Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

376results about How to "Avoid performance bottlenecks" patented technology

Creation method of virtual machine, management system of virtual machine and related equipment thereof

The invention discloses a creation method of a virtual machine, a management system of the virtual machine and related equipment of the management system. The creation method of the virtual machine, the management system of the virtual machine and related equipment thereof are used for improving performance of the network and an image storage server, and shortening the consumed time to create the virtual machine. The creation method of the virtual machine includes that receiving creation request initiated by a user, confirming a specified type of the virtual machine operating system image requested by the virtual machine creation in an image buffer pool, selecting an objective physical machine to deploy the virtual machine in a hardware resource pool composed of a large number of physical machines according to the creation request of the virtual machine for specified resource requirements, wherein the image buffer pool is built in hardware resources and composed of all physical machines for catching various types of virtual machine operating system images; transferring the specified type of the virtual machine operating system image requested by the virtual machine creation in the image buffer pool to virtual machine running directories of the physical machines; and ordering the physical machine to start the virtual machine.
Owner:CHINA MOBILE COMM GRP CO LTD

User access method and device based on SSL (Secure Socket Layer) VPN (Virtual Private Network) gateway cluster

The invention discloses a user access method and a device based on an SSL (Secure Socket Layer) VPN (Virtual Private Network) gateway cluster. The gateways in the SSL VPN gateway cluster use a VRRP (Virtual Router Redundancy Protocol), and are configured with cluster neighbor table entries which contain the current states of neighbor gateways and current user connecting number. The method comprises the following steps that the gateways maintain the cluster neighbor table entries through a cluster neighbor probe process which is periodically executed; and when the master gateway receives an SSL access request transmitted to the SSL VPN gateway cluster VRRP backup tram address by a user terminal, and judges that no gateway processing source IP (Internet Protocol) address is the access request of the source IP address of the SSL access request, according to the current states of the neighbor gateways and the current user connecting number in the cluster neighbor table entries, as well as the current user connecting number of the master gateway, the gateway which has minimum load and can be accessible is selected, and the user terminal is redirected to the neighbor gateway. The invention can realize SSL VPN gateway cluster load balancing and improves the property of a system.
Owner:XINHUASAN INFORMATION TECH CO LTD

Load balancing method of virtual machines, related equipment and trunking system

The invention discloses a load balancing method of virtual machines, related equipment and a trunking system. The network performance of the trunking system can be improved after load balancing. According to certain feasible execution modes, the method includes the steps that a management node determines a plurality of virtual machines in which load balancing is needed in the trunking system; according to the network flow relation among the virtual machines, the virtual machines are integrated into at least one virtual machine cluster, so that the network flow between each virtual machine and at least one other virtual machine in the same virtual machine cluster is larger than or equal to a network flow threshold value, and the network flow between each virtual machine and any other virtual machine in the different virtual machine cluster is smaller than the network flow threshold value; migration suggestions are generated, and the migration suggestions are used for instructing all the virtual machines included in each virtual machine cluster to be migrated or hosted to the same target computational node; the migration suggestions are sent to source computational nodes hosted by one or more virtual machines included in each virtual machine cluster.
Owner:HANGZHOU HUAWEI DIGITAL TECH

Load balancing method in server cluster, as well as node server and cluster

ActiveCN102447624AImprove network bandwidth utilization efficiencyFlexible Load SharingData switching networksAddress Resolution ProtocolName server
The embodiment of the invention discloses a load balancing method in server cluster comprising the following steps: acquiring an address resolution protocol ARP request message sent from a client; if a node server has an ARP response token, returning the client ARP response message, wherein the ARP response token is used for representing the response authority of the node server to the ARP request message; acquiring the load information of each node server in the server cluster, selecting the node server with small load from the server cluster according to the acquired load condition, transmitting the ARP response token to the node server with small load, synchronizing the load information of the node server with the ARP response token to the node server with small load and storing the load information on the load table of the node server with small load. The node server in the embodiment of the invention can flexibly distribute the load according to its own network adapter configuration condition and load condition to improve the server network bandwidth utilization rate, especially to fully utilize all server network adapters and to avoid the performance bottleneck caused by excessive reliance on the load balancing equipment when the server configures multiple network adapters.
Owner:CHENGDU HUAWEI TECH

Safe region-crossing equipment uniform monitoring method based on independent monitoring services, and monitoring system for the same

The invention discloses a safe region-crossing equipment uniform monitoring method based on independent monitoring services, and a monitoring system for the same, which are used for safe region-crossing equipment comprehensive monitoring of a power dispatching automation system. The monitoring services are independently arranged and run in different safe regions, a global unique production mechanism of the instance identifiers of resource, warning and performance models is used, timely collection of the safe region-crossing equipment resource, warning and performance information in a safe III region monitoring service is realized, and a III region monitoring client monitors and manages the equipment uniformly. With the method, the independently arranged monitoring services have basic capabilities in resource model management, equipment warning basic analysis and management, and performance data processing, thus, data redundant transmission through a physical isolation device is reduced, some of the pressure on the III region uniform monitoring service is shared, and finally, the safe region-crossing equipment uniform monitoring is finished.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD SHAOXING POWER SUPPLY CO +2

Distributed safety memory system

The invention discloses a distributed security storage system, pertains to the technical filed of computer storage and aims at overcoming the problems of the heavy burden of a security manager and complex user authority management in the current security storage system based on a certificate. The storage system of the invention consists of an application client connected to a network, a storage device, a security and strategy manager and a metadata server; the security and strategy manager stores and manages the access control entry, access control strategy and rule of the whole system and carries out access strategy control and authority control over the storage device according to the access control entry, access control strategy and rule of the whole system, including the changes of the priority and inheritance rules of the access control entry and adding and deletion of the access control entry. The storage system of the invention distributes centralized authorization to storage nodes, avoids the performance bottle neck of the security manager, solves the problem of the complex user authority management, combines identification management and access control, eliminates access control redundancy and security holes and is applicable to establishing a large-scale security storage system with high performance.
Owner:HUAZHONG UNIV OF SCI & TECH

Character string matching method based on finite state automation and content filtering equipment

InactiveCN101876986AReduce the number of accesses to main memorySolve system performance bottlenecksSpecial data processing applicationsFinite stateString database
The invention discloses a character string matching method based on a finite state automation and content filtering equipment. The character string matching method comprises the step of combining two sequence-associated states meeting the set conditions in a DFA (Deterministic Finite Automaton) to obtain a combined DFA; the corresponding matching process of character strings comprises the following steps of: sequentially reading characters from a character string database and judging whether the matching is character string matching according to the current state and the read characters; if not, skipping to the next state according to the current state and the read characters; if so, acquiring a matched character string of the current state from the corresponding storage address of the character string, reading next character and judging whether to be matched with next character matched with the character string or not; during matching, continuously reading next character and skipping to the next state until the character strings are successfully matched; and if not, skipping to the next state according to the current state and the read characters. By using the method, the times for accessing a memory during the matching of the character strings can be reduced and the speed and the efficiency for the matching of the character strings can be improved.
Owner:RUIJIE NETWORKS CO LTD

Multi-unmanned-aerial-vehicle formation consistency control method based on event-triggered communication

The invention discloses a multi-unmanned-aerial-vehicle formation consistency control method based on event-triggered communication. With the distributed control architecture, the control center in the centralized control architecture is removed, so that no phenomenon of formation failure due to the destruction of the central control node exists. Computing tasks of the UAV formation are controlled, the tasks are distributed from a control center to onboard computers of the member UAVs, thereby greatly improving the overall computing power of the formation and breaking through the performance bottleneck caused by the computing power; with introduction of an event trigger communication mechanism, the algorithm does not need to acquire cooperative state information in each control cycle continuous communication, and only intermittent communication needs to be carried out under a trigger communication condition. Compared with a consistency algorithm based on continuous communication, the algorithm has the advantages that the network information transmission quantity can be greatly reduced, the limited communication bandwidth is used for transmitting more task information, and the dependence on the performance of a communication system can be reduced The algorithm has certain tolerance to transient communication interruption or signal interference, and engineering implementation isfacilitated.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products