Please download the dossier by clicking on the dossier button x
×

Controlling access of clients to service in cluster environment

  • US 20130212264A1
  • Filed: 02/14/2013
  • Published: 08/15/2013
  • Est. Priority Date: 02/14/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access of a plurality of clients to a service, the service provided by each of a plurality of servers, the method performable by an addresses pool controller operably coupled to a name server for controlling client access to the servers, the method comprising:

  • creating a first set of addresses, a second set of addresses, and a third set of addresses, where the first set of addresses comprises addresses that are registered in the name server, the second set of addresses comprises addresses that are not registered in the name server, the third set of addresses comprises addresses not registered in the name server, and the second and the third sets of addresses are disjoint;

    determining a first server of the servers as a server that has failed and to which the access is to be prohibited, the first server being associated with a first address of the first set of addresses;

    moving the first address from the first set of addresses to the third set of addresses;

    removing the first address from the first server and assigning the first address to a second server of the servers;

    removing the first address from the name server;

    monitoring one or more usage parameter values of the first address;

    evaluating the one or more monitored usage parameter values to yield a determination as to whether at least one of the monitored one or more usage parameter values is below a minimum usage threshold value;

    removing the first address from the second server and moving the first address from the third set of addresses to the second set of addresses if the determination indicates that the at least one of the usage parameter values is below the minimum usage threshold value;

    determining that access to the first server is no longer to be prohibited;

    assigning a second address of the second set of addresses to the first server; and

    adding the second address to the name server, to permit fail-back of the first server.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×