[go: up one dir, main page]

CN104767774A - Method and system for disaster recovery - Google Patents

Method and system for disaster recovery Download PDF

Info

Publication number
CN104767774A
CN104767774A CN201410004907.5A CN201410004907A CN104767774A CN 104767774 A CN104767774 A CN 104767774A CN 201410004907 A CN201410004907 A CN 201410004907A CN 104767774 A CN104767774 A CN 104767774A
Authority
CN
China
Prior art keywords
environment
topology information
information
topology
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410004907.5A
Other languages
Chinese (zh)
Inventor
熊殷翔
闻晶
李玉猛
周英飚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to CN201410004907.5A priority Critical patent/CN104767774A/en
Publication of CN104767774A publication Critical patent/CN104767774A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to cloud computing and discloses a method for disaster recovery. The method comprises the following steps of obtaining topology information of a target environment; obtaining topology information of a source environment; searching resources matched with the topology information of the source environment from the topology information of the target environment; and utilizing the found resources to carry out disaster recovery according to the topology information of the source environment, wherein the topology information comprises interconnection information between objects. By utilizing the method and the system in the illustrative embodiments, the interconnection limitation between the resources is fully considered, when disaster recovery is carried out in a cloud computing system, the resources are not distributed randomly, but the resources, which can be interconnected, are purposefully selected before resource distribution, so that the interconnection relation between the resources after distribution is guaranteed.

