.
32. A method as recited in claim 30, wherein said policy comprises characterstics for controlling a heart-beat frequency, a checkpointing interval, configuration of health-checks, or start/stop/restart scripts.
33. A method as recited in claim 28, further comprising performing healthchecks during the execution of said application program for said detecting of a failure in the execution of said application program.
34. A method as recited in claim 28, further comprising: utilizing Virtual IPs (VIPs) wherein a unique IP address is assigned for the individual application under protection, and wherein if the application fails on the primary node and gets moved to the backup node, the VIP gets moved with the application ensuring that clients communicating with the application on the VIP are not aware that the application was moved from the primary node to the backup node.
35. A method as recited in claim 34, further comprising using said VIPs for detecting if more than one duplicate copy of said application program is launched at any given time and terminating one or more said duplicates.
36. A method as recited in claim 28, further comprising maintaining a client connection to an application program in a multimode network, comprising: assigning a virtual IP address to one or more application programs hosted on a first node; wherein each said application program, or groups of application programs, is assigned a unique virtual IP address; wherein assignment of a virtual IP address is transparent to an application program; wherein said virtual IP address is retained by an application program when said application program is migrated to a second node; and wherein migration of an application program from said first node to said second node is transparent to a user.
37. A method as recited in claim 28, further comprising starting and stopping the application as selected from the group of application start and stop mechanisms consisting essentially of: (a) launching the application in accord with the standard Linux START/RESTART/STOP launch and termination scripts by parsing the START/RESTART/STOP scripts and interpreting environmental variables and configuration data for use by the invention; (b) launching the application (START) though a custom written executable or script; (c) restarting (RESTART) the application by executing through a custom written executable or script; (d) terminating the application (STOP) through executing a custom written executable or script; (e) executing an "AutoStartup" in which the programming automatically launches HA services for pre-configured application upon initial booting or rebooting of the system; and (f) ensuring that the application with AutoStartup enabled only gets launched on the primary server, even if the backup server comes up first.
38. A method as recited in claim 28, further comprising: process checkpointing single-threaded and multi-threaded application processes; wherein said process checkpointing is selected from the group of checkpointing mechanisms consisting essentially of: (a) checkpointing daemonized multi-process applications; (b) checkpointing general multiprocess applications; (c) full and incremental checkpointing; and (d) checkpointing to either local or shared disk.
39. A method as recited in claim 28, further comprising storage checkpointing and synchronizing storage checkpointing with process checkpointing.
40. A method as recited in claim 28, wherein during said storage checkpointing, the checkpointing procedure notifies the kernel module which captures the state of the open TCP connections for the checkpointing procedure.
41. A method as recited in claim 28, wherein said method is configured as a mechanism for ensuring that processes within an application program are launched and recovered in a proper order, and that proper timing constraints are maintained during recovery.
42. A method as recited in claim 28, further comprising controlling the configuration of high availability characteristics of an application program through a user interface.
43. A method as recited in claim 28, wherein said method is implemented as a computer program for transparently registering an application program with a high availability computer program and comprises a set of instructions stored on a media accessible by a computer and executable on said computer for performing said method steps.
44. A method for performing lossless migration of an application program from a primary node to a backup node and while being transparent to a client connected to the primary node over a TCP/IP connection, comprising: loading a kernel module comprising a dummy device driver; executing a checkpointing procedure for said application to invoke said kernel module for capturing the state of TCP connections that are open for that process and sending the connection state to said checkpointing procedure and to a backup server node in conjunction with application state; and executing application restoration procedures to invoke said kernel module for restoring the backup server node to restore TCP connections in the exact state as they were in the primary server.
45. A method as recited in claim 44: wherein the kernel module hooks into the networking stack during checkpointing and restoration and freezes the entire connection; and wherein the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
46. A computer executable program for lossless migration of an application program from a primary node to a backup node which is transparent to a client connected to the primary node over a TCP/IP connection, comprising: a loadable kernel module comprising a dummy device driver; an application checkpointing procedure configured for invoking said kernel module for capturing the state of all the open TCP connections for that process and communicating the connection states back to the checkpointing procedure and to a backup node along with the application state; and an application restoration procedure configured for invoking said kernel module to restore all the TCP connections in the exact same state as they were in the primary node.
47. A computer executable program as recited in claim 46: wherein the kernel module hooks into the networking stack during checkpointing and restoration and freezes the entire connection; and wherein the client experiences a connection delay during the time the process is checkpointed and restored on the backup node.
PCT/US2005/030353 2004-08-26 2005-08-26 Method and system for providing high availability to computer applications WO2006026402A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05792688A EP1719056A4 (en) 2004-08-26 2005-08-26 Method and system for providing high availability to computer applications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60502604P 2004-08-26 2004-08-26
US60/605,026 2004-08-26

Publications (2)

Publication Number Publication Date
WO2006026402A2 true WO2006026402A2 (en) 2006-03-09
WO2006026402A3 WO2006026402A3 (en) 2007-09-27

Family

ID=36000598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/030353 WO2006026402A2 (en) 2004-08-26 2005-08-26 Method and system for providing high availability to computer applications

Country Status (3)

