An application deployment method, its deployment device and edge data center

A technology for deploying devices and receiving users, which is applied in the computer field, can solve problems such as low security level, and achieve the effect of strong isolation

Active Publication Date: 2021-04-13
CHINA MOBILE COMM LTD RES INST +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the data center of edge computing, virtualization technology can abstract and integrate physical resources, dynamically allocate and schedule resources, and realize the automatic deployment of data centers; among them, virtual machines can provide a safe and isolated environment for different businesses, greatly improving the performance of data centers. security management efficiency; and, for this virtualization technology, the virtualization layer provides users with a virtual machine with a complete system image including the kernel, and provides users with an exclusive application operating environment that is completely isolated from other users ; and container technology is another lightweight virtualization technology, which can directly load and run applications on the host platform without encapsulating an independent operating system; because it essentially uses kernel containers (LinuxContainer, LXC ) technology, through control group (Control Group, CGroup) and other mechanisms to isolate the applications running in different containers, authority management and quota allocation, etc., it provides a certain degree of isolation for different applications, but it is different from virtualization technology The security level is still low compared to virtual machines in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An application deployment method, its deployment device and edge data center
  • An application deployment method, its deployment device and edge data center
  • An application deployment method, its deployment device and edge data center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Example 1: Combining Figure 4 The flow chart of the application deployment method is shown, taking the deployment of an application as an example.

[0090] S401. Receive a message requesting deployment of an application sent by a user;

[0091] S402. Analyzing and processing the received request message;

[0092] S403. According to the result of the analysis and processing, determine whether the preset security level of the requested deployment application is high; if yes, execute step S404; if not, execute step S410;

[0093] S404. Determine whether there is a created virtual machine; if yes, execute step S405; if not, execute step S407;

[0094] S405. Determine whether the nature of the created virtual machine matches the nature of the requested deployment application; if yes, execute step S406; if not, execute step S407;

[0095] S406. Determine that there is no need to create a virtual machine that matches the requested deployment application; execute step S409;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application deployment method, a deployment device and an edge data center. Through the combination of two virtualization technologies of virtual machine and container, the deployment of applications of different security levels is realized, and the security level of the requested deployment application is realized. When the security level is high, the container is started in the virtual machine for deployment, and when the security level of the application requested to be deployed is low, the container is started on the physical machine for deployment; in this way, the security isolation of the virtual machine is compared with the container. Combined with the advantages of lightweight and rapid deployment, it not only retains the strong isolation characteristics of virtual machines, but also makes full use of the advantages of containers to quickly and efficiently deploy applications, providing applications with different levels of security isolation.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an application deployment method, a deployment device thereof, and an edge data center. Background technique [0002] Edge computing (Edge Computing, EC) is proposed by the European Telecommunications Standards Institute based on the fifth generation mobile communication technology (The 5 th The evolved architecture of Generation Mobile Communication Technology, 5G, is a technology that deeply integrates mobile access networks and Internet services. On the one hand, this technology can improve user experience and save broadband resources; Mobile edge nodes provide third-party application integration, creating a carrier-class service environment with high performance, low latency, and high bandwidth, which accelerates the distribution and download of various content, services, and applications in the network, and improves user experience. [0003] In the data center of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455G06F9/50
CPCG06F9/45558G06F9/5027G06F2009/45562G06F2009/4557G06F2009/45587
Inventor 孔帅
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products