CN112306762A - Communication processing method, device and system, and non-volatile storage medium - Google Patents

Communication processing method, device and system, and non-volatile storage medium Download PDF

Info

Publication number
CN112306762A
CN112306762A CN202011193871.1A CN202011193871A CN112306762A CN 112306762 A CN112306762 A CN 112306762A CN 202011193871 A CN202011193871 A CN 202011193871A CN 112306762 A CN112306762 A CN 112306762A
Authority
CN
China
Prior art keywords
standby
virtual
cluster server
request
standby machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011193871.1A
Other languages
Chinese (zh)
Inventor
李帅明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202011193871.1A priority Critical patent/CN112306762A/en
Publication of CN112306762A publication Critical patent/CN112306762A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2038Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant with a single idle spare processing component
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Human Computer Interaction (AREA)
  • Hardware Redundancy (AREA)

Abstract

The application discloses a communication processing method, a communication processing device, a communication processing system and a nonvolatile storage medium. Wherein, the method comprises the following steps: receiving a first standby request sent by a terminal device, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; and sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment. According to the method and the device, the technical problems that in the related art, the communication efficiency is poor due to the influence of network fluctuation under the wide area network environment, and the office experience and the office efficiency of cloud desktop office are reduced are solved.

Description

Communication processing method, device and system, and non-volatile storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a communication processing method, apparatus, and system, and a non-volatile storage medium.
Background
With the development and maturity of cloud computing, the use scene of the cloud desktop is more and more extensive, and a plurality of industries such as colleges and universities, medical treatment, government and the like begin to gradually popularize the cloud desktop office, so the cloud desktop becomes an integral trend in the future. In addition to the virtual desktop interface VDI architecture for local area networks, there are existing VDI architecture solutions in wide area networks. Namely, a user can be connected with a certain cluster server through a network at any place to acquire a desktop image. In a wide area network scene, a user can conveniently realize remote office.
However, because the VDI architecture is heavily dependent on the network bandwidth environment and is all calculated through the back end, all transmissions of the VDI cloud desktop pass through the network, the network stability of the wide area network is poor, and if a card is stuck in the network, network delay occurs. For example, for a user, a situation that a mouse suddenly cannot move, or a keyboard is knocked without any reaction, content just knocked is displayed after a few seconds, and the like occurs, which is very unfriendly for the user, especially, the communication efficiency is poor in a wide area network environment, and any network fluctuation affects cloud desktop use, so that the office experience and the office efficiency are reduced.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a communication processing method, a communication processing device, a communication processing system and a nonvolatile storage medium, and aims to at least solve the technical problems that in the related art, the communication efficiency is poor due to the influence of network fluctuation in a wide area network environment, and the office experience and the office efficiency of cloud desktop office are reduced.
According to an aspect of an embodiment of the present application, there is provided a communication processing method, including: receiving a first standby request sent by a terminal device, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; and sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment.
Optionally, the first standby machine request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; sending a second standby request to the first cluster server according to the first standby request, including: and sending a second standby request to the first cluster server based on the first identification information, wherein the second standby request carries the second identification information and the third identification information.
Optionally, sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server, where the sending includes: determining standby configuration information based on the host configuration information; and sending a third standby machine request to the second cluster server based on the third identification information, where the third standby machine request carries the standby machine configuration information, and the second cluster server is configured to create the virtual standby machine locally according to the standby machine configuration information and determine login information of the virtual standby machine, where the login information includes a login address, a login account, and a login password of the virtual standby machine on the second cluster server.
Optionally, before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes: establishing a heartbeat connection between the first cluster server and the second cluster server, wherein the first cluster server and the second cluster server are cluster servers distributed in different regions, and a plurality of cluster servers in different regions are in the same network; the virtual host is configured to send data to be copied to the virtual standby machine based on the heartbeat connection, the virtual standby machine is configured to generate a source desktop according to the data to be copied, and the data to be copied is difference data between the virtual host and the virtual standby machine.
Optionally, before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes: acquiring user data of the virtual host; determining data to be copied in the user data, wherein the data to be copied is difference data between the virtual host and the virtual standby machine; and sending the data to be copied to the virtual standby machine, wherein the virtual standby machine is used for generating a source desktop according to the data to be copied.
Optionally, after sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes: authenticating the user identity of the terminal equipment; and determining to pass the first standby request when the authentication is passed, wherein determining to send a second standby request to the first cluster server when the first standby request is passed.
Optionally, the method further includes: after the terminal equipment finishes logging in the virtual standby machine based on the login information, backing up current user data and current operation data on the virtual standby machine; and synchronizing the current operation data and the current user data to the virtual host and releasing the virtual standby machine before the terminal device exits the virtual standby machine.
Optionally, the method further includes: receiving a standby logout request sent by the terminal equipment; and forwarding the backup logout request to the second cluster server, wherein the second cluster server is used for resetting the virtual backup and logging out the login information of the virtual backup.
According to another aspect of the embodiments of the present application, there is also provided a communication processing system, including: the terminal device is used for sending a first standby request, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server; and the proxy server is connected with the terminal equipment and used for sending a second standby request to the first cluster server according to the received first standby request, sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server and sending the received login information of the virtual standby returned by the second cluster server to the terminal equipment.
Optionally, the first standby machine request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; the proxy server is further configured to send the second standby machine request to the first cluster server based on the first identifier information, where the second standby machine request carries the second identifier information and the third identifier information, and the host configuration information is used to determine standby machine configuration information; the proxy server is further configured to send the third standby request to the second cluster server based on the third identifier information, where the third standby request carries the standby configuration information, and the second cluster server is configured to create the virtual standby locally according to the standby configuration information.
Optionally, the system further includes: the first cluster server is connected to the proxy server, and configured to determine host configuration information of the virtual host according to the second identifier information and the third identifier information after receiving the second standby request, and return the host configuration information to the proxy server; the second cluster server is connected to the proxy server, and configured to create the virtual standby machine locally according to the standby machine configuration information after receiving the third standby machine request, and return login information of the virtual standby machine to the proxy server, where the login information includes a login address, a login account, and a login password of the virtual standby machine on the second cluster server.
According to another aspect of the embodiments of the present application, there is also provided a communication processing apparatus, including: the first communication module is used for receiving a first standby machine request sent by terminal equipment, wherein the first standby machine request is used for requesting to create a virtual standby machine which is the same as a virtual host machine on a first cluster server on a second cluster server; the second communication module is used for sending a second standby request to the first cluster server according to the first standby request; a third communication module, configured to send a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; and the fourth communication module is used for sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment.
According to another aspect of the embodiments of the present application, there is also provided a non-volatile storage medium storing a plurality of instructions, the instructions being adapted to be loaded by a processor and to perform any one of the above-mentioned communication processing methods.
According to another aspect of the embodiments of the present application, there is also provided an electronic apparatus, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the computer program to perform any one of the above communication processing methods.
In the embodiment of the application, a first standby machine request sent by a terminal device is received, where the first standby machine request is used to request to create a virtual standby machine on a second cluster server, where the virtual standby machine is the same as a virtual host on a first cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; the received login information of the virtual standby machine returned by the second cluster server is sent to the terminal equipment, the purpose of improving the communication efficiency under the wide area network environment is achieved, the technical effects of enhancing the office experience and the office efficiency of cloud desktop office are achieved, and the technical problems that in the related art, the communication efficiency is poor due to the fact that network fluctuation influences under the wide area network environment, and the office experience and the office efficiency are reduced due to the fact that the cloud desktop office is achieved are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flow chart of a communication processing method according to an embodiment of the present application;
FIG. 2 is an architectural diagram of an alternative desktop virtualization VDI according to embodiments of the present application;
FIG. 3 is a flow chart of an alternative communication processing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a communication processing system according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a communication processing apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to an embodiment of the present application, there is provided an embodiment of a communication processing method, it should be noted that the steps shown in the flowchart of the drawings may be executed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be executed in an order different from that here.
Fig. 1 is a flowchart of a communication processing method according to an embodiment of the present application, and as shown in fig. 1, the method includes the following steps:
step S102, receiving a first standby request sent by a terminal device, wherein the first standby request is used for requesting to create a virtual standby machine on a second cluster server, and the virtual standby machine is the same as a virtual host on a first cluster server;
step S104, according to the first standby request, sending a second standby request to the first cluster server;
step S106, based on the received host configuration information of the virtual host returned by the first cluster server, sending a third standby request to the second cluster server;
step S108, sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device.
In the embodiment of the application, a first standby machine request sent by a terminal device is received, where the first standby machine request is used to request to create a virtual standby machine on a second cluster server, where the virtual standby machine is the same as a virtual host on a first cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; the received login information of the virtual standby machine returned by the second cluster server is sent to the terminal equipment, the purpose of improving the communication efficiency under the wide area network environment is achieved, the technical effects of enhancing the office experience and the office efficiency of cloud desktop office are achieved, and the technical problems that in the related art, the communication efficiency is poor due to the fact that network fluctuation influences under the wide area network environment, and the office experience and the office efficiency are reduced due to the fact that the cloud desktop office is achieved are solved.
Optionally, the terminal device is a user terminal, for example, a client device, a zero terminal device, or the like.
It should be noted that, the execution subject of the embodiment of the present application is a proxy server, and the communication processing method provided by the embodiment of the present application may be applied to, but is not limited to, a cloud desktop off-site office scenario and a desktop virtualization scenario, in the scheme of the application, a user can submit a first standby machine request (namely a virtual standby machine application) to the proxy server through the terminal equipment, thereby completing the generation and data copying of the standby machine by the proxy server, providing the user with the virtual standby machine which is identical to the virtual host in the different place, thus, the user can realize office experience completely the same as that of the local under the local area network in different places, the user can realize office in different places without connecting with the local virtual host through a public network, therefore, the phenomenon that office experience and office efficiency are reduced due to the influence of network fluctuation in the wide area network environment can be effectively avoided.
It should be noted that desktop Virtualization (VDI) refers to virtualizing a terminal system (also referred to as a desktop) of a computer to achieve security and flexibility of desktop usage. The desktop system belonging to the user's person can be accessed by any device, anywhere, and at any time over the network. By utilizing the virtualization technology, various physical devices are virtualized, so that the utilization rate of resources is effectively improved, the cost is saved, and the application quality is improved. Under the support of virtualization technology, the connection between network software and hardware equipment can be more flexible, and the expansibility can also be greatly improved. The cloud desktop utilization virtualization technology is essentially used for uniformly storing and managing various user information, and through simple network access equipment, terminal equipment can enter the cloud desktop to realize centralized management and realize efficient resource sharing.
Briefly, desktop Virtualization (VDI) may be understood as virtualizing a user's desktop by running a Windows system on a cluster server in a data center. The user is connected with the virtual desktop (generally referred to as a virtual machine) through a client computing protocol from a client device (zero terminal device), the user accesses the personal desktop through the zero terminal device just like accessing the traditional local installation desktop, the user can be connected to the desktop which the user wants to be connected at any time and any place as long as a network exists, the IT personnel can manage desktop users and data more easily, and the data of the user is safer because all the data are in a service provider.
