Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method, controller and monitoring device

A technology of monitoring equipment and control method, applied in the field of electronics, can solve problems such as large investment

Inactive Publication Date: 2016-08-31
NUBIA TECHNOLOGY CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For some key businesses that require extremely high reliability and cannot be interrupted, such as telecommunications billing, finance, business, customer service, etc., other methods must be used, such as establishing a disaster recovery center in a different place to ensure system data and Business operations are not affected by disasters, but this method requires special equipment such as dedicated lines or optical fiber communications, and the investment is huge, which is unaffordable for some small and medium-sized enterprises with insufficient funds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method, controller and monitoring device
  • Control method, controller and monitoring device
  • Control method, controller and monitoring device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] This embodiment provides a control method, specifically, this embodiment provides a disaster recovery method, that is, control a master server and multiple slave servers through a node pool (that is, the node controller described in this embodiment) communication connection between servers to achieve mutual backup and disaster recovery between servers; when a disaster occurs, slave servers in a normal communication state can be selected through the node pool, thereby maximizing the continuity of services and the resource availability of the database system and, the disaster recovery method described in the present embodiment can realize high-efficiency fault detection without making large changes to the existing database system. The method described in the example is inexpensive.

[0070] Here, the method described in this embodiment can be specifically applied to a database system; the database system specifically includes: a node controller, a listening device, a mast...

Embodiment 2

[0080] Based on the method described in Embodiment 1, this embodiment provides an implementation of the write operation; specifically, as image 3 As shown, the method includes:

[0081] Step 301: the terminal sends a write operation request to the main server;

[0082] Wherein, the write operation request represents an operation request sent by the terminal to the main server to request to write the first target data;

[0083] Step 302: the main server sends the write operation request to the node controller;

[0084] Step 303: the node controller acquires a write operation request for the main server;

[0085] Step 304: The node controller determines second identification information of the at least two slave servers that have a communication connection relationship with the master server based on the write operation request;

[0086] In an embodiment, based on the write operation request, the node controller determines the second identification information of all slave s...

Embodiment 3

[0091] Based on the method described in Embodiment 1 or Embodiment 2, this embodiment provides an implementation of the read operation; specifically, as Figure 4 as shown,

[0092] Step 401: the terminal sends a read operation request to the address selection controller;

[0093] Wherein, the read operation request represents that the terminal requests to read the second target data from the server to the third target;

[0094] Step 402: the address selection controller receives the read operation request;

[0095] Step 403: The address selection controller receives the second identification information for the second target slave server sent by the listening device;

[0096] Wherein, the second target slave server is a target slave server selected by the monitoring device from at least two slave servers in the second communication state with the master server;

[0097] Specifically, when the monitoring device monitors the communication state between the master server and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a control method. The control method comprises the steps that: a node controller obtains first identification information of a main server and second identification information of at least two slave servers; based on the first identification information of the main server and the second identification information of the at least two slave servers, the communication connection between the main server and the at least two slave servers is controlled so as to enable the main server to be communicated with the at least two slave servers through the node controller. The embodiments of the invention further disclose a controller and a monitoring device.

Description

technical field [0001] The invention relates to electronic technology, in particular to a control method, a controller, and a monitoring device. Background technique [0002] The so-called disaster recovery is mainly manifested in two aspects in practice: one is to ensure the security of enterprise data, and the other is to ensure the continuity of business. At present, almost all enterprises have implemented data protection for their application business. The commonly used method is offline data backup, and the data backup is completed through a tape drive or a CD tower. For some key businesses that require extremely high reliability and cannot be interrupted, such as telecommunications billing, finance, business, customer service, etc., other methods must be used, such as establishing a disaster recovery center in a different place to ensure system data and Business operations are not affected by disasters, but this method requires special equipment such as leased lines ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/08
CPCH04L41/084H04L67/1095H04L67/1001
Inventor 张善万
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products