Font Size: a A A

Design And Implementation Of Enterprise-class Cluster High Availability And Security Based On AIX Operation System

Posted on:2016-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2348330512470856Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the progress of information technology,the degree of informatization for all kinds of industries in human society is becoming deeper and deeper.The standalone computing technology and independence network technology cannot meet the needs of the daily increasing of enterprises business application.For now,in the most rapid development field,electronic business,and network industry could enlarge their scale from several times to dozens of times in only a few months.With the scale extension of enterprises,the data produced by enterprises business application will be multiplied further.To face the situation above,the computer cluster technology is widely used.But severely heavy load on enterprise business application will cause the problem such as delayed response of service,unavailable access to application,data error and so on.According to the problems above,this paper mainly bases on the "High Available Cluster" technology to make the meticulous research that the method of design and implementation of enterprise-class business application.This paper also makes every effort to execute the configuration and operation through the study of theoretical solution in a real experiment environment.Firstly,this paper analyzes the main function of High Available Cluster and the significance of using the High Available Cluster for enterprise-class business application.The paper also states that in a general condition,the reason why the enterprise-class business application should beexecuted under the High Available Cluster environment.Secondly,about the theory architecture and working principle of High Available Cluster,this paper will take a deep analyzing and design workon software organization of High Available Cluster via topological technology and the monitor mechanism of High Available Cluster and also explains the running process of monitor program and the working principle of hear-beat network.This paper analyzes the failover mechanism of High Available Cluster explaining the active type failover and passive type failover.The related technology(Virtualization technology,RAID technology etc.)for High Available Cluster is also involved in this paper.Thirdly,this paper takes the research for High Available Cluster design.According to different kinds of business application there will be different methods to make the design of High Available Cluster.The design mainly including:Cluster physical topological design;Network resource design;Storage resource design;Cluster nodes design;Resource group design and application design.Fourthly,considering about the security aspects of High Available Cluster,this paper introduces the LDAP technology to guarantee the security in cluster environment and analyzes the work principle of LDAP environment.Combine with the cluster environment,the LDAP take the security management to existed High Available Cluster environment.This paper also makes the detailed research and practice for LDAP environment installation and configuration.Finally,to make a better estimate on the performance of High Available Cluster this paper utilizesthe "GUI"(Graphic User Interface)to do the analyzing and estimating work.And also the "GUI" can rise up the efficiency of the High Available Cluster and reduce the possibility of error operation through human beings in cluster planning and configuration steps.Furthermore,the "GUI" could do real-time monitor to the cluster and generate the report that can describe the ratio of availability for the cluster.In a word,this paper applies both theory and practice in the study of High Available Cluster analysis,research and solution application.Though the research results in this paper the problems of system availability have been well solved and the possibility of application interruption has been reduced in the most extent.With the stability of enterprise-business application has be guaranteed,this paper will be a significant meaning to the improvement of High Available Cluster technology flied.
Keywords/Search Tags:cluster technology, AIX operation system, virtualization, security
PDF Full Text Request
Related items