Fig. 2 is an architecture diagram of an optional simpler VDI according to an embodiment of the present application, where a user may access a virtual machine (e.g., virtual machine 1, virtual machine 2, … … virtual machine N) allocated to a cluster server through a zero terminal device (e.g., zero terminal 1, zero terminal 2, … … zero terminal N) to obtain a desktop image, and control an obtained virtual desktop thereof in a reverse control manner.
The communication processing method provided by the embodiment of the application is suitable for the VDI-based different-place office scene, the virtual standby machine can be conveniently established for the user in the different-place VDI system, all configurations and data in the virtual standby machine are completely consistent with the virtual host of the user at the local place (on the main working place), and no difference exists between the user experience and the use of the local office desktop. According to the scheme, the office network environment of the user is switched from the wide area network office environment to the metropolitan area network office environment or the local area network office environment, so that the influence of the network fluctuation of the wide area network on the use of the cloud desktop can be greatly reduced, or the influence of the network fluctuation on the use of the cloud desktop is avoided.
As an alternative embodiment, the communication processing scheme provided in the present application is described in detail by an alternative embodiment as follows:
in wide area network mode, a proxy server (broker server) is used to achieve load balancing of application server clusters; the method comprises the steps that a user uses a cloud desktop in a wide area network environment, a browser server is accessed through zero terminal equipment, a connection request and server cluster information are managed by the browser server, and the virtual desktop is returned to the zero terminal equipment for the user to use. Due to network limitation and disaster recovery strategies, the server clusters are distributed in various regions, cluster servers of various regions form a large cluster, and a brooker server is used for communication.
For example, for analysis, for example, if a work place of a user is in city a, a virtual desktop corresponding to the user exists on a cluster server in city a, when the user is in normal use, the user uses a zero terminal, accesses a virtual desktop of the user through a browser server, establishes communication through the browser server, and realizes media transmission through a metropolitan area network or a local area network (where, because the metropolitan area network environment is superior to the wide area network environment, the local area network environment is hardly affected by the network environment of the public network); when the user goes to the city B for business, the user can apply to establish a virtual standby machine of a virtual desktop on a cluster server of the city B, establish a two-machine connection relation between the virtual host and the virtual standby machine through a broker server, and complete data replication at the same time.
It should be noted that the application of the virtual standby machine is initiated by the user, and first, the configuration information of the cloud desktop of the user is obtained, a cloud desktop with the same configuration as that of the first cluster server is created on the second cluster server at the user application site (business trip site), then, a dual-machine relationship is established between the newly created cloud desktop and the source cloud desktop, and the state of the dual machines is maintained, and when the client no longer needs the virtual standby machine, the virtual standby machine is released.
In an optional embodiment, sending a second standby request to the first cluster server includes:
step S202, sending a second standby request to the first cluster server based on the first identifier information, where the second standby request carries the second identifier information and the third identifier information.
Optionally, the first standby machine request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; according to the first standby request, therefore, the proxy server sends a second standby request to the first cluster server, that is, based on the first identification information carried in the first standby request, the proxy server sends a second standby request to the first cluster server, and the second standby request carries the second identification information and the third identification information.
After the proxy server sends a second standby request to the first cluster server, the first cluster server determines the host configuration information of the virtual host based on the second identification information and the third identification information, and returns the host configuration information of the virtual host to the proxy server.
In an optional embodiment, after sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes:
authenticating the user identity of the terminal equipment; and determining to pass the first standby request when the authentication is passed, wherein determining to send a second standby request to the first cluster server when the first standby request is passed.
As an alternative embodiment, a proxy server (broker server) is in the same networking with a plurality of cluster servers, and a user may connect to the proxy server through a zero-terminal device used by the user.
Optionally, the user owns a corresponding virtual machine (virtual host) on the local cluster server, when the user wants to create a remote virtual machine (virtual standby machine) identical to the local virtual machine (virtual host) on the remote cluster server, a first standby machine request is initiated to the proxy server, and after authenticating the user identity, the proxy server determines whether to agree with the first standby machine request.
In an optional embodiment, sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server includes:
step S302, determining standby configuration information based on the host configuration information;
step S304, sending a third standby request to the second cluster server based on the third identification information, where the third standby request carries the standby configuration information, and the second cluster server is configured to create the virtual standby locally according to the standby configuration information, and determine login information of the virtual standby.
Optionally, the login information includes a login address, a login account, and a login password of the virtual standby machine on the second cluster server.
After the first server returns the host configuration information of the virtual host to the proxy server, the proxy server determines the standby configuration information of the virtual standby machine based on the received host configuration information, and sends a third standby request carrying the standby configuration information to the second cluster server. After receiving a third standby machine request, the second cluster server locally creates the virtual standby machine according to the standby machine configuration information carried in the third standby machine request, and determines the login information of the virtual standby machine.
Specifically, the proxy server initiates a second standby machine request to the first cluster server, the first cluster server receiving the second standby machine request firstly returns host configuration information of the local host to the proxy server, and then the proxy server sends a third standby machine request to the second cluster server, so that the second cluster server can create a virtual standby machine with the same configuration as the virtual host locally. The third standby request includes: and the standby machine configuration information is determined according to the host configuration information returned by the first cluster server, and the second cluster server receiving the third standby machine request locally creates a virtual standby machine with the same configuration as the virtual host according to the standby machine configuration information.
In an optional embodiment, before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes:
step S402, establishing a heartbeat connection between the first cluster server and the second cluster server.
The first cluster server and the second cluster server are cluster servers distributed in different regions, and a plurality of cluster servers in different regions are in the same network; the virtual host is configured to send data to be copied to the virtual standby machine based on the heartbeat connection, the virtual standby machine is configured to generate a source desktop according to the data to be copied, and the data to be copied is difference data between the virtual host and the virtual standby machine.
In the above optional embodiment, after the virtual standby machine in the second cluster server is ready, the data replication from the virtual host machine to the virtual standby machine may be started. Specifically, the data replication may be performed in a manner that the first cluster server directly establishes a heartbeat connection with the second cluster server.
Establishing heartbeat connection through a browser server, taking a source desktop as a virtual host, taking a newly-built desktop as a virtual standby machine, establishing dual-machine connection, and synchronizing data of the virtual host to the virtual standby machine through a dual-machine hot standby mode (data synchronization can be realized through the browser server through a wide area network, because only data transmission is carried out and a network is unstable in the hot standby process, the virtual host can be normally used), after the data synchronization is finished, before a user starts to use the virtual standby machine, main-standby switching is carried out, the virtual standby machine which finishes data synchronization is used as a new host, the source cloud desktop is the new standby machine and receives data synchronization of the new host, so that the operation and data of the user on the virtual standby machine can be stored (real-time data synchronization can be carried out, synchronous time can be set for data synchronization, only the synchronization is finished before the virtual standby machine is released), when the virtual standby machine is not used (for example, the user finishes business trip), and the virtual standby machine is released; it is worth noting that in the normal dual-computer mode, if the standby computer cannot detect the heartbeat of the host computer, the standby computer will take over, and in the application scenario of the embodiment of the present application, the heartbeat connection between the virtual host computer and the virtual standby computer only performs communication and transfers synchronous data.
In an optional embodiment, before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further includes:
step S502, obtaining the user data of the virtual host;
step S504, determining data to be copied in the user data, where the data to be copied is difference data between the virtual host and the virtual standby;
step S506, sending the data to be copied to the virtual standby machine, where the virtual standby machine is configured to generate a source desktop according to the data to be copied.
In the embodiment of the application, because the virtual host and the virtual standby machine are in the same network, the proxy server may copy or synchronize data between the first cluster server and the second cluster server, that is, synchronize data of the virtual host to the virtual standby machine, determine difference data between the virtual host and the virtual standby machine by comparison, copy data to be copied, which are different in user data, to the virtual standby machine, and relate to data to be copied.
And after the data replication of the virtual host and the virtual standby machine is finished, the proxy server sends a notification message to the current user, wherein the notification message comprises the login address and the account password of the standby machine on the second cluster server. Therefore, when the user reaches the range of the local area network where the second cluster server is located, the user can log in the corresponding virtual standby machine through the login address and the account password provided by the proxy server, and therefore the user can work in different places just like using a virtual host.
In an alternative embodiment, fig. 3 is a flowchart of an alternative communication processing method according to an embodiment of the present application, and as shown in fig. 3, the method further includes:
step S702, after the terminal device completes logging in the virtual standby machine based on the login information, backing up current user data and current operation data on the virtual standby machine; and
step S704, before the terminal device exits the virtual standby machine, synchronizes the current operation data and the current user data to the virtual host, and releases the virtual standby machine.
In the above optional embodiment, after the terminal device completes logging in the virtual standby machine based on the login information, current user data and current operation data on the virtual standby machine are backed up, and before the terminal device exits the virtual standby machine, the current operation data and the current user data are synchronized to the virtual host, and the virtual standby machine is released.
In an optional embodiment, the method further includes:
step S802, receiving a standby logout request sent by the terminal equipment;
step S804, the backup logout request is forwarded to the second cluster server, wherein the second cluster server is configured to reset the virtual backup and logout the login information of the virtual backup.
For example, when the user is on business, a standby machine logout request may be sent, and a logout of the virtual standby machine is applied to the proxy server, and then the proxy server notifies the second cluster server to perform a logout operation of the virtual standby machine. Specifically, the second cluster server resets the current virtual standby machine, and logs out the login account and the password information bound to the virtual standby machine.
In a networking, the transmission can be completed by other technologies (for example, p2p) of point-to-point transmission, and in a processing mode of synchronous data, a cold standby mode can be adopted to complete the processing except for a hot standby mode, for example, a client is powered off after using a virtual standby machine in the market A, and then data is backed up and transmitted to the market B for direct use; when the customer goes on business, the same operation is reversed to log off the standby machine.
Example 2
According to an embodiment of the present application, there is further provided a system embodiment for implementing the communication processing method, and fig. 4 is a schematic structural diagram of a communication processing system according to the embodiment of the present application, and as shown in fig. 4, the communication processing system includes: terminal device 40, proxy server 42, first cluster server 44 and second cluster server 46, wherein:
a terminal device 40, configured to send a first standby request, where the first standby request is used to request to create a virtual standby on a second cluster server, where the virtual standby is the same as a virtual host on a first cluster server; and a proxy server 42, connected to the terminal device, configured to send a second standby request to the first cluster server according to the received first standby request, send a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server, and send the received login information of the virtual standby returned by the second cluster server to the terminal device.
In the embodiment of the application, a first standby machine request sent by a terminal device is received, where the first standby machine request is used to request to create a virtual standby machine on a second cluster server, where the virtual standby machine is the same as a virtual host on a first cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; the received login information of the virtual standby machine returned by the second cluster server is sent to the terminal equipment, the purpose of improving the communication efficiency under the wide area network environment is achieved, the technical effects of enhancing the office experience and the office efficiency of cloud desktop office are achieved, and the technical problems that in the related art, the communication efficiency is poor due to the fact that network fluctuation influences under the wide area network environment, and the office experience and the office efficiency are reduced due to the fact that the cloud desktop office is achieved are solved.
Optionally, the terminal device is a user terminal, for example, a client device, a zero terminal device, or the like.
It should be noted that, the execution subject of the embodiment of the present application is a proxy server, and the communication processing system provided by the embodiment of the present application may be applied to, but is not limited to, a cloud desktop off-site office scenario and a desktop virtualization scenario, in the scheme of the application, a user can submit a first standby machine request (namely a virtual standby machine application) to the proxy server through the terminal equipment, thereby completing the generation and data copying of the standby machine by the proxy server, providing the user with the virtual standby machine which is identical to the virtual host in the different place, thus, the user can realize office experience completely the same as that of the local under the local area network in different places, the user can realize office in different places without connecting with the local virtual host through a public network, therefore, the phenomenon that office experience and office efficiency are reduced due to the influence of network fluctuation in the wide area network environment can be effectively avoided.
It should be noted that desktop Virtualization (VDI) refers to virtualizing a terminal system (also referred to as a desktop) of a computer to achieve security and flexibility of desktop usage. The desktop system belonging to the user's person can be accessed by any device, anywhere, and at any time over the network. By utilizing the virtualization technology, various physical devices are virtualized, so that the utilization rate of resources is effectively improved, the cost is saved, and the application quality is improved. Under the support of virtualization technology, the connection between network software and hardware equipment can be more flexible, and the expansibility can also be greatly improved. The cloud desktop utilization virtualization technology is essentially used for uniformly storing and managing various user information, and through simple network access equipment, terminal equipment can enter the cloud desktop to realize centralized management and realize efficient resource sharing.
Briefly, desktop Virtualization (VDI) may be understood as virtualizing a user's desktop by running a Windows system on a cluster server in a data center. The user is connected with the virtual desktop (generally referred to as a virtual machine) through a client computing protocol from a client device (zero terminal device), the user accesses the personal desktop through the zero terminal device just like accessing the traditional local installation desktop, the user can be connected to the desktop which the user wants to be connected at any time and any place as long as a network exists, the IT personnel can manage desktop users and data more easily, and the data of the user is safer because all the data are in a service provider.
The communication processing system provided by the embodiment of the application is suitable for a VDI-based different-place office scene, a virtual standby machine can be conveniently established for a user in a different-place VDI system, all configurations and data in the virtual standby machine are completely consistent with a virtual host of the user at the local place (on a main working place), and no difference exists between the user experience and the use of a local office desktop. According to the scheme, the office network environment of the user is switched from the wide area network office environment to the metropolitan area network office environment or the local area network office environment, so that the influence of the network fluctuation of the wide area network on the use of the cloud desktop can be greatly reduced, or the influence of the network fluctuation on the use of the cloud desktop is avoided.
As an alternative embodiment, the communication processing scheme provided in the present application is described in detail by an alternative embodiment as follows:
in wide area network mode, a proxy server (broker server) is used to achieve load balancing of application server clusters; the method comprises the steps that a user uses a cloud desktop in a wide area network environment, a browser server is accessed through zero terminal equipment, a connection request and server cluster information are managed by the browser server, and the virtual desktop is returned to the zero terminal equipment for the user to use. Due to network limitation and disaster recovery strategies, the server clusters are distributed in various regions, cluster servers of various regions form a large cluster, and a brooker server is used for communication.
For example, for analysis, for example, if a work place of a user is in city a, a virtual desktop corresponding to the user exists on a cluster server in city a, when the user is in normal use, the user uses a zero terminal, accesses a virtual desktop of the user through a browser server, establishes communication through the browser server, and realizes media transmission through a metropolitan area network or a local area network (where, because the metropolitan area network environment is superior to the wide area network environment, the local area network environment is hardly affected by the network environment of the public network); when the user goes to the city B for business, the user can apply to establish a virtual standby machine of a virtual desktop on a cluster server of the city B, establish a two-machine connection relation between the virtual host and the virtual standby machine through a broker server, and complete data replication at the same time.
It should be noted that the application of the virtual standby machine is initiated by the user, and first, the configuration information of the cloud desktop of the user is obtained, a cloud desktop with the same configuration as that of the first cluster server is created on the second cluster server at the user application site (business trip site), then, a dual-machine relationship is established between the newly created cloud desktop and the source cloud desktop, and the state of the dual machines is maintained, and when the client no longer needs the virtual standby machine, the virtual standby machine is released.
In an optional embodiment, the first standby request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; the proxy server is further configured to send the second standby machine request to the first cluster server based on the first identifier information, where the second standby machine request carries the second identifier information and the third identifier information, and the host configuration information is used to determine standby machine configuration information; the proxy server is further configured to send the third standby request to the second cluster server based on the third identifier information, where the third standby request carries the standby configuration information, and the second cluster server is configured to create the virtual standby locally according to the standby configuration information.
In another optional embodiment, the system further includes:
the first cluster server 44, connected to the proxy server, is configured to determine host configuration information of the virtual host according to the second identifier information and the third identifier information after receiving the second standby request, and return the host configuration information to the proxy server;
the second cluster server 46 is connected to the proxy server, and configured to create the virtual standby machine locally according to the standby machine configuration information after receiving the third standby machine request, and return login information of the virtual standby machine to the proxy server, where the login information includes a login address, a login account, and a login password of the virtual standby machine on the second cluster server.
Optionally, the first standby machine request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; according to the first standby request, therefore, the proxy server sends a second standby request to the first cluster server, that is, based on the first identification information carried in the first standby request, the proxy server sends a second standby request to the first cluster server, and the second standby request carries the second identification information and the third identification information.
After the proxy server sends a second standby request to the first cluster server, the first cluster server determines the host configuration information of the virtual host based on the second identification information and the third identification information, and returns the host configuration information of the virtual host to the proxy server.
After the first server returns the host configuration information of the virtual host to the proxy server, the proxy server determines the standby configuration information of the virtual standby machine based on the received host configuration information, and sends a third standby request carrying the standby configuration information to the second cluster server. After receiving a third standby machine request, the second cluster server locally creates the virtual standby machine according to the standby machine configuration information carried in the third standby machine request, and determines the login information of the virtual standby machine.
Specifically, the proxy server initiates a second standby machine request to the first cluster server, the first cluster server receiving the second standby machine request firstly returns host configuration information of the local host to the proxy server, and then the proxy server sends a third standby machine request to the second cluster server, so that the second cluster server can create a virtual standby machine with the same configuration as the virtual host locally. The third standby request includes: and the standby machine configuration information is determined according to the host configuration information returned by the first cluster server, and the second cluster server receiving the third standby machine request locally creates a virtual standby machine with the same configuration as the virtual host according to the standby machine configuration information.
It should be noted that the specific structure of the communication processing system shown in fig. 4 in this request is merely an illustration, and in a specific application, the communication processing system in this request may have more or less structures than the communication processing system shown in fig. 4.
It should be noted that any optional or preferred communication processing method in embodiment 1 above may be executed or implemented in the communication processing system provided in this embodiment.
In addition, it should be noted that, for alternative or preferred embodiments of the present embodiment, reference may be made to the relevant description in embodiment 1, and details are not described herein again.
Example 3
According to an embodiment of the present application, there is further provided an apparatus embodiment for implementing the communication processing method, fig. 5 is a schematic structural diagram of a communication processing apparatus according to the embodiment of the present application, and as shown in fig. 5, the communication processing apparatus includes: a first communication module 50, a second communication module 52, a third communication module 54, and a fourth communication module 56, wherein:
a first communication module 50, configured to receive a first standby request sent by a terminal device, where the first standby request is used to request to create a virtual standby on a second cluster server, where the virtual standby is the same as a virtual host on a first cluster server; a second communication module 52, configured to send a second standby request to the first cluster server according to the first standby request; a third communication module 54, configured to send a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; a fourth communication module 56, configured to send the received login information of the virtual standby machine returned by the second cluster server to the terminal device.
It should be noted that the above modules may be implemented by software or hardware, for example, for the latter, the following may be implemented: the modules can be located in the same processor; alternatively, the modules may be located in different processors in any combination.
It should be noted that the first communication module 50, the second communication module 52, the third communication module 54, and the fourth communication module 56 correspond to steps S102 to S108 in embodiment 1, and the modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in embodiment 1. It should be noted that the modules described above may be implemented in a computer terminal as part of an apparatus.
It should be noted that, reference may be made to the relevant description in embodiment 1 for alternative or preferred embodiments of this embodiment, and details are not described here again.
The communication processing apparatus may further include a processor and a memory, where the first communication module 50, the second communication module 52, the third communication module 54, the fourth communication module 56, and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls a corresponding program unit from the memory, wherein one or more than one kernel can be arranged. The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
According to the embodiment of the request, the embodiment of the nonvolatile storage medium is also provided. Optionally, in this embodiment, the nonvolatile storage medium includes a stored program, and the apparatus in which the nonvolatile storage medium is located is controlled to execute any one of the communication processing methods when the program runs.
Optionally, in this embodiment, the nonvolatile storage medium may be located in any one of a group of computer terminals in a computer network, or in any one of a group of mobile terminals, and the nonvolatile storage medium includes a stored program.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: receiving a first standby request sent by a terminal device, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server; sending a second standby request to the first cluster server according to the first standby request; sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server; and sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: and sending a second standby request to the first cluster server based on the first identification information, wherein the second standby request carries the second identification information and the third identification information.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: determining standby configuration information based on the host configuration information; and sending a third standby machine request to the second cluster server based on the third identification information, where the third standby machine request carries the standby machine configuration information, and the second cluster server is configured to create the virtual standby machine locally according to the standby machine configuration information and determine login information of the virtual standby machine, where the login information includes a login address, a login account, and a login password of the virtual standby machine on the second cluster server.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: establishing a heartbeat connection between the first cluster server and the second cluster server, wherein the first cluster server and the second cluster server are cluster servers distributed in different regions, and a plurality of cluster servers in different regions are in the same network; the virtual host is configured to send data to be copied to the virtual standby machine based on the heartbeat connection, the virtual standby machine is configured to generate a source desktop according to the data to be copied, and the data to be copied is difference data between the virtual host and the virtual standby machine.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: acquiring user data of the virtual host; determining data to be copied in the user data, wherein the data to be copied is difference data between the virtual host and the virtual standby machine; and sending the data to be copied to the virtual standby machine, wherein the virtual standby machine is used for generating a source desktop according to the data to be copied.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: authenticating the user identity of the terminal equipment; and determining to pass the first standby request when the authentication is passed, wherein determining to send a second standby request to the first cluster server when the first standby request is passed.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: after the terminal equipment finishes logging in the virtual standby machine based on the login information, backing up current user data and current operation data on the virtual standby machine; and synchronizing the current operation data and the current user data to the virtual host and releasing the virtual standby machine before the terminal device exits the virtual standby machine.
Optionally, the apparatus in which the non-volatile storage medium is controlled to perform the following functions when the program is executed: receiving a standby logout request sent by the terminal equipment; and forwarding the backup logout request to the second cluster server, wherein the second cluster server is used for resetting the virtual backup and logging out the login information of the virtual backup.
An embodiment of a processor is also provided according to the claimed embodiment. Optionally, in this embodiment, the processor is configured to execute a program, where the program executes to execute any one of the communication processing methods.
According to the requested embodiment, there is also provided an embodiment of an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the computer program to perform any one of the above communication processing methods.
According to an embodiment of the present request, there is also provided an embodiment of a computer program product, which, when executed on a data processing device, is adapted to execute a program initializing the steps of the communication processing method of any of the above.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable non-volatile storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in a software product, which is stored in a non-volatile storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned nonvolatile storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (14)

