[go: up one dir, main page]

CN111800506B - An edge computing node deployment method and related devices - Google Patents

An edge computing node deployment method and related devices Download PDF

Info

Publication number
CN111800506B
CN111800506B CN202010641178.XA CN202010641178A CN111800506B CN 111800506 B CN111800506 B CN 111800506B CN 202010641178 A CN202010641178 A CN 202010641178A CN 111800506 B CN111800506 B CN 111800506B
Authority
CN
China
Prior art keywords
edge computing
virtual machine
node
host
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010641178.XA
Other languages
Chinese (zh)
Other versions
CN111800506A (en
Inventor
蒋海明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technologies Co Ltd
Original Assignee
Shenzhen Onething Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technologies Co Ltd filed Critical Shenzhen Onething Technologies Co Ltd
Priority to CN202010641178.XA priority Critical patent/CN111800506B/en
Publication of CN111800506A publication Critical patent/CN111800506A/en
Application granted granted Critical
Publication of CN111800506B publication Critical patent/CN111800506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

本申请公开了一种边缘计算节点部署方法,所述方法包括:宿主机根据获取到的节点配置文件创建出边缘计算虚拟机;根据从服务器接收到的唯一标识将所述边缘计算虚拟机注册至边缘计算平台;将边缘计算业务程序部署至所述边缘计算虚拟机,以便将所述宿主机的部分硬件性能部署为边缘计算节点。本发明还公开了一种计算机装置、边缘计算节点部署系统、计算机可读存储介质以及计算机程序产品。本发明所实现的技术方案可以在宿主机中部署了一个边缘计算节点,实现边缘计算,并且该节点与宿主机之间相互隔离,不会侵占虚拟机之外的硬件资源,避免将宿主机的所有硬件资源进行独占。

This application discloses an edge computing node deployment method. The method includes: the host creates an edge computing virtual machine based on the obtained node configuration file; and registers the edge computing virtual machine to the server based on the unique identifier received from the server. Edge computing platform: deploy edge computing business programs to the edge computing virtual machine, so as to deploy part of the hardware performance of the host machine as edge computing nodes. The invention also discloses a computer device, an edge computing node deployment system, a computer-readable storage medium and a computer program product. The technical solution implemented by the present invention can deploy an edge computing node in the host machine to implement edge computing, and the node and the host machine are isolated from each other, and will not occupy hardware resources other than the virtual machine, and avoid the use of the host machine's hardware resources. All hardware resources are exclusive.

Description

一种边缘计算节点部署方法及相关装置An edge computing node deployment method and related devices

技术领域Technical field

本申请涉及计算机技术领域,尤其涉及一种边缘计算节点部署方法、计算机装置、边缘计算节点部署系统、计算机可读存储介质以及计算机程序产品。The present application relates to the field of computer technology, and in particular, to an edge computing node deployment method, a computer device, an edge computing node deployment system, a computer-readable storage medium, and a computer program product.

背景技术Background technique

随着信息技术不断发展,出现了云计算技术。现有互联网应用中可以通过云计算技术降低对硬件资源的依赖,将服务器搬移至云端。进一步为了提高云计算平台的计算能力,需要应用到边缘计算服务。因此,随着边缘设备以及物联网的发展,越来越多的节点开始参与到云计算或者边缘计算业务中来,大到服务器,小到个人PC,无不利用其闲置的CPU、带宽、存储资源来提供服务,成为一个云计算或者边缘计算的服务节点。With the continuous development of information technology, cloud computing technology has emerged. In existing Internet applications, cloud computing technology can be used to reduce dependence on hardware resources and move servers to the cloud. Further, in order to improve the computing power of the cloud computing platform, it needs to be applied to edge computing services. Therefore, with the development of edge devices and the Internet of Things, more and more nodes are beginning to participate in cloud computing or edge computing services, ranging from servers to personal PCs, all utilizing their idle CPU, bandwidth, and storage resources. To provide services and become a cloud computing or edge computing service node.

现有技术中,一般将服务节点中的硬件设备及资源全部使用到边缘计算或者云计算过程中,这会导致对硬件设备的性能资源进行独占,设备控制权完全交给云计算或者边缘计算业务使用方,本身不利于硬件设备所有者自身业务的部署,共享方面比较差。In the existing technology, all hardware devices and resources in the service node are generally used in the edge computing or cloud computing process. This will lead to the exclusive monopoly of the performance resources of the hardware device, and the control of the device is completely handed over to the cloud computing or edge computing business. On the user side, it is not conducive to the deployment of the hardware equipment owner's own business, and the sharing aspect is relatively poor.

因此,如何避免将边缘节点以独占的方式接入云计算或者边缘计算网络中是本领技术人员关注的重点问题。Therefore, how to prevent edge nodes from being exclusively connected to cloud computing or edge computing networks is a key issue that technical personnel are concerned about.

发明内容Contents of the invention

本发明的主要目的在于提供一种边缘计算节点部署方法、计算机装置、边缘计算节点部署系统、计算机可读存储介质以及计算机程序产品,旨在解决如何将边缘节点更安全、便捷、高效的接入边缘计算网络中。The main purpose of the present invention is to provide an edge computing node deployment method, a computer device, an edge computing node deployment system, a computer-readable storage medium and a computer program product, aiming to solve how to connect edge nodes more safely, conveniently and efficiently in edge computing networks.

为实现上述目的,本发明提供了一种边缘计算节点部署方法,所述方法包括:To achieve the above objectives, the present invention provides an edge computing node deployment method, which method includes:

宿主机根据获取到的节点配置文件创建出边缘计算虚拟机;The host creates an edge computing virtual machine based on the obtained node configuration file;

根据从服务器接收到的唯一标识将所述边缘计算虚拟机注册至边缘计算平台;Register the edge computing virtual machine to the edge computing platform according to the unique identification received from the server;

将边缘计算业务程序部署至所述边缘计算虚拟机,以便将所述宿主机的部分硬件性能部署为边缘计算节点。Deploy an edge computing service program to the edge computing virtual machine so that part of the hardware performance of the host machine is deployed as an edge computing node.

优选的,宿主机根据获取到的节点配置文件创建出边缘计算虚拟机,包括:Preferably, the host creates an edge computing virtual machine based on the obtained node configuration file, including:

所述宿主机通过web管理系统接收到输入的配置信息;其中,所述配置信息包括内存、CPU、存储路径、存储大小;The host machine receives the input configuration information through the web management system; wherein the configuration information includes memory, CPU, storage path, and storage size;

将所述配置信息保存为所述节点配置文件;Save the configuration information as the node configuration file;

根据所述节点配置文件创建出所述边缘计算虚拟机。The edge computing virtual machine is created according to the node configuration file.

优选的,根据所述节点配置文件创建出所述边缘计算虚拟机,包括:Preferably, the edge computing virtual machine is created according to the node configuration file, including:

通过预设接口将所述节点配置文件发送至虚拟机管理程序;Send the node configuration file to the virtual machine hypervisor through a preset interface;

控制所述虚拟机管理程序根据所述节点配置文件中的配置信息执行虚拟机创建操作,得到所述边缘计算虚拟机。Control the virtual machine management program to perform a virtual machine creation operation according to the configuration information in the node configuration file to obtain the edge computing virtual machine.

优选的,根据所述节点配置文件创建出所述边缘计算虚拟机,包括:Preferably, the edge computing virtual machine is created according to the node configuration file, including:

所述宿主机判断本地是否存在虚拟机程序;The host determines whether a virtual machine program exists locally;

若是,则控制虚拟机管理程序根据所述节点配置文件创建出所述边缘计算虚拟机;If so, control the virtual machine hypervisor to create the edge computing virtual machine according to the node configuration file;

若否,则下载目标虚拟机程序;控制虚拟机管理程序根据所述目标虚拟机程序和所述节点配置文件创建出所述边缘计算虚拟机。If not, download the target virtual machine program; control the virtual machine management program to create the edge computing virtual machine according to the target virtual machine program and the node configuration file.

优选的,还包括:Preferably, it also includes:

当所述宿主机接收到所述唯一标识之前,所述服务器根据平台整体调度信息计算出所述唯一标识;Before the host receives the unique identifier, the server calculates the unique identifier based on the overall platform scheduling information;

将所述唯一标识发送至所述宿主机。Send the unique identifier to the host.

优选的,还包括:Preferably, it also includes:

采集所述边缘计算业务程序的数据,将所述数据上传至所述边缘计算平台,以便对边缘计算节点进行监控。Collect data from the edge computing business program and upload the data to the edge computing platform to monitor edge computing nodes.

为实现上述目的,本发明还提供了一种计算机装置,所述装置包括存储器和处理器,所述存储器上存储有可在所述处理器上运行的边缘计算节点部署程序,所述边缘计算节点部署程序被所述处理器执行时实现如上所述的边缘计算节点部署方法的步骤。In order to achieve the above object, the present invention also provides a computer device. The device includes a memory and a processor. The memory stores an edge computing node deployment program that can run on the processor. The edge computing node When the deployment program is executed by the processor, the steps of the edge computing node deployment method as described above are implemented.

优选的,所述计算机装置为组成CDN网络或者区块链网络的节点。Preferably, the computer device is a node constituting a CDN network or a blockchain network.

为实现上述目的,本发明还提供了一种边缘计算节点部署系统,所述系统包括:To achieve the above objectives, the present invention also provides an edge computing node deployment system, which includes:

虚拟机创建模块,用于根据获取到的节点配置文件创建出边缘计算虚拟机;The virtual machine creation module is used to create an edge computing virtual machine based on the obtained node configuration file;

虚拟机激活模块,用于根据从服务器接收到的唯一标识将所述边缘计算虚拟机注册至边缘计算平台;A virtual machine activation module, configured to register the edge computing virtual machine to the edge computing platform according to the unique identification received from the server;

节点部署模块,用于将边缘计算业务程序部署至所述边缘计算虚拟机,以便将所述宿主机的部分硬件性能部署为边缘计算节点。A node deployment module is used to deploy edge computing service programs to the edge computing virtual machine, so as to deploy part of the hardware performance of the host machine as edge computing nodes.

为实现上述目的,本发明还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有边缘计算节点部署程序,所述边缘计算节点部署程序可被一个或多个处理器执行,以实现如上所述的边缘计算节点部署方法的步骤。In order to achieve the above object, the present invention also provides a computer-readable storage medium. An edge computing node deployment program is stored on the computer-readable storage medium. The edge computing node deployment program can be executed by one or more processors. , to implement the steps of the edge computing node deployment method as described above.

为实现上述目的,本发明还提供了一种计算机程序产品,包括计算机指令,当其在计算机上运行时,使得计算机可以执行上述边缘计算节点部署方法的步骤。To achieve the above object, the present invention also provides a computer program product, which includes computer instructions, which when run on a computer, enable the computer to execute the steps of the above edge computing node deployment method.

本申请所提供的一种边缘计算节点部署方法,所述方法包括:宿主机根据获取到的节点配置文件创建出边缘计算虚拟机;根据从服务器接收到的唯一标识将所述边缘计算虚拟机注册至边缘计算平台;将边缘计算业务程序部署至所述边缘计算虚拟机,以便将所述宿主机的部分硬件性能部署为边缘计算节点。An edge computing node deployment method provided by this application, the method includes: the host creates an edge computing virtual machine according to the obtained node configuration file; registers the edge computing virtual machine according to the unique identifier received from the server to the edge computing platform; deploy the edge computing service program to the edge computing virtual machine, so as to deploy part of the hardware performance of the host machine as an edge computing node.

首先根据该宿主机对应的节点配置文件在宿主机中创建出边缘计算虚拟机,然后通过服务器分配的唯一标识将该边缘计算虚拟机注册至边缘计算平台中,而不是将宿主机整体注册至边缘计算平台中,最后将将边缘计算业务程序部署至所述边缘计算虚拟机,使得该边缘计算虚拟机具备边缘计算节点的功能,也就是将所述宿主机的部分硬件部署为边缘计算节点,可见,通过虚拟机在宿主机中部署了一个边缘计算节点,实现边缘计算,并且该节点与宿主机之间相互隔离,不会侵占虚拟机之外的硬件资源,避免将宿主机的所有硬件资源进行独占,并且可以不考虑宿主机的情况单独对虚拟机进行调整,提高了节点的管控效率,将边缘节点更安全、便捷、高效的接入边缘计算网络中。First, create an edge computing virtual machine in the host based on the node configuration file corresponding to the host, and then register the edge computing virtual machine to the edge computing platform through the unique identifier assigned by the server, instead of registering the entire host to the edge. In the computing platform, the edge computing business program will finally be deployed to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, that is, part of the hardware of the host machine is deployed as an edge computing node. It can be seen that , an edge computing node is deployed in the host machine through a virtual machine to implement edge computing, and the node and the host machine are isolated from each other and will not occupy hardware resources other than the virtual machine and avoid all hardware resources of the host machine. It is exclusive and can adjust virtual machines independently without considering the host situation, which improves the management and control efficiency of nodes and connects edge nodes to the edge computing network more safely, conveniently and efficiently.

本发明所提供一种计算机装置、边缘计算节点部署系统、计算机可读存储介质以及计算机程序产品,具有以上有益效果,在此不做赘述。The invention provides a computer device, an edge computing node deployment system, a computer-readable storage medium and a computer program product, which have the above beneficial effects and will not be described in detail here.

附图说明Description of drawings

为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to explain the embodiments of the present application or the technical solutions in the prior art more clearly, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below. Obviously, the drawings in the following description are only This is an embodiment of the present application. For those of ordinary skill in the art, other drawings can be obtained based on the provided drawings without exerting creative efforts.

图1为本发明第一实施例的流程示意图;Figure 1 is a schematic flow chart of the first embodiment of the present invention;

图2为本发明第一实施例中创建虚拟机的流程示意图;Figure 2 is a schematic flowchart of creating a virtual machine in the first embodiment of the present invention;

图3为本发明第二实施例的流程示意图;Figure 3 is a schematic flow chart of the second embodiment of the present invention;

图4为本发明第一实施例揭露的计算机装置的内部结构示意图;Figure 4 is a schematic diagram of the internal structure of the computer device disclosed in the first embodiment of the present invention;

图5为本发明所提供的第三实施例的结构框图。Figure 5 is a structural block diagram of the third embodiment provided by the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of the present invention.

本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if present) in the description and claims of this application and the above-mentioned drawings are used to distinguish similar objects without necessarily using Used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions, e.g., a process, method, system, product, or apparatus that encompasses a series of steps or units and need not be limited to those explicitly listed. Those steps or elements may instead include other steps or elements not expressly listed or inherent to the process, method, product or apparatus.

需要说明的是,在本发明中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本发明要求的保护范围之内。It should be noted that descriptions involving “first”, “second”, etc. in the present invention are for descriptive purposes only and cannot be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features. . Therefore, features defined as "first" and "second" may explicitly or implicitly include at least one of these features. In addition, the technical solutions in various embodiments can be combined with each other, but it must be based on the realization by those of ordinary skill in the art. When the combination of technical solutions is contradictory or cannot be realized, it should be considered that such a combination of technical solutions does not exist. , nor within the protection scope required by the present invention.

现有技术中,一般将服务节点中的硬件设备及资源全部使用到边缘计算或者云计算过程中,这会导致对硬件设备的性能资源进行独占,设备控制权完全交给云计算或者边缘计算业务使用方,本身不利于硬件设备所有者自身业务的部署,共享方面比较差。In the existing technology, all hardware devices and resources in the service node are generally used in the edge computing or cloud computing process. This will lead to the exclusive monopoly of the performance resources of the hardware device, and the control of the device is completely handed over to the cloud computing or edge computing business. On the user side, it is not conducive to the deployment of the hardware equipment owner's own business, and the sharing aspect is relatively poor.

因此,本申请提供一种边缘计算节点部署方法,首先根据该宿主机对应的节点配置文件在宿主机中创建出边缘计算虚拟机,然后通过服务器分配的唯一标识将该边缘计算虚拟机注册至边缘计算平台中,而不是将宿主机整体注册至边缘计算平台中,最后将将边缘计算业务程序部署至所述边缘计算虚拟机,使得该边缘计算虚拟机具备边缘计算节点的功能,也就是将所述宿主机的部分硬件部署为边缘计算节点,可见,通过虚拟机在宿主机中部署了一个边缘计算节点,实现边缘计算,并且该节点与宿主机之间相互隔离,不会侵占虚拟机之外的硬件资源,避免将宿主机的所有硬件资源进行独占,并且可以不考虑宿主机的情况单独对虚拟机进行调整,提高了节点的管控效率,将边缘节点更安全、便捷、高效的接入边缘计算网络中。Therefore, this application provides an edge computing node deployment method. First, an edge computing virtual machine is created in the host machine according to the node configuration file corresponding to the host machine, and then the edge computing virtual machine is registered to the edge through a unique identifier assigned by the server. In the computing platform, instead of registering the entire host machine into the edge computing platform, the edge computing business program will finally be deployed to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, that is, all Part of the hardware of the host machine is deployed as an edge computing node. It can be seen that an edge computing node is deployed in the host machine through a virtual machine to implement edge computing. The node and the host machine are isolated from each other and will not invade the virtual machine. Hardware resources avoid monopolizing all hardware resources of the host machine, and the virtual machine can be adjusted independently regardless of the host machine, which improves the management and control efficiency of the node and connects the edge nodes to the edge more safely, conveniently and efficiently in computing networks.

具体的,以下通过一个实施例对本申请提供的一种边缘计算节点部署方法进行说明。Specifically, an edge computing node deployment method provided by this application is described below through an embodiment.

参照图1,图1为本发明第一实施例的流程示意图。Referring to Figure 1, Figure 1 is a schematic flow chart of the first embodiment of the present invention.

在第一实施例中,该方法可以包括:In a first embodiment, the method may include:

S101,宿主机根据获取到的节点配置文件创建出边缘计算虚拟机;S101, the host creates an edge computing virtual machine based on the obtained node configuration file;

本实施例中,为了方便描述将宿主计算机简称为宿主机。其中,本步骤中可以通过用户的输入获取到节点配置文件。具体的,是通过宿主机中的web管理系统获取到用户输入的配置信息后,将配置信息进行保存得到的节点配置文件,然后根据该节点配置文件创建出边缘计算虚拟机。其中,配置文件包括但不限于内存、CPU、存储路径、存储大小。In this embodiment, for convenience of description, the host computer is simply called the host machine. Among them, in this step, the node configuration file can be obtained through user input. Specifically, after obtaining the configuration information input by the user through the web management system in the host machine, the configuration information is saved into the node configuration file, and then the edge computing virtual machine is created based on the node configuration file. Among them, the configuration file includes but is not limited to memory, CPU, storage path, and storage size.

该边缘计算虚拟机的配置则由节点配置文件控制。节点配置文件中的配置信息可以由web管理系统的默认配置确定,也可以由web管理系统根据预设比例和宿主机配置确定,还可以由用户对web管理系统输入的信息确定。该节点配置文件会影响边缘计算虚拟机的性能,但是总的来说是在宿主机中虚拟出边缘计算虚拟机,该边缘计算虚拟机的硬件性能具有独立性,数据上与宿主机相互隔离,之间相互不影响,可以保证宿主机和虚拟机之间的独立运行。The configuration of the edge computing virtual machine is controlled by the node configuration file. The configuration information in the node configuration file can be determined by the default configuration of the web management system, or can be determined by the web management system based on the preset ratio and host configuration, or can also be determined by the information input by the user to the web management system. This node configuration file will affect the performance of the edge computing virtual machine, but generally speaking, the edge computing virtual machine is virtualized in the host. The hardware performance of the edge computing virtual machine is independent, and the data is isolated from the host. They do not affect each other and can ensure the independent operation of the host machine and the virtual machine.

节点配置文件可以包括虚拟机使用宿主机的CPU的核数以及使用存储空间的大小等。例如,一个PC的处理器为8核的,存储器的存储空间是1TB。在采用PC作为宿主机时,可以在设置信息中设置虚拟机使用的CPU为4核,可以使用的存储空间是500GB。这样,就可以实现在虚拟机运行之后,只使用设置信息中设置对应的硬件资源,其他资源宿主机可以运行其他应用或者程序等。The node configuration file can include the number of cores of the host's CPU used by the virtual machine and the size of the storage space used by the virtual machine. For example, a PC has an 8-core processor and a 1TB memory storage space. When using a PC as the host, you can set the CPU used by the virtual machine to 4 cores in the setting information, and the available storage space is 500GB. In this way, after the virtual machine is running, only the corresponding hardware resources set in the setting information are used, and the host machine with other resources can run other applications or programs.

可以想到的是,本实施例中可以通过节点配置文件对边缘计算虚拟机的性能资源及配置进行调整和控制,以便将虚拟机和宿主机之间形成良好的配合。It is conceivable that in this embodiment, the performance resources and configuration of the edge computing virtual machine can be adjusted and controlled through the node configuration file, so as to form a good cooperation between the virtual machine and the host machine.

S102,根据从服务器接收到的唯一标识将边缘计算虚拟机注册至边缘计算平台;S102, register the edge computing virtual machine to the edge computing platform according to the unique identifier received from the server;

在S101的基础上,本步骤则需要将该边缘计算虚拟机注册于边缘计算平台,而不是将整个宿主机设备注册于边缘计算平台中。需要说明的是,本步骤中将边缘计算虚拟机注册至边缘计算平台的过程,与将边缘计算虚拟机在边缘计算平台中进行激活是类似的,均是通过唯一标识将边缘计算虚拟机记录在边缘计算平台中,使得该边缘计算平台通过该唯一标识或其他标识,对边缘计算虚拟机进行操作。Based on S101, this step requires registering the edge computing virtual machine with the edge computing platform instead of registering the entire host device with the edge computing platform. It should be noted that the process of registering the edge computing virtual machine to the edge computing platform in this step is similar to activating the edge computing virtual machine in the edge computing platform. The edge computing virtual machine is recorded in the edge computing platform through a unique identifier. In the edge computing platform, the edge computing platform uses the unique identifier or other identifier to operate the edge computing virtual machine.

具体的,本步骤中的唯一标识是由服务器向宿主机发送得到的。可以是当宿主机创建完成边缘计算虚拟机后向服务器发送唯一标识请求后,服务器再向宿主机发送该唯一标识。也可以是当宿主机在创建边缘计算虚拟机期间,向服务器发送唯一标识请求后,服务器再向该宿主机发送该唯一标识。还可以是在创建该边缘计算虚拟机之前就向服务器发送该唯一标识请求,以便服务器向该宿主机发送该唯一标识。其中,在创建边缘计算虚拟机之前发送该唯一标识请求,具体可以是获取该节点配置文件的同时发送该唯一标识请求,也可以是下载虚拟机时发送该唯一标识请求。可见,本步骤中获取该唯一标识的方式并不唯一,可以根据实际的情况选择对应的获取方式。只要将边缘计算虚拟机成功注册至边缘计算平台的唯一标识获取方案都可以作为本实施例中的获取方案,在此不做赘述。Specifically, the unique identifier in this step is sent by the server to the host. It may be that after the host computer completes the creation of the edge computing virtual machine, it sends a unique identification request to the server, and then the server sends the unique identification request to the host computer. It can also be that when the host machine sends a unique identification request to the server during the creation of the edge computing virtual machine, the server then sends the unique identification to the host machine. It is also possible to send the unique identification request to the server before creating the edge computing virtual machine, so that the server sends the unique identification to the host. The unique identification request is sent before creating the edge computing virtual machine. Specifically, the unique identification request may be sent while obtaining the node configuration file, or the unique identification request may be sent when downloading the virtual machine. It can be seen that the method of obtaining the unique identifier in this step is not unique, and the corresponding obtaining method can be selected according to the actual situation. As long as the edge computing virtual machine is successfully registered to the edge computing platform, the unique identifier acquisition solution can be used as the acquisition solution in this embodiment, and will not be described again here.

优选的,本步骤还可以包括:Preferably, this step may also include:

当宿主机接收到唯一标识之前,服务器根据平台整体调度信息计算出唯一标识,并将唯一标识发送至宿主机。Before the host receives the unique identifier, the server calculates the unique identifier based on the overall platform scheduling information and sends the unique identifier to the host.

可见,本可选方案中主要是对宿主机如何获取到唯一标识进行说明。具体的,本步骤中主要是通过服务器对平台整体调度信息进行计算,得到唯一标识,然后将该唯一标识发送至该宿主机中。一般的,服务器是在接收到宿主机发送的唯一标识请求时,根据平台整体调度信息计算出该唯一标识。It can be seen that this alternative mainly explains how the host obtains the unique identifier. Specifically, in this step, the server calculates the overall scheduling information of the platform, obtains a unique identifier, and then sends the unique identifier to the host. Generally, when the server receives the unique identification request sent by the host, it calculates the unique identification based on the overall platform scheduling information.

S103,将边缘计算业务程序部署至边缘计算虚拟机,使得虚拟机成为计算节点。S103: Deploy the edge computing business program to the edge computing virtual machine, making the virtual machine become a computing node.

在S102的基础上,本步骤旨在将边缘计算业务程序部署至边缘计算虚拟机,也就是使边缘计算虚拟机具有进行边缘计算的功能。Based on S102, this step aims to deploy the edge computing business program to the edge computing virtual machine, that is, to enable the edge computing virtual machine to have the function of performing edge computing.

通常来说实现对应的功能,需要多种插件模块共同作用。以IaaS(Infrastructureas a Service基础设施即服务)业务功能举例,边缘计算业务程序可以包括基础插件模块和IaaS业务插件模块。其中,基础插件模块包括业务管理系统,用于存储隔离、存储管理、流量监控、进程隔离、网络隔离以及各类安全监控。以上功能模块,可以根据需要进行执行,执行方式可以选择并列执行,也可以是先后顺序执行。例如,对网络进行流量监控,对进程进行隔离。并且,基础插件模块中的业务管理系统可以调度、部署、管理IaaS业务插件,以便在边缘计算虚拟机中部署新的IaaS业务,并根据需求调度新的IaaS业务,并对已存在的IaaS业务进行管理。业务管理系统主要是通过IaaS业务插件模块对IaaS业务实现管理。该IaaS业务插件模块包括各类业务插件程序,用于执行不同的IaaS业务。Generally speaking, realizing corresponding functions requires the cooperation of multiple plug-in modules. Taking the IaaS (Infrastructure as a Service) business function as an example, the edge computing business program can include basic plug-in modules and IaaS business plug-in modules. Among them, the basic plug-in module includes a business management system, which is used for storage isolation, storage management, traffic monitoring, process isolation, network isolation and various security monitoring. The above functional modules can be executed as needed, and the execution method can be selected to be executed in parallel or sequentially. For example, monitor network traffic and isolate processes. Moreover, the business management system in the basic plug-in module can schedule, deploy, and manage IaaS business plug-ins to deploy new IaaS services in edge computing virtual machines, schedule new IaaS services according to needs, and perform existing IaaS services manage. The business management system mainly manages the IaaS business through the IaaS business plug-in module. The IaaS business plug-in module includes various business plug-in programs for executing different IaaS services.

可以想到的是,本步骤中还可以部署其他业务功能的程序,以便实现不同的业务功能,具体的在此不做赘述。It is conceivable that in this step, other business function programs can also be deployed in order to realize different business functions, and details will not be described here.

优选的,本步骤还可以包括:Preferably, this step may also include:

采集边缘计算业务程序的数据,将数据上传至边缘计算平台,以便对边缘计算节点进行监控。Collect data from edge computing business programs and upload the data to the edge computing platform to monitor edge computing nodes.

可见,通过本可选方案可以对该边缘计算节点实现良好的监控和管理。其中,获取到的数据包括但不限于边缘计算业务程序的性能数据、网络数据、数据处理状态数据。It can be seen that this optional solution can achieve good monitoring and management of the edge computing node. Among them, the obtained data includes but is not limited to performance data, network data, and data processing status data of edge computing business programs.

同时,由于边缘计算虚拟机未独占宿主机的全部硬件资源,在宿主机中存在未使用的硬件资源。因此,可以在不考虑宿主机的硬件使用情况下,对边缘计算虚拟机进行调整。At the same time, because the edge computing virtual machine does not exclusively occupy all the hardware resources of the host, there are unused hardware resources in the host. Therefore, edge computing virtual machines can be tuned without considering the hardware usage of the host machine.

本实施例中,首先根据配置文件在宿主机中创建出边缘计算虚拟机,然后通过服务器分配的唯一标识将该边缘计算虚拟机注册至边缘计算平台中,而不是将宿主机整体注册至边缘计算平台中,最后将将边缘计算业务程序部署至边缘计算虚拟机,使得该边缘计算虚拟机具备边缘计算节点的功能,而不是将宿主机的全部硬件部署为边缘计算节点,可见,通过虚拟机的方式在宿主机中部署了一个边缘计算节点,实现边缘计算,并且该节点与宿主机之间的数据等相互隔离,不会侵占虚拟机之外的硬件资源,避免将宿主机的所有硬件资源进行独占,并且可以不考虑宿主机的情况单独对虚拟机进行调整,提高了节点的管控效率,将边缘节点更安全、便捷、高效的接入边缘计算网络中。In this embodiment, an edge computing virtual machine is first created in the host machine according to the configuration file, and then the edge computing virtual machine is registered to the edge computing platform through a unique identifier assigned by the server, instead of registering the entire host machine to the edge computing platform. In the platform, the edge computing business program will finally be deployed to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, instead of deploying all the hardware of the host machine as an edge computing node. It can be seen that through the virtual machine This method deploys an edge computing node in the host machine to implement edge computing, and the data between the node and the host machine are isolated from each other, which will not occupy the hardware resources other than the virtual machine and avoid all the hardware resources of the host machine. It is exclusive and can adjust virtual machines independently without considering the host situation, which improves the management and control efficiency of nodes and connects edge nodes to the edge computing network more safely, conveniently and efficiently.

作为一种优选实施例,请参考图2,图2为本发明第一实施例中创建虚拟机的流程示意图。As a preferred embodiment, please refer to Figure 2, which is a schematic flowchart of creating a virtual machine in the first embodiment of the present invention.

上述根据获取到的节点配置文件创建出边缘计算虚拟机的过程,可以包括:The above process of creating an edge computing virtual machine based on the obtained node configuration file may include:

S201,宿主机通过web管理系统接收到输入的配置信息;其中,配置信息包括内存、CPU、存储路径、存储大小;将配置信息保存为节点配置文件;S201: The host receives the input configuration information through the web management system; the configuration information includes memory, CPU, storage path, and storage size; saves the configuration information as a node configuration file;

本步骤旨在通过web管理系统,也就是通过基于网页的管理系统接收用户输入的配置信息,将该配置信息作为节点配置文件进行保存,也就是服务器的本地磁盘保存到了对应的节点配置文件。其中,配置信息包括内存、CPU、存储路径、存储大小。This step aims to receive the configuration information input by the user through the web management system, that is, through the web-based management system, and save the configuration information as a node configuration file, that is, the local disk of the server is saved to the corresponding node configuration file. Among them, the configuration information includes memory, CPU, storage path, and storage size.

其中,配置信息的输入方式可以是用户通过计算机设备直接进行输入,也可以用户远程进行输入后将配置信息发送至该web管理管理系统,还可以是通过网络从对端设备发送来的配置信息。The input method of the configuration information can be that the user directly inputs through the computer device, or the user can remotely input the configuration information and then send the configuration information to the web management system, or it can also be the configuration information sent from the peer device through the network.

可以想到的是,本实施例中用户也可以通过该web管理系统对宿主机中的边缘计算虚拟机进行进一步的管理和调整。因此,该web管理系统包括但不限于虚拟机配置管理页面、虚拟机数据展示页面以及虚拟机控制管理页面。It is conceivable that in this embodiment, the user can also further manage and adjust the edge computing virtual machine in the host machine through the web management system. Therefore, the web management system includes but is not limited to a virtual machine configuration management page, a virtual machine data display page, and a virtual machine control management page.

S202,通过预设接口将节点配置文件发送至虚拟机管理程序;S202: Send the node configuration file to the virtual machine management program through the preset interface;

在S201的基础上,本步骤旨在通过预设的接口将该节点配置文件从web管理系统发送至该宿主机中的虚拟机管理程序。其中,预设接口可以是API(ApplicationProgramming Interface应用程序接口)接口,是宿主机创建好虚拟机管理程序后以server形式开放的API接口。Based on S201, this step aims to send the node configuration file from the web management system to the virtual machine management program in the host through a preset interface. Among them, the preset interface may be an API (Application Programming Interface) interface, which is an API interface opened in the form of a server after the host creates a virtual machine management program.

S203,控制虚拟机管理程序根据节点配置文件中的配置信息执行虚拟机创建操作,得到边缘计算虚拟机。S203. Control the virtual machine management program to perform a virtual machine creation operation according to the configuration information in the node configuration file to obtain an edge computing virtual machine.

在S202的基础上,本步骤旨在控制虚拟机管理程序根据节点配置文件中的配置信息执行虚拟机创建操作,得到边缘计算虚拟机。即本步骤中主要是通过虚拟机管理程序的操作创建出该边缘计算虚拟机。其中,虚拟机管理程序可以采用现有技术提供的任意一种虚拟机管理程序,在此不做具体限定。Based on S202, this step aims to control the virtual machine hypervisor to perform a virtual machine creation operation based on the configuration information in the node configuration file to obtain an edge computing virtual machine. That is, in this step, the edge computing virtual machine is mainly created through the operation of the virtual machine hypervisor. Among them, the virtual machine hypervisor can be any virtual machine hypervisor provided by the existing technology, and is not specifically limited here.

优选的,本步骤可以包括:Preferably, this step may include:

步骤1,宿主机判断本地是否存在虚拟机程序;若是,则执行步骤2;若否,则执行步骤3;Step 1: The host determines whether there is a virtual machine program locally; if so, perform step 2; if not, perform step 3;

步骤2,控制虚拟机管理程序根据节点配置文件创建出边缘计算虚拟机;Step 2: Control the hypervisor to create an edge computing virtual machine based on the node configuration file;

步骤3,下载目标虚拟机程序;控制虚拟机管理程序根据目标虚拟机程序和节点配置文件创建出边缘计算虚拟机。Step 3: Download the target virtual machine program; control the virtual machine management program to create an edge computing virtual machine based on the target virtual machine program and node configuration file.

可见,本可选方案中主要是判断该宿主机中是否已经存在虚拟机程序。该虚拟机程序包括但不限于vitrualbox,vmware,hyper-v。如果存在则可以直接使用创建出该边缘计算虚拟机。如果不存在则需要下载对应的目标虚拟机,最后控制虚拟机管理程序根据目标虚拟机程序和节点配置文件创建出边缘计算虚拟机。It can be seen that this optional solution mainly determines whether a virtual machine program already exists in the host machine. The virtual machine programs include but are not limited to vitrualbox, vmware, hyper-v. If it exists, you can directly use it to create the edge computing virtual machine. If it does not exist, you need to download the corresponding target virtual machine, and finally control the virtual machine management program to create an edge computing virtual machine based on the target virtual machine program and node configuration file.

可见,本实施例通过首先根据该宿主机对应的节点配置文件在宿主机中创建出边缘计算虚拟机,确保将边缘计算节点部署至该边缘计算虚拟机中,以便保证宿主机与边缘计算节点之间的隔离性以及安全性。It can be seen that this embodiment ensures that the edge computing node is deployed to the edge computing virtual machine by first creating an edge computing virtual machine in the host according to the node configuration file corresponding to the host, so as to ensure that the connection between the host and the edge computing node is isolation and security.

基于上述各实施例,本发明提供了一种更为具体的边缘计算节点部署方法。Based on the above embodiments, the present invention provides a more specific edge computing node deployment method.

参照图3,图3为本发明第二实施例的流程示意图。Referring to Figure 3, Figure 3 is a schematic flow chart of a second embodiment of the present invention.

在第二实施例中,本方案应用的具体场景包括宿主机,虚拟机管理程序,虚拟机,边缘计算业务程序,web管理系统。In the second embodiment, the specific application scenarios of this solution include host machines, virtual machine hypervisors, virtual machines, edge computing business programs, and web management systems.

其中,宿主机,即当前需要接入的节点,包括个人pc电脑,闲置服务器、专业矿机等设备,通过虚拟化技术,可以作为共享节点接入边缘计算web管理系统,为用户提供虚拟机操作入口,包括虚拟机启停,输入配置设置,收益查看等;虚拟机管理程序,根据不同的宿主机操作系统,下载、安装不同的虚拟机和虚拟机镜像,并且完成对虚拟机的创建、启停、限速、磁盘管理等操作;虚拟机模块,虚拟机包括vitrualbox,vmware,hyper-v等虚拟化方案,已经配套的虚拟机镜像包。Among them, the host machine, that is, the node that currently needs to be accessed, includes personal PCs, idle servers, professional mining machines and other equipment. Through virtualization technology, it can be used as a shared node to access the edge computing web management system to provide users with virtual machine operations. The portal includes starting and stopping virtual machines, entering configuration settings, viewing revenue, etc.; the virtual machine management program downloads and installs different virtual machines and virtual machine images according to different host operating systems, and completes the creation and startup of virtual machines. Stop, speed limit, disk management and other operations; virtual machine module, virtual machines include virtualbox, vmware, hyper-v and other virtualization solutions, and supporting virtual machine image packages.

其中,边缘计算业务程序包括基础插件模块,IaaS业务插件模块。基础插件模块,包括业务管理系统,存储隔离和存储管理,流量监控,进程隔离,网络隔离,以及各类安全监控;IaaS业务插件模块,包括各类业务插件程序,基础模插件中的业务管理系统会调度、部署、管理IaaS业务插件。Among them, the edge computing business program includes basic plug-in modules and IaaS business plug-in modules. The basic plug-in module includes business management system, storage isolation and storage management, traffic monitoring, process isolation, network isolation, and various security monitoring; the IaaS business plug-in module includes various business plug-in programs and the business management system in the basic module plug-in Can schedule, deploy, and manage IaaS business plug-ins.

在此基础上,本实施例中该方法可以包括:On this basis, the method in this embodiment may include:

S301,宿主机通过web管理系统接收到用户输入的配置信息;其中,配置信息包括内存、CPU、存储路径、存储大小;并将配置信息保存为节点配置文件;S301: The host receives the configuration information input by the user through the web management system; the configuration information includes memory, CPU, storage path, and storage size; and saves the configuration information as a node configuration file;

S302,web管理系统自动下载安装虚拟机管理程序,并引导该用户启动虚拟机管理程序;S302, the web management system automatically downloads and installs the virtual machine management program, and guides the user to start the virtual machine management program;

S303,虚拟机管理程序启动后会以server形式对外开放预设接口,web管理系统将保存的节点配置文件发送给虚拟机管理程序;S303, after the virtual machine management program is started, the preset interface will be opened to the outside world in the form of a server, and the web management system will send the saved node configuration file to the virtual machine management program;

S304,虚拟机管理程序接受节点配置文件后,自动下载虚拟机,然后根据虚拟机配置信息,创建、启动边缘计算虚拟机;S304, after the virtual machine management program accepts the node configuration file, it automatically downloads the virtual machine, and then creates and starts the edge computing virtual machine according to the virtual machine configuration information;

S305,通过web管理系统输入设备激活码,虚拟机管理程序调用边缘计算虚拟机对外提供的激活接口,以便激活该边缘计算虚拟机,使该边缘计算虚拟机成为唯一标识的边缘计算节点;S305, input the device activation code through the web management system, and the virtual machine management program calls the activation interface provided by the edge computing virtual machine to activate the edge computing virtual machine, so that the edge computing virtual machine becomes a uniquely identified edge computing node;

S306,边缘计算虚拟机启动后,对该边缘计算部署并启动基础插件模块;S306: After the edge computing virtual machine is started, deploy and start the basic plug-in module for the edge computing;

S307,当该基础插件模块启动后,从服务器端调度并部署IaaS业务程序,同时采集各类IaaS业务插件数据。S307: After the basic plug-in module is started, schedule and deploy the IaaS business program from the server side, and collect various IaaS business plug-in data at the same time.

可见,本实施例首先根据该宿主机对应的节点配置文件在宿主机中创建出边缘计算虚拟机,然后通过服务器分配的唯一标识将该边缘计算虚拟机注册至边缘计算平台中,而不是将宿主机整体注册至边缘计算平台中,最后将将边缘计算业务程序部署至边缘计算虚拟机,使得该边缘计算虚拟机具备边缘计算节点的功能,而不是将宿主机的全部硬件部署为边缘计算节点,可见,通过虚拟机在宿主机中部署了一个边缘计算节点,实现边缘计算,并且该节点与宿主机之间相互隔离,不会侵占虚拟机之外的硬件资源,避免将宿主机的所有硬件资源进行独占,并且可以不考虑宿主机的情况单独对虚拟机进行调整,提高了节点的管控效率,将边缘节点更安全、便捷、高效的接入边缘计算网络中。It can be seen that this embodiment first creates an edge computing virtual machine in the host machine according to the node configuration file corresponding to the host machine, and then registers the edge computing virtual machine into the edge computing platform through the unique identifier assigned by the server, instead of registering the edge computing virtual machine with the host machine. The host is registered as a whole into the edge computing platform, and finally the edge computing business program is deployed to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, instead of deploying all the hardware of the host machine as an edge computing node. It can be seen that an edge computing node is deployed in the host machine through the virtual machine to implement edge computing, and the node and the host machine are isolated from each other and will not occupy hardware resources other than the virtual machine and avoid all hardware resources of the host machine. Exclusively, and the virtual machine can be adjusted independently without considering the host situation, which improves the efficiency of node management and control, and connects edge nodes to the edge computing network more safely, conveniently and efficiently.

参照图4,图4为本发明第一实施例揭露的计算机装置的内部结构示意图。Referring to FIG. 4, FIG. 4 is a schematic diagram of the internal structure of the computer device disclosed in the first embodiment of the present invention.

在本实施例中,计算机装置1可以是PC(Personal Computer,个人电脑),也可以是智能手机、平板电脑、掌上电脑、便携计算机、智能路由器、矿机、网络存储设备、终端设备。In this embodiment, the computer device 1 may be a PC (Personal Computer, personal computer), or may be a smartphone, a tablet computer, a handheld computer, a portable computer, a smart router, a mining machine, a network storage device, or a terminal device.

该计算机装置1可以包括存储器11、处理器12和总线13。The computer device 1 may include a memory 11 , a processor 12 and a bus 13 .

其中,存储器11至少包括一种类型的可读存储介质,可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、磁性存储器、磁盘、光盘等。存储器11在一些实施例中可以是计算机装置1的内部存储单元,例如该计算机装置1的硬盘。存储器11在另一些实施例中也可以是计算机装置1的外部存储设备,例如计算机装置1上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器11还可以既包括计算机装置1的内部存储单元也包括外部存储设备。存储器11不仅可以用于存储安装于计算机装置1的应用软件及各类数据,例如数据通信程序的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。The memory 11 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may be an internal storage unit of the computer device 1 in some embodiments, such as a hard disk of the computer device 1 . In other embodiments, the memory 11 may also be an external storage device of the computer device 1, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), or a secure digital (SD) equipped on the computer device 1. card, flash card, etc. Further, the memory 11 may also include both an internal storage unit of the computer device 1 and an external storage device. The memory 11 can be used not only to store application software installed on the computer device 1 and various types of data, such as codes for data communication programs, but also to temporarily store data that has been output or is to be output.

处理器12在一些实施例中可以是一中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器或其他数据处理芯片,用于运行存储器11中存储的程序代码或处理数据,例如执行边缘计算节点部署程序等。In some embodiments, the processor 12 may be a central processing unit (CPU), a controller, a microcontroller, a microprocessor or other data processing chips for running program codes or processes stored in the memory 11 Data, such as executing edge computing node deployment procedures, etc.

该总线13可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图4中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 13 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus. The bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in Figure 4, but it does not mean that there is only one bus or one type of bus.

可选的,该计算机装置1可以是组成CDN网络(Content Delivery Network,内容分发网络)或者区块链网络的节点。Optionally, the computer device 1 may be a node constituting a CDN network (Content Delivery Network, content distribution network) or a blockchain network.

进一步地,计算机装置1还可以包括网络接口,网络接口可选的可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该计算机装置1与其他电子设备之间建立通信连接。Further, the computer device 1 may also include a network interface. The network interface may optionally include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which are usually used to communicate between the computer device 1 and other electronic devices. establish a communication connection between them.

可选地,该计算机装置1还可以包括用户接口,用户接口可以包括显示器(Display)、输入单元比如键盘(Keyboard),可选的用户接口还可以包括标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在计算机装置1中处理的信息以及用于显示可视化的用户界面。Optionally, the computer device 1 may also include a user interface, which may include a display (Display) and an input unit such as a keyboard (Keyboard). The optional user interface may also include a standard wired interface and a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, or the like. The display, which may also be appropriately referred to as a display screen or a display unit, is used for displaying information processed in the computer device 1 and for displaying a visual user interface.

图4仅示出了具有组件11-13以及边缘计算节点部署程序的计算机装置1,本领域技术人员可以理解的是,图4示出的结构并不构成对计算机装置1的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。Figure 4 only shows the computer device 1 with the components 11-13 and the edge computing node deployment program. Those skilled in the art can understand that the structure shown in Figure 4 does not constitute a limitation to the computer device 1, and may include other configurations. The figures illustrate fewer or more components, or combinations of certain components, or different arrangements of components.

本发明提供的一种边缘计算节点部署系统。The invention provides an edge computing node deployment system.

参照图5,图5为本发明所提供的第三实施例的结构框图。Referring to Figure 5, Figure 5 is a structural block diagram of a third embodiment provided by the present invention.

在第四实施例中,该数据通信系统可以包括:In a fourth embodiment, the data communication system may include:

虚拟机创建模块100,用于根据获取到的节点配置文件创建出边缘计算虚拟机;The virtual machine creation module 100 is used to create an edge computing virtual machine according to the obtained node configuration file;

虚拟机激活模块200,用于根据从服务器接收到的唯一标识将边缘计算虚拟机注册至边缘计算平台;The virtual machine activation module 200 is used to register the edge computing virtual machine to the edge computing platform according to the unique identification received from the server;

节点部署模块300,用于将边缘计算业务程序部署至边缘计算虚拟机,以便将宿主机的部分硬件性能部署为边缘计算节点。The node deployment module 300 is used to deploy edge computing business programs to edge computing virtual machines, so as to deploy part of the hardware performance of the host machine as edge computing nodes.

本发明实施例还提供一种计算机可读存储介质,该计算机可读存储介质上数据通信程序,该数据通信程序可被一个或者多个处理器执行,以实现如以上任一实施例的边缘计算节点部署方法的步骤。Embodiments of the present invention also provide a computer-readable storage medium with a data communication program on the computer-readable storage medium. The data communication program can be executed by one or more processors to implement edge computing as in any of the above embodiments. Steps of the node deployment method.

本发明实施例还提供一种计算机程序产品,该计算机程序产品包括计算机指令,当其在计算机上运行时,使得计算机可以执行上述任一实施例所述的边缘计算节点部署方法的步骤。Embodiments of the present invention also provide a computer program product, which includes computer instructions that, when run on a computer, enable the computer to execute the steps of the edge computing node deployment method described in any of the above embodiments.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product.

所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with the embodiments of the present invention are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) means. The computer-readable storage medium may be any available medium that a computer can store, or a data storage device such as a server or data center integrated with one or more available media. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), etc.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的设备和系统的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, the specific working processes of the above-described equipment and systems can be referred to the corresponding processes in the foregoing method embodiments, and will not be described again here.

在本申请所提供的几个实施例中,应该理解到,所揭露的设备,系统和方法,可以通过其它的方式实现。例如,以上所描述的系统实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices, systems and methods can be implemented in other ways. For example, the system embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit. The above integrated units can be implemented in the form of hardware or software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code.

需要说明的是,上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。并且本文中的术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、装置、物品或者方法中还存在另外的相同要素。It should be noted that the above serial numbers of the embodiments of the present invention are only for description and do not represent the advantages and disadvantages of the embodiments. and the terms "comprises," "comprises" or any other variations thereof herein are intended to cover a non-exclusive inclusion such that a process, apparatus, article or method that includes a list of elements includes not only those elements, but also includes not expressly other elements listed, or may also include elements inherent to the process, apparatus, article or method. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, apparatus, article or method that includes that element.

Claims (10)

1. A method of edge computing node deployment, the method comprising:
the host creates an edge computing virtual machine according to the obtained node configuration file; wherein the edge computing virtual machine is registered based on a portion of the resources of the host machine, rather than registering the host machine as a whole into an edge computing platform;
registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
an edge computing service program is deployed to the edge computing virtual machine to deploy a portion of the hardware capabilities of the host machine as edge computing nodes.
2. The edge computing node deployment method of claim 1 wherein the host creates an edge computing virtual machine from the acquired node configuration file, comprising:
the host receives the input configuration information through the web management system; the configuration information comprises a memory, a CPU, a storage path and a storage size;
saving the configuration information as the node configuration file;
and creating the edge computing virtual machine according to the node configuration file.
3. The edge computing node deployment method of claim 2, wherein creating the edge computing virtual machine from the node configuration file comprises:
the node configuration file is sent to a virtual machine management program through a preset interface;
and controlling the virtual machine management program to execute virtual machine creation operation according to the configuration information in the node configuration file to obtain the edge computer virtual machine.
4. The edge computing node deployment method of claim 2, wherein creating the edge computing virtual machine from the node configuration file comprises:
the host machine judges whether a virtual machine program exists locally;
if yes, controlling a virtual machine management program to create the edge computing virtual machine according to the node configuration file;
if not, downloading the target virtual machine program; and the control virtual machine management program creates the edge computing virtual machine according to the target virtual machine program and the node configuration file.
5. The edge computing node deployment method of claim 1, further comprising:
before the host receives the unique identifier, the server calculates the unique identifier according to the overall platform scheduling information;
and sending the unique identification to the host.
6. The edge computing node deployment method of claim 1, further comprising:
and collecting data of the edge computing service program, and uploading the data to the edge computing platform so as to monitor edge computing nodes.
7. A computer apparatus comprising a memory and a processor, the memory having stored thereon an edge computing node deployment program executable on the processor, the edge computing node deployment program when executed by the processor implementing the steps of the edge computing node deployment method of any of claims 1 to 6.
8. The apparatus of claim 7, wherein the computer means is a node comprising a CDN network or a blockchain network.
9. An edge computing node deployment system, the system comprising:
the virtual machine creation module is used for creating an edge computing virtual machine according to the obtained node configuration file; the edge computing virtual machine is registered based on partial resources of the host machine, and the host machine is not integrally registered in the edge computing platform;
the virtual machine activation module is used for registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
the node deployment module is used for deploying the edge computing service program to the edge computing virtual machine so as to deploy part of hardware performance of the host machine as an edge computing node.
10. A computer readable storage medium having stored thereon an edge computing node deployment program executable by one or more processors to implement the steps of the edge computing node deployment method of any of claims 1 to 6.
CN202010641178.XA 2020-07-06 2020-07-06 An edge computing node deployment method and related devices Active CN111800506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010641178.XA CN111800506B (en) 2020-07-06 2020-07-06 An edge computing node deployment method and related devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010641178.XA CN111800506B (en) 2020-07-06 2020-07-06 An edge computing node deployment method and related devices

Publications (2)

Publication Number Publication Date
CN111800506A CN111800506A (en) 2020-10-20
CN111800506B true CN111800506B (en) 2023-09-19

Family

ID=72811263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010641178.XA Active CN111800506B (en) 2020-07-06 2020-07-06 An edge computing node deployment method and related devices

Country Status (1)

Country Link
CN (1) CN111800506B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114513770B (en) * 2020-10-29 2024-01-30 伊姆西Ip控股有限责任公司 Method, system and medium for deploying application
CN112506659B (en) * 2020-12-10 2023-09-22 腾讯科技(深圳)有限公司 Management method of edge equipment and related device
CN112422352B (en) * 2021-01-25 2021-04-20 华东交通大学 Edge computing node deployment method based on user data hotspot distribution
CN113595899A (en) * 2021-06-30 2021-11-02 上海云轴信息科技有限公司 Method and system for realizing multi-node point cloud routing
CN113726547B (en) * 2021-07-14 2023-08-15 阿里巴巴新加坡控股有限公司 Network system, network configuration method and device
CN114090246B (en) * 2021-11-17 2022-10-18 苏州和氏设计营造股份有限公司 Method and device for processing data of displayed and aged artwork based on big data
CN113821009B (en) * 2021-11-24 2022-03-11 北京和利时系统工程有限公司 Edge controller and quality detection system
CN114339727B (en) * 2021-12-29 2023-08-15 中国联合网络通信集团有限公司 Edge platform, configuration method, device, terminal and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611704A (en) * 2012-03-20 2012-07-25 广东电子工业研究院有限公司 Cloud computing node registering system and cloud computing node registering method
CN102929687A (en) * 2012-10-12 2013-02-13 山东省计算中心 Energy-saving virtual machine placement method for cloud computing data center
CN102958166A (en) * 2011-08-29 2013-03-06 华为技术有限公司 Resource allocation method and resource management platform
CN103037002A (en) * 2012-12-21 2013-04-10 中标软件有限公司 Method and system for arranging server cluster in cloud computing cluster environment
CN103389909A (en) * 2012-05-09 2013-11-13 上海幻维数码创意科技有限公司 Rendering farm node virtualization deployment system and application thereof
CN103780433A (en) * 2014-02-18 2014-05-07 成都致云科技有限公司 Self-healing type virtual resource configuration management data architecture
CN104410699A (en) * 2014-12-04 2015-03-11 武汉邮电科学研究院 Resource management method and system of open type cloud computing
CN104767741A (en) * 2015-03-24 2015-07-08 杭州安恒信息技术有限公司 A Computing Service Separation and Security Protection System Based on Lightweight Virtual Machine
CN106445733A (en) * 2016-08-30 2017-02-22 广州鼎甲计算机科技有限公司 KVM virtualization-based agency mode-free backup method and system
CN109471714A (en) * 2017-09-07 2019-03-15 龙芯中科技术有限公司 Platform deployment method, apparatus, equipment and storage medium
CN110517138A (en) * 2019-08-20 2019-11-29 深圳市网心科技有限公司 Intelligent contract processing method, device, computer equipment and storage medium
CN110784361A (en) * 2019-10-31 2020-02-11 国网河南省电力公司电力科学研究院 Virtualized cloud honeynet deployment method, device, system and computer-readable storage medium
WO2020116223A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
WO2020116221A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801128B2 (en) * 2006-03-31 2010-09-21 Amazon Technologies, Inc. Managing communications between computing nodes
WO2012031112A2 (en) * 2010-09-03 2012-03-08 Time Warner Cable, Inc. Methods and systems for managing a virtual data center with embedded roles based access control
US10097410B2 (en) * 2014-06-26 2018-10-09 Vmware, Inc. Methods and apparatus to scale application deployments in cloud computing environments
US11582090B2 (en) * 2018-08-20 2023-02-14 Vmware, Inc. Service chaining of virtual network functions in a cloud computing system
US11824784B2 (en) * 2019-12-20 2023-11-21 Intel Corporation Automated platform resource management in edge computing environments

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102958166A (en) * 2011-08-29 2013-03-06 华为技术有限公司 Resource allocation method and resource management platform
CN102611704A (en) * 2012-03-20 2012-07-25 广东电子工业研究院有限公司 Cloud computing node registering system and cloud computing node registering method
CN103389909A (en) * 2012-05-09 2013-11-13 上海幻维数码创意科技有限公司 Rendering farm node virtualization deployment system and application thereof
CN102929687A (en) * 2012-10-12 2013-02-13 山东省计算中心 Energy-saving virtual machine placement method for cloud computing data center
CN103037002A (en) * 2012-12-21 2013-04-10 中标软件有限公司 Method and system for arranging server cluster in cloud computing cluster environment
CN103780433A (en) * 2014-02-18 2014-05-07 成都致云科技有限公司 Self-healing type virtual resource configuration management data architecture
CN104410699A (en) * 2014-12-04 2015-03-11 武汉邮电科学研究院 Resource management method and system of open type cloud computing
CN104767741A (en) * 2015-03-24 2015-07-08 杭州安恒信息技术有限公司 A Computing Service Separation and Security Protection System Based on Lightweight Virtual Machine
CN106445733A (en) * 2016-08-30 2017-02-22 广州鼎甲计算机科技有限公司 KVM virtualization-based agency mode-free backup method and system
CN109471714A (en) * 2017-09-07 2019-03-15 龙芯中科技术有限公司 Platform deployment method, apparatus, equipment and storage medium
WO2020116223A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
WO2020116221A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
CN110517138A (en) * 2019-08-20 2019-11-29 深圳市网心科技有限公司 Intelligent contract processing method, device, computer equipment and storage medium
CN110784361A (en) * 2019-10-31 2020-02-11 国网河南省电力公司电力科学研究院 Virtualized cloud honeynet deployment method, device, system and computer-readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
云数据中心I/O资源池化;王展;安学军;;集成技术(第01期);全文 *
网络功能虚拟化技术研究综述;周伟林;杨芫;徐明伟;;计算机研究与发展(第04期);全文 *

Also Published As

Publication number Publication date
CN111800506A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN111800506B (en) An edge computing node deployment method and related devices
CN112148422B (en) A method and device for IO processing
KR101369428B1 (en) Application management apparatus and method for mobile terminal for supporting different type guest operating system
US20130055254A1 (en) Methods and apparatuses for providing a virtual machine with dynamic assignment of a physical hardware resource
CN110908753B (en) Intelligent fusion cloud desktop server, client and system
CN109168328B (en) Method, device and virtualization system for virtual machine migration
CN103761088A (en) Multiple operation system switching method applicable to ARM (advanced risc machine) framework mobile equipment
JP2012078893A (en) Computer system and management computer
US11671379B1 (en) System and method for subscription management using dynamically composed management entities
US9448807B2 (en) Automatic creation, deployment, and upgrade of disk images
CN113934437B (en) Method, system and client cloud phone for installing applications on cloud phone
WO2017107483A1 (en) Load balancing method for virtualized network management file downloading, and network management server
CN111209080A (en) Transparent transmission method for graphic processor
US10318343B2 (en) Migration methods and apparatuses for migrating virtual machine including locally stored and shared data
CN110677464A (en) Edge node device, content distribution system, method, computer device, and medium
CN114281444A (en) Arrangement method for implementing cloud desktop client
CN103677962B (en) Desktop delivery device based on Intel Virtualization Technology realize system and method
CN109600439B (en) Microservice-based PaaS platform deployment method and PaaS platform
CN104468811A (en) Upgrading method and device
CN108563472B (en) Method and device for loading service plug-in based on multi-open application
CN106776347A (en) A kind of virtualization system mirror image mounting test system and method
CN108881504A (en) A kind of hardware information automatic acquiring method and device
CN111082982B (en) Data transmission method, electronic device, system and medium
CN109857408A (en) Application dispositions method, device, equipment, system and the readable storage medium storing program for executing of terminal
CN114020404B (en) A cloud platform-based application deployment method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant