CN104683476A - Stored data migration method - Google Patents

Stored data migration method Download PDF

Info

Publication number
CN104683476A
CN104683476A CN201510116525.6A CN201510116525A CN104683476A CN 104683476 A CN104683476 A CN 104683476A CN 201510116525 A CN201510116525 A CN 201510116525A CN 104683476 A CN104683476 A CN 104683476A
Authority
CN
China
Prior art keywords
host computer
fictitious host
computer environment
virtual
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510116525.6A
Other languages
Chinese (zh)
Inventor
王美婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU YICHEN DEXUN TECHNOLOGY Co Ltd
Original Assignee
CHENGDU YICHEN DEXUN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU YICHEN DEXUN TECHNOLOGY Co Ltd filed Critical CHENGDU YICHEN DEXUN TECHNOLOGY Co Ltd
Priority to CN201510116525.6A priority Critical patent/CN104683476A/en
Publication of CN104683476A publication Critical patent/CN104683476A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources

Abstract

The invention provides a stored data migration method which is suitable for covering the migration between virtual host environmental data clusters in network construction and implementing the migration between virtual host environmental data clusters on a layered architecture. The stored data migration method can meet the virtual host environment migration requirements under a cloud platform, and meanwhile has less impact on the virtual host environment transmission.

Description

A kind of storage data migration method
Technical field
The present invention relates to cloud computing, particularly one stores data migration method.
Background technology
The low cost of cloud computing, rapid deployment and flexibly the advantage such as adjustment scale cause showing great attention to of industrial quarters, make cloud border from the tradition of traditional calculations network environment, single, dominant to fuzzy, extensive, dynamic transition, thus physical boundary progressively develop to virtual boundary.But along with the deep development of cloud computing technology, the increase of computational resource expense and the growth of complexity, make the computational resource requirements that single cloud cannot adapt in continuous increase and decrease.Enterprise and operator no longer meet has single cloud, and turn to build multiple data cluster with formed rent mutually the other side in mixed cloud or multiple operator cloud computing resources to form associating cloud.But this core demand of fictitious host computer environmental transport and transfer is but not being met in this case, and existing technology is still based on single cloud environment.This makes fictitious host computer environmental strategies migration between data cluster become this field current key issue urgently to be resolved hurrily.
When moving between data cluster there is larger change in physical network architecture, and destination host and source host are no longer positioned at same local area network (LAN), guarantee that fictitious host computer Environment Architecture consistency and network configuration consistency must need the process cost of great number.Existing technical scheme achieves the virtual machine (vm) migration under wide area network, but but reckons without the problem of fictitious host computer environment and network profile migration, cannot carry out network architecture migration to fictitious host computer environment.
Therefore, for the problems referred to above existing in correlation technique, at present effective solution is not yet proposed.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of storage data migration method, comprising:
Intercept and capture the network message of virtual network adapter transmitting-receiving, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment; By fictitious host computer environmental transport and transfer agreement between data cluster, the architecture of migration fictitious host computer environment and network profile, to migrate to target data cluster by complete for fictitious host computer environment.
Preferably, described method also comprises: the route chain mechanism utilizing operating system to provide, for virtual interface arranges the configuration of QoS network interface, receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface, with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment, overall routing table is split as localized routing table for fictitious host computer Environment Architecture and sets different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile, fictitious host computer Environment communication between data cluster is realized by agency service, before virtual machine (vm) migration starts, agency service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster.
Preferably, wherein, described fictitious host computer environment is divided by fictitious host computer environment ID, in fictitious host computer environment, the routed path of Ether frame controlled by localized routing table, after virtual network adapter joins fictitious host computer environment, unicast packet is directly sent to the virtual machine at corresponding virtual network adapter place;
Described localized routing table, is made up of 3 tuples: the IP address HostIP of virtual network adapter MAC, virtual machine place main frame and territory, place EID, is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
Preferably, by the database of maintenance package containing the data structure corresponding to management object, unified management and control are carried out to virtual machine, virtual network adapter and fictitious host computer environment thereof, correspondingly change network architecture when virtual machine active or passive change state, this data structure is by 6 tuple { NIC, EID, HostIP, VMID, MAC, NICCONF} forms, and describes a fictitious host computer environmental interface and attribute thereof, wherein:
NIC: the unique identification of virtual network adapter;
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route;
HostIP: the physical host IP at virtual machine place;
VMID: the virtual machine at virtual network adapter place, NIC and VMID divides out process, and this is determined when virtual machine creating starts with the form of UUID;
MAC: judge that message is originated according to this MAC Address, in order to control the route of message;
NICCONF: to the configuration of this virtual network adapter, comprises the list of disparate networks configuration order, comprises QoS setting, fire compartment wall setting.
The present invention compared to existing technology, has the following advantages:
The present invention can meet fictitious host computer environmental transport and transfer demand under cloud platform, simultaneously less on the impact of fictitious host computer Ambient Transfer.
Accompanying drawing explanation
Fig. 1 is the flow chart of the storage data migration method according to the embodiment of the present invention.
Embodiment
Detailed description to one or more embodiment of the present invention is hereafter provided together with the accompanying drawing of the diagram principle of the invention.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.Scope of the present invention is only defined by the claims, and the present invention contain many substitute, amendment and equivalent.Set forth many details in the following description to provide thorough understanding of the present invention.These details are provided for exemplary purposes, and also can realize the present invention according to claims without some in these details or all details.
Fig. 1 is the storage data migration method flow chart according to the embodiment of the present invention.Demand is moved across fictitious host computer environmental strategies under the present invention is directed to multiple cloud environment, proposition is applicable to migration mechanism between the fictitious host computer environmental data cluster under overlay network structure, by fictitious host computer environmental transport and transfer agreement between data cluster, make virtual machine in transition process, fictitious host computer Environment Architecture and network profile thereof are moved in the lump and are automatically configured, between the cluster in transition process, the link of fictitious host computer environment is temporarily by channel transfer between cluster, when after cluster virtual machine successively Successful migration, fictitious host computer environment then intactly migrates to target data cluster, to realize cluster virtual machine migration between the data cluster under network virtualization.
System architecture is divided into 3 layers, is respectively: be responsible for the routing layer building the network layer of moving between fictitious host computer environment and cluster, responsible main frame localized routing table and transmit virtual machine (vm) migration event notice and the inner nuclear layer that responsible network channel realizes, virtual interface configures.
1) inner nuclear layer: this layer is positioned at physical host, by the front and back end driving mechanism of virtual network adapter, intercepts and captures and route message that virtual interface sends; Its route chain mechanism utilizing operating system to provide, arranges the configuration of the network interfaces such as QoS for virtual interface simultaneously.
2) routing layer: this layer is also positioned at physical host, safeguards the localized routing table of physical host, to control the virtual interface routed path of inner nuclear layer.In addition also receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface.
3) network layer: the network management part extending cloud computing platform, and with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment.Network layer maintains overall routing table, and this table is produced the setting of fictitious host computer environment by user.When overall situation routing table is handed down to routing layer, be split as localized routing table for fictitious host computer Environment Architecture and set different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile.This layer also realizes fictitious host computer Environment communication between data cluster by agency service simultaneously.Before virtual machine (vm) migration starts, this service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster, and by fictitious host computer environmental transport and transfer agreement, ensure that fictitious host computer environment architecture in transition process is constant.
In the method for the invention, the network message of virtual network adapter transmitting-receiving is intercepted and captured by inner nuclear layer, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment.
Fictitious host computer environment is divided by fictitious host computer environment ID, and in fictitious host computer environment, the routed path of Ether frame then controlled by localized routing table.After virtual network adapter joins fictitious host computer environment, for unicast packet directly according to routing table HostIP item, send to the virtual machine at corresponding virtual network adapter place.Broadcast packet then gives the virtual network adapter in all fictitious host computer environment by inner nuclear layer route.
The localized routing table that routing layer is safeguarded, is made up of 3 tuples: the IP address (HostIP) of virtual network adapter MAC (MAC), virtual machine place main frame and territory, place (EID).Routing layer is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
Intel Virtualization Technology supports the virtual machine instance dynamic migration function on different physical node, thus also can realize virtual machine instance and move in the architecture of different pieces of information cluster.
Network layer carries out unified management and control to virtual machine, virtual network adapter and fictitious host computer environment thereof, and due to virtual machine meeting active or passive change state, network layer needs correspondingly to change network architecture.Network layer maintains a database, comprises the data structure corresponding to its management object, this data structure by 6 tuples NIC, EID, HostIP, VMID, MAC, NICCONF} describe a fictitious host computer environmental interface and attribute thereof:
NIC: the unique identification of virtual network adapter.
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route.
HostIP: the physical host IP at virtual machine place, inner nuclear layer is according to this for foundation determines the destination host of route.
VMID: the virtual machine at virtual network adapter place, owing to there being polylith virtual network adapter, therefore NIC and VMID divides out process, and this starts just to be determined in virtual machine creating with the form of UUID.
MAC: according to this MAC Address, inner nuclear layer judges that message is originated, in order to control the route of message.This MAC Address is just determined when virtual machine creating virtual interface.
NICCONF: to the configuration of this virtual network adapter itself is a list comprising disparate networks configuration order, comprises QoS setting, fire compartment wall setting etc.
Below describe fictitious host computer environmental transport and transfer strategy between data cluster of the present invention in detail.
Fictitious host computer environmental transport and transfer is carried out with virtual machine (vm) migration, and between data cluster, fictitious host computer environmental transport and transfer strategy is as follows:
Suppose that the source data cluster migration network address, agency service place is SOURCESERVICEIP, the target data cluster migration network address, agency service place is REMOTESERVICEIP, and open to the other side by the public signature key of adaptation services device between data cluster.
1) cloud platform proposes migration request between data cluster, and network layer determines the corresponding VMID of virtual machine to be migrated and migration source host network address SIP and REMOTESERVICEIP according to request;
2) migration request between the agency service generation data set group of source data cluster, sends to target data cluster after the public key signature using target data cluster to provide;
3) target data cluster uses private key checking request, and after checking the other side identity is legal, distribute migration destination server, its network address is RDIP, and sends to source data cluster after the public key signature using source data cluster to provide;
4) source data cluster and target data cluster carry out key agreement, the Traffic encryption key(TEK) Key of negotiation result and VMID generating virtual passage;
5) set of source data group network layer inquires about the virtual network adapter to be migrated list that comprises of virtual machine according to VMID;
6) traversal of lists is to the virtual network adapter NICn in list, takes out corresponding fictitious host computer environment EIDn;
7) inquire about the physical host corresponding to this EIDn, form physical host address list, determine to be moved and the network architecture that occurs changes the physical host affected;
8) travel through physical host address list, and judge whether HostIPn is positioned at source data cluster, if HostIPn is positioned at source data cluster, then send primitive REMOTECHANGENIC (EIDn, NICnMAC, SIP to this HostIPn, RDIP, Key), if HostIPn is positioned at target data cluster, then the tunnel in target data cluster no longer needs encrypted transmission, send primitive CHANGENIC (EIDn, NICnMAC, SIP, RDIP);
9) judge whether the physical host address list that this EIDn is corresponding comprises RDIP, if do not comprise, then generate the localized routing table of this EIDn according to RDIP, and send to target data set group, by target data cluster route to destination server;
10) 6 are returned) until virtual network adapter list traversal is complete;
11) send virtual network adapter configured list corresponding to virtual network adapter list to RDIP, the configuration of its adapter is set in advance;
12) cloud platform moves virtual machine by encrypted tunnel, and virtual machine (vm) migration result is back to network layer;
13) if move successfully, traversal of lists, and the physical host address list corresponding according to NICn sends primitive SELECTNIC (EIDn, NICnMAC, RDIP) successively, notify that it retains the virtual machine destination host address after moving, to safeguard new network architecture, and delete NICn in SIP adapter configuration, judge simultaneously SIP whether be contained in migration after new HostIP in, if no longer comprise, then send notice SIP and delete the localized routing table do not re-used;
14) if move unsuccessfully, traversal of lists, and the physical host address list corresponding according to NICn sends primitive SELECTNIC (EIDn successively, NICnMAC, SIP), local routing table is return back to and moves the architecture state before starting, and delete the adapter configuration in advance for virtual network adapter list setting in RDIP, if have sent complete fictitious host computer environment routing table to RDIP before, then sending notice and deleting.
Between this data cluster, migration scheme has made more estimation & disposings to some particular cases, except the needs newly including physical host before moving in send brand-new list item to ensure in itself and fictitious host computer environment except other main-machine communications, also need to be connected process respectively to long-range connection with this locality: this locality is connected, communicate without the need to adopting cipher mode to encapsulate channel, and for long-range connection, then specify encryption key Key, encapsulated frame is encrypted.In the present implementation, key K ey is by the secret generating after key agreement between VMID and data cluster.
In sum, the present invention can meet fictitious host computer environmental transport and transfer demand under cloud platform, simultaneously less on the impact of fictitious host computer Ambient Transfer.
Obviously, it should be appreciated by those skilled in the art, above-mentioned of the present invention each module or each step can realize with general computing system, they can concentrate on single computing system, or be distributed on network that multiple computing system forms, alternatively, they can realize with the executable program code of computing system, thus, they can be stored and be performed by computing system within the storage system.Like this, the present invention is not restricted to any specific hardware and software combination.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.

Claims (4)

1. store a data migration method, it is characterized in that, comprising:
Intercept and capture the network message of virtual network adapter transmitting-receiving, then message is encapsulated, add fictitious host computer environment ID, virtual machine ID identifying information forms the TCP frame encapsulated, routed in physical network and form fictitious host computer environment; By fictitious host computer environmental transport and transfer agreement between data cluster, the architecture of migration fictitious host computer environment and network profile, to migrate to target data cluster by complete for fictitious host computer environment.
2. method according to claim 1, is characterized in that, described method also comprises: the route chain mechanism utilizing operating system to provide, for virtual interface arranges the configuration of QoS network interface, receive the fictitious host computer environmental interface allocation list set by cloud computing platform, be translated as concrete network interface control command according to by the network configuration of this table set by virtual interface, with cloud platform virtual machine management function phase Cooperative Maintenance fictitious host computer environment, overall routing table is split as localized routing table for fictitious host computer Environment Architecture and sets different physical hosts respectively, when virtual machine (vm) migration event produces, then issue new routing table according to setting, migration fictitious host computer environmental interface and network profile, fictitious host computer Environment communication between data cluster is realized by agency service, before virtual machine (vm) migration starts, agency service sends virtual machine (vm) migration message to the agency service of other data clusters, consult the destination host that virtual machine is positioned at new data cluster.
3. method according to claim 2, it is characterized in that, wherein, described fictitious host computer environment is divided by fictitious host computer environment ID, in fictitious host computer environment, the routed path of Ether frame controlled by localized routing table, after virtual network adapter joins fictitious host computer environment, unicast packet is directly sent to the virtual machine at corresponding virtual network adapter place;
Described localized routing table, is made up of 3 tuples: the IP address HostIP of virtual network adapter MAC, virtual machine place main frame and territory, place EID, is subject to network layer management and configuration by following management primitive:
ADDNIC: add list item (EID, MAC, HostIP);
REMOVENIC: delete list item (EID, MAC, HostIP);
CHANGENIC: amendment list item (EID, MAC, HostIP, HostIP'), for migration, transfer virtual interface route target;
SELECTNIC: select effective item (EID, MAC, HostIP) in the routing table, for the migration configuration that comes into force;
REMOTEADDNIC: add list item (EID, MAC, RemoteHostIP, Key), for moving between data cluster, this uses key K ey encryption by making target physical main frame to the communication of remote physical main frame;
REMOTECHANGENIC: amendment list item (EID, MAC, HostIP, RemoteHostIP', Key), during for moving between data cluster, amendment route target.
4. method according to claim 2, is characterized in that, by the database of maintenance package containing the data structure corresponding to management object, unified management and control are carried out to virtual machine, virtual network adapter and fictitious host computer environment thereof, correspondingly change network architecture when virtual machine active or passive change state, this data structure is by one 6 tuple { NIC, EID, HostIP, VMID, MAC, NICCONF} form, describe a fictitious host computer environmental interface and attribute thereof, wherein:
NIC: the unique identification of virtual network adapter;
EID: virtual network adapter place fictitious host computer environment, comprises polylith virtual network adapter in fictitious host computer environment, the message that the virtual network adapter being only positioned at same fictitious host computer environment sends could allow route;
HostIP: the physical host IP at virtual machine place;
VMID: the virtual machine at virtual network adapter place, NIC and VMID divides out process, and this is determined when virtual machine creating starts with the form of UUID;
MAC: judge that message is originated according to this MAC Address, in order to control the route of message;
NICCONF: to the configuration of this virtual network adapter, comprises the list of disparate networks configuration order, comprises QoS setting, fire compartment wall setting.
CN201510116525.6A 2015-03-17 2015-03-17 Stored data migration method Pending CN104683476A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510116525.6A CN104683476A (en) 2015-03-17 2015-03-17 Stored data migration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510116525.6A CN104683476A (en) 2015-03-17 2015-03-17 Stored data migration method

Publications (1)

Publication Number Publication Date
CN104683476A true CN104683476A (en) 2015-06-03

Family

ID=53318042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510116525.6A Pending CN104683476A (en) 2015-03-17 2015-03-17 Stored data migration method

Country Status (1)

Country Link
CN (1) CN104683476A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107623683A (en) * 2017-09-07 2018-01-23 西安电子科技大学 A kind of cloud resource by dynamic safety prevents method disclosed in information
CN108924087A (en) * 2018-05-28 2018-11-30 国网福建省电力有限公司 Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address
CN109274537A (en) * 2018-10-25 2019-01-25 深圳供电局有限公司 A kind of continuity network virtualization platform system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457439A (en) * 2011-12-07 2012-05-16 中标软件有限公司 Virtual switching system and method of cloud computing system
CN103023704A (en) * 2012-12-24 2013-04-03 北京启明星辰信息技术股份有限公司 Method and system for accessing virtual network service equipment
CN103516802A (en) * 2013-09-30 2014-01-15 中国科学院计算技术研究所 Method and device for achieving seamless transference of across heterogeneous virtual switch

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457439A (en) * 2011-12-07 2012-05-16 中标软件有限公司 Virtual switching system and method of cloud computing system
CN103023704A (en) * 2012-12-24 2013-04-03 北京启明星辰信息技术股份有限公司 Method and system for accessing virtual network service equipment
CN103516802A (en) * 2013-09-30 2014-01-15 中国科学院计算技术研究所 Method and device for achieving seamless transference of across heterogeneous virtual switch

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王丽娜等: ""IDVE:面向跨数据中心的虚拟域一致性迁移机制"", 《四川大学学报(工程科学版)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107623683A (en) * 2017-09-07 2018-01-23 西安电子科技大学 A kind of cloud resource by dynamic safety prevents method disclosed in information
CN107623683B (en) * 2017-09-07 2020-12-18 西安电子科技大学 Method for preventing information disclosure through dynamic and safe cloud resources
CN108924087A (en) * 2018-05-28 2018-11-30 国网福建省电力有限公司 Cloud virtual machine intellectual property method for effective protecting is realized based on No. UUID and MAC Address
CN109274537A (en) * 2018-10-25 2019-01-25 深圳供电局有限公司 A kind of continuity network virtualization platform system
CN109274537B (en) * 2018-10-25 2022-12-27 深圳供电局有限公司 Continuous network virtualization platform system

Similar Documents

Publication Publication Date Title
CN110351191B (en) Network configuration method, system, device and storage medium
CN112511611B (en) Communication method, device and system of node cluster and electronic equipment
CN102893559B (en) The member of interconnected virtual network
CN104699522A (en) Virtual machine dynamic migration method
CN102473114B (en) Dynamically migrating computer networks
EP2905930B1 (en) Processing method, apparatus and system for multicast
CN101605084B (en) Method and system for processing virtual network messages based on virtual machine
CN111612466B (en) Consensus and resource transmission method, device and storage medium
US20200374127A1 (en) Blockchain-powered cloud management system
US10454880B2 (en) IP packet processing method and apparatus, and network system
US20130315242A1 (en) Network Communication Method and Device
US20170373931A1 (en) Method for updating network service descriptor nsd and apparatus
EP2687982A1 (en) Hierarchical system for managing a plurality of virtual machines, method and computer program
US11671363B2 (en) Method and apparatus for cross-service-zone communication, and data center network
CN104685507A (en) Providing a virtual security appliance architecture to a virtual cloud infrastructure
CN103607430A (en) Network processing method and system, and network control center
CN105429938B (en) Resource allocation method and device
CN106416147A (en) System and method for a software defined protocol network node
JP2015095894A (en) Management server and management method thereof for managing cloud appliances in virtual local area networks
CN106712988A (en) Virtual network management method and device
CN105306612A (en) Method for acquiring identifier of terminal in network and management network element
EP3598705B1 (en) Routing control
US20240048484A1 (en) Route updating method and user cluster
CN110336730B (en) Network system and data transmission method
CN105704042A (en) Message processing method, BNG and BNG cluster system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150603