METHOD OF CREATING HIGH AVAILABILITY FOR SINGLE POINT NETWORK GATEWAY USING CONTAINERS
20210397473 · 2021-12-23
Inventors
Cpc classification
H04L67/59
ELECTRICITY
G06F9/5038
PHYSICS
G06F9/44505
PHYSICS
H04L69/40
ELECTRICITY
International classification
Abstract
Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources when different processes are performed in a virtual computing environment. Methods consistent with the present disclosure may be used to provide a form of redundancy that does not require two physically distinct computers. Such methods may use a set of physical hardware components and two or more sets of synchronized virtual gateway software. Architectural features of physical hardware components included in an apparatus consistent with the present disclosure may be abstracted from sets of virtual program code when one virtual software process backs up another virtual software process at the apparatus.
Claims
1. A method for providing redundancy in a computer, the method comprising: processing data packets by a first virtual process at the computer; receiving state information associated with the processing of the data packets, the state information accessible by a second virtual process at the computer; identifying that the first virtual process has stopped processing the data packets; and continuing to process the data packets by the second virtual process based on the state information received from the first virtual process.
2. The method of claim 1, further comprising initiating operation of a third virtual process at the computer.
3. The method of claim 2, further comprising: receiving a first set of liveness information associated with the first virtual process, wherein the identification that the first virtual process has stopped processing the data packets is based on the first set of liveness information; and receiving a second set of liveness information associated with the second virtual process.
4. The method of claim 2, further comprising: receiving additional state information from the second virtual process; identifying that the second virtual process has stopped processing additional data packets; and continuing to process the additional data packets by the third virtual process based on the additional state information provided by the second virtual process.
5. The method of claim 1, further comprising: initiating the first virtual process at the computer; initiating the second virtual process at the computer; configuring the first virtual process to receive the data packets via a first hardware network interface controller at the computer; and receiving the data packets via the first hardware network interface controller by the first virtual process based on the configuration.
6. The method of claim 5, further comprising: configuring the first virtual process to send the data packets via a second hardware network interface controller at the computer; and sending the data packets via the second hardware network interface controller by the first virtual process based on the configuration.
7. The method of claim 1, further comprising: initiating operation of a liveness virtual process; and receiving a first set of liveness information associated with the first virtual process.
8. The method of claim 1, further comprising storing configuration information that identifies that the first virtual process is in an active state and that the second virtual process is available to take over processing tasks from the first virtual process.
9. The method of claim 1, further comprising: initiating a set of virtual processes for processing data packets received via a first communication session that is different from a second communication session associated with the data packets processed by the first virtual process, the set of virtual processes inclusive of an active virtual process and an in-active virtual process; receiving additional state information associated with the processing of the data packets by the active virtual process; identifying that the active virtual process has erred; and processing the data packets received via the first communication session by the in-active virtual process based on the identification that the active virtual process has erred and the additional state information.
10. A non-transitory computer-readable storage medium having embodied thereon a program executable by a processor for implementing a method for providing redundancy in a computer, the method comprising: processing data packets by a first virtual process at the computer; receiving state information associated with the processing of the data packets, the state information accessible by a second virtual process at the computer; identifying that the first virtual process has stopped processing the data packets; and continuing to process the data packets by the second virtual process based on the state information received from the first virtual process.
11. The non-transitory computer-readable storage medium of claim 10, the program further executable to initiate operation of a third virtual process at the computer.
12. The non-transitory computer-readable storage medium of claim 11, the program further executable to: receive a first set of liveness information associated with the first virtual process, wherein the identification that the first virtual process has stopped processing the data packets is based on the first set of liveness information; and receive a second set of liveness information associated with the second virtual process.
13. The non-transitory computer-readable storage medium of claim 11, the program further executable to: receive additional state information from the second virtual process; identify that the second virtual process has stopped processing additional data packets; and continue processing the additional data packets by the third virtual process based on the additional state information provided by the second virtual process.
14. The non-transitory computer-readable storage medium of claim 10, the program further executable to: initiate the first virtual process at the computer; initiate the second virtual process at the computer; configure the first virtual process to receive the data packets via a first hardware network interface controller at the computer; and receive the data packets via the first hardware network interface controller by the first virtual process based on the configuration.
15. The non-transitory computer-readable storage medium of claim 14, the program further executable to: configure the first virtual process to send the data packets via a second hardware network interface controller at the computer; and send the data packets via the second hardware network interface controller by the first virtual process based on the configuration.
16. The non-transitory computer-readable storage medium of claim 10, the program further executable to: initiate operation of a liveness virtual process; and receive a first set of liveness information associated with the first virtual process.
17. The non-transitory computer-readable storage medium of claim 10, the program further executable to store configuration information that identifies that the first virtual process is in an active state and that the second virtual process is available to take over processing tasks from the first virtual process.