Country Link
US (11) US8122280B2 (en)
EP (1) EP1719056A4 (en)
WO (1) WO2006026402A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007044874A1 (en) 2007-09-20 2009-04-16 Siemens Ag Method for determining attenuation values for a patient's PET data
WO2012033773A2 (en) 2010-09-10 2012-03-15 Microsoft Corporation Controlled automatic healing of data-center services
EP2805239A1 (en) * 2012-01-18 2014-11-26 DH2i Company Systems and methods for server cluster application virtualization
GB2532732A (en) * 2014-11-25 2016-06-01 Ibm Integrating a communication bridge into a data procesing system
CN113806106A (en) * 2021-08-13 2021-12-17 中国航空无线电电子研究所 Modem hardware abstraction layer facing VxWorks real-time process

Families Citing this family (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8122280B2 (en) 2004-08-26 2012-02-21 Open Invention Network, Llc Method and system for providing high availability to computer applications
US8572431B2 (en) * 2005-02-23 2013-10-29 Barclays Capital Inc. Disaster recovery framework
US7681075B2 (en) 2006-05-02 2010-03-16 Open Invention Network Llc Method and system for providing high availability to distributed computer applications
US9286109B1 (en) 2005-08-26 2016-03-15 Open Invention Network, Llc Method and system for providing checkpointing to windows application groups
US8612802B1 (en) * 2011-01-31 2013-12-17 Open Invention Network, Llc System and method for statistical application-agnostic fault detection
US8621275B1 (en) 2010-08-06 2013-12-31 Open Invention Network, Llc System and method for event-driven live migration of multi-process applications
US8078910B1 (en) 2008-12-15 2011-12-13 Open Invention Network, Llc Method and system for providing coordinated checkpointing to a group of independent computer applications
US8752049B1 (en) 2008-12-15 2014-06-10 Open Invention Network, Llc Method and computer readable medium for providing checkpointing to windows application groups
US8195722B1 (en) 2008-12-15 2012-06-05 Open Invention Network, Llc Method and system for providing storage checkpointing to a group of independent computer applications
US8220042B2 (en) * 2005-09-12 2012-07-10 Microsoft Corporation Creating secure interactive connections with remote resources
US8175089B2 (en) * 2005-09-30 2012-05-08 Rockwell Automation Technologies, Inc. Extended address space capability for an industrial protocol
CN101346634B (en) 2005-11-04 2012-10-24 甲骨文国际公司 System and method for a gatekeeper in a communications network
US7549079B2 (en) * 2005-11-30 2009-06-16 Oracle International Corporation System and method of configuring a database system with replicated data and automatic failover and recovery
US7644141B2 (en) * 2006-03-23 2010-01-05 International Business Machines Corporation High-availability identification and application installation
US7831686B1 (en) * 2006-03-31 2010-11-09 Symantec Operating Corporation System and method for rapidly ending communication protocol connections in response to node failure
US7797565B1 (en) 2006-04-04 2010-09-14 Symantec Operating Corporation System and method for maintaining communication protocol connections during failover
US8171466B2 (en) * 2006-05-16 2012-05-01 Oracle International Corporation Hitless application upgrade for SIP server architecture
US8001250B2 (en) * 2006-05-16 2011-08-16 Oracle International Corporation SIP and HTTP convergence in network computing environments
US8112525B2 (en) * 2006-05-16 2012-02-07 Oracle International Corporation Engine near cache for reducing latency in a telecommunications environment
US8219697B2 (en) 2006-05-17 2012-07-10 Oracle International Corporation Diameter protocol and SH interface support for SIP server architecture
US20070288288A1 (en) * 2006-06-07 2007-12-13 Tetsuro Motoyama Use of schedule editors in a network-based project schedule management system
US8799043B2 (en) * 2006-06-07 2014-08-05 Ricoh Company, Ltd. Consolidation of member schedules with a project schedule in a network-based management system
US7890636B2 (en) * 2006-06-28 2011-02-15 Cisco Technology, Inc. Application integrated gateway
JP4860434B2 (en) * 2006-11-01 2012-01-25 Necインフロンティア株式会社 Software maintenance method and software maintenance method in VoIP server device
EP1953995A1 (en) * 2007-01-30 2008-08-06 Seiko Epson Corporation Application execution system, computer, application execution device, and control method and program for an application execution system
US9152433B2 (en) 2007-03-15 2015-10-06 Ricoh Company Ltd. Class object wrappers for document object model (DOM) elements for project task management system for managing project schedules over a network
US20080244552A1 (en) * 2007-03-27 2008-10-02 Telefonaktiebolaget Lm Ericsson (Publ) Upgrading services associated with high availability systems
US8225129B2 (en) * 2007-04-10 2012-07-17 International Business Machines Corporation Methods and apparatus for effective on-line backup selection for failure recovery in distributed stream processing systems
US8892624B2 (en) * 2007-04-10 2014-11-18 International Business Machines Corporation Method for the interoperation of virtual organizations
US8417762B2 (en) * 2007-04-10 2013-04-09 International Business Machines Corporation Mechanism for execution of multi-site jobs in a data stream processing system
US8688850B2 (en) * 2007-04-10 2014-04-01 International Business Machines Corporation Method for inter-site data stream transfer in cooperative data stream processing
US8359347B2 (en) * 2007-04-10 2013-01-22 International Business Machines Corporation Method and apparatus for cooperative data stream processing
US20080256549A1 (en) * 2007-04-10 2008-10-16 International Business Machines Corporation System and Method of Planning for Cooperative Information Processing
CN101290577A (en) * 2007-04-20 2008-10-22 鸿富锦精密工业(深圳)有限公司 Embedded equipment and its loading method
US7958385B1 (en) * 2007-04-30 2011-06-07 Netapp, Inc. System and method for verification and enforcement of virtual interface failover within a cluster
JP2008305070A (en) * 2007-06-06 2008-12-18 Hitachi Communication Technologies Ltd Information processor and information processor system
US20090164767A1 (en) * 2007-12-20 2009-06-25 Telefonaktiebolaget Lm Ericsson (Publ) Methods and systems for generating availability management framework (amf) configurations
US20090217240A1 (en) * 2008-02-22 2009-08-27 Tetsuro Motoyama Script generation for graceful termination of a web enabled client by a web server
US20090217241A1 (en) * 2008-02-22 2009-08-27 Tetsuro Motoyama Graceful termination of a web enabled client
US7971099B2 (en) * 2008-04-02 2011-06-28 International Business Machines Corporation Method for enabling faster recovery of client applications in the event of server failure
JP5074290B2 (en) * 2008-05-13 2012-11-14 株式会社日立国際電気 Redundancy switching system, redundancy management device and application processing device
US8321257B2 (en) * 2008-05-16 2012-11-27 Ricoh Company, Ltd. Managing project schedule data using separate current and historical task schedule data
US8352498B2 (en) * 2008-05-16 2013-01-08 Ricoh Company, Ltd. Managing to-do lists in a schedule editor in a project management system
US8706768B2 (en) 2008-05-16 2014-04-22 Ricoh Company, Ltd. Managing to-do lists in task schedules in a project management system
US9483743B1 (en) * 2008-06-30 2016-11-01 Sprint Communications Company L.P. System and method for improving recovery of a telecommunications network from an unscheduled loss of service using repeatable requirements for applications by design criticality classification
US8782670B2 (en) * 2009-04-10 2014-07-15 Open Invention Network, Llc System and method for application isolation
US8752048B1 (en) * 2008-12-15 2014-06-10 Open Invention Network, Llc Method and system for providing checkpointing to windows application groups
US8539488B1 (en) * 2009-04-10 2013-09-17 Open Invention Network, Llc System and method for application isolation with live migration
US8281317B1 (en) 2008-12-15 2012-10-02 Open Invention Network Llc Method and computer readable medium for providing checkpointing to windows application groups
US8904004B2 (en) 2009-04-10 2014-12-02 Open Invention Network, Llc System and method for maintaining mappings between application resources inside and outside isolated environments
US10019327B1 (en) 2008-12-15 2018-07-10 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US8341631B2 (en) 2009-04-10 2012-12-25 Open Invention Network Llc System and method for application isolation
US8745442B1 (en) * 2011-04-28 2014-06-03 Open Invention Network, Llc System and method for hybrid kernel- and user-space checkpointing
US8826070B1 (en) 2008-12-15 2014-09-02 Open Invention Network, Llc Method and system for providing storage checkpointing to a group of independent computer applications
US8880473B1 (en) 2008-12-15 2014-11-04 Open Invention Network, Llc Method and system for providing storage checkpointing to a group of independent computer applications
US8464256B1 (en) 2009-04-10 2013-06-11 Open Invention Network, Llc System and method for hierarchical interception with isolated environments
US9256496B1 (en) * 2008-12-15 2016-02-09 Open Invention Network, Llc System and method for hybrid kernel—and user-space incremental and full checkpointing
US9354977B1 (en) * 2008-12-15 2016-05-31 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US7941700B2 (en) * 2009-03-02 2011-05-10 Microsoft Corporation Operating system-based application recovery
US8555360B1 (en) 2009-04-10 2013-10-08 Open Invention Network Llc System and method for on-line and off-line streaming application isolation
US9577893B1 (en) 2009-04-10 2017-02-21 Open Invention Network Llc System and method for cached streaming application isolation
US10419504B1 (en) 2009-04-10 2019-09-17 Open Invention Network Llc System and method for streaming application isolation
US8418236B1 (en) 2009-04-10 2013-04-09 Open Invention Network Llc System and method for streaming application isolation
US9058599B1 (en) * 2009-04-10 2015-06-16 Open Invention Network, Llc System and method for usage billing of hosted applications
US11538078B1 (en) * 2009-04-10 2022-12-27 International Business Machines Corporation System and method for usage billing of hosted applications
US8930527B2 (en) * 2009-05-26 2015-01-06 Oracle International Corporation High availability enabler
JP5498102B2 (en) * 2009-09-02 2014-05-21 アラクサラネットワークス株式会社 Network system, network relay device, and control method thereof
US9755886B2 (en) * 2009-09-30 2017-09-05 Micro Focus Software Inc. Techniques for conditional name resolution and configuration
US8688816B2 (en) * 2009-11-19 2014-04-01 Oracle International Corporation High availability by letting application session processing occur independent of protocol servers
US8335853B2 (en) * 2009-12-17 2012-12-18 Sonus Networks, Inc. Transparent recovery of transport connections using packet translation techniques
US8352799B2 (en) * 2010-02-12 2013-01-08 Symantec Corporation Data corruption prevention during application restart and recovery
US8555105B2 (en) * 2010-04-12 2013-10-08 International Business Machines Corporation Fallover policy management in high availability systems
US8782434B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time
US8650431B2 (en) * 2010-08-24 2014-02-11 International Business Machines Corporation Non-disruptive hardware change
US10031796B1 (en) 2011-01-31 2018-07-24 Open Invention Network, Llc System and method for trend estimation for application-agnostic statistical fault detection
US9948324B1 (en) 2011-01-31 2018-04-17 Open Invention Network, Llc System and method for informational reduction
US10191796B1 (en) 2011-01-31 2019-01-29 Open Invention Network, Llc System and method for statistical application-agnostic fault detection in environments with data trend
US9935836B2 (en) * 2011-04-07 2018-04-03 Veritas Technologies Llc Exclusive IP zone support systems and method
US11307941B1 (en) 2011-04-28 2022-04-19 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US11625307B1 (en) 2011-04-28 2023-04-11 International Business Machines Corporation System and method for hybrid kernel- and user-space incremental and full checkpointing
US8756455B2 (en) 2011-11-17 2014-06-17 Microsoft Corporation Synchronized failover for active-passive applications
US9288177B2 (en) * 2011-12-14 2016-03-15 International Business Machines Corporation Inventory updating of an internet protocol (IP) alias within a highly available computing cluster
WO2013101082A1 (en) * 2011-12-29 2013-07-04 Intel Corporation Reset of processing core in multi-core processing system
US9342348B2 (en) 2012-01-23 2016-05-17 Brocade Communications Systems, Inc. Transparent high availability for stateful services
US9020894B2 (en) * 2012-01-24 2015-04-28 Cisco Technology, Inc. Service version modification of a high-availability system
US8966190B1 (en) 2012-03-31 2015-02-24 Emc Corporation System and method for assigning control of a logical unit number
US8909886B1 (en) * 2012-03-31 2014-12-09 Emc Corporation System and method for improving cache performance upon detecting a migration event
US8914583B1 (en) 2012-03-31 2014-12-16 Emc Corporation System and method for improving cache performance
US9742676B2 (en) 2012-06-06 2017-08-22 International Business Machines Corporation Highly available servers
US8918673B1 (en) * 2012-06-14 2014-12-23 Symantec Corporation Systems and methods for proactively evaluating failover nodes prior to the occurrence of failover events
US8935563B1 (en) * 2012-06-15 2015-01-13 Symantec Corporation Systems and methods for facilitating substantially continuous availability of multi-tier applications within computer clusters
KR102028663B1 (en) 2012-07-24 2019-10-04 삼성전자주식회사 Apparatus and method for error detection
US9063721B2 (en) 2012-09-14 2015-06-23 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
US9069782B2 (en) 2012-10-01 2015-06-30 The Research Foundation For The State University Of New York System and method for security and privacy aware virtual machine checkpointing
US9032199B1 (en) 2012-12-28 2015-05-12 Google Inc. Systems, devices, and methods for capturing information, creating loadable images, and providing for restarts in a computer system
JP6205898B2 (en) 2013-06-27 2017-10-04 富士通株式会社 Control method, control program, and information processing system
US9680774B2 (en) 2014-02-26 2017-06-13 Red Hat, Inc. Network interface card offloading
US9692642B2 (en) 2014-02-26 2017-06-27 Red Hat, Inc. Offloading to a network interface card
GB2528441B (en) * 2014-07-21 2016-05-18 Ibm Routing communication between computing platforms
US9715433B2 (en) 2014-08-29 2017-07-25 Netapp, Inc. Reconciliation in sync replication
US10291545B2 (en) 2014-12-08 2019-05-14 Samsung Electronics Co., Ltd. Method and apparatus for setting communicating session
US10019249B1 (en) * 2014-12-18 2018-07-10 Amazon Technologies, Inc. Techniques for minimally invasive application updates and data transfer
US9971622B2 (en) * 2015-06-25 2018-05-15 Intel Corporation Technologies for application migration using lightweight virtualization
US10749964B2 (en) * 2015-12-17 2020-08-18 Twilio Inc. System and method for contextual communication
US10203966B2 (en) * 2016-08-26 2019-02-12 Avago Technologies International Sales Pte. Limited Application launcher and management framework for a network device
US11916994B1 (en) * 2016-12-15 2024-02-27 Blue Yonder Group, Inc. Extending RESTful web service resources in a JAVA-component-driven-architecture application
US10310872B2 (en) * 2017-02-21 2019-06-04 Red Hat, Inc. Transparent fast application launcher
US11301332B2 (en) * 2017-07-31 2022-04-12 Honeywell International Inc. Automatic firmware upgrade of an embedded node
US10445181B2 (en) * 2017-10-23 2019-10-15 Western Digital Technologies, Inc. Lossless synchronization software reset
US10795717B2 (en) * 2018-09-18 2020-10-06 Microsoft Technology Licensing, Llc Hypervisor flow steering for address sharing
US11182508B1 (en) 2021-02-23 2021-11-23 Polyverse Corporation Enhanced version retention systems and methods
US11868206B2 (en) * 2021-05-11 2024-01-09 Sap Se Automated mass message processing
US11461481B1 (en) 2021-06-04 2022-10-04 Polyverse Corporation Encrypted to be executed software code and execution environment apparatuses, systems, and methods
US11354405B1 (en) 2021-07-06 2022-06-07 Polyverse Corporation Code snippet mobilization systems and methods
US11216299B1 (en) 2021-07-06 2022-01-04 Polyverse Corporation Computing environment multi-aliasing systems and methods

Family Cites Families (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0665175B2 (en) 1985-07-25 1994-08-22 松下電工株式会社 Discharge lamp lighting device
CA2106280C (en) * 1992-09-30 2000-01-18 Yennun Huang Apparatus and methods for fault-tolerant computing employing a daemon monitoring process and fault-tolerant library to provide varying degrees of fault tolerance
US5463287A (en) 1993-10-06 1995-10-31 Tdk Corporation Discharge lamp lighting apparatus which can control a lighting process
DE69635409T2 (en) * 1995-03-06 2006-07-27 Intel Corp., Santa Clara A COMPUTER SYSTEM WITH UNBEATED ON-REQUEST AVAILABILITY
US6321275B1 (en) 1995-04-24 2001-11-20 Microsoft Corporation Interpreted remote procedure calls
US6105148A (en) * 1995-06-16 2000-08-15 Lucent Technologies Inc. Persistent state checkpoint and restoration systems
CA2179337C (en) 1995-08-22 2000-11-14 Thomas F. Laporta Network-based migrating user agents for personal communication services
US5774660A (en) * 1996-08-05 1998-06-30 Resonate, Inc. World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network
US6021408A (en) * 1996-09-12 2000-02-01 Veritas Software Corp. Methods for operating a log device
US7136903B1 (en) 1996-11-22 2006-11-14 Mangosoft Intellectual Property, Inc. Internet-based shared file service with native PC client access and semantics and distributed access control
US5951650A (en) 1997-01-31 1999-09-14 International Business Machines Corporation Session traffic splitting using virtual internet protocol addresses associated with distinct categories of application programs irrespective of destination IP address
JP3253883B2 (en) 1997-01-31 2002-02-04 株式会社東芝 Process restart method and process monitoring device
US6189111B1 (en) * 1997-03-28 2001-02-13 Tandem Computers Incorporated Resource harvesting in scalable, fault tolerant, single system image clusters
US5996016A (en) * 1997-04-15 1999-11-30 International Business Machines Corporation Reinitiation of bind calls for IP applications concurrently executing with alternate address
JPH11238488A (en) 1997-06-06 1999-08-31 Toshiba Lighting & Technology Corp Metal halide discharge lamp, metal halide discharge lamp lighting device and lighting system
US6154877A (en) * 1997-07-03 2000-11-28 The University Of Iowa Research Foundation Method and apparatus for portable checkpointing using data structure metrics and conversion functions
US6161219A (en) * 1997-07-03 2000-12-12 The University Of Iowa Research Foundation System and method for providing checkpointing with precompile directives and supporting software to produce checkpoints, independent of environment constraints
US6148410A (en) * 1997-09-15 2000-11-14 International Business Machines Corporation Fault tolerant recoverable TCP/IP connection router
USH1940H1 (en) * 1997-09-26 2001-02-06 Dsc/Celcore, Inc. System and method for dynamically mapping components within a telecommunications switching platform
US6018725A (en) * 1997-09-30 2000-01-25 Pitney Bowes Inc. Method and system of implementing a carrier manager registry
US6496979B1 (en) * 1997-10-24 2002-12-17 Microsoft Corporation System and method for managing application installation for a mobile device
US6160362A (en) 1998-01-07 2000-12-12 Philips Electronics North America Corporation Ignition scheme for a high intensity discharge lamp
US6560626B1 (en) 1998-04-02 2003-05-06 Microsoft Corporation Thread interruption with minimal resource usage using an asynchronous procedure call
US6496847B1 (en) 1998-05-15 2002-12-17 Vmware, Inc. System and method for virtualizing computer systems
US6144999A (en) 1998-05-29 2000-11-07 Sun Microsystems, Incorporated Method and apparatus for file system disaster recovery
JP2000058276A (en) 1998-08-11 2000-02-25 Stanley Electric Co Ltd Discharge lamp lighting device
US6314567B1 (en) 1998-11-13 2001-11-06 Hewlett-Packard Company Apparatus and method for transferring state data when performing on-line replacement of a running program code and data
US6269442B1 (en) 1998-11-13 2001-07-31 Hewlett-Packard Company Apparatus and method for on-line replacement of a running program code and data using checkpoints
JP3125775B2 (en) 1999-01-11 2001-01-22 ウシオ電機株式会社 High-pressure mercury lamp and its light source device
US6317875B1 (en) * 1999-01-15 2001-11-13 Intel Corporation Application execution performance through disk block relocation
US6484276B1 (en) * 1999-10-25 2002-11-19 Lucent Technologies Inc. Method and apparatus for providing extensible object-oriented fault injection
US6629266B1 (en) * 1999-11-17 2003-09-30 International Business Machines Corporation Method and system for transparent symptom-based selective software rejuvenation
US6581191B1 (en) * 1999-11-30 2003-06-17 Synplicity, Inc. Hardware debugging in a hardware description language
US7627694B2 (en) * 2000-03-16 2009-12-01 Silicon Graphics, Inc. Maintaining process group membership for node clusters in high availability computing systems
WO2001084314A2 (en) * 2000-05-02 2001-11-08 Sun Microsystem, Inc. Method and system for providing cluster replicated checkpoint services
US6854069B2 (en) * 2000-05-02 2005-02-08 Sun Microsystems Inc. Method and system for achieving high availability in a networked computer system
US6678369B2 (en) * 2000-06-09 2004-01-13 Nms Communications Corporation Network interface redundancy
US6954784B2 (en) * 2000-08-17 2005-10-11 International Business Machines Corporation Systems, method and computer program products for cluster workload distribution without preconfigured port identification by utilizing a port of multiple ports associated with a single IP address
US7089294B1 (en) * 2000-08-24 2006-08-08 International Business Machines Corporation Methods, systems and computer program products for server based type of service classification of a communication request
US6718538B1 (en) * 2000-08-31 2004-04-06 Sun Microsystems, Inc. Method and apparatus for hybrid checkpointing
US7228453B2 (en) * 2000-10-16 2007-06-05 Goahead Software, Inc. Techniques for maintaining high availability of networked systems
US6766471B2 (en) 2000-12-28 2004-07-20 International Business Machines Corporation User-level checkpoint and restart for groups of processes
US6934875B2 (en) 2000-12-29 2005-08-23 International Business Machines Corporation Connection cache for highly available TCP systems with fail over connections
TW561358B (en) 2001-01-11 2003-11-11 Force Corp Z File switch and switched file system
US7502861B1 (en) * 2001-02-16 2009-03-10 Swsoft Holding, Ltd. System and method for providing services for offline servers using the same network address
US20020174265A1 (en) 2001-03-28 2002-11-21 Schmidt Brian K. Method and apparatus for caching active computing environments
US6766314B2 (en) 2001-04-05 2004-07-20 International Business Machines Corporation Method for attachment and recognition of external authorization policy on file system resources
US7174370B1 (en) * 2001-04-17 2007-02-06 Atul Saini System and methodology for developing, integrating and monitoring computer applications and programs
US7552239B2 (en) * 2001-05-14 2009-06-23 Canon Information Systems, Inc. Network device mimic support
US7082551B2 (en) 2001-06-29 2006-07-25 Bull Hn Information Systems Inc. Method and data processing system providing checkpoint/restart across multiple heterogeneous computer systems
US6615217B2 (en) 2001-06-29 2003-09-02 Bull Hn Information Systems Inc. Method and data processing system providing bulk record memory transfers across multiple heterogeneous computer systems
US6944785B2 (en) 2001-07-23 2005-09-13 Network Appliance, Inc. High-availability cluster virtual server system
US7096388B2 (en) * 2001-08-08 2006-08-22 Avaya Technology Corp. Fault tolerance software system with periodic external self-test failure detection
KR100385996B1 (en) * 2001-09-05 2003-06-02 삼성전자주식회사 Method for allocating a plurality of IP addresses to a NIC(Network Interface Card) and apparatus therefor
JP2003282292A (en) 2002-01-18 2003-10-03 Mitsubishi Electric Corp Discharge lamp lighting device
US7076555B1 (en) 2002-01-23 2006-07-11 Novell, Inc. System and method for transparent takeover of TCP connections between servers
US7093086B1 (en) 2002-03-28 2006-08-15 Veritas Operating Corporation Disaster recovery and backup using virtual machines
US7350184B2 (en) * 2002-05-02 2008-03-25 Bea Systems, Inc. System and method for enterprise application interactions
US7275106B1 (en) * 2002-06-10 2007-09-25 Veritas Operating Corporation Sustaining TCP connections
JP4052039B2 (en) 2002-07-02 2008-02-27 ウシオ電機株式会社 High pressure discharge lamp lighting device
FR2843209B1 (en) * 2002-08-02 2006-01-06 Cimai Technology METHOD FOR REPLICATING SOFTWARE APPLICATION IN MULTI-COMPUTER ARCHITECTURE, METHOD FOR REALIZING OPERATING CONTINUITY USING THIS REPLICATION METHOD, AND MULTI-COMPUTER SYSTEM THUS EQUIPPED
FR2843210B1 (en) * 2002-08-02 2005-10-14 Meiosys METHOD FOR MIGRATION OF CONNECTIONS IN A MULTI-COMPUTER ARCHITECTURE, METHOD FOR PERFORMING OPERATING CONTINUITY USING THE METHOD OF MIGRATION, AND MULTI-COMPUTER SYSTEM THUS EQUIPPED
US7386855B2 (en) 2002-08-12 2008-06-10 Ntt Docomo, Inc. Application mobility service
US7673308B2 (en) 2002-11-18 2010-03-02 Symantec Corporation Virtual OS computing environment
JP2004207018A (en) 2002-12-25 2004-07-22 Seiko Epson Corp Light source drive circuit, projector, lighting control method of light source, and computer-readable program for executing it
US20040153700A1 (en) 2003-01-02 2004-08-05 Nixon Mark J. Redundant application stations for process control systems
JP4393774B2 (en) 2003-02-28 2010-01-06 株式会社日立製作所 Job management method, information processing system, program, and recording medium
US7234072B2 (en) * 2003-04-17 2007-06-19 Computer Associates Think, Inc. Method and system for making an application highly available
US20040212286A1 (en) 2003-04-23 2004-10-28 Makoto Horiuchi Lamp system with reflector, high pressure discharge lamp, and image projection apparatus
JP3853755B2 (en) 2003-05-16 2006-12-06 花王株式会社 Flame retardant resin composition
US7251745B2 (en) * 2003-06-11 2007-07-31 Availigent, Inc. Transparent TCP connection failover
US20050071824A1 (en) 2003-08-22 2005-03-31 K. N. Keerthi Bhushan Method and system for executing software on non-native platforms
US7243262B2 (en) * 2003-08-29 2007-07-10 Intel Corporation Incremental checkpointing in a multi-threaded architecture
US7519814B2 (en) * 2003-09-15 2009-04-14 Trigence Corp. System for containerization of application sets
US7533175B1 (en) * 2003-10-24 2009-05-12 Network Appliance, Inc. Network address resolution and forwarding TCP/IP packets over a fibre channel network
US7269645B2 (en) 2003-10-31 2007-09-11 International Business Machines Corporation Seamless migration of one or more business processes and their work environment between computing devices and a network
JP2008502953A (en) * 2003-11-17 2008-01-31 ヴァージニア テック インテレクチュアル プロパティーズ,インコーポレイテッド Transparent checkpointing and process migration in distributed systems
WO2005059720A1 (en) * 2003-12-17 2005-06-30 Telecom Italia S.P.A. Method and apparatus for monitoring operation of processing systems, related network and computer program product therefor
US7246256B2 (en) * 2004-01-20 2007-07-17 International Business Machines Corporation Managing failover of J2EE compliant middleware in a high availability system
US7275150B2 (en) * 2004-03-15 2007-09-25 International Business Machines Corporation Method and system for adding frequently selected applications to a computer startup sequence
US7506194B2 (en) 2004-03-24 2009-03-17 Cisco Technology, Inc. Routing system and method for transparently rocovering routing states after a failover or during a software upgrade
US7162666B2 (en) * 2004-03-26 2007-01-09 Emc Corporation Multi-processor system having a watchdog for interrupting the multiple processors and deferring preemption until release of spinlocks
US7246217B1 (en) * 2004-04-19 2007-07-17 Sandia Corporation Interconnection arrangement of routers of processor boards in array of cabinets supporting secure physical partition
US7401256B2 (en) * 2004-04-27 2008-07-15 Hitachi, Ltd. System and method for highly available data processing in cluster system
US8108429B2 (en) 2004-05-07 2012-01-31 Quest Software, Inc. System for moving real-time data events across a plurality of devices in a network for simultaneous data protection, replication, and access services
US7257811B2 (en) * 2004-05-11 2007-08-14 International Business Machines Corporation System, method and program to migrate a virtual machine
US7770169B2 (en) 2004-05-17 2010-08-03 Oracle America, Inc. Thread rendezvous for read-only code in an object-oriented computing environment
US7366949B2 (en) * 2004-06-14 2008-04-29 Lucent Technologies Inc. Distributed software application software component recovery in an ordered sequence
US7509630B2 (en) * 2004-06-14 2009-03-24 Alcatel-Lucent Usa Inc. Software component initialization in an ordered sequence
US7363365B2 (en) 2004-07-13 2008-04-22 Teneros Inc. Autonomous service backup and migration
US20060015764A1 (en) 2004-07-13 2006-01-19 Teneros, Inc. Transparent service provider
US7219255B2 (en) * 2004-07-27 2007-05-15 Mks Instruments, Inc. Failsafe switching of intelligent controller method and device
US8122280B2 (en) * 2004-08-26 2012-02-21 Open Invention Network, Llc Method and system for providing high availability to computer applications
WO2006026403A2 (en) * 2004-08-26 2006-03-09 Availigent, Inc. Method and system for providing transparent incremental and multiprocess checkpointing to computer applications
JP2006120502A (en) 2004-10-22 2006-05-11 Iwasaki Electric Co Ltd High-pressure discharge lamp
JP4244914B2 (en) 2004-11-19 2009-03-25 ウシオ電機株式会社 Short arc type discharge lamp lighting device
US7376860B2 (en) 2004-12-16 2008-05-20 International Business Machines Corporation Checkpoint/resume/restart safe methods in a data processing system to establish, to restore and to release shared memory regions
WO2006099446A2 (en) 2005-03-11 2006-09-21 Argade Pramod V Environment for controlling the execution of computer programs
US7751311B2 (en) 2005-05-19 2010-07-06 Cisco Technology, Inc. High availability transport protocol method and apparatus
US7801135B2 (en) 2005-05-19 2010-09-21 Cisco Technology, Inc. Transport protocol connection synchronization
JP4462119B2 (en) 2005-06-10 2010-05-12 セイコーエプソン株式会社 Ballast and projector
GB2428314A (en) 2005-07-11 2007-01-24 Hewlett Packard Development Co Associating a location specific URL with a machine readable tag on an advertising poster
US7681075B2 (en) 2006-05-02 2010-03-16 Open Invention Network Llc Method and system for providing high availability to distributed computer applications
US7716240B2 (en) 2005-12-29 2010-05-11 Nextlabs, Inc. Techniques and system to deploy policies intelligently
US7877781B2 (en) 2005-12-29 2011-01-25 Nextlabs, Inc. Enforcing universal access control in an information management system
US7543182B2 (en) 2006-01-12 2009-06-02 International Business Machines Corporation Automated failover system for logical partitions
US20070192518A1 (en) 2006-02-14 2007-08-16 Aarohi Communications, Inc., A California Corporation Apparatus for performing I/O sharing & virtualization
US7694123B2 (en) 2006-03-28 2010-04-06 Hewlett-Packard Development Company, L.P. Storing files for operating system restoration
US7523344B2 (en) 2006-05-08 2009-04-21 Sun Microsystems, Inc. Method and apparatus for facilitating process migration
US7774636B2 (en) 2006-10-31 2010-08-10 Hewlett-Packard Development Company, L.P. Method and system for kernel panic recovery
US20080295114A1 (en) 2007-05-07 2008-11-27 Pramod Vasant Argade Method and apparatus for execution control of computer programs
US10305910B2 (en) * 2010-01-15 2019-05-28 Apple Inc. Accessing specialized fileserver

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of EP1719056A4 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8452378B2 (en) 2007-09-20 2013-05-28 Siemens Aktiengesellschaft Method for determining attenuation values for PET data of a patient
DE102007044874A1 (en) 2007-09-20 2009-04-16 Siemens Ag Method for determining attenuation values for a patient's PET data
KR101804605B1 (en) 2010-09-10 2017-12-04 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 Controlled automatic healing of data-center services
WO2012033773A2 (en) 2010-09-10 2012-03-15 Microsoft Corporation Controlled automatic healing of data-center services
EP2614436A4 (en) * 2010-09-10 2015-12-02 Microsoft Technology Licensing Llc Controlled automatic healing of data-center services
EP2805239A1 (en) * 2012-01-18 2014-11-26 DH2i Company Systems and methods for server cluster application virtualization
EP3896570A1 (en) * 2012-01-18 2021-10-20 DH2i Company Systems and methods for server cluster application virtualization
GB2532732A (en) * 2014-11-25 2016-06-01 Ibm Integrating a communication bridge into a data procesing system
GB2532732B (en) * 2014-11-25 2019-06-26 Ibm Integrating a communication bridge into a data procesing system
US10601692B2 (en) 2014-11-25 2020-03-24 International Business Machines Corporation Integrating a communication bridge into a data processing system
US10735294B2 (en) 2014-11-25 2020-08-04 International Business Machines Corporation Integrating a communication bridge into a data processing system
CN113806106A (en) * 2021-08-13 2021-12-17 中国航空无线电电子研究所 Modem hardware abstraction layer facing VxWorks real-time process
CN113806106B (en) * 2021-08-13 2023-09-15 中国航空无线电电子研究所 Communication system for VxWorks real-time process

Also Published As

Publication number Publication date
US9223671B2 (en) 2015-12-29
EP1719056A4 (en) 2009-04-08
US7783914B1 (en) 2010-08-24
US8122280B2 (en) 2012-02-21
US8959395B2 (en) 2015-02-17
WO2006026402A3 (en) 2007-09-27
US9311200B1 (en) 2016-04-12
US8176364B1 (en) 2012-05-08
US20130238943A1 (en) 2013-09-12
US20140208153A1 (en) 2014-07-24
US20060090097A1 (en) 2006-04-27
US8402305B1 (en) 2013-03-19
US8458534B1 (en) 2013-06-04
EP1719056A2 (en) 2006-11-08
US8726078B1 (en) 2014-05-13
US9141502B2 (en) 2015-09-22
US20140359354A1 (en) 2014-12-04
US8037367B1 (en) 2011-10-11

Similar Documents

Publication Publication Date Title
US9311200B1 (en) Method and system for providing high availability to computer applications
US8108722B1 (en) Method and system for providing high availability to distributed computer applications
US8266472B2 (en) Method and system to provide high availability of shared data
US7107481B2 (en) Server takeover system and method
US7003692B1 (en) Dynamic configuration synchronization in support of a “hot” standby stateful switchover
US20020107966A1 (en) Method and system for maintaining connections in a network
JP2008533573A (en) Disaster recovery architecture
US20060271812A1 (en) Systems and methods for providing redundant application servers
JP2005535241A (en) Method of moving application software in multicomputer architecture, multicomputer method and apparatus for realizing continuity of operation using the moving method
US9992058B2 (en) Redundant storage solution
EP3912036B1 (en) Technique for connection handling in a distributed system
AT&T
JP5307223B2 (en) Disaster recovery architecture
Chang et al. Virtual machine support for zero‐loss Internet service recovery and upgrade
Engel et al. Autonomic Network Services on a Microkernel

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2005792688

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 200580000734.9

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 2005792688

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE