Solved

IP address resouce in a cluster group

Posted on 2006-11-02
3
161 Views
Last Modified: 2013-11-15
can someone tell me the purpose of creating IP address resouce and network name resource in a cluster group?

thanks
0
Comment
Question by:jskfan
3 Comments
 
LVL 18

Assisted Solution

by:simsjrg
simsjrg earned 80 total points
Comment Utility
I guess you can best explain this by saying its "virtual". Each node has its own IP but the point of a cluster is redundancy. So you give the cluster (node1 and node 2) a virtual name and IP. This is how the cluster is accessed. From the front nobody knows what box they are hitting and it doesn't matter to them. These are cluster resources just as disks are so if node 1 fails node 2 now knows that all requests that go to that cluster name or IP are now his job.
0
 
LVL 43

Assisted Solution

by:Steve Knight
Steve Knight earned 85 total points
Comment Utility
Exactly.  Pretty well you can see each cluster group as like having another server.  Each generally has at least one disc resource which shares can be created on, printer spooler, possibly application resources and always needs a network name and ip address to be able to access the resources in it.  When the resource group fails over to the other node the resources in the group all go with it so the IP address, network name and discs appear on the other node.  As far as client pc's are concerned in theory they don't notice any difference.

If you have more specific question about this please ask more

Steve

0
 
LVL 5

Accepted Solution

by:
cjtraman earned 85 total points
Comment Utility
Network name & IP address resource is used for virtual server identification. When you install cluster, the applications needs to be available without users know which node is providing access to the application. TO achieve this objective, one needs to use virtual name and valid IP to access the resources running in clusters instead of node name & ip address. In that way, if the node serving the application goes down or taken off, the users need not do any changes to the connectivity part of application as the resource group would automatically failover to another node and users still able to access the resource using virtual IP & name.

Hope it gives enough explanation.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now