18. The non-transitory computer-readable storage medium of claim 10, the program further executable to: initiate a set of virtual processes for processing data packets received via a first communication session that is different from a second communication session associated with the data packets processed by the first virtual process, the set of virtual processes inclusive of an active virtual process and an in-active virtual process; receive additional state information associated with the processing of the data packets by the active virtual process; identify that the active virtual process has erred; and process the data packets received via the first communication session by the in-active virtual process based on the identification that the active virtual process has erred and the additional state information.
19. An apparatus for providing redundancy in a computer, the apparatus comprising: a first hardware network interface that receives data packets via a first computer network; a memory; and a processor that executes instructions out of the memory to: process the data packets by executing instructions associated with a first virtual process at the computer, wherein the data packets are processed based on a configuration that associates the first hardware network with the first virtual process; receive state information associated with the processing of the data packets, the state information accessible by a second virtual process at the computer, identify that the first virtual process has stopped processing the data packets, and continue processing the data packets by executing instructions associated with the second virtual process based on the state information received from the first virtual process.
20. The apparatus of claim 19, further comprising a second hardware interface that sends data associated with the data packets to another computer after the data packets have been processed by at least one of the first virtual process or the second virtual process.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012]
[0013]
[0014]
[0015]
[0016]
DETAILED DESCRIPTION
[0017] Methods and apparatus consistent with the present disclosure may be used in environments where multiple different virtual sets of program instructions are executed by shared computing resources when different processes are performed in a virtual computing environment. Methods consistent with the present disclosure may be used to provide a form of redundancy that does not require two physically distinct computers. Such methods may use a set of physical hardware components and two or more sets of synchronized virtual gateway software. Architectural features of physical hardware components included in an apparatus consistent with the present disclosure may be abstracted from sets of virtual program code when one virtual software process backs up another virtual software process at the apparatus.
[0018]
[0019] The computing system 100 of
[0020] Each of the virtual network interface controller (V-NIC) of
[0021] The communication lines illustrated in
[0022] Gateway stacks 115A & 115B of
[0023] In certain instances, a gateway consistent with the present disclosure may not include redundant pieces of hardware and the methods consistent with the present disclosure may provide redundancy using multiple different redundant sets of virtual software program code. Alternatively, a gateway consistent with the present disclosure may include some pieces of redundant hardware. For example, gateway 100 of
[0024] In instances where an error occurs that renders an active first set of program code inactive, processes that were previously being handled by the first set of program code may be picked up by a second set of program code with little or no delay. This failover process may be entirely transparent to users of the gateway as no data packets may be lost or corrupted during the failover process. The shared state information allows the second set of program code to take over operations that were previously being performed by the first set of program code. Errors that can occur may have been caused by imperfect software program code (i.e. software bugs), race states associated with different asynchronous processes, excessive electrical noise, or may be caused by radiation (e.g. electromagnetic waves, radiation, or cosmic rays).
[0025] Table 1 illustrates exemplary state information that may be sent from, received by, or stored by state information module 110A or 110B of
[0026] Note that table 1 indicates that a creation time may be a timestamp that identifies when a record of a communication was established/created. This typically occurs when a new communication channel is created or when data packets with new attributes are received. Table 2 includes a list of descriptions that define what each of the attributes in table 1 may be. Table 2 identifies that a creation time may be a time a record is created and that this creation may be associated with the receipt of data packets that include new attributes. An expiry time is a time that identifies a lifetime of a record. Once an expiry time has transpired, data relating to that record may be deleted. Table 2 also identifies that source IP and destination IP are respectively internet protocol addresses from which data is received and to which data is sent. Source ports and destination ports may respectively be number of ports where data is respectively received and sent. Table 2 also identifies exemplary protocols that may be supported by methods and apparatus consistent with the present disclosure. The incoming network interface controller (NIC) and outgoing network interface controller may be respective virtual NICs that receive data from and send data to other computing devices.
[0027] Communications from a source computer may pass through a physical or virtual source port and a physical or virtual destination port as data is sent from the source computer to the receiving computer through gateway 100 of
[0028] Data stored in a third column of table 1 identifies that a second record (Record 2) of communications was created on May 4, 2018 at a time of 15 hours, 55 minutes, and 27.220094 seconds. This record 2 currently has an expiry time of 120 seconds and is receiving data from a source IP address of 198.199.88.104 via port 1514 according to the transfer control protocol (TCP). Record 2 also identifies a destination IP address of 10.103.10.233 and a destination port of 443. Finally record 2 indicates that the presently active virtual gateway is using V-NIC1 as an incoming NIC and is using V-NIC2 as an outgoing NIC.