Description

For the method and system of disaster recovery
Technical field
The present invention relates to cloud computing.More definite, the present invention relates to a kind of method and system for disaster recovery in cloud computing system.
Background technology
Cloud computing system requires the stability of service.Therefore, disaster recovery is concerning extremely important cloud computing system.For the disaster recovery in cloud computing system, should be taken into account the feature of cloud computing system.During disaster recovery in traditional environment, data set returns on same or analogous hardware usually, can not consider hardware connection restriction to each other.In cloud computing system, need the resource redistributed in cloud computing system required for recovery when recovering data, comprise computational resource and storage resources.Scheme of the prior art does not consider the interconnected restriction between resource usually when carrying out the disaster recovery of cloud computing system, general fashion is elder generation's Random assignment resource in cloud computing system, then revises the connection configuration of resource, interconnected to realize.The validity done like this is hypothesis that to each other can be interconnected based on resource.And this hypothesis is unpractical often in cloud computing system.Due to aspects such as fail safe and physical connection abilities, often there is inevitable interconnected restriction between the resource in cloud computing system, such as TCP/IP, the annexations such as SAN.And based on the Resource dynamic allocation characteristic of cloud computing system, if Random assignment resource, cannot ensure that the interconnecting relation between resource can meet the demand of the data set of backup.
Summary of the invention
Therefore, need a kind of method and system of disaster recovery, effective disaster recovery can be realized in cloud computing system.
Illustrative embodiment of the present invention provides a kind of method for disaster recovery, comprising: the topology information obtaining targeted environment; The topology information of acquisition source environment; The resource of mating with the topology information of source environment is found from the topology information of targeted environment; According to the topology information of source environment, the resource found is utilized to carry out disaster recovery; Wherein topology information comprises the interconnected information between object.
Illustrative embodiment of the present invention additionally provides a kind of system for disaster recovery, comprising: obtain equipment, is configured to the topology information obtaining targeted environment; And the topology information of the source of acquisition environment; Matching unit, is configured to from the topology information of targeted environment, find the resource of mating with the topology information of source environment; Restorer, is configured to the topology information according to source environment, utilizes the resource found to carry out disaster recovery; Wherein topology information comprises the interconnected information between object.
Illustrative embodiment of the present invention additionally provides the method and system for backup environment.
Utilize the method and system of illustrative embodiment, fully take into account the interconnected restriction between resource, not Random assignment resource when carrying out disaster recovery in cloud computing system, but the interconnected resource that first autotelic selection is passable before Resources allocation, ensure to distribute the interconnecting relation between rear each resource with this.
Accompanying drawing explanation
In conjunction with the drawings disclosure illustrative embodiments is described in more detail, above-mentioned and other object of the present disclosure, Characteristics and advantages will become more obvious, wherein, in disclosure illustrative embodiments, identical reference number represents same parts usually.
Fig. 1 represents cloud computing node according to an embodiment of the invention;
Fig. 2 represents cloud computing environment according to an embodiment of the invention;
Fig. 3 represents abstract model layer according to an embodiment of the invention;
Fig. 4 a-4b respectively illustrates the schematic diagram of the source environment of cloud computing system and the targeted environment for disaster recovery;
Fig. 5 shows according to an embodiment of the invention for the flow chart of the method 500 of disaster recovery;
Fig. 6 shows according to an embodiment of the invention for the block diagram of the system 600 of disaster recovery.
Embodiment
Below with reference to accompanying drawings preferred implementation of the present disclosure is described in more detail.Although show preferred implementation of the present disclosure in accompanying drawing, but should be appreciated that, the disclosure can be realized in a variety of manners and not should limit by the execution mode of setting forth here.On the contrary, provide these execution modes to be to make the disclosure more thorough and complete, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Although first should be appreciated that the disclosure comprises the detailed description about cloud computing, the realization of the technical scheme wherein recorded is not limited to cloud computing environment, but can realize in conjunction with the computing environment of other type any of known or later exploitation now.
Cloud computing is a kind of service offering pattern, for carrying out access to netwoks conveniently, as required to the configurable computational resource pond of sharing.Configurable computational resource can carry out the resource of minimum mutual just energy rapid deployment and release with minimum management cost or with ISP, such as, can be network, the network bandwidth, server, process, internal memory, storage, application, virtual machine and service.This cloud mode can comprise at least five features, at least three service models and at least four deployment models.
Feature comprises:
Self-help service as required: the consumer of cloud unilaterally automatically can dispose the computing capability of such as server time and the network storage etc. as required when without the need to carrying out artificially mutual with ISP.
Network insertion widely: computing capability can be obtained on network by standard mechanism, this standard mechanism facilitates by different types of thin client platform or thick client platform (such as mobile phone, kneetop computer, the personal digital assistant PDA) use to cloud.
Resource pool: the computational resource of supplier is included into resource pool and by many tenants (multi-tenant) mode service in multiple consumer, wherein as required different actual resources and virtual resource is dynamically distributed and reallocated.Generally, consumer can not control or even not know the accurate location of provided resource, but can on higher level of abstraction assigned address (such as country, state or data center), therefore there is location independence.
Rapid elasticity: can rapidly, flexiblely (being automatically sometimes) dispose computing capability, to realize Quick Extended, and can discharge rapid drop rapidly.In the view of consumer, the available computational capacity for disposing often seems it is unlimited, and can obtain the computing capability of any amount any time.
Measurable service: cloud system is suitable for the metrology capability of certain level of abstraction of COS (such as store, process, bandwidth sum any active ues account number) by utilization, automatically control and optimize resource effectiveness.Can monitor, control and report resource service condition, for ISP and consumer both sides provide transparency.
Service model is as follows:
Namely software serve (SaaS): the ability provided to consumer is the application using supplier to run in cloud architecture.Can by the thin client interface (such as network Email) of such as web browser from various client devices access application.Except the limited application specific to user configuration is arranged, consumer neither manages the bottom cloud architecture also not controlling to comprise network, server, operating system, storage and even single application power etc.
Namely platform serves (PaaS): the ability provided to consumer is the application creating cloud architecture deploy consumer or obtain, and the program design language that these applications exploitings supplier supports instrument of making peace creates.Consumer neither manages the bottom cloud architecture also not controlling to comprise network, server, operating system or storage, but is possessed of control power to the application that it is disposed, and may also be possessed of control power to the configuration of application hosting environment.
Namely architecture serves (IaaS): the ability provided to consumer is that consumer can dispose wherein and run the process of any software comprising operating system and application, storage, network and other basic calculation resources.Consumer neither manages the cloud architecture also not controlling bottom, but is possessed of control power to operating system, storage and its application disposed, and may have limited control to the networking component (such as host firewall) selected.
Deployment model is as follows:
Privately owned cloud: cloud architecture is separately certain operation.Cloud architecture can be managed by this tissue or third party and be may reside in this organization internal or outside.
Community's cloud: cloud architecture is shared by some tissues and supported the specific community of common interests (such as task mission, safety requirements, policy and conjunction rule are considered).Community's cloud can be managed by the multiple tissue in community or third party and may reside in this community inside or outside.
Public cloud: cloud architecture provides to the public or large-scale industrial colony and had by the tissue selling cloud service.
Mixed cloud: cloud architecture is made up of the cloud (privately owned cloud, community's cloud or public cloud) of two or more deployment models, these clouds are still unique entities, but are bound together by the standardized technique that makes data and application transplant or privately owned technology (the cloud burst flow such as the load balance between cloud shares technology).
Cloud computing environment is service-oriented, and feature concentrates on the interoperability of Stateless, low coupling, modularity and the meaning of one's words.The core of cloud computing is the architecture comprising interconnecting nodes network.
With reference now to Fig. 1, which show an example of cloud computing node.The cloud computing node 10 of Fig. 1 display is only an example of applicable cloud computing node, should not bring any restriction to the function of the embodiment of the present invention and the scope of application.In a word, cloud computing node 10 can be used to realize and/or perform above-described any function.
Cloud computing node 10 has computer system/server 12, and it can operate with other universal or special computing system environment numerous or together with configuring.As everyone knows, the example of the computing system being suitable for operating together with computer system/server 12, environment and/or configuration includes but not limited to: personal computer system, server computer system, thin client, thick client computer, hand-held or laptop devices, the system based on microprocessor, Set Top Box, programmable consumer electronics, NetPC Network PC, little type Ji calculate machine Xi Tong ﹑ large computer system and comprise the distributed cloud computing technology environment of above-mentioned any system, etc.
Computer system/server 12 can describe under the general linguistic context of the computer system executable instruction (such as program module) performed by computer system.Usually, program module can comprise the routine, program, target program, assembly, logic, data structure etc. that perform specific task or realize specific abstract data type.Implement in the distributed cloud computing environment that computer system/server 12 can be executed the task at the remote processing devices by communication network links.In distributed cloud computing environment, program module can be positioned at and comprise on the Local or Remote computing system storage medium of memory device.
As shown in Figure 1, the computer system/server 12 in cloud computing node 10 shows with the form of universal computing device.The assembly of computer system/server 12 can include but not limited to: one or more processor or processing unit 16, system storage 28, connects the bus 18 of different system assembly (comprising system storage 28 and processing unit 16).
Bus 18 represent in a few class bus structures one or more, comprise memory bus or Memory Controller, peripheral bus, AGP, processor or use any bus-structured local bus in multiple bus structures.For example, these architectures include but not limited to ISA(Industry Standard Architecture) bus, MCA (MAC) bus, enhancement mode isa bus, VESA's (VESA) local bus and periphery component interconnection (PCI) bus.
Computer system/server 12 typically comprises various computing systems computer-readable recording medium.These media can be any obtainable media can accessed by computer system/server 12, comprise volatibility and non-volatile media, moveable and immovable medium.
System storage 28 can comprise the computer system-readable medium of volatile memory form, such as random-access memory (ram) 30 and/or cache memory 32.Computer system/server 12 may further include that other is removable/immovable, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 may be used for reading and writing immovable, non-volatile magnetic media (Fig. 1 does not show, and is commonly referred to " hard disk drive ").Although not shown in Fig. 1, the disc driver that removable non-volatile magnetic disk (such as " floppy disk ") is read and write can be provided for, and to the CD drive that removable anonvolatile optical disk (such as CD-ROM, DVD-ROM or other light medium) is read and write.In these cases, each driver can be connected with bus 18 by one or more data media interfaces.Memory 28 can comprise at least one program product, and this program product has one group of (such as at least one) program module, and these program modules are configured to the function performing various embodiments of the present invention.
There is the program/utility 40 of one group of (at least one) program module 42, can be stored in memory 28, such program module 42 includes but not limited to operating system, one or more application program, other program module and routine data, may comprise the realization of network environment in each or certain combination in these examples.Function in program module 42 embodiment that execution is described in the invention usually and/or method.
Computer system/server 12 also can with one or more external equipment 14(such as keyboard, sensing equipment, display 24 etc.) communicate, also can make with one or more devices communicating that user can be mutual with this computer system/server 12, and/or communicate with any equipment (such as network interface card, modulator-demodulator etc.) making this computer system/server 12 can carry out communicating with other computing equipment one or more.This communication can be passed through I/O (I/O) interface 22 and carry out.Further, computer system/server 12 can also such as, be communicated by network adapter 20 and one or more network (such as Local Area Network, wide area network (WAN) and/or public network, internet).As shown in the figure, network adapter 20 is by bus 18 other module communication with computer system/server 12.Be understood that, although not shown, other hardware and/or software module can operate together with computer system/server 12, include but not limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc.
With reference now to Fig. 2, which show exemplary cloud computing environment 50.As shown in the figure, one or more cloud computing node 10 that the local computing device that cloud computing environment 50 comprises cloud computing consumer use can communicate with it, local computing device can be such as PDA(Personal Digital Assistant) or mobile phone 54A, desktop computer 54B, notebook computer 54C and/or Automotive Computer System 54N.Can intercom mutually between cloud computing node 10.In one or more network including but not limited to privately owned cloud as above, community's cloud, public cloud or mixed cloud or their combination, cloud computing node 10 can be carried out physics or virtual group (not shown).Like this, namely the architecture that the consumer of cloud just can ask cloud computing environment 50 to provide without the need to maintenance resources on local computing device serves (IaaS), namely platform serves (PaaS) and/or namely software serve (SaaS).Be to be understood that, all kinds of computing equipment 54A-N of Fig. 2 display are only schematic, cloud computing node 10 and cloud computing environment 50 can with in any type of network and/or the computing equipment (such as using web browser) of any type that is connected of network addressable communicate.
With reference now to Fig. 3, which show cloud computing environment 50(Fig. 2) one group of function modeling layer providing.First should be appreciated that the assembly shown in Fig. 3, layer and function are all only schematic, embodiments of the invention are not limited thereto.As shown in Figure 3, following layers and corresponding function are provided:
Hardware and software layer 60 comprises hardware and software component.The example of nextport hardware component NextPort comprises: main frame, such as IBM zSeries system; Based on RISC(Reduced Instruction Set Computer) server of architecture, such as IBM pSeries system; IBM xSeries system; IBMBladeCenter system; Memory device; Network and networking component.The example of component software comprises: network application server software, such as IBM WebSphere application server software; Database software, such as IBM DB2 database software.(IBM, zSeries, pSeries, xSeries, BladeCenter, WebSphere and DB2 are the registered trade mark of International Business Machine Corporation (IBM) in all parts of the world).
Virtual level 62 provides a level of abstraction, and this layer can provide the example of following pseudo-entity: virtual server, virtual memory, virtual network (comprising virtual private networks), virtual application and operating system, and virtual client.
In one example, management level 64 can provide following function: resource provisioning function: the Dynamic Acquisition being provided for computational resource and other resource of executing the task in cloud computing environment; Metering and pricing function: in cloud computing environment, cost tracing is carried out to the use of resource, and bill and invoice are provided for this reason.In one example in which, this resource can comprise application software license.Safety function: for the consumer of cloud and task provide authentication, for data and other resource provide protection.Portal user function: for consumer and system manager provide the access to cloud computing environment.Service level management function: the distribution and the management that provide cloud computing resources, to meet required service level.Service level agreement (SLA) is planned and fulfils function: for providing cloud computing resources tomorrow requirement of predicting according to SLA is presetted and supplied.
Operating load layer 66 provides the example of cloud computing environment function in the cards.In this layer, the example of available operating load or function comprises: mapping and navigation; Software development and life cycle management; The teaching of Virtual Class provides; Data Analysis Services; Trading processing and high availability management etc.High availability management can realize the disaster recovery of the cloud computing system according to the embodiment of the present invention in management level 64.
Below with reference to Fig. 4, wherein Fig. 4 a shows the schematic diagram of the source environment of cloud computing system and the targeted environment for disaster recovery.
As shown in fig. 4 a, the source environment of cloud computing system comprises 5 objects, DB server B, DB server C, Web server A, disk D and disk E.According to one embodiment of present invention, a kind of method for backup environment is disclosed.In order to effective disaster recovery can be being realized in cloud computing system, need the interconnected information between the object in the environment of identification source, and utilize the topology information of the interconnected information back-up source environment between the object in the environment of source.According to one embodiment of present invention, also disclose a kind of system for environment backup, comprising: identification equipment, be configured to the interconnected information in environment-identification between object; Alternate device, is configured to the topology information of backup environment, and the topology information wherein backed up comprises the interconnected information between object.According to one embodiment of present invention, topology information comprises the interconnected information between object in the environment of source and object, can (Fig. 4 a) represents with topology diagram.Interconnected information between object comprises: the connection type between object and/or connected mode.Interconnected information between the structure record object that can utilize table 1.
Object ID Attribute Object ID Attribute
ID1 {Port} ID2 {Port}
ID1 {Type,Capacity} ID3 {Type,Capacity}
ID1 {Info1,Info2,…} ID4 {Info1,Info2,…}
Table 1
In table 1:
Object ID field: the unique identification representing each object;
Attribute field: represent the connection type between object and/or connected mode.Connection type between object has multiple, can be TCP/IP, SAN etc.Table 1 gives three kinds of examples, wherein:
The connection attribute of TCP/IP can { Port} represents, indicated object is connected with other objects by corresponding port by port numbers;
The connection attribute of SAN can { Type, Capacity} represent, wherein memory capacity can be empty, for representing that this is to the user liking memory device by the complex attribute of storage device type and capacity;
May need much information complex attribute Info1, Info2 ... other connection attributes of representing.
The structure that utilization provides above, the interconnected information between the object of the source environment of Fig. 4 a can represent with table 2.Like this, the topology information of source environment comprises topology diagram (the interconnected information (table 2) between the object of Fig. 4 a) and in the environment of source of source environment.
Should be appreciated that, TCP/IP and SAN is the example provided for convenience of explanation, the invention is not restricted to these the two kinds of annexations provided.In prior art, any other can cause the annexation of interconnected restriction to be all applicable to the present invention.The data structure of table 1 and table 2 is also be convenient to the example provided is described, any other suitable mode can be utilized in prior art to record the interconnected information between object.
Object ID Attribute Object ID Attribute
Web server A Port 1000 DB server B Port 2000
DB server B Port 2000 Web server A Port 1000
Web server A Port 1001 DB server C Port 2000
DB server C Port 2000 Web server A Port 1001
DB server B {SCSI,NULL} Disk D {SCSI,50TB}
Disk D {SCSI,50TB} DB server B {SCSI,NULL}
DB server C {SCSI,NULL} Disk E {SCSI,100TB}
Disk E {SCSI,100TB} DB server C {SCSI,NULL}
Table 2
Referring to Fig. 5, illustrated therein is the flow chart of the method 500 for disaster recovery according to an embodiment of the invention.Method 500 for disaster recovery according to the present invention is from step 502.
Next, method enters step 504, wherein obtains the topology information of targeted environment.According to one embodiment of present invention, topology information, except comprising object, also comprises the interconnected information between object.Interconnected information between object can comprise the topological connection relation between object, such as, and connection type and connected mode.See Fig. 4 b, which show an example of targeted environment, according to one embodiment of present invention, the data structure in table 1 can be utilized to shown in the following page table 3 of the interconnected information between the object in the targeted environment recording Fig. 4 b.
Next, method enters step 506, wherein obtains the topology information of source environment.The example of the source environment still provided with reference to Fig. 4 a, can obtain topology diagram (the interconnected information (table 2) between object Fig. 4 a), and in the environment of source of source environment according to the topology information of source environment.Should be appreciated that, step 504 and 506 order can exchange.
Next, method enters step 508, wherein finds and source from the topology information of targeted environment
Object ID Attribute Object ID Attribute
A’ Port 100-5000 B’ Port 100-5000
B’ Port 100-5000 A’ Port 100-5000
A’ Port 100-3000 C’ Port 100-3000
C’ Port 100-3000 A’ Port 100-3000
C’ Port 100-5000 F’ Port 100-5000
F’ Port 100-5000 C’ Port 100-5000
B’ Port 100-5000 H’ Port 100-5000
A’ Port 100-5000 H’ Port 100-5000
B’ {SCSI,NULL} D’ {SCSI,50TB}
D’ {SCSI,50TB} B’ {SCSI,NULL}
C’ {SCSI,NULL} E’ {SCSI,100TB}
E’ {SCSI,100TB} C’ {SCSI,NULL}
E’ {SCSI,100TB} G’ {SCSI,NULL}
G’ {SCSI,NULL} C’ {SCSI,NULL}
Table 3
The resource of the topology information coupling of environment.According to one embodiment of present invention, from the topology diagram of targeted environment, find the topological structure graph isomorhpism subgraph of source environment.Arbitrary subgraph match algorithm in prior art can be utilized, such as, excavate (AGF) algorithm or Frequent tree mining based on the subgraph of Apriori and excavate (FSG) and carried out said process.It should be noted that, in the process of carrying out the topological structure graph isomorhpism subgraph finding source environment from the topology diagram of targeted environment, interconnected information between the object of source environment must meet, and so just can find the resource of mating with the topology information of source environment from the topology information of targeted environment.Still for the targeted environment that Fig. 4 b provides, pass through subgraph match, the topological structure graph isomorhpism subgraph of the source environment that Fig. 4 a can be found to provide is the subgraph that object (A ', B ', C ', D ', E ') is formed, can know according to the interconnected information between object, in this subgraph source environment object between interconnected information be also satisfied.
Next, method enters step 510, wherein according to the topology information of source environment, utilizes the resource found to carry out disaster recovery.According to one embodiment of present invention, according to topology information Restorer varieties environment in the isomorphism subgraph found of source environment.Still for the targeted environment that Fig. 4 b provides, Web server A returns to object A ', and DB server B returns to object B ', DB server C returns to object C ', and disk D returns to object D ', and disk E returns to object E '.
Referring to Fig. 6, which show according to an embodiment of the invention for the block diagram of the system 600 of disaster recovery.System 600 according to an embodiment of the invention for disaster recovery comprises: obtain equipment 602, is configured to the topology information obtaining targeted environment; And the topology information of the source of acquisition environment; Matching unit 604, is configured to from the topology information of targeted environment, find the resource of mating with the topology information of source environment; Restorer 606, is configured to the topology information according to source environment, utilizes the resource found to carry out disaster recovery; Wherein topology information comprises the interconnected information between object.
According to one embodiment of present invention, the interconnected information between object comprises the connected mode between object.Wherein topology information topology diagram represents, wherein matching unit 604 is further configured to the topological structure graph isomorhpism subgraph finding source environment from the topology diagram of targeted environment.According to one embodiment of present invention, restorer 606 is further configured to the topology information Restorer varieties environment in the isomorphism subgraph found according to source environment.
Flow chart in accompanying drawing and block diagram show system according to multiple embodiment of the present invention, the architectural framework in the cards of method and computer program product, function and operation.In this, each square frame in flow chart or block diagram can represent a part for module, program segment or a code, and a part for described module, program segment or code comprises one or more executable instruction for realizing the logic function specified.Also it should be noted that at some as in the realization of replacing, the function marked in square frame also can be different from occurring in sequence of marking in accompanying drawing.Such as, in fact two continuous print square frames can perform substantially concurrently, and they also can perform by contrary order sometimes, and this determines according to involved function.Also it should be noted that, the combination of the square frame in each square frame in block diagram and/or flow chart and block diagram and/or flow chart, can realize by the special hardware based system of the function put rules into practice or operation, or can realize with the combination of specialized hardware and computer instruction.
Be described above various embodiments of the present invention, above-mentioned explanation is exemplary, and non-exclusive, and be also not limited to disclosed each embodiment.When not departing from the scope and spirit of illustrated each embodiment, many modifications and changes are all apparent for those skilled in the art.The selection of term used herein, is intended to explain best the principle of each embodiment, practical application or the technological improvement to technology in market, or makes other those of ordinary skill of the art can understand each embodiment disclosed herein.

Claims (10)

1., for a method for disaster recovery, comprising:
Obtain the topology information of targeted environment;
The topology information of acquisition source environment;
The resource of mating with the topology information of source environment is found from the topology information of targeted environment;
According to the topology information of source environment, the resource found is utilized to carry out disaster recovery;
Wherein topology information comprises the interconnected information between object.
2. method according to claim 1, wherein:
Interconnected information between object comprises the connected mode between object.
3. method according to claim 1, wherein topology information topology diagram represents, finds the resource of mating with the topology information of source environment and comprise from the topology information of targeted environment:
The topological structure graph isomorhpism subgraph of source environment is found from the topology diagram of targeted environment.
4. method according to claim 3, wherein according to the topology information of source environment, utilizes the resource found to carry out disaster recovery and comprises:
According to topology information Restorer varieties environment in the isomorphism subgraph found of source environment.
5., for a method for environment backup, comprising:
Interconnected information in environment-identification between object;
The topology information of backup environment, the topology information wherein backed up comprises the interconnected information between object.
6., for a system for disaster recovery, comprising:
Acquisition equipment, is configured to the topology information obtaining targeted environment; And the topology information of the source of acquisition environment;
Matching unit, is configured to from the topology information of targeted environment, find the resource of mating with the topology information of source environment;
Restorer, is configured to the topology information according to source environment, utilizes the resource found to carry out disaster recovery;
Wherein topology information comprises the interconnected information between object.
7. system according to claim 6, wherein:
Interconnected information between object comprises the connected mode between object.
8. system according to claim 6, wherein topology information topology diagram represents, wherein matching unit is configured to:
The topological structure graph isomorhpism subgraph of source environment is found from the topology diagram of targeted environment.
9. system according to claim 8, wherein restorer is configured to:
According to topology information Restorer varieties environment in the isomorphism subgraph found of source environment.
10., for a system for environment backup, comprising:
Identification equipment, is configured to the interconnected information in environment-identification between object;
Alternate device, is configured to the topology information of backup environment, and the topology information wherein backed up comprises the interconnected information between object.
CN201410004907.5A 2014-01-06 2014-01-06 Method and system for disaster recovery Pending CN104767774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410004907.5A CN104767774A (en) 2014-01-06 2014-01-06 Method and system for disaster recovery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410004907.5A CN104767774A (en) 2014-01-06 2014-01-06 Method and system for disaster recovery

Publications (1)

Publication Number Publication Date
CN104767774A true CN104767774A (en) 2015-07-08

Family

ID=53649378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410004907.5A Pending CN104767774A (en) 2014-01-06 2014-01-06 Method and system for disaster recovery

Country Status (1)

Country Link
CN (1) CN104767774A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404040A (en) * 2008-08-07 2009-04-08 南方电网技术研究中心 Computation resource partition method for power system real-time simulation based on subgraph omorphism
CN101661482A (en) * 2008-08-27 2010-03-03 国际商业机器公司 Method and device for recognizing similar subgraph in network
CN102388595A (en) * 2011-09-30 2012-03-21 华为技术有限公司 Resource matching method and device in VPC migration

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404040A (en) * 2008-08-07 2009-04-08 南方电网技术研究中心 Computation resource partition method for power system real-time simulation based on subgraph omorphism
CN101661482A (en) * 2008-08-27 2010-03-03 国际商业机器公司 Method and device for recognizing similar subgraph in network
CN102388595A (en) * 2011-09-30 2012-03-21 华为技术有限公司 Resource matching method and device in VPC migration

Similar Documents

Publication Publication Date Title
CN103365725B (en) Method and system for dynamic allocation of workload deployment units across a plurality of clouds
CN104516730A (en) Data processing method and device
CN104731658B (en) Supply and merging shared resource are with the method and system of maximum resource availability
CN103368767B (en) For disposing the method and system of software application in the Internet cloud of fault tolerant
CN103379114B (en) For the method and apparatus protecting private data in Map Reduce system
CN104424013A (en) Method and device for deploying virtual machine in computing environment
US20240214428A1 (en) Platform for management and tracking of collaborative projects
CN104796270B (en) Recommend the method and device of suspect assembly in being diagnosed in the problem of cloud application
CN104866513A (en) System and method for cross-tenant data access
CN105446793A (en) Method and device for migrating virtual assets
CN104253831A (en) Method and system for deploying application in cloud computing environment
CN103853596B (en) For the method and system for migrating virtual machine between working group
US11570214B2 (en) Crowdsourced innovation laboratory and process implementation system
CN107924293A (en) Copy on write redirects
US20150310049A1 (en) Managing an index of a table of a database
CN104205115A (en) Using different secure erase algorithms to erase chunks from file associated with different security levels
CN105335207A (en) Method and apparatus for managing virtual machine instance
CN102736972A (en) Processing method of test case of application to be tested and system
CN103916455A (en) Method And System For Data Replication
CN105530273A (en) Method and device for data migration
CN103729250A (en) Method and system to select data nodes configured to satisfy a set of requirements
CN103294556B (en) Method and system for host computer system access control
CN103856480A (en) User datagram protocol (UDP) packet migration in a virtual machine (VM) migration
CN105843703A (en) Extraction of system administrator actions to a workflow providing a resolution to a system issue
CN105938525B (en) The discovery based on catalogue of virtual machine facility

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150708

WD01 Invention patent application deemed withdrawn after publication