Resource allocation method, equipment and system

A technology of resource allocation and resource allocation unit, applied in the field of resource allocation, can solve the problems of reducing the security of the application system, and achieve the effects of improving the utilization rate, flexibly sharing resources, and solving the problem of resource sharing.

Active Publication Date: 2014-09-10
SHANXI CHINA MOBILE COMM CORP
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can realize the flexible sharing of all resources in the resource pool, all applications are deployed in a large security domain, and the security of the application system will be lower than before integration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource allocation method, equipment and system
  • Resource allocation method, equipment and system
  • Resource allocation method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] figure 1 It is a schematic diagram of the implementation flow of the resource allocation method of the present invention, such as figure 1 As shown, the method includes the following steps:

[0040] Step 101: Receive a resource allocation request sent by the security domain;

[0041] Step 102: When it is determined that the dedicated resource group of the security domain satisfies the resources requested by the security domain, allocate resources to the security domain in the dedicated resource group of the security domain; the dedicated resource group of the security domain does not satisfy When the resource requested by the security domain is used, the resource requested by the security domain is scheduled and allocated in the resource pool.

[0042] Specifically, each security domain is allocated a dedicated resource grou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource allocation method used for allocating a special resource group for each security domain in a resource pool. The method comprises the following steps: after a resource allocation request sent by a security domain is received, and when that a special resource group of the security domain meets resource requested by the security domain is determined, resource is allocated for the security domain in the special resource group of the security domain; and when the special resource group of the security domain does not meet the resource requested by the security domain, the security domain is scheduled in the resource pool, and the resource requested by the security domain is allocated for the security domain. The invention further discloses a piece of resource allocation equipment and a resource allocation system. By adopting the scheme of the invention, the problem of resource sharing across security domains can be solved, the utilization rate of resources can be improved, and security specification requirements of security domains can be met.

Description

technical field [0001] The present invention relates to cloud computing network security technology, in particular to a resource allocation method, device and system. Background technique [0002] At present, in the network environment of multiple security domains, the use of virtualization technology to integrate resources of the Internet technology (IT, Internet Technology) infrastructure requires that the number of servers be greatly reduced, the flexible sharing of computing resources should be improved, and as much as possible Maintain the original security domain environment as much as possible to meet the network security specification requirements of the enterprise. The general idea is to deploy more host servers, or add as many network cards as possible to the host servers to meet the access needs of multiple security domains. However, in the cloud computing and virtualization environment, the computing environment is mostly built on the blade server environment. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/917H04L29/08H04L47/76
Inventor 卢山
Owner SHANXI CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products