TABLE-US-00001 TABLE 1 Stateful Information Attribute Record 1 Record 2 Creation Time 2018 Apr. 20 2018 May 04 09:26:19.4833327 15:55:27.220094 Expiry Time 30 120 Source IP 192.168.8.127 198.199.88.104 Source Port N/A 1514 Protocol ICMP TCP Destination IP 192.168.8.1 10.103.10.233 Destination Port N/A 443 Incoming NIC Virtual NIC1 Virtual NIC1 Outgoing NIC Virtual NIC2 Virtual NIC2
[0029] As mentioned above table 2 identifies a series of exemplary protocols that may be used by gateway 100, these include various protocols supported by the requirements for Internet Host Communication protocols (i.e. RFC compliant communication protocols). The protocols identified in table 2 include the Internet message protocol (ICMP), the transfer control protocol (TCP), the user datagram protocol (UDP), or another designated protocol that may or may not be standard.
TABLE-US-00002 TABLE 2 Stateful Information Descriptions Attribute Description Creation Time Timestamp when the record is created. My be triggered by a new arrived packets with new attributes Expiry Time The Expiry Time identifies a remaining lifetime a record. Once expired, the record is invalid. Source/Destination IP Source/Destination IP addresses of a Packet Stream Source/Destination Source Port Designator & Destination Port Ports Designator Protocol Exemplary Protocols Include: ICMP, TCP, UDP, or other designated protocol. Incoming NIC Virtual NIC from which Packets are Received Outgoing NIC Virtual NIC to which Packets are Sent
[0030]
[0031] Each set of virtual process code 270 and 290 may share parameters with the hardware aware code 250 by providing data to and receiving data from program interface code 260 without any of the sets of virtual program code 270 or 290 being aware of certain features or an architecture associated with the physical processing hardware 200. In certain instances, program interface, 260 may be integrated into hardware aware code 250 as a single computer program. Program interface 260 may allow compatible software processes to provide data to and to receive data from hardware aware code 250. To accomplish this, data stored in memory 220 may be updated based on data received from a virtual process and operation of processor(s) 210. For example instructions executed by processor(s) 210 may allow data to be provided from one software process to another by updating data or variables stored in memory. This data may be passed through program interface 260 that abstracts the actual physical processing hardware 200 from virtual program code 270 and 290. Using this information processor(s) 210 executing instructions from the hardware aware code 250 may access memory when performing tasks abstractly for a set of virtual program code (270 or 290). The execution of the hardware aware code by the processor(s) 210 may allow data to be provided to the set of virtual program code via program interface 260. Operations of the failover controller 280 may be performed by a set of hardware or by a set of program code that may also be a virtual set of program code.
[0032] The architecture reviewed in
[0033]
[0034] After the first and second virtual processes are initiated, data packets may be processed by program code associated with the first virtual process and this first virtual process may share state information with the second virtual process in step 340 of
[0035] When determination step 350 identifies that the first virtual process is not alive, program flow may move to step 360, where the data packets are processed by program code associated with the second virtual process. Next, in step 370 an additional virtual process may be initiated. The initiation of the virtual process in step 370 may be a restart of the first virtual process of step 310. This additional virtual process may be yet another virtual gateway process that is synchronized with operations of the second virtual process by state information shared in step 380 of
[0036] While
[0037]
[0038] The updates performed in step 430 may update sets of configuration information relating to what virtual NIC is communicatively linked to a particular hardware NIC during a failover process. This may result in connection 125A being switched to connect to V-NIC1 120B of secondary gateway 105B of
[0039]
[0040] The components shown in
[0041] Mass storage device 530, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 510. Mass storage device 530 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 520.
[0042] Portable storage device 540 operates in conjunction with a portable non-volatile storage medium, such as a FLASH memory, compact disk or Digital video disc, to input and output data and code to and from the computer system 500 of
[0043] Input devices 560 provide a portion of a user interface. Input devices 560 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 500 as shown in
[0044] Display system 570 may include a liquid crystal display (LCD), a plasma display, an organic light-emitting diode (OLED) display, an electronic ink display, a projector-based display, a holographic display, or another suitable display device. Display system 570 receives textual and graphical information, and processes the information for output to the display device. The display system 570 may include multiple-touch touchscreen input capabilities, such as capacitive touch detection, resistive touch detection, surface acoustic wave touch detection, or infrared touch detection. Such touchscreen input capabilities may or may not allow for variable pressure or force detection.
[0045] Peripherals 580 may include any type of computer support device to add additional functionality to the computer system. For example, peripheral device(s) 580 may include a modem or a router.
[0046] Network interface 595 may include any form of computer interface of a computer, whether that be a wired network or a wireless interface. As such, network interface 595 may be an Ethernet network interface, a BlueTooth™ wireless interface, an 802.11 interface, or a cellular phone interface.
[0047] The components contained in the computer system 500 of
[0048] The present invention may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, a FLASH memory, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASHEPROM, and any other memory chip or cartridge.
[0049] While various flow diagrams provided and described above may show a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary (e.g., alternative embodiments can perform the operations in a different order, combine certain operations, overlap certain operations, etc.).
[0050] The foregoing detailed description of the technology herein has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the technology to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the technology be defined by the claim.