1. A communication processing method, comprising:
receiving a first standby request sent by terminal equipment, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server;
sending a second standby request to the first cluster server according to the first standby request;
sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server;
and sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment.
2. The method according to claim 1, wherein the first standby request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server; according to the first standby request, sending a second standby request to the first cluster server, including:
and sending a second standby request to the first cluster server based on the first identification information, wherein the second standby request carries the second identification information and the third identification information.
3. The method of claim 2, wherein sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server comprises:
determining standby configuration information based on the host configuration information;
and sending a third standby machine request to the second cluster server based on the third identification information, wherein the third standby machine request carries the configuration information of the standby machine, and the second cluster server is used for locally creating the virtual standby machine according to the configuration information of the standby machine and determining login information of the virtual standby machine, and the login information includes a login address, a login account and a login password of the virtual standby machine on the second cluster server.
4. The method according to claim 1, wherein before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further comprises:
establishing heartbeat connection between the first cluster server and the second cluster server, wherein the first cluster server and the second cluster server are cluster servers distributed in different regions, and a plurality of cluster servers in different regions are in the same network; the virtual host is used for sending data to be copied to the virtual standby machine based on the heartbeat connection, the virtual standby machine is used for generating a source desktop according to the data to be copied, and the data to be copied is difference data between the virtual host and the virtual standby machine.
5. The method according to claim 1, wherein before sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further comprises:
acquiring user data of the virtual host;
determining data to be copied in the user data, wherein the data to be copied is difference data between the virtual host and the virtual standby machine;
and sending the data to be copied to the virtual standby machine, wherein the virtual standby machine is used for generating a source desktop according to the data to be copied.
6. The method according to claim 1, wherein after sending the received login information of the virtual standby machine returned by the second cluster server to the terminal device, the method further comprises:
authenticating the user identity of the terminal equipment;
and determining to pass the first standby request when the authentication is passed, wherein determining to send a second standby request to the first cluster server when the first standby request is passed.
7. The method of claim 1, further comprising:
after the terminal equipment finishes logging in the virtual standby machine based on the login information, backing up current user data and current operation data on the virtual standby machine; and
and before the terminal equipment exits the virtual standby machine, synchronizing the current operation data and the current user data to the virtual host, and releasing the virtual standby machine.
8. The method of claim 1, further comprising:
receiving a standby logout request sent by the terminal equipment;
and forwarding the standby machine logout request to the second cluster server, wherein the second cluster server is used for resetting the virtual standby machine and logging out the login information of the virtual standby machine.
9. A communication processing system, comprising:
the terminal device is used for sending a first standby request, wherein the first standby request is used for requesting to create a virtual standby machine which is the same as a virtual host on a first cluster server on a second cluster server;
and the proxy server is connected with the terminal equipment and used for sending a second standby request to the first cluster server according to the received first standby request, sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server, and sending the received login information of the virtual standby returned by the second cluster server to the terminal equipment.
10. The system according to claim 9, wherein the first standby request carries first identification information of the first cluster server, second identification information of the virtual host, and third identification information of the second cluster server;
the proxy server is further configured to send the second standby machine request to the first cluster server based on the first identification information, where the second standby machine request carries the second identification information and the third identification information, and the host configuration information is used to determine standby machine configuration information;
the proxy server is further configured to send the third standby machine request to the second cluster server based on the third identification information, where the third standby machine request carries the standby machine configuration information, and the second cluster server is configured to create the virtual standby machine locally according to the standby machine configuration information.
11. The system of claim 10, further comprising:
the first cluster server is connected with the proxy server and used for determining host configuration information of the virtual host according to the second identification information and the third identification information after receiving the second standby machine request, and returning the host configuration information to the proxy server;
and the second cluster server is connected with the proxy server and used for locally creating the virtual standby machine according to the configuration information of the standby machine after receiving the third standby machine request, and returning the login information of the virtual standby machine to the proxy server, wherein the login information comprises a login address, a login account and a login password of the virtual standby machine on the second cluster server.
12. A communication processing apparatus, comprising:
the first communication module is used for receiving a first standby machine request sent by terminal equipment, wherein the first standby machine request is used for requesting to create a virtual standby machine which is the same as a virtual host machine on a first cluster server on a second cluster server;
the second communication module is used for sending a second standby request to the first cluster server according to the first standby request;
the third communication module is used for sending a third standby request to the second cluster server based on the received host configuration information of the virtual host returned by the first cluster server;
and the fourth communication module is used for sending the received login information of the virtual standby machine returned by the second cluster server to the terminal equipment.
13. A non-volatile storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the communication processing method of any of claims 1 to 8.
14. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and the processor is configured to execute the computer program to perform the communication processing method according to any one of claims 1 to 8.
CN202011193871.1A 2020-10-30 2020-10-30 Communication processing method, device and system, and non-volatile storage medium Pending CN112306762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011193871.1A CN112306762A (en) 2020-10-30 2020-10-30 Communication processing method, device and system, and non-volatile storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011193871.1A CN112306762A (en) 2020-10-30 2020-10-30 Communication processing method, device and system, and non-volatile storage medium

Publications (1)

Publication Number Publication Date
CN112306762A true CN112306762A (en) 2021-02-02

Family

ID=74333014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011193871.1A Pending CN112306762A (en) 2020-10-30 2020-10-30 Communication processing method, device and system, and non-volatile storage medium

Country Status (1)

Country Link
CN (1) CN112306762A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115499296A (en) * 2022-07-29 2022-12-20 天翼云科技有限公司 Cloud desktop hot standby management method, device and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104407938A (en) * 2014-11-21 2015-03-11 上海爱数软件有限公司 Recovery method for various granularities after mirror-image-level backup of virtual machine
CN105094897A (en) * 2015-07-02 2015-11-25 华为技术有限公司 Virtual machine starting method, cloud access equipment and cloud computing center
CN205809860U (en) * 2016-06-15 2016-12-14 成都云祺科技有限公司 A kind of virtual machine backup and recovery system
CN107360015A (en) * 2016-05-10 2017-11-17 华为技术有限公司 The method and apparatus of the shared storage of switching
WO2019205272A1 (en) * 2018-04-27 2019-10-31 平安科技(深圳)有限公司 Virtual machine service providing method, device and equipment and computer readable storage medium
CN110399202A (en) * 2019-06-29 2019-11-01 苏州浪潮智能科技有限公司 A kind of method and device of efficient virtual machine disaster tolerance
CN110442427A (en) * 2019-07-29 2019-11-12 腾讯科技(深圳)有限公司 A kind of virtual machine snapshot management method, device, equipment and storage medium
KR102073017B1 (en) * 2019-03-28 2020-02-04 한화시스템 주식회사 Method for designing and operating of naval combat management system
CN110972497A (en) * 2018-11-02 2020-04-07 深信服科技股份有限公司 Disaster recovery method and device for virtualization platform
CN111090851A (en) * 2019-12-20 2020-05-01 深信服科技股份有限公司 Method and device for resetting virtual machine authentication information, host machine and storage medium
CN111143114A (en) * 2018-11-02 2020-05-12 深信服科技股份有限公司 Virtualization platform disaster tolerance method, system, server and storage medium
CN111651305A (en) * 2020-08-05 2020-09-11 腾讯科技(深圳)有限公司 Virtual machine backup method, virtual machine backup assembly and cloud computing system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104407938A (en) * 2014-11-21 2015-03-11 上海爱数软件有限公司 Recovery method for various granularities after mirror-image-level backup of virtual machine
CN105094897A (en) * 2015-07-02 2015-11-25 华为技术有限公司 Virtual machine starting method, cloud access equipment and cloud computing center
CN107360015A (en) * 2016-05-10 2017-11-17 华为技术有限公司 The method and apparatus of the shared storage of switching
CN205809860U (en) * 2016-06-15 2016-12-14 成都云祺科技有限公司 A kind of virtual machine backup and recovery system
WO2019205272A1 (en) * 2018-04-27 2019-10-31 平安科技(深圳)有限公司 Virtual machine service providing method, device and equipment and computer readable storage medium
CN110972497A (en) * 2018-11-02 2020-04-07 深信服科技股份有限公司 Disaster recovery method and device for virtualization platform
CN111143114A (en) * 2018-11-02 2020-05-12 深信服科技股份有限公司 Virtualization platform disaster tolerance method, system, server and storage medium
KR102073017B1 (en) * 2019-03-28 2020-02-04 한화시스템 주식회사 Method for designing and operating of naval combat management system
CN110399202A (en) * 2019-06-29 2019-11-01 苏州浪潮智能科技有限公司 A kind of method and device of efficient virtual machine disaster tolerance
CN110442427A (en) * 2019-07-29 2019-11-12 腾讯科技(深圳)有限公司 A kind of virtual machine snapshot management method, device, equipment and storage medium
CN111090851A (en) * 2019-12-20 2020-05-01 深信服科技股份有限公司 Method and device for resetting virtual machine authentication information, host machine and storage medium
CN111651305A (en) * 2020-08-05 2020-09-11 腾讯科技(深圳)有限公司 Virtual machine backup method, virtual machine backup assembly and cloud computing system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHENG ZHI-YUN ET AL.: "Research on Availability of Virtual Machine Hot Standby", JOURNAL OF CHINESE COMPUTER SYSTEMS, 1 May 2014 (2014-05-01) *
谭文贵等: "一种基于云存储方式进行数据备份的研究及实现", 电子技术与软件工程, vol. 2017, no. 17, 7 September 2017 (2017-09-07) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115499296A (en) * 2022-07-29 2022-12-20 天翼云科技有限公司 Cloud desktop hot standby management method, device and system
CN115499296B (en) * 2022-07-29 2024-03-12 天翼云科技有限公司 Cloud desktop hot standby management method, device and system

Similar Documents

Publication Publication Date Title
US9747125B2 (en) Associating virtual machines on a server computer with particular users on an exclusive basis
AU2004288532B2 (en) Method and system for accessing and managing virtual machines
US11206253B2 (en) Domain pass-through authentication in a hybrid cloud environment
EP3014434B1 (en) Management of computing sessions
AU2014302474B2 (en) Management of computing sessions
US11539803B2 (en) Highly available private cloud service
WO2017162173A1 (en) Method and device for establishing connection of cloud server cluster
US20090006537A1 (en) Virtual Desktop Integration with Terminal Services
CA2916386C (en) Maintaining virtual desktop instance during data store failure
US20150006614A1 (en) Management of computing sessions
EP3014432B1 (en) Management of computing sessions
KR20130087552A (en) Asynchronous virtual machine replication
US20100318610A1 (en) Method and system for a weak membership tie-break
CN105094897B (en) A kind of virtual machine starting method, cloud access equipment and cloud computing center
US9819626B1 (en) Placement-dependent communication channels in distributed systems
CN112306762A (en) Communication processing method, device and system, and non-volatile storage medium
US10637924B2 (en) Cloud metadata discovery API
US11252157B1 (en) Permission management for electronic resources
KR101618992B1 (en) System for providing virtual desktop service, control method thereof, recording medium for recording program for executing the control method, application saved in the recording medium for executing the control method being combined with hardware
US11588801B1 (en) Application-centric validation for electronic resources
US20170171016A1 (en) Disaster Recovery of Cloud Resources
Chakraborty et al. Application High Availability and Disaster Recovery on Azure
CN117278436A (en) Monitoring method and device of virtual machine and storage medium
CN117056013A (en) Virtualized cloud desktop fusion system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination