摘要:
A system of protecting data in write-back cache between storage systems and the method thereof are employed to protect data in the write-back cache between a first storage system and a second storage system. The system adds, updates, or deletes the data in the second storage system backed up from the write-back cache of the first storage system by monitoring operations on the write-back cache of the first storage system and sending a corresponding command to the second storage system in accord with the monitored operation. Therefore, the method ensures the consistency between the backup data and the data stored in the write-back cache of the first storage system, thereby increasing the security of the data.
摘要:
An Internet protocol (IP) address take-over system in a local area network and a method thereof are provided. The IP address take-over system takes over the IP addresses in a server connecting with a plurality of clients and containing a plurality of network interface cards, and automatically updates the media access control (MAC) addresses stored in the address resolution protocol (ARP) caches of the clients and corresponding to the IP address of the server, so as to guarantee the continuity of the network communication between the clients and the server, and improve the reliability of the server.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting the cache memory data in a storage system is used to protect the data in the cache memory of a battery backed storage system. The method provides a preserved area in the random access memory (RAM) of the system for storing the information of disk cache items. When the storage system has a power failure, the battery backed function provides power to protect the data stored in the RAM of the system being lost. When the storage system resumes, the information stored in the preserved area preserves the data stored in the disk cache of the system RAM. After the storage system resumes, the data stored in the disk cache of the RAM of the system are written into the corresponding block device. These implement the power failure protection for the data stored in the disk cache of the RAM of the system.
摘要:
A network intrusion detection system (IDS) is built at an important network node and used to detect and monitor network packets. The network intrusion detection system includes a network card and a system core processor. When receiving a network packet, a micro-processor of the network card performs a packet decode procedure and a packet preprocess procedure, thereby verifying a type and a source address of the packet in advance and converting the packet into an IDS format packet. Afterwards, the system core processor determines whether the packet is an intrusion packet. Since the computation of the packet decode procedure and the packet pre-process procedure is handled by the network card, the network intrusion detection system will not lose packets due to too heavy computation burden, thereby greatly improving the accuracy of the network intrusion detection system.