摘要:
A system of protecting data in write-back cache between storage systems and the method thereof are employed to protect data in the write-back cache between a first storage system and a second storage system. The system adds, updates, or deletes the data in the second storage system backed up from the write-back cache of the first storage system by monitoring operations on the write-back cache of the first storage system and sending a corresponding command to the second storage system in accord with the monitored operation. Therefore, the method ensures the consistency between the backup data and the data stored in the write-back cache of the first storage system, thereby increasing the security of the data.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting the cache memory data in a storage system is used to protect the data in the cache memory of a battery backed storage system. The method provides a preserved area in the random access memory (RAM) of the system for storing the information of disk cache items. When the storage system has a power failure, the battery backed function provides power to protect the data stored in the RAM of the system being lost. When the storage system resumes, the information stored in the preserved area preserves the data stored in the disk cache of the system RAM. After the storage system resumes, the data stored in the disk cache of the RAM of the system are written into the corresponding block device. These implement the power failure protection for the data stored in the disk cache of the RAM of the system.
摘要:
An Internet protocol (IP) address take-over system in a local area network and a method thereof are provided. The IP address take-over system takes over the IP addresses in a server connecting with a plurality of clients and containing a plurality of network interface cards, and automatically updates the media access control (MAC) addresses stored in the address resolution protocol (ARP) caches of the clients and corresponding to the IP address of the server, so as to guarantee the continuity of the network communication between the clients and the server, and improve the reliability of the server.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A network intrusion detection system (IDS) is built at an important network node and used to detect and monitor network packets. The network intrusion detection system includes a network card and a system core processor. When receiving a network packet, a micro-processor of the network card performs a packet decode procedure and a packet preprocess procedure, thereby verifying a type and a source address of the packet in advance and converting the packet into an IDS format packet. Afterwards, the system core processor determines whether the packet is an intrusion packet. Since the computation of the packet decode procedure and the packet pre-process procedure is handled by the network card, the network intrusion detection system will not lose packets due to too heavy computation burden, thereby greatly improving the accuracy of the network intrusion detection system.
摘要:
A network packet capturing method for capturing a plurality of packets from a physical layer to an application layer by a network server through a network card is described. The packet capturing method includes the following steps. Capture packets by a new application interface (NAPI); set a ring queue in a kernel; provide a hook process for capturing the packets; store the captured packets into the ring queue; and map the packets stored in the ring queue into a memory space of a corresponding application through memory mapping, thereby reducing the number of interrupts of the system and the number of replications during the packets parsing.
摘要:
An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space.
摘要:
A method of automatically adjusting a size of a copy-on-write (COW) disk space of a snapshot device is provided. A first disk space of a snapshot device is initialized, and a COW operation is performed on a chunk of the first disk space. Next, it is determined whether a chunk sequence number of a write request is in the first disk space. Then, if the chuck sequence number of the write request is in the first disk space, the first disk space is maintained. Then, if the chuck sequence number of the write request is not in the first disk space, a second disk space is initialized, and the number of chunks of the second disk space is the same as the number of maximum successive chunks of the first disk space, and then, the COW operation is performed on the chunk of the second disk space.
摘要:
A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced.