CN104683476A - Stored data migration method - Google Patents
Stored data migration method Download PDFInfo
- Publication number
- CN104683476A CN104683476A CN201510116525.6A CN201510116525A CN104683476A CN 104683476 A CN104683476 A CN 104683476A CN 201510116525 A CN201510116525 A CN 201510116525A CN 104683476 A CN104683476 A CN 104683476A
- Authority
- CN
- China
- Prior art keywords
- host computer
- fictitious host
- computer environment
- virtual
- virtual machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
Abstract
The invention provides a stored data migration method which is suitable for covering the migration between virtual host environmental data clusters in network construction and implementing the migration between virtual host environmental data clusters on a layered architecture. The stored data migration method can meet the virtual host environment migration requirements under a cloud platform, and meanwhile has less impact on the virtual host environment transmission.
Description
Technical field
The present invention relates to cloud computing, particularly one stores data migration method.
Background technology
The low cost of cloud computing, rapid deployment and flexibly the advantage such as adjustment scale cause showing great attention to of industrial quarters, make cloud border from the tradition of traditional calculations network environment, single, dominant to fuzzy, extensive, dynamic transition, thus physical boundary progressively develop to virtual boundary.But along with the deep development of cloud computing technology, the increase of computational resource expense and the growth of complexity, make the computational resource requirements that single cloud cannot adapt in continuous increase and decrease.Enterprise and operator no longer meet has single cloud, and turn to build multiple data cluster with formed rent mutually the other side in mixed cloud or multiple operator cloud computing resources to form associating cloud.But this core demand of fictitious host computer environmental transport and transfer is but not being met in this case, and existing technology is still based on single cloud environment.This makes fictitious host computer environmental strategies migration between data cluster become this field current key issue urgently to be resolved hurrily.
When moving between data cluster there is larger change in physical network architecture, and destination host and source host are no longer positioned at same local area network (LAN), guarantee that fictitious host computer Environment Architecture consistency and network configuration consistency must need the process cost of great number.Existing technical scheme achieves the virtual machine (vm) migration under wide area network, but but reckons without the problem of fictitious host computer environment and network profile migration, cannot carry out network architecture migration to fictitious host computer environment.
Therefore, for the problems referred to above existing in correlation technique, at present effective solution is not yet proposed.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of storage data migration method, comprising:
Intercept and capture the network message of virtual network adapter transmitting-receiving, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment; By fictitious host computer environmental transport and transfer agreement between data cluster, the architecture of migration fictitious host computer environment and network profile, to migrate to target data cluster by complete for fictitious host computer environment.
Preferably, described method also comprises: the route chain mechanism utilizing operating system to provide, for virtual interface arranges the configuration of QoS network interface, receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface, with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment, overall routing table is split as localized routing table for fictitious host computer Environment Architecture and sets different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile, fictitious host computer Environment communication between data cluster is realized by agency service, before virtual machine (vm) migration starts, agency service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster.
Preferably, wherein, described fictitious host computer environment is divided by fictitious host computer environment ID, in fictitious host computer environment, the routed path of Ether frame controlled by localized routing table, after virtual network adapter joins fictitious host computer environment, unicast packet is directly sent to the virtual machine at corresponding virtual network adapter place;
Described localized routing table, is made up of 3 tuples: the IP address HostIP of virtual network adapter MAC, virtual machine place main frame and territory, place EID, is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
Preferably, by the database of maintenance package containing the data structure corresponding to management object, unified management and control are carried out to virtual machine, virtual network adapter and fictitious host computer environment thereof, correspondingly change network architecture when virtual machine active or passive change state, this data structure is by 6 tuple { NIC, EID, HostIP, VMID, MAC, NICCONF} forms, and describes a fictitious host computer environmental interface and attribute thereof, wherein:
NIC: the unique identification of virtual network adapter;
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route;
HostIP: the physical host IP at virtual machine place;
VMID: the virtual machine at virtual network adapter place, NIC and VMID divides out process, and this is determined when virtual machine creating starts with the form of UUID;
MAC: judge that message is originated according to this MAC Address, in order to control the route of message;
NICCONF: to the configuration of this virtual network adapter, comprises the list of disparate networks configuration order, comprises QoS setting, fire compartment wall setting.
The present invention compared to existing technology, has the following advantages:
The present invention can meet fictitious host computer environmental transport and transfer demand under cloud platform, simultaneously less on the impact of fictitious host computer Ambient Transfer.
Accompanying drawing explanation
Fig. 1 is the flow chart of the storage data migration method according to the embodiment of the present invention.
Embodiment
Detailed description to one or more embodiment of the present invention is hereafter provided together with the accompanying drawing of the diagram principle of the invention.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.Scope of the present invention is only defined by the claims, and the present invention contain many substitute, amendment and equivalent.Set forth many details in the following description to provide thorough understanding of the present invention.These details are provided for exemplary purposes, and also can realize the present invention according to claims without some in these details or all details.
Fig. 1 is the storage data migration method flow chart according to the embodiment of the present invention.Demand is moved across fictitious host computer environmental strategies under the present invention is directed to multiple cloud environment, proposition is applicable to migration mechanism between the fictitious host computer environmental data cluster under overlay network structure, by fictitious host computer environmental transport and transfer agreement between data cluster, make virtual machine in transition process, fictitious host computer Environment Architecture and network profile thereof are moved in the lump and are automatically configured, between the cluster in transition process, the link of fictitious host computer environment is temporarily by channel transfer between cluster, when after cluster virtual machine successively Successful migration, fictitious host computer environment then intactly migrates to target data cluster, to realize cluster virtual machine migration between the data cluster under network virtualization.
System architecture is divided into 3 layers, is respectively: be responsible for the routing layer building the network layer of moving between fictitious host computer environment and cluster, responsible main frame localized routing table and transmit virtual machine (vm) migration event notice and the inner nuclear layer that responsible network channel realizes, virtual interface configures.
1) inner nuclear layer: this layer is positioned at physical host, by the front and back end driving mechanism of virtual network adapter, intercepts and captures and route message that virtual interface sends; Its route chain mechanism utilizing operating system to provide, arranges the configuration of the network interfaces such as QoS for virtual interface simultaneously.
2) routing layer: this layer is also positioned at physical host, safeguards the localized routing table of physical host, to control the virtual interface routed path of inner nuclear layer.In addition also receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface.
3) network layer: the network management part extending cloud computing platform, and with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment.Network layer maintains overall routing table, and this table is produced the setting of fictitious host computer environment by user.When overall situation routing table is handed down to routing layer, be split as localized routing table for fictitious host computer Environment Architecture and set different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile.This layer also realizes fictitious host computer Environment communication between data cluster by agency service simultaneously.Before virtual machine (vm) migration starts, this service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster, and by fictitious host computer environmental transport and transfer agreement, ensure that fictitious host computer environment architecture in transition process is constant.
In the method for the invention, the network message of virtual network adapter transmitting-receiving is intercepted and captured by inner nuclear layer, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment.
Fictitious host computer environment is divided by fictitious host computer environment ID, and in fictitious host computer environment, the routed path of Ether frame then controlled by localized routing table.After virtual network adapter joins fictitious host computer environment, for unicast packet directly according to routing table HostIP item, send to the virtual machine at corresponding virtual network adapter place.Broadcast packet then gives the virtual network adapter in all fictitious host computer environment by inner nuclear layer route.
The localized routing table that routing layer is safeguarded, is made up of 3 tuples: the IP address (HostIP) of virtual network adapter MAC (MAC), virtual machine place main frame and territory, place (EID).Routing layer is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
Intel Virtualization Technology supports the virtual machine instance dynamic migration function on different physical node, thus also can realize virtual machine instance and move in the architecture of different pieces of information cluster.
Network layer carries out unified management and control to virtual machine, virtual network adapter and fictitious host computer environment thereof, and due to virtual machine meeting active or passive change state, network layer needs correspondingly to change network architecture.Network layer maintains a database, comprises the data structure corresponding to its management object, this data structure by 6 tuples NIC, EID, HostIP, VMID, MAC, NICCONF} describe a fictitious host computer environmental interface and attribute thereof:
NIC: the unique identification of virtual network adapter.
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route.
HostIP: the physical host IP at virtual machine place, inner nuclear layer is according to this for foundation determines the destination host of route.
VMID: the virtual machine at virtual network adapter place, owing to there being polylith virtual network adapter, therefore NIC and VMID divides out process, and this starts just to be determined in virtual machine creating with the form of UUID.
MAC: according to this MAC Address, inner nuclear layer judges that message is originated, in order to control the route of message.This MAC Address is just determined when virtual machine creating virtual interface.
NICCONF: to the configuration of this virtual network adapter itself is a list comprising disparate networks configuration order, comprises QoS setting, fire compartment wall setting etc.
Below describe fictitious host computer environmental transport and transfer strategy between data cluster of the present invention in detail.
Fictitious host computer environmental transport and transfer is carried out with virtual machine (vm) migration, and between data cluster, fictitious host computer environmental transport and transfer strategy is as follows:
Suppose that the source data cluster migration network address, agency service place is SOURCESERVICEIP, the target data cluster migration network address, agency service place is REMOTESERVICEIP, and open to the other side by the public signature key of adaptation services device between data cluster.
1) cloud platform proposes migration request between data cluster, and network layer determines the corresponding VMID of virtual machine to be migrated and migration source host network address SIP and REMOTESERVICEIP according to request;
2) migration request between the agency service generation data set group of source data cluster, sends to target data cluster after the public key signature using target data cluster to provide;
3) target data cluster uses private key checking request, and after checking the other side identity is legal, distribute migration destination server, its network address is RDIP, and sends to source data cluster after the public key signature using source data cluster to provide;
4) source data cluster and target data cluster carry out key agreement, the Traffic encryption key(TEK) Key of negotiation result and VMID generating virtual passage;
5) set of source data group network layer inquires about the virtual network adapter to be migrated list that comprises of virtual machine according to VMID;
6) traversal of lists is to the virtual network adapter NICn in list, takes out corresponding fictitious host computer environment EIDn;
7) inquire about the physical host corresponding to this EIDn, form physical host address list, determine to be moved and the network architecture that occurs changes the physical host affected;
8) travel through physical host address list, and judge whether HostIPn is positioned at source data cluster, if HostIPn is positioned at source data cluster, then send primitive REMOTECHANGENIC (EIDn, NICnMAC, SIP to this HostIPn, RDIP, Key), if HostIPn is positioned at target data cluster, then the tunnel in target data cluster no longer needs encrypted transmission, send primitive CHANGENIC (EIDn, NICnMAC, SIP, RDIP);
9) judge whether the physical host address list that this EIDn is corresponding comprises RDIP, if do not comprise, then generate the localized routing table of this EIDn according to RDIP, and send to target data set group, by target data cluster route to destination server;
10) 6 are returned) until virtual network adapter list traversal is complete;
11) send virtual network adapter configured list corresponding to virtual network adapter list to RDIP, the configuration of its adapter is set in advance;
12) cloud platform moves virtual machine by encrypted tunnel, and virtual machine (vm) migration result is back to network layer;
13) if move successfully, traversal of lists, and the physical host address list corresponding according to NICn sends primitive SELECTNIC (EIDn, NICnMAC, RDIP) successively, notify that it retains the virtual machine destination host address after moving, to safeguard new network architecture, and delete NICn in SIP adapter configuration, judge simultaneously SIP whether be contained in migration after new HostIP in, if no longer comprise, then send notice SIP and delete the localized routing table do not re-used;
14) if move unsuccessfully, traversal of lists, and the physical host address list corresponding according to NICn sends primitive SELECTNIC (EIDn successively, NICnMAC, SIP), local routing table is return back to and moves the architecture state before starting, and delete the adapter configuration in advance for virtual network adapter list setting in RDIP, if have sent complete fictitious host computer environment routing table to RDIP before, then sending notice and deleting.
Between this data cluster, migration scheme has made more estimation & disposings to some particular cases, except the needs newly including physical host before moving in send brand-new list item to ensure in itself and fictitious host computer environment except other main-machine communications, also need to be connected process respectively to long-range connection with this locality: this locality is connected, communicate without the need to adopting cipher mode to encapsulate channel, and for long-range connection, then specify encryption key Key, encapsulated frame is encrypted.In the present implementation, key K ey is by the secret generating after key agreement between VMID and data cluster.
In sum, the present invention can meet fictitious host computer environmental transport and transfer demand under cloud platform, simultaneously less on the impact of fictitious host computer Ambient Transfer.
Obviously, it should be appreciated by those skilled in the art, above-mentioned of the present invention each module or each step can realize with general computing system, they can concentrate on single computing system, or be distributed on network that multiple computing system forms, alternatively, they can realize with the executable program code of computing system, thus, they can be stored and be performed by computing system within the storage system.Like this, the present invention is not restricted to any specific hardware and software combination.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.
Claims (4)
1. store a data migration method, it is characterized in that, comprising:
Intercept and capture the network message of virtual network adapter transmitting-receiving, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment; By fictitious host computer environmental transport and transfer agreement between data cluster, the architecture of migration fictitious host computer environment and network profile, to migrate to target data cluster by complete for fictitious host computer environment.
2. method according to claim 1, is characterized in that, described method also comprises: the route chain mechanism utilizing operating system to provide, for virtual interface arranges the configuration of QoS network interface, receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface, with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment, overall routing table is split as localized routing table for fictitious host computer Environment Architecture and sets different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile, fictitious host computer Environment communication between data cluster is realized by agency service, before virtual machine (vm) migration starts, agency service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster.
3. method according to claim 2, it is characterized in that, wherein, described fictitious host computer environment is divided by fictitious host computer environment ID, in fictitious host computer environment, the routed path of Ether frame controlled by localized routing table, after virtual network adapter joins fictitious host computer environment, unicast packet is directly sent to the virtual machine at corresponding virtual network adapter place;
Described localized routing table, is made up of 3 tuples: the IP address HostIP of virtual network adapter MAC, virtual machine place main frame and territory, place EID, is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
4. method according to claim 2, is characterized in that, by the database of maintenance package containing the data structure corresponding to management object, unified management and control are carried out to virtual machine, virtual network adapter and fictitious host computer environment thereof, correspondingly change network architecture when virtual machine active or passive change state, this data structure is by one 6 tuple { NIC, EID, HostIP, VMID, MAC, NICCONF} form, describe a fictitious host computer environmental interface and attribute thereof, wherein:
NIC: the unique identification of virtual network adapter;
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route;
HostIP: the physical host IP at virtual machine place;
VMID: the virtual machine at virtual network adapter place, NIC and VMID divides out process, and this is determined when virtual machine creating starts with the form of UUID;
MAC: judge that message is originated according to this MAC Address, in order to control the route of message;
NICCONF: to the configuration of this virtual network adapter, comprises the list of disparate networks configuration order, comprises QoS setting, fire compartment wall setting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510116525.6A CN104683476A (en) | 2015-03-17 | 2015-03-17 | Stored data migration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510116525.6A CN104683476A (en) | 2015-03-17 | 2015-03-17 | Stored data migration method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104683476A true CN104683476A (en) | 2015-06-03 |
Family
ID=53318042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510116525.6A Pending CN104683476A (en) | 2015-03-17 | 2015-03-17 | Stored data migration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104683476A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107623683A (en) * | 2017-09-07 | 2018-01-23 | 西安电子科技大学 | A kind of cloud resource by dynamic safety prevents method disclosed in information |
CN108924087A (en) * | 2018-05-28 | 2018-11-30 | 国网福建省电力有限公司 | Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address |
CN109274537A (en) * | 2018-10-25 | 2019-01-25 | 深圳供电局有限公司 | A kind of continuity network virtualization platform system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457439A (en) * | 2011-12-07 | 2012-05-16 | 中标软件有限公司 | Virtual switching system and method of cloud computing system |
CN103023704A (en) * | 2012-12-24 | 2013-04-03 | 北京启明星辰信息技术股份有限公司 | Method and system for accessing virtual network service equipment |
CN103516802A (en) * | 2013-09-30 | 2014-01-15 | 中国科学院计算技术研究所 | Method and device for achieving seamless transference of across heterogeneous virtual switch |
-
2015
- 2015-03-17 CN CN201510116525.6A patent/CN104683476A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457439A (en) * | 2011-12-07 | 2012-05-16 | 中标软件有限公司 | Virtual switching system and method of cloud computing system |
CN103023704A (en) * | 2012-12-24 | 2013-04-03 | 北京启明星辰信息技术股份有限公司 | Method and system for accessing virtual network service equipment |
CN103516802A (en) * | 2013-09-30 | 2014-01-15 | 中国科学院计算技术研究所 | Method and device for achieving seamless transference of across heterogeneous virtual switch |
Non-Patent Citations (1)
Title |
---|
王丽娜等: ""IDVE:面向跨数据中心的虚拟域一致性迁移机制"", 《四川大学学报(工程科学版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107623683A (en) * | 2017-09-07 | 2018-01-23 | 西安电子科技大学 | A kind of cloud resource by dynamic safety prevents method disclosed in information |
CN107623683B (en) * | 2017-09-07 | 2020-12-18 | 西安电子科技大学 | Method for preventing information disclosure through dynamic and safe cloud resources |
CN108924087A (en) * | 2018-05-28 | 2018-11-30 | 国网福建省电力有限公司 | Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address |
CN109274537A (en) * | 2018-10-25 | 2019-01-25 | 深圳供电局有限公司 | A kind of continuity network virtualization platform system |
CN109274537B (en) * | 2018-10-25 | 2022-12-27 | 深圳供电局有限公司 | Continuous network virtualization platform system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110351191B (en) | Network configuration method, system, device and storage medium | |
CN112511611B (en) | Communication method, device and system of node cluster and electronic equipment | |
CN102893559B (en) | The member of interconnected virtual network | |
CN104699522A (en) | Virtual machine dynamic migration method | |
CN102473114B (en) | Dynamically migrating computer networks | |
EP2905930B1 (en) | Processing method, apparatus and system for multicast | |
CN101605084B (en) | Method and system for processing virtual network messages based on virtual machine | |
CN111612466B (en) | Consensus and resource transmission method, device and storage medium | |
US20200374127A1 (en) | Blockchain-powered cloud management system | |
US10454880B2 (en) | IP packet processing method and apparatus, and network system | |
US20130315242A1 (en) | Network Communication Method and Device | |
US20170373931A1 (en) | Method for updating network service descriptor nsd and apparatus | |
EP2687982A1 (en) | Hierarchical system for managing a plurality of virtual machines, method and computer program | |
US11671363B2 (en) | Method and apparatus for cross-service-zone communication, and data center network | |
CN104685507A (en) | Providing a virtual security appliance architecture to a virtual cloud infrastructure | |
CN103607430A (en) | Network processing method and system, and network control center | |
CN105429938B (en) | Resource allocation method and device | |
CN106416147A (en) | System and method for a software defined protocol network node | |
JP2015095894A (en) | Management server and management method thereof for managing cloud appliances in virtual local area networks | |
CN106712988A (en) | Virtual network management method and device | |
CN105306612A (en) | Method for acquiring identifier of terminal in network and management network element | |
EP3598705B1 (en) | Routing control | |
US20240048484A1 (en) | Route updating method and user cluster | |
CN110336730B (en) | Network system and data transmission method | |
CN105704042A (en) | Message processing method, BNG and BNG cluster system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150603 |