CN103152389A - Method and system of responding peak access in cloud computer system - Google Patents

Method and system of responding peak access in cloud computer system Download PDF

Info

Publication number
CN103152389A
CN103152389A CN2013100413067A CN201310041306A CN103152389A CN 103152389 A CN103152389 A CN 103152389A CN 2013100413067 A CN2013100413067 A CN 2013100413067A CN 201310041306 A CN201310041306 A CN 201310041306A CN 103152389 A CN103152389 A CN 103152389A
Authority
CN
China
Prior art keywords
access
cloud computing
computing machine
data
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100413067A
Other languages
Chinese (zh)
Inventor
范冰冰
郑伟平
刘子锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Normal University
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN2013100413067A priority Critical patent/CN103152389A/en
Publication of CN103152389A publication Critical patent/CN103152389A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention belongs to the field of cloud computer system application, and particularly discloses a method of responding peak access in a cloud computer system. The method of responding the peak access in the cloud computer system comprises the following steps: intercepting all access request data at the position of an access point of the cloud computer system, and recording operating data of an operative virtual machine example; predicting access amount of an upcoming predicted point of the cloud computer system according to the access request data; sending an order of building an virtual machine when the predicted access amount is larger than a set value, and selecting a virtual machine example with minimum resource occupation to serve as a target virtual machine used for processing requests, and returning the virtual machine example to the access point so as to carry out processing according to the operating data of the operative virtual machine example. By active load prediction of an access peak, the cloud computer system can start enough resources such as virtual machines to carry out load balancing before the access peak arrives, and really achieves intellectualization and automation of resource scheduling.

Description

Be applied to the method and apparatus of reply peak access in cloud computing machine system
Technical field
The invention belongs to the application of cloud computing machine system, specifically, relate to a kind of method and device that is applied to reply peak access in cloud computing machine system.
Background technology
Cloud computing just has been subject to the strong interest of Global Academy, industrial quarters, and has surpassed rapidly grid computing since 2007 are suggested.About the unofficial definition of cloud computing hundreds of, at present comparatively popular comprising is following several.
Wikipedia is defined as cloud computing: " cloud computing is a kind of account form of Internet-based, and in this way, the software and hardware resources of sharing and information can offer computer and other equipment as required.A kind of new IT service increase, use and delivery mode of Internet-based described in cloud computing, and being usually directed to provides dynamically easily expansion and be often virtualized resource by the Internet.Typical cloud computing provider often provides general Network to use, and can visit by the software such as browser or other Web services, and software and data all is stored on server.The key element of cloud computing key comprises that also the Extraordinary user experiences ".
The definition that IBM makes cloud computing in the Technical White Paper for ××× of issue in 2007: " cloud computing is a term that is used for describing certain platform or certain application.Cloud computing platform Dynamical Deployment (provision), configuration (configuration) as required, reconfigure (reconfigure) and cancel deployment server.The server of cloud computing platform can be physics or virtual server.Senior cloud computing platform can comprise other computational resource, as storage area network, the network equipment, fire compartment wall and other safety means.Cloud computing has been described some equally can be by the extendible application program that is accessed to.These cloud computing application programs are come support applications and service with large-scale data center and powerful server.Any equipment that has interface and a standard browser is addressable cloud computing application program all.
Comprehensive above definition, can roughly be summarised as: cloud computing is the product that the traditional calculations machine technology such as grid computing, Distributed Calculation, parallel computation, the network storage, virtual and load balancing and network technical development merge, can be with resource consolidations such as huge system, servers together, so that all kinds of services of high-performance, strong computing capability to be provided; A kind of brand-new computation schema and computing architecture.
Cloud computing is the important component part of generation information technical industry, is the tide of information technology for the third time after personal computer, the Internet, with the essence change of solicited message industry business model.Along with the development of cloud computing and ripe gradually, various novel application begin to introduce cloud computing service, and the construction method of website will turn to from single exploitation, deployment, server or hosting and take the website as core application, construction that have the cloud computing system of distributed environment and outstanding dispatching and load balancing.
As the cloud computing framework take the website cloud as application core, must have distributed scheduling scheme, resource dynamic distribution capability and stable scheduling mechanism.As shown in Figure 1, the core of website cloud scheduling is the scheduling virtual machine device, downward operation to various resources all realizes by virtual machine manager, use unified management interface and data interchange format, the main state collection, data statistics, monitoring etc. that realize resource, all available data upwards are provided, carry out relevant treatment by Service Processing Unit, and carry out alternately with web console.Generally speaking, in order to improve the utilance of virtual machine, the state of all virtual machines that moving of virtual machine manager Real Time Monitoring, and based on the condition of request to the resource consumption maximum of all movable virtual machines, select up till now the virtual machine of most suitable processing process the access request of porch.Yet, although use the scheduling strategy of the utilance that improves virtual machine can effectively improve the utilance of virtual machine, but the peak that enters when cloud computing machine system during the visit, and this strategy just is difficult in time reply the access request of terminal 10, the state of " paralysis " occurs.System is difficult to successfully manage the situation that the peak is accessed for the cloud computing machine, and the researcher has also made many fruitful effort, and is documented among many disclosed patent documentations or Patent Application Publication.for example, Chinese patent 200810114731 discloses a kind of " based on the machine group loading forecast control method of flow model ", this is a kind of forecast Control Algorithm that relates in the complicated production manufacture process that there are many group machine groups in before and after have twice bottleneck operation and per pass bottleneck operation each machine group load of bottleneck operation of rear road, it comprises the timing sampling of machine group load in rear road bottleneck operation, rear road bottleneck operation machine group load desired value is determined, bottleneck operation machine group load d rank, rear road predictive control model is set up and front road bottleneck operation machine group control parameter is asked for.This invention is set up each machine group load estimation control model of rear road bottleneck operation based on flow model and Adaptive Neuro-fuzzy Inference, and the quadratic sum minimum of the difference of road each machine group actual loading of bottleneck operation later on and expectation load is the optimal control target, adopt the Lagrange relaxation method, provide the task output rating of front road each machine group of bottleneck operation, to improve production performance.
In addition, Chinese patent 200810038367 discloses " a kind of grid resource management system and management method ", and this invention has disclosed a kind of grid resource management system, and this system comprises the application layer of grid top layer, the monitoring and control management software layer of grid bottom; Described system also comprises Web service layer, access middleware layer; Application layer, Web service layer, access middleware layer, monitoring and control management software layer connect successively; The Web service layer is used for providing grid resource discovery service, the service of gridding resource historic state, reaches the grid resource scheduling service; Corresponding grid resource discovery module, gridding resource historic state module, and the grid resource scheduling module of comprising; The access middleware layer provides the resource management interface with platform independence, is used for realizing the data access of grid bottom monitoring and control management software layer and Web service layer.This invention grid resource management system can adapt to discovery and the management work of a large amount of dynamic resources in traffic grid by unified management interface is set.
In addition, a kind of client active balancing method of loads in the face of the network multimedia transmission service is also disclosed in Chinese patent CN101184031A, the method is according to the proxy service node number of client connection and the transmission rate of each proxy service node, the number of active accommodation Connection Proxy service node, when the transmission rate of client causes the bandwidth consumption waste over certain threshold value, initiatively reduce transmission node.This active balancing method of loads can be used as replenishing of server end retarded type or forecasting type balancing method of loads, and the response to the Internet Transmission state of raising system improves the multi-media network transmission service quality.
In addition, cloud CDN(Content Delivery Network based on statistical forecast is also disclosed in Chinese patent CN102801792A) the resource automatic deployment method, it is according to 24 hours load estimation values of historical data predict future of each fringe node load of cloud CDN, formulate the virtual server resource deployment plan of respective edges node, each fringe node of cloud CDN is carried out the virtual server resource deployment; Each fringe node loading condition of Real Time Monitoring cloud CDN, when cloud CDN was in the user and accesses the peak period, the mirror image that the cloud platform will configure related service was mounted in virtual server and starts and joins in the middle of each fringe node of cloud CDN, shares the access pressure of burst; When cloud CDN is in non-access peak period, only keep the virtual server of keeping the operation of business normal level, idle virtual server resource is recovered in resource pool.The method can not only successfully manage the peak traffic of burst, improves the resource utilization of CDN, and has reduced energy consumption and the O﹠M cost of CDN.
Yet those skilled in the art still expect can be applied to more method and the device of reply peak access in cloud computing machine system, to solve one or more above-mentioned technical problems.
Summary of the invention
For the deficiencies in the prior art, the objective of the invention is to provide a kind of method and apparatus that is applied to reply peak access in cloud computing machine system, expect that the method and device can improve cloud computing machine system in the response speed of peak Access status.
For this reason, first aspect present invention provides a kind of method that is applied to reply peak access in cloud computing machine system, comprises the steps:
All access request data are tackled in porch in described cloud computing machine system, and the service data of the virtual machine instance of record activity;
Visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
If the visit capacity of future position is greater than or equal to a set point, sends the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.
Correspondingly, second aspect present invention provides a kind of device that is applied to reply peak access in cloud computing machine system, comprising:
Service register is used for tackling all access request data in the porch of described cloud computing machine system, and the service data of the virtual machine instance of record activity;
The machine learning fallout predictor is used for the visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
Load equalizer, be used for after the visit capacity of the future position on the horizon that receives described machine learning fallout predictor surpasses a set point, send the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.
Arbitrary technical scheme of either side of the present invention can make up with the other technologies scheme, as long as they contradiction can not occur.In addition, in arbitrary technical scheme of either side of the present invention, arbitrary technical characterictic goes for this technical characterictic in other embodiments, as long as they contradiction can not occur.Below the invention will be further described.
All documents that the present invention quotes from, their full content is incorporated this paper by reference into, and, if when the implication that these documents are explained and the present invention are inconsistent, be as the criterion with statement of the present invention.In addition, various terms and phrase that the present invention uses have the general sense of well known to a person skilled in the art, nonetheless, the present invention still wishes at this, these terms and phrase to be described in more detail and to explain, the term of mentioning and phrase are as the criterion with the implication that the present invention was explained if any inconsistent with known implication.
Concrete, according to a kind of method that is applied to reply peak access in cloud computing machine system that first aspect present invention provides, it comprises the steps:
All access request data are tackled in porch in described cloud computing machine system, and the service data of the virtual machine instance of record activity;
Visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
If the visit capacity of described future position is greater than or equal to a set point, sends the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.Wherein, described " set point " can be set according to the visit capacity of the daily cardinal principle of described cloud computing machine system, and/or sets according to cloud computing machine system of systems capacity.For example, if the visit capacity of the daily cardinal principle of cloud computing machine system is 100, can set above-mentioned " set point " is 120, thinks that namely predicting visit capacity is to think that the access peak at hand at 120 o'clock.In addition, described " being about to " refers to the moment point that not yet arrives, the moment point that those skilled in the art can Set arbitrarily need to predict, and to improve the ability that cloud computing machine system should the peak access, this paper is not restricted this.
The method of reply peak access in the cloud computing machine that the is applied to system that provides according to first aspect present invention, predict that the visit capacity of the future position on the horizon of described cloud computing machine system comprises the following steps:
Choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n;
Predict the visit capacity v of the future position on the horizon of described cloud computing machine system knn, wherein:
v knn = Σ i = 1 n v i * d i Σ i = 1 n d i ;
Wherein, d iBe predicted value v n+1To v iDistance: d i=|| n – i+1||.
The method of reply peak access in the cloud computing machine that the is applied to system that provides according to first aspect present invention, use the adjacent node algorithm of cum rights K-to comprise the following steps according to the visit capacity of the future position on the horizon of the described cloud computing machine of described forecast sample prediction system:
Choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n, wherein, i is less than or equal to n more than or equal to 1, and, i, n is integer;
Choose the concentrated data of described sample training as the class center C, according to the concentrated data v of described sample training iTo described class center C apart from d iWeight w corresponding to these data is set i, wherein
w i=f(v i)=d i||v i–v 1||=(i-1) 2||v i–C||;
By described sample training collection { v 1, v 2, v 3..., v i..., v nAnd weight w iPredict the access number v of next time point knnThereby, the access peak of completing the described cloud computing machine of prediction system, wherein:
v knn = Σ i = 1 n v i * w i Σ i = 1 n w i .
Use the adjacent node algorithm of K-to predict the access peak of described cloud computing machine system by described sample training collection and weights.The adjacent node algorithm of described K-for fixing sample number, meet the weights proportion of target function, the time of its consumption and space complexity be O (1) just obviously, and computational process is extremely quick, the drain space resource, do not implement simple possible.
The method of reply peak access in the cloud computing machine that the is applied to system that provides according to first aspect present invention, the described sampling period is 24 hours, described sample training collection is visit data corresponding to same time point in continuous several sampling periods.
The method of reply peak access in the cloud computing machine that the is applied to system that provides according to first aspect present invention, described class center is visit data corresponding to time point in first sampling period, the data that described sample training is concentrated are far away to the distance at described class center, and weights corresponding to these data are less.
The method of reply peak access in the cloud computing machine that the is applied to system that provides according to first aspect present invention, described weights are selected according to minimum distance classification.About the minimum distance classification method, refer to obtain unknown categorization vector to the distance that will identify representation vector central point of all categories, unknown categorization vector is belonged to a kind of image classification method of the minimum class of distance.those skilled in the art can be with reference to " based on the parameter selection method of the minimum distance classification of core " of Qiu Xiao treasure and Zhang Huaxiang, computer engineering, 05 phase in 2008, do as, once " based on the Classification Method of Itself Adjustment of minimum range principle " of constitution Gui, Institutes Of Technology Of Jiangxi's journal, 04 phase in 2007, Zhang Daoqiang, " the Learning the Kernel Parameters in Kernel Minimum Distance Classifier " of Chen Songcan etc., Pattern Recognition, 2006, 39(1): the documents such as 133-135, with the more deep the present invention that understands.
In addition, according to a kind of device that is applied to reply peak access in cloud computing machine system that second aspect present invention provides, it comprises:
Service register is used for tackling all access request data in the porch of described cloud computing machine system, and the service data of the virtual machine instance of record activity;
The machine learning fallout predictor is used for the visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
Load equalizer, be used for after the visit capacity of the future position on the horizon that receives described machine learning fallout predictor surpasses a set point, send the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.
The device of reply peak access in the cloud computing machine that the is applied to system that provides according to second aspect present invention, described machine learning fallout predictor use the adjacent node algorithm of K-according to the visit capacity of the future position on the horizon of the described cloud computing machine of described forecast sample prediction system.
The device of reply peak access in the cloud computing machine that the is applied to system that provides according to second aspect present invention, described machine learning fallout predictor comprises with lower module:
The first module is used for choosing access request data corresponding to the time point in several sampling periods as the sample training collection;
The second module is used for choosing the concentrated data of described sample training as the class center, and the data concentrated according to described sample training to the distance at described class center arranges weights corresponding to these data;
Computing module be used for to use the adjacent node algorithm of K-to predict the access peak of described cloud computing machine system by described sample training collection and weights.
The device of reply peak access in the cloud computing machine that the is applied to system that provides according to second aspect present invention, the described sampling period is 24 hours, described sample training collection is visit data corresponding to same time point in continuous several sampling periods.
The present invention has obtained following beneficial effect:
The present invention is by the active load estimation to the access peak, cloud computing machine system can open enough resources (for example virtual machine) and carry out load balancing before the peak access arrives, transfer aggressive mode to from Passive Mode, break away from the situations such as the response lag that system produces, stability deficiency, really realized intellectuality and the automation of scheduling of resource.
Description of drawings
Accompanying drawing is not to be intended to draw in proportion.In these accompanying drawings, pass through same reference numeral at each the identical or almost identical parts shown in each accompanying drawing.In order to know purpose, in the accompanying drawings each parts is not carried out mark.In the accompanying drawings:
Fig. 1 is the existing scheduling of resource schematic diagram that is applied to cloud computing machine system, can find out in figure, this cloud computing machine system utilizes the running status of virtual machine manager Real Time Monitoring virtual machine, selects at present the virtual machine of the most suitable processing to process the access request of porch, improves the utilance of virtual machine.
Fig. 2 is the flow chart of an embodiment of method of the present invention, can find out in figure, by can in time adjust the resource deployment of cloud computing machine system to the prediction of visit capacity, improves cloud computing machine system in the response speed of access peak period;
Fig. 3 is the flow chart of an embodiment of the visit capacity step of prediction cloud computing machine system in Fig. 2, utilizes the adjacent node algorithm of K-to realize the prediction on access peak in this embodiment;
Fig. 4 is the flow chart of an embodiment of the visit capacity step of prediction cloud computing machine system in Fig. 2, utilizes the adjacent node algorithm of cum rights K-to realize the prediction on access peak in this embodiment;
Fig. 5 is of the present invention for the flow chart of cum rights KNN method;
Fig. 6 is the structural representation of an embodiment of device of the present invention, can find out in figure, by can in time adjust the resource deployment of cloud computing machine system to the prediction of visit capacity, improves cloud computing machine system in the response speed of access peak period;
Fig. 7 is the structural representation of machine learning fallout predictor in Fig. 6, by to the choosing of the weights of sample training collection and each data, can use the adjacent node algorithm of cum rights K-to realize rapidly the prediction of visit capacity;
Fig. 8 is based on the illustraton of model of the cloud computing machine system of Eucalyptus;
Fig. 9 is the block diagram of experimental result, and as can be seen from the figure, machine learning algorithm can initiatively be opened virtual machine and process before the access peak arrives, successfully realized prediction and processing to the peak visit capacity, reached re-set target;
In figure:
10-terminal; 21-entrance; 22-virtual machine manager; 23-virtual machine; 31-service register; 32-load equalizer; 33-machine learning fallout predictor; The 331-the first module; The 332-the second module; 333-computing module.
Embodiment
Further illustrate the present invention below by object lesson, still, should be understood to, these examples are only used for the use that specifically describes more in detail, and should not be construed as for limiting in any form the present invention.
Embodiments of the invention can carry out in any cloud computing machine system with scheduling of resource, load monitoring ability.By to the prediction of the visit capacity of cloud computing machine system and timely adjustment and deployment (can be for example to increase virtual machine), thereby during arriving on the access peak, the raising system improves the responsibility of system.
See also Fig. 2, in one embodiment of the invention, the described method that is applied to reply peak access in cloud computing machine system comprises the steps:
Step S201: all access request data are tackled at entrance 21 places in described cloud computing machine system, and the service data of virtual machine 23 examples of record activity.Wherein, the access request data of interception can be for example the access request of HTTP.The visit data that uses phrase " interception " to refer to the to receive entrance 21 places herein line item of going forward side by side does not affect the response of its access request.
Step S202: according to the visit capacity of the future position on the horizon of the described cloud computing machine of described access request data prediction system.About the prediction to visit capacity, generally by sample set off in search rule, and utilize rule that unknown data is predicted, can be for example SVM(Support Vector Machine, SVMs) algorithm has effectively overcome the shortcomings such as sample distribution, redundancy feature, overfitting, have good generalization ability, take advantage on stability.Yet disappointed is that the convergence speed of SVM on large data sets is slower, needs a large amount of storage resources and powerful calculating ability to become its deadly defect.And the method abilities such as Bayes, linear classification, decision tree and KNN relatively a little less than, but their model is simple, efficient is high.In addition, also can use KNN(K arest neighbors sorting algorithm) method predicts, preferably uses cum rights KNN method to predict.KNN method about KNN method and cum rights will be set forth follow-up, wouldn't be discussed herein.
Step S203: the test access peak whether at hand, if the visit capacity of described future position is greater than or equal to a set point, namely predicting the access peak will arrive at the time point of next one prediction, forward step S204 to, otherwise, return to step S201.At this moment, virtual machine 23 managers 22 still operate in normal mode, can be for example to dispatch as target take the peak use rate of virtual machine 23, therefore can not make intervention to system.In addition, apparent, step S201 is the action of a continuation, no matter subsequent scenario how, all access request data all can be tackled by cloud computing machine system, for next step prediction provides Data support.;
Step S204: if predict the access peak at hand, the running status in the example pond of current virtual machine 23 and select minimum virtual machine 23 examples of resource occupation to return to entrance 21 places as the target virtual machine 23 of processing request according to the service data of virtual machine 23 examples of described activity and process no matter send the instruction that creates virtual machine 23.At this moment, original operation strategy of virtual machine 23 managers 22 will suspend execution, the scheduling meeting that for example realizes high usage is suspended, and selects minimum virtual machine 23 examples of resource occupation to return to entrance 21 with the response access request as the target virtual machine 23 of processing request.
See also Fig. 3, Figure 3 shows that KNN(K arest neighbors sorting algorithm) block diagram.The KNN method is a kind of machine learning algorithm of theoretical comparative maturity, its core concept is: if the great majority in the sample of the K of sample in feature space (being the most contiguous in feature space) the most similar belong to some classifications, this sample also belongs to this classification.For website cloud load estimation strategy, the KNN algorithm all has higher model dependency from the foundation of choosing feature space etc. of sampling, sample training collection.
As shown in Figure 3, use the method for KNN method reply peak access, predict that the visit capacity of the future position on the horizon of described cloud computing machine system comprises the following steps:
Step S201: choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n.The below illustrates how to build access request data as the sample training collection for example.Can be for example as shown in Figure 4, access request to entrance 21 places was tackled and record according to the employing cycle, the continuous sampling period of preferred use is carried out record, for example take one day as a sampling period, carry out sampled data take Monday as first sampling period, carry out sampled data take Tuesday as second sampling period ..., by that analogy.All sample in identical moment point in each sampling period j, obtain as cycle index data Aj1, Aj2 ..., Aji ..., Ajn}, the i.e. record of horizontal data.In these sampling periods, the data that record in the same time mutually, for example A1i, A2i ..., Ami} is as a sample training collection Ri, and namely sample training collection Ri belongs to a longitudinal data, thereby if can obtain each and every one sample training collection Ri.
Step S302: to each described sample training collection { v 1, v 2, v 3..., v i..., v nIn choose data as the class center C of this sample training collection, wherein, i is less than or equal to n more than or equal to 1, and, i, n is integer.
Step S303: the visit capacity v that predicts the future position on the horizon of described cloud computing machine system knn, wherein:
v knn = Σ i = 1 n v i * d i Σ i = 1 n d i ;
Wherein, d iBe predicted value v n+1To v iDistance: d i=|| n – i+1||.
According to the difference of the sample training collection of choosing, can predict next visit capacity constantly corresponding to each moment point, thus the prediction of realization access peak value.
In addition, the visit capacity of the described cloud computing machine of prediction system is preferably used another follow-on KNN method.See also Fig. 5, Figure 5 shows that cum rights KNN method, it comprises the following steps:
Step S501: choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n, wherein, i is less than or equal to n more than or equal to 1, and, i, n is integer.The sample training collection that uses in sample training collection used herein and Fig. 3 is consistent, no longer gives unnecessary details herein.
Step S502: choosing data that described sample training concentrates as the class center C, can be for example that described class center is visit data v corresponding to time point in first sampling period 1According to the concentrated data v of described sample training iTo described class center C apart from d iWeight w corresponding to these data is set i, wherein
w i=f(v i)=d i||v i–v 1||=(i-1) 2||v i–C||;
Preferably, the data that described sample training is concentrated are far away to the distance of described class center C, and weights corresponding to these data are less, and select according to minimum distance classification.
Step S503: by described sample training collection { v 1, v 2, v 3..., v i..., v nAnd weight w iPredict the access number v of next time point knnThereby, the access peak of completing the described cloud computing machine of prediction system, wherein:
v knn = Σ i = 1 n v i * w i Σ i = 1 n w i .
Corresponding, the present invention also provides the device that is applied to reply peak access in cloud computing machine system, and as shown in Figure 6, it also comprises:
Service register 31 is used for tackling all access request data at entrance 21 places of described cloud computing machine system, and the service data of virtual machine 23 examples of record activity;
Machine learning fallout predictor 33 is used for the visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
Load equalizer 32, be used for after the visit capacity of the future position on the horizon that receives described machine learning fallout predictor 33 surpasses a set point, namely access the peak at hand, send the instruction that creates virtual machine 23 and select minimum virtual machine 23 examples of resource occupation to return to entrance 21 places as the target virtual machine 23 of processing request according to the service data of virtual machine 23 examples of described activity and process.(namely access under the situation that does not arrive on the peak) under normal circumstances, manage, dispatch to respond the access request at entrance 21 places by 22 pairs of virtual machines 23 of virtual machine 23 manager.In this process, service register 31 also can carry out record to the access request at entrance 21 places, and is sent to machine learning fallout predictor 33 and calculates, and predicts the peak of its access request.When machine learning fallout predictor 33 predicts the access peak at hand the time, original operation strategy of virtual machine 23 managers 22 will suspend execution, the scheduling meeting that for example realizes high usage is suspended, and selects minimum virtual machine 23 examples of resource occupation to return to entrance 21 with the response access request as the target virtual machine 23 of processing request.
Accordingly, described machine learning fallout predictor 33 can use the adjacent node algorithm of K-according to the access peak of the described cloud computing machine of described forecast sample prediction system.Use the machine learning fallout predictor 33 of the adjacent node algorithm of K-to comprise following several module:
Module one: be used for choosing access request data corresponding to the time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n.
The below illustrates how to build access request data as the sample training collection for example.Can be for example as shown in Figure 4, access request to entrance 21 places was tackled and record according to the employing cycle, the continuous sampling period of preferred use is carried out record, for example take one day as a sampling period, carry out sampled data take Monday as first sampling period, carry out sampled data take Tuesday as second sampling period ..., by that analogy.All sample in identical moment point in each sampling period j, obtain as cycle index data Aj1, Aj2 ..., Aji ..., Ajn}, the i.e. record of horizontal data.In these sampling periods, the data that record in the same time mutually, for example A1i, A2i ..., Ami} is as a sample training collection Ri, and namely sample training collection Ri belongs to a longitudinal data, thereby if can obtain each and every one sample training collection Ri.
Module two: be used for each described sample training collection { v 1, v 2, v 3..., v i..., v nIn choose data as the class center C of this sample training collection, wherein, i is less than or equal to n more than or equal to 1, and, i, n is integer.
Module three: the visit capacity v that predicts the future position on the horizon of described cloud computing machine system knn, wherein:
v knn = Σ i = 1 n v i * d i Σ i = 1 n d i ;
Wherein, d iBe predicted value v n+1To v iDistance: d i=|| n – i+1||.
In addition, described machine learning fallout predictor 33 also can use another structure to predict, as shown in Figure 7, this structure comprises with lower module:
The first module 331 is used for choosing access request data corresponding to the time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n; Choose discuss in module one in the adjacent node algorithm of the process of sample training collection such as above-mentioned K-consistent, no longer give unnecessary details herein.Generally speaking, preferred, the described sampling period is 24 hours, described sample training collection { v 1, v 2, v 3..., v i..., v nBe visit data corresponding to same time point in continuous several sampling periods.
The second module 332 is used for choosing described sample training collection { v 1, v 2, v 3..., v i..., v nIn data as the class center C, according to described sample training collection { v 1, v 2, v 3..., v i..., v nIn data v iTo described class center C apart from d iThese data v is set iCorresponding weight w i
Computing module 333 is used for according to described sample training collection { v 1, v 2, v 3..., v i..., v nAnd weight w iPredict the access number v of next time point knnThereby, the access peak of completing the described cloud computing machine of prediction system, wherein:
v knn = Σ i = 1 n v i * w i Σ i = 1 n w i .
Illustrate implementation procedure of the present invention and technique effect below by an experiment.
The below describes as embodiment as website cloud basic platform framework with the Eucalyptus system.
See also Fig. 8, Fig. 8 is the website cloud architecture based on Eucalyptus, and on it, virtual machine 23 of operation comprises Web container and Web engineering, is a complete Web server.The Eucalyptus front end node is responsible for scheduling of resource and the control of system, and backend nodes provides the Web server ability based on the website.
System is carried out a continuous test of week, carry out in advance data record in test the first seven day, the data that are saved will be as the sample training collection of machine learning fallout predictor 33.Due to the predictability and the load balancing that are test reply peak access, therefore, by the computing that began to carry out machine learning on the 8th day.Utilize LoadRunner as the pressure test instrument, the concurrent users of simulation varying number carry out peak access experiment to the some websites example in the cloud platform of website, according to quantity and the average utilization of virtual machine 23 under the change records of access number.
As shown in Figure 9, by experimental result as can be known, when visit capacity rises to 1500, the machine learning predicting machine has predicted possible peak access and has newly started a new virtual machine 23 according to the sample training collection, along with the continuous increase of visit capacity and reach at 2500 o'clock, system starts to 4 virtual machines 23 and processes, thereby can in time reply the access of system.Experimental result shows, machine learning algorithm can initiatively be opened virtual machine 23 and process before the official visit peak arrives, and successfully realized prediction and processing that the peak is accessed reaching re-set target.
The above has done detailed description to embodiments of the present invention by reference to the accompanying drawings, but the present invention is not limited to above-mentioned execution mode, in the ken that one skilled in the relevant art possesses, can also make various variations under the prerequisite that does not break away from aim of the present invention.

Claims (10)

1. a method that is applied to reply peak access in cloud computing machine system, is characterized in that, comprises the steps:
All access request data are tackled in porch in described cloud computing machine system, and the service data of the virtual machine instance of record activity;
Visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
If the visit capacity of described future position is greater than or equal to a set point, sends the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.
2. the method that is applied to reply peak access in cloud computing machine system as claimed in claim 1, is characterized in that, predicts that the visit capacity of the future position on the horizon of described cloud computing machine system comprises the following steps:
Choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n;
Predict the visit capacity v of the future position on the horizon of described cloud computing machine system knn, wherein:
v knn = Σ i = 1 n v i * d i Σ i = 1 n d i ;
Wherein, d iBe predicted value v n+1To v iDistance: d i=|| n – i+1||.
3. the method that is applied to reply peak access in cloud computing machine system as claimed in claim 1, is characterized in that, predicts that the visit capacity of the future position on the horizon of described cloud computing machine system comprises the following steps:
Choose access request data corresponding to a time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n, wherein, i is less than or equal to n more than or equal to 1, and, i, n is integer;
Choose the concentrated data of described sample training as the class center C, according to the concentrated data v of described sample training iTo described class center C apart from d iWeight w corresponding to these data is set i, wherein
w i=f(v i)=d i||v i–v 1||=(i-1) 2||v i–C||;
By described sample training collection { v 1, v 2, v 3..., v i..., v nAnd weight w iPredict the access number v of next time point knnThereby, the access peak of completing the described cloud computing machine of prediction system, wherein:
v knn = Σ i = 1 n v i * w i Σ i = 1 n w i .
4. be applied to as claimed in claim 2 or claim 3 the method for reply peak access in cloud computing machine system, it is characterized in that, the described sampling period is 24 hours, and described sample training collection is visit data corresponding to same time point in continuous several sampling periods.
5. the method that is applied to reply peak access in cloud computing machine system as claimed in claim 3, it is characterized in that, described class center is visit data corresponding to time point in first sampling period, the data that described sample training is concentrated are far away to the distance at described class center, and weights corresponding to these data are less.
6. the method that is applied to reply peak access in cloud computing machine system as claimed in claim 5, is characterized in that, described weights are selected according to minimum distance classification.
7. a device that is applied to reply peak access in cloud computing machine system, is characterized in that, comprising:
Service register is used for tackling all access request data in the porch of described cloud computing machine system, and the service data of the virtual machine instance of record activity;
The machine learning fallout predictor is used for the visit capacity according to the future position on the horizon of the described cloud computing machine of described access request data prediction system;
Load equalizer, be used for after the visit capacity of the future position on the horizon that receives described machine learning fallout predictor surpasses a set point, send the instruction that creates virtual machine and select the minimum virtual machine instance of resource occupation to return to the porch as the target virtual machine of processing request according to the service data of the virtual machine instance of described activity and process.
8. the device that is applied to reply peak access in cloud computing machine system as claimed in claim 7, it is characterized in that, described machine learning fallout predictor uses the adjacent node algorithm of K-according to the visit capacity of the future position on the horizon of the described cloud computing machine of described forecast sample prediction system.
9. the device that is applied to reply peak access in cloud computing machine system as claimed in claim 7, is characterized in that, described machine learning fallout predictor comprises with lower module:
The first module is used for choosing access request data corresponding to the time point in several sampling periods as sample training collection { v 1, v 2, v 3..., v i..., v n;
The second module is used for choosing described sample training collection { v 1, v 2, v 3..., v i..., v nIn data as the class center C, according to described sample training collection { v 1, v 2, v 3..., v i..., v nIn data v iTo described class center C apart from d iThese data v is set iCorresponding weight w i
Computing module is used for according to described sample training collection { v 1, v 2, v 3..., v i..., v nAnd weight w iPredict the access number v of next time point knnThereby, the access peak of completing the described cloud computing machine of prediction system, wherein:
v knn = Σ i = 1 n v i * w i Σ i = 1 n w i .
10. be applied to as claimed in claim 8 or 9 the device of reply peak access in cloud computing machine system, it is characterized in that, the described sampling period is 24 hours, described sample training collection { v 1, v 2, v 3..., v i..., v nBe visit data corresponding to same time point in continuous several sampling periods.
CN2013100413067A 2013-02-01 2013-02-01 Method and system of responding peak access in cloud computer system Pending CN103152389A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100413067A CN103152389A (en) 2013-02-01 2013-02-01 Method and system of responding peak access in cloud computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100413067A CN103152389A (en) 2013-02-01 2013-02-01 Method and system of responding peak access in cloud computer system

Publications (1)

Publication Number Publication Date
CN103152389A true CN103152389A (en) 2013-06-12

Family

ID=48550248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100413067A Pending CN103152389A (en) 2013-02-01 2013-02-01 Method and system of responding peak access in cloud computer system

Country Status (1)

Country Link
CN (1) CN103152389A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327118A (en) * 2013-07-09 2013-09-25 南京大学 Intelligent virtual machine cluster scaling method and system for web application in cloud computing
CN103442076A (en) * 2013-09-04 2013-12-11 上海海事大学 Usability guarantee method for cloud storage system
CN104580524A (en) * 2015-01-30 2015-04-29 华为技术有限公司 Resource scaling method and cloud platform with same
WO2015077958A1 (en) * 2013-11-28 2015-06-04 华为技术有限公司 Method, apparatus and system for controlling service traffic
WO2016065858A1 (en) * 2014-10-30 2016-05-06 中兴通讯股份有限公司 Method and device for deploying virtual core network
CN106027685A (en) * 2016-08-02 2016-10-12 合肥奇也信息科技有限公司 Peak access method based on cloud computation system
CN106230944A (en) * 2016-08-02 2016-12-14 合肥奇也信息科技有限公司 The running gear that a kind of peak based on cloud computer system accesses
CN106330754A (en) * 2016-08-31 2017-01-11 东软集团股份有限公司 Access request control method and device
CN108023742A (en) * 2016-10-31 2018-05-11 阿里巴巴集团控股有限公司 A kind of expansion method of application, device and system
CN108880945A (en) * 2018-08-02 2018-11-23 浙江口碑网络技术有限公司 A kind of cloud monitoring system and method
CN108984344A (en) * 2018-07-12 2018-12-11 郑州云海信息技术有限公司 A kind of dynamic generates method, apparatus, equipment and the storage medium of snapshot
CN109104497A (en) * 2018-09-26 2018-12-28 郑州云海信息技术有限公司 A kind of method for processing business and device based on cloud platform
US10217053B2 (en) 2015-06-23 2019-02-26 International Business Machines Corporation Provisioning service requests in a computer system
CN109492774A (en) * 2018-11-06 2019-03-19 北京工业大学 A kind of cloud resource dispatching method based on deep learning
CN110493643A (en) * 2019-08-06 2019-11-22 北京邮电大学 Video storage method and device
WO2019227707A1 (en) * 2018-06-01 2019-12-05 平安科技(深圳)有限公司 Server, method for predicting system invocation volume, and storage medium
CN111738781A (en) * 2020-07-31 2020-10-02 支付宝(杭州)信息技术有限公司 Deep learning model and method for predicting flow data thereof
CN111858015A (en) * 2019-04-25 2020-10-30 中国移动通信集团河北有限公司 Method, device and gateway for configuring running resources of application program
CN113014671A (en) * 2021-04-01 2021-06-22 毕延杰 Cloud service resource sharing method and resource sharing platform applied to big data analysis

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6714968B1 (en) * 2000-02-09 2004-03-30 Mitch Prust Method and system for seamless access to a remote storage server utilizing multiple access interfaces executing on the remote server
CN102427475A (en) * 2011-12-08 2012-04-25 曙光信息产业(北京)有限公司 Load balance scheduling system in cloud computing environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6714968B1 (en) * 2000-02-09 2004-03-30 Mitch Prust Method and system for seamless access to a remote storage server utilizing multiple access interfaces executing on the remote server
CN102427475A (en) * 2011-12-08 2012-04-25 曙光信息产业(北京)有限公司 Load balance scheduling system in cloud computing environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘子锋: "基于Eucalyptus网站云的资源调度", 《计算机系统应用》, 15 October 2012 (2012-10-15) *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327118A (en) * 2013-07-09 2013-09-25 南京大学 Intelligent virtual machine cluster scaling method and system for web application in cloud computing
CN103327118B (en) * 2013-07-09 2016-10-05 南京大学 A kind of in cloud computing web application intelligent virtual computer cluster Zoom method and system
CN103442076B (en) * 2013-09-04 2016-09-07 上海海事大学 A kind of usability guarantee method of cloud storage system
CN103442076A (en) * 2013-09-04 2013-12-11 上海海事大学 Usability guarantee method for cloud storage system
WO2015077958A1 (en) * 2013-11-28 2015-06-04 华为技术有限公司 Method, apparatus and system for controlling service traffic
WO2016065858A1 (en) * 2014-10-30 2016-05-06 中兴通讯股份有限公司 Method and device for deploying virtual core network
CN105610592A (en) * 2014-10-30 2016-05-25 中兴通讯股份有限公司 Method and device for deploying virtual core network
WO2016119412A1 (en) * 2015-01-30 2016-08-04 华为技术有限公司 Resource scaling method on cloud platform and cloud platform
CN104580524A (en) * 2015-01-30 2015-04-29 华为技术有限公司 Resource scaling method and cloud platform with same
US10217053B2 (en) 2015-06-23 2019-02-26 International Business Machines Corporation Provisioning service requests in a computer system
CN106027685A (en) * 2016-08-02 2016-10-12 合肥奇也信息科技有限公司 Peak access method based on cloud computation system
CN106230944A (en) * 2016-08-02 2016-12-14 合肥奇也信息科技有限公司 The running gear that a kind of peak based on cloud computer system accesses
CN106330754A (en) * 2016-08-31 2017-01-11 东软集团股份有限公司 Access request control method and device
CN106330754B (en) * 2016-08-31 2020-02-21 东软集团股份有限公司 Access request control method and device
CN108023742A (en) * 2016-10-31 2018-05-11 阿里巴巴集团控股有限公司 A kind of expansion method of application, device and system
CN108023742B (en) * 2016-10-31 2021-08-27 阿里巴巴集团控股有限公司 Application capacity expansion method, device and system
WO2019227707A1 (en) * 2018-06-01 2019-12-05 平安科技(深圳)有限公司 Server, method for predicting system invocation volume, and storage medium
CN108984344A (en) * 2018-07-12 2018-12-11 郑州云海信息技术有限公司 A kind of dynamic generates method, apparatus, equipment and the storage medium of snapshot
CN108984344B (en) * 2018-07-12 2021-09-17 郑州云海信息技术有限公司 Method, device and equipment for dynamically generating snapshot and storage medium
CN108880945B (en) * 2018-08-02 2020-07-28 浙江口碑网络技术有限公司 Cloud monitoring system and method
CN108880945A (en) * 2018-08-02 2018-11-23 浙江口碑网络技术有限公司 A kind of cloud monitoring system and method
CN109104497A (en) * 2018-09-26 2018-12-28 郑州云海信息技术有限公司 A kind of method for processing business and device based on cloud platform
CN109492774A (en) * 2018-11-06 2019-03-19 北京工业大学 A kind of cloud resource dispatching method based on deep learning
CN109492774B (en) * 2018-11-06 2021-10-26 北京工业大学 Deep learning-based cloud resource scheduling method
CN111858015A (en) * 2019-04-25 2020-10-30 中国移动通信集团河北有限公司 Method, device and gateway for configuring running resources of application program
CN111858015B (en) * 2019-04-25 2024-01-12 中国移动通信集团河北有限公司 Method, device and gateway for configuring running resources of application program
CN110493643A (en) * 2019-08-06 2019-11-22 北京邮电大学 Video storage method and device
CN111738781A (en) * 2020-07-31 2020-10-02 支付宝(杭州)信息技术有限公司 Deep learning model and method for predicting flow data thereof
CN113014671A (en) * 2021-04-01 2021-06-22 毕延杰 Cloud service resource sharing method and resource sharing platform applied to big data analysis
CN113014671B (en) * 2021-04-01 2021-11-23 湖南机械之家信息科技有限公司 Cloud service resource sharing method and resource sharing platform applied to big data analysis

Similar Documents

Publication Publication Date Title
CN103152389A (en) Method and system of responding peak access in cloud computer system
Sahoo et al. ESMLB: Efficient switch migration-based load balancing for multicontroller SDN in IoT
Aujla et al. MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge–cloud environment
Wang et al. MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems
CN110231976B (en) Load prediction-based edge computing platform container deployment method and system
CN111930511A (en) Identifier resolution node load balancing device based on machine learning
Xia Resource scheduling for piano teaching system of internet of things based on mobile edge computing
Sigwele et al. Fuzzy logic-based call admission control in 5G cloud radio access networks with preemption
Dimitrios et al. Simulation and performance evaluation of a fog system
Zare et al. Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm
Swain et al. Efficient resource management in cloud environment
Saxena et al. Workload forecasting and resource management models based on machine learning for cloud computing environments
Tekiyehband et al. An efficient dynamic service provisioning mechanism in fog computing environment: A learning automata approach
Zhang Storage optimization algorithm design of cloud computing edge node based on artificial intelligence technology
Liu et al. ScaleFlux: Efficient stateful scaling in NFV
Karimiafshar et al. A request dispatching method for efficient use of renewable energy in fog computing environments
Li et al. Service cost-based resource optimization and load balancing for edge and cloud environment
Wang et al. A quick adaptive migration algorithm for virtual network function
Zhao et al. Application of dynamic management of 5G network slice resource based on reinforcement Learning in Smart Grid
Cui et al. Resource-Efficient DNN Training and Inference for Heterogeneous Edge Intelligence in 6G
Zhu et al. Deep reinforcement learning-based edge computing offloading algorithm for software-defined IoT
Surya et al. Novel Approaches for Resource Management Across Edge Servers
Li et al. Two-stage selection of distributed data centers based on deep reinforcement learning
Sha et al. A multi-objective QoS-aware IoT service placement mechanism using Teaching Learning-Based Optimization in the fog computing environment
Tang et al. A Survey on Scheduling Techniques in Computing and Network Convergence

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130612