CN111432005A - A method for service migration under the condition of narrow-band weakly connected network - Google Patents

A method for service migration under the condition of narrow-band weakly connected network Download PDF

Info

Publication number
CN111432005A
CN111432005A CN202010234294.XA CN202010234294A CN111432005A CN 111432005 A CN111432005 A CN 111432005A CN 202010234294 A CN202010234294 A CN 202010234294A CN 111432005 A CN111432005 A CN 111432005A
Authority
CN
China
Prior art keywords
service
edge
node
migration
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010234294.XA
Other languages
Chinese (zh)
Other versions
CN111432005B (en
Inventor
李新明
刘斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Frontier Technology Co ltd
Original Assignee
Edge Intelligence Of Cas Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Edge Intelligence Of Cas Co ltd filed Critical Edge Intelligence Of Cas Co ltd
Priority to CN202010234294.XA priority Critical patent/CN111432005B/en
Publication of CN111432005A publication Critical patent/CN111432005A/en
Application granted granted Critical
Publication of CN111432005B publication Critical patent/CN111432005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a service migration method under the condition of a narrow-band weak networking, which comprises the following steps: (a) enabling each edge service node and the end user served by the edge service node to monitor the state of the logical connection with each other through periodic beacon information; (b) when the logic connection fails, the edge service node reports migration requirements to a virtual main node in a cloud center or a mobile edge service node set, and the end user actively searches other possible access objects and delegates the access objects to report to the cloud center or the virtual main node after successful access; (c) and the cloud center or the virtual main node determines a migration path and migrates the migration path according to the maintained and updated cloud-edge or edge-edge fusion network routing graph after acquiring the addresses of the initiating node of the service to be migrated and the receiving node expected to receive the migration service. Therefore, the migration efficiency of the service and the data is improved, and the application service is ensured to be uninterrupted.

Description

一种窄带弱连网络条件下服务迁移的方法A method for service migration under the condition of narrow-band weakly connected network

技术领域technical field

本发明属于网络服务技术领域,涉及一种窄带弱连网络条件下服务迁移的方法,具体涉及一种在间歇断连与窄带弱连网络条件下提升迁移服务和数据效率的方法。The invention belongs to the technical field of network services, and relates to a method for service migration under the condition of a narrowband weak connection network, in particular to a method for improving the migration service and data efficiency under intermittent disconnection and narrowband weak connection network conditions.

背景技术Background technique

多节点机动信息服务中心在管理跨节点数据时,针对特定环境(间歇弱连接特性和窄带弱连网络),需要实现多节点的版本同步更新,解决数据分发产生的版本一致性管理问题。张春明提出了面向海量数据的基于时间戳的副本一致性模型RCMTS,RCMTS模型通过时间戳技术对副本进行管理,并通过网格区域性的高度自治特点,将副本更新分为域外更新和域内更新两种策略,提高了更新的速度;并采用基于用户视图的访问策略,保证了用户访问逻辑文件的正确性,同时提出了一种动态可扩展的副本定位方法DSRL,使用索引信息节点来支持对同一数据多个副本的同时高效定位,通过使用本地索引节点来支持对本地的副本查询,进一步提出了一种动态映射技术,能够根据索引节点的机器性能而分配全局副本定位信息,并支持索引信息节点的动态加入和退出。When the multi-node mobile information service center manages cross-node data, it needs to implement multi-node version synchronization updates for specific environments (intermittent weak connection characteristics and narrow-band weak connection networks) to solve the version consistency management problem caused by data distribution. Zhang Chunming proposed a timestamp-based replica consistency model RCMTS for massive data. The RCMTS model manages replicas through timestamp technology, and divides replica updates into out-of-domain updates and intra-domain updates through the high degree of autonomy of grid regions. This strategy improves the speed of update; and adopts the access strategy based on user view to ensure the correctness of user access to logical files, and proposes a dynamic and scalable copy positioning method DSRL, which uses index information nodes to support the same Simultaneous and efficient positioning of multiple copies of data, by using local index nodes to support local copy queries, a dynamic mapping technology is further proposed, which can allocate global copy positioning information according to the machine performance of index nodes, and supports index information nodes. dynamic joins and exits.

但是,当用户设备发生跨节点接入时,为保障服务不间断,有两种不间断服务保障模式。一种是基于容器的服务轻量化与数据单元化的思想,以用户为中心进行服务迁移,其目的是将服务和数据迁移到靠近用户设备的边缘服务节点上以获得就近服务;另一种是在新接入点与原接入点之间建立一条中继通道,将两者进行桥接,由新接入点充当用户与原接入点之间的中继。前者有利于避免业务响应超时,但服务和随行数据迁移时间可能较长。后者虽然无需迁移服务,但业务响应时间会受中继转发能力的制约。这两种基于迁移的保障模式都面临如何在间歇断连与窄带弱连网络条件下提升迁移服务和数据效率的问。However, in order to ensure uninterrupted service when user equipment accesses across nodes, there are two uninterrupted service guarantee modes. One is the idea of container-based service lightweight and data unitization, user-centric service migration, the purpose of which is to migrate services and data to edge service nodes close to user equipment to obtain nearby services; the other is A relay channel is established between the new access point and the original access point to bridge the two, and the new access point acts as a relay between the user and the original access point. The former is beneficial to avoid business response timeout, but the migration time of services and accompanying data may be longer. Although the latter does not need to migrate services, the service response time will be restricted by the relay forwarding capability. Both of these migration-based assurance models face the question of how to improve the efficiency of migration services and data under intermittent disconnection and narrow-band weak network conditions.

发明内容SUMMARY OF THE INVENTION

本发明目的是为了克服现有技术的不足而提供一种窄带弱连网络条件下服务迁移的方法。The purpose of the present invention is to provide a method for service migration under the condition of narrow-band weak connection network in order to overcome the deficiencies of the prior art.

为达到上述目的,本发明所采用的技术方案为:一种窄带弱连网络条件下服务迁移的方法,它包括以下步骤:In order to achieve the above-mentioned purpose, the technical scheme adopted in the present invention is: a method for service migration under the condition of a narrow-band weakly connected network, which comprises the following steps:

(a)使每个边缘服务节点与其服务的末端用户通过周期性的信标信息彼此监测逻辑连接的状态;(a) Make each edge service node and its service end users monitor the status of logical connections with each other through periodic beacon information;

(b)当逻辑连接失效时,所述边缘服务节点向云中心或移动边缘服务节点集合内的虚拟主节点报告迁移需求,所述末端用户主动寻找其它可能的接入对象并在成功接入后委托其向所述云中心或所述虚拟主节点报告;(b) When the logical connection fails, the edge service node reports the migration requirement to the cloud center or the virtual master node in the mobile edge service node set, and the end user actively searches for other possible access objects and after successful access entrust it to report to the cloud center or the virtual master node;

(c)所述云中心或所述虚拟主节点根据获得的欲迁移服务的发起节点和期望接纳迁移服务的接收节点的地址后,依据其维护与更新的云-边或边-边融合网路由图,确定迁移路径并进行迁移。(c) The cloud center or the virtual master node maintains and updates the cloud-edge or edge-edge fusion network route according to the obtained addresses of the initiating node of the service to be migrated and the receiving node of the service expected to receive the migration service. Figure, determine the migration path and carry out the migration.

优化地,步骤(a)中,将末端用户的接入状态信息通过其接入的边缘服务节点周期性汇报到云中心或移动边缘服务节点集合内的虚拟主节点。Optimally, in step (a), the access status information of the end user is periodically reported to the virtual master node in the cloud center or the mobile edge service node set through the edge service node to which it is connected.

进一步地,步骤(a)中,所述接入状态信息包括末端用户标识号及末端用户当前位置、接入的边缘服务节点标识号及边缘服务节点当前位置以及成功接入次数,所述成功接入次数的信息内容中包括每次接入的逻辑连接维持时间并按请求接入的时间顺序列出。Further, in step (a), the access state information includes the identification number of the end user and the current location of the end user, the identification number of the accessed edge service node, the current location of the edge service node, and the number of successful accesses. The information content of the access times includes the logical connection maintenance time of each access and is listed in the chronological order of the access requests.

更进一步地,步骤(a)中,所述云中心或虚拟主节点为每个末端用户计算接入请求密度和平均接入维持时间的度量值,并用历史接入时序图表示;所述请求密度为给定时长内发现接入对象并发出请求的次数以用于衡量一个末端用户偶遇某个边缘服务节点的频度,所述平均接入维持时间为给定时长内所有成功接入的连接维持时长的均值以用于衡量连接的稳定性。Further, in step (a), the cloud center or the virtual master node calculates the metric values of the access request density and the average access maintenance time for each end user, and uses the historical access sequence diagram to represent; the request density It is the number of times that the access object is discovered and the request is sent within a given time period to measure the frequency of an end user encountering an edge service node. The average access maintenance time is the connection maintenance of all successful accesses within a given time period Average duration to measure the stability of the connection.

进一步地,步骤(a)中,所述云中心或虚拟主节点基于k-means聚类算法,以边缘服务节点数量为参数k,以边缘服务节点坐标为初始聚类中心,以末端用户到聚类中心的距离为度量值进行聚类,产生k个簇团。Further, in step (a), the cloud center or virtual master node is based on the k-means clustering algorithm. The distances of the class centers are clustered as metric values, resulting in k clusters.

优化地,步骤(c)中,所述迁移采用服务轻量级容器化封装迁移技术。Optimally, in step (c), the migration adopts the service lightweight containerization package migration technology.

由于上述技术方案运用,本发明与现有技术相比具有下列优点:本发明窄带弱连网络条件下服务迁移的方法,通过将边缘服务节点与末端用户进行监测逻辑连接,当边缘服务节点有迁移需求时,由云中心或虚拟主节点确定欲迁移服务的发起节点和期望接纳迁移服务的接收节点的地址,并根据融合网路由图进行迁移,从而提升服务和数据的迁移效率,确保应用服务不间断。Due to the application of the above technical solutions, the present invention has the following advantages compared with the prior art: the method for service migration under the condition of a narrow-band weak connection network of the present invention, by monitoring the logical connection between the edge service node and the end user, when the edge service node has migrated When required, the cloud center or virtual master node determines the addresses of the initiating node of the service to be migrated and the receiving node that expects to receive the migration service, and migrates according to the converged network routing map, thereby improving the efficiency of service and data migration and ensuring that application services are not Intermittent.

附图说明Description of drawings

图1为本发明容器镜像分层框架的结构示意图;1 is a schematic structural diagram of a container image layered framework of the present invention;

图2为本发明用户、服务及数据互依赖关系图;Fig. 2 is the user, service and data interdependence relationship diagram of the present invention;

图3为本发明基于用户、服务、数据互依赖关系的数据权限管理图;Fig. 3 is the data rights management diagram of the present invention based on user, service, data interdependence;

图4为本发明数据单元与轻量化服务迁移图;4 is a migration diagram of a data unit and a lightweight service according to the present invention;

图5为本发明无线通联环境下跨节点访问与迁移的智能决策框架图。FIG. 5 is a framework diagram of an intelligent decision-making for cross-node access and migration in a wireless communication environment of the present invention.

具体实施方式Detailed ways

下面将结合附图对本发明优选实施方案进行详细说明。The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

本发明窄带弱连网络条件下服务迁移的方法,它包括以下步骤:The method for service migration under the narrowband weak connection network condition of the present invention comprises the following steps:

(a)使每个边缘服务节点与其服务的末端用户通过周期性的信标信息彼此监测逻辑连接的状态。(a) Make each edge service node and its service end users monitor the status of logical connections with each other through periodic beacon information.

每个末端用户的接入状态信息都通过它接入的边缘服务节点周期性汇报到云中心(简称为云)或移动边缘服务节点(简称为边)集合内的虚拟主节点。该类状态信息包括末端用户标识号(或地址)和当前位置、接入的边缘服务节点标识号(或地址)和当前位置、成功接入次数(包括每次接入的逻辑连接维持时间,按请求接入的时间顺序列出)。基于这类状态信息,云中心或虚拟主节点为每个末端用户计算如下度量值:接入请求密度(给定时长内发现接入对象并发出请求的次数,用于衡量一个末端用户偶遇某个边缘服务节点的频度)、平均接入维持时间(给定时长内所有成功接入的连接维持时长的均值,用于衡量连接的稳定性),并用历史接入时序图表示,即横坐标值为状态信息汇报时刻,纵坐标值为这两个状态值。The access status information of each end user is periodically reported to the virtual master node in the cloud center (referred to as cloud) or mobile edge service node (referred to as edge) set through the edge service node it accesses. This type of status information includes the end user identification number (or address) and current location, the access edge service node identification number (or address) and current location, and the number of successful accesses (including the logical connection maintenance time of each access, according to the chronological order in which access was requested). Based on this kind of state information, the cloud center or virtual master node calculates the following metrics for each end user: access request density (the number of times that access objects are found and requests are issued within a given period of time, which is used to measure the chance that an end user encounters a certain The frequency of edge service nodes), the average access maintenance time (the average value of the maintenance duration of all successfully accessed connections within a given time period, used to measure the stability of the connection), and represented by the historical access sequence diagram, that is, the abscissa value It is the reporting time of status information, and the ordinate value is these two status values.

云中心或移动边缘服务节点集合内的虚拟主节点基于k-means聚类算法,以边缘服务节点数量为参数k,以边缘服务节点坐标为初始聚类中心,以末端用户到聚类中心的距离为度量值进行聚类,产生k个簇团。以簇团内边缘服务节点位置离中心点的距离值划分为“近”、“中”、“远”三级,以簇团内端设备数量划分为“小”、“中”、“大”三级,再以这两个维度综合衡量边缘服务节点的潜在接入负载。通过组合可以构成9种潜在接入负载等级,例如,若距离聚类后的中心为“近”的边缘服务节点所在的簇团的末端用户数量属于“大”,则该边缘服务节点的潜在接入负载可能最重。每个边缘服务节点的潜在接入负载也被表示为潜在负载时序图。The virtual master node in the cloud center or mobile edge service node set is based on the k-means clustering algorithm, with the number of edge service nodes as the parameter k, the coordinates of the edge service nodes as the initial cluster center, and the distance from the end user to the cluster center. Clustering for metric values yields k clusters. According to the distance between the edge service node in the cluster and the center point, it is divided into three levels: "near", "medium" and "far", and the number of end devices in the cluster is divided into "small", "medium" and "large" At the third level, these two dimensions are used to comprehensively measure the potential access load of edge service nodes. Nine potential access load levels can be formed by combining them. For example, if the number of end users in the cluster where the edge service node that is “close” to the clustered center is located is “large”, then the potential access load of the edge service node is “large”. The input load may be the heaviest. The potential access load of each edge service node is also represented as a potential load timing diagram.

依据上述两类时序图,可以为服务迁移做决策。例如,当确定了迁移的源边缘服务节点和目的边缘服务节点后,是否真正实施迁移,需要做如下判断:首先查阅目的边缘服务节点的潜在负载时序图,若判断是负载大,则不宜接收迁移服务;若判断可以接收,则查阅迁移服务的服务对象(即某末端用户)关于目的边缘服务节点历史接入时序图,若判断请求接入密度极低或平均接入维持时间极短,则不宜迁移;若判断适宜迁移,则查阅末端用户关于源边缘服务节点历史接入时序图,若判断请求接入密度极低或平均接入维持时间极短,则不考虑留存服务副本。为了提高对时序图分析的准确性和时效性,可以使用主成分分析法、独立成分分析法、主特征分析法以及逻辑回归法进行组合分析。Based on the above two types of sequence diagrams, decisions for service migration can be made. For example, after determining the source edge service node and the destination edge service node to be migrated, whether to actually implement the migration needs to make the following judgment: First, check the potential load sequence diagram of the destination edge service node. If it is judged that the load is heavy, it is not appropriate to accept the migration. If it is judged that it can be received, check the historical access sequence diagram of the destination edge service node for the service object of the migration service (that is, an end user). If it is judged that the requested access density is extremely low or the average access maintenance time is extremely short, it is not appropriate Migration; if it is judged that the migration is suitable, check the end user's historical access sequence diagram of the source edge service node. If it is judged that the requested access density is extremely low or the average access maintenance time is extremely short, the retained service copy will not be considered. In order to improve the accuracy and timeliness of time sequence diagram analysis, principal component analysis, independent component analysis, principal feature analysