摘要:
An Internet protocol (IP) address take-over system in a local area network and a method thereof are provided. The IP address take-over system takes over the IP addresses in a server connecting with a plurality of clients and containing a plurality of network interface cards, and automatically updates the media access control (MAC) addresses stored in the address resolution protocol (ARP) caches of the clients and corresponding to the IP address of the server, so as to guarantee the continuity of the network communication between the clients and the server, and improve the reliability of the server.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting the cache memory data in a storage system is used to protect the data in the cache memory of a battery backed storage system. The method provides a preserved area in the random access memory (RAM) of the system for storing the information of disk cache items. When the storage system has a power failure, the battery backed function provides power to protect the data stored in the RAM of the system being lost. When the storage system resumes, the information stored in the preserved area preserves the data stored in the disk cache of the system RAM. After the storage system resumes, the data stored in the disk cache of the RAM of the system are written into the corresponding block device. These implement the power failure protection for the data stored in the disk cache of the RAM of the system.
摘要:
A network packet capturing method for capturing a plurality of packets from a physical layer to an application layer by a network server through a network card is described. The packet capturing method includes the following steps. Capture packets by a new application interface (NAPI); set a ring queue in a kernel; provide a hook process for capturing the packets; store the captured packets into the ring queue; and map the packets stored in the ring queue into a memory space of a corresponding application through memory mapping, thereby reducing the number of interrupts of the system and the number of replications during the packets parsing.
摘要:
A method of detecting heartbeats and the device thereof are applied to a cluster server. It includes a first controller, a second controller, and a detecting module. The detecting module does the counting according to a first predetermined period. If the detecting module receives a first reset signal of the first controller before the first predetermined period, it determines that the operation of the first controller is normal. If the detecting module has not receive the first reset signal of the first controller before the first predetermined period, then the operation of the first controller is determined to be abnormal. The detecting module sends out a control signal to start the second controller. The second controller communicates with the first controller to execute the corresponding failure transfer program and to interrupt the operation of the first controller.