Method of penetrating internal network to remotely connect large-scale virtual machines
A technology of remote connection and virtual machine, applied in the field of remote control tool software penetrating the intranet
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] 1. Process pool model
[0039] The agent software of the present invention adopts the process pool model, creates multiple sub-processes in advance, and handles specific agent work, while the main process maintains the size of the process pool. The size of the process pool is maintained with two thresholds MinSpareServers and MaxSpareServers in the configuration file. The statistics of the number of idle processes use file lock synchronization. When a child process enters the task processing flow, the number of idle processes is reduced by one, and when the child process exits the task processing flow, the number of idle processes is increased by one. When the number of idle processes is less than MinSpareServers, the main process creates a new worker process and waits for the arrival of tasks. When the number of idle processes is greater than MaxSpareServers, the current child process exits. In this way, the maintenance of the process pool size is realized.
[0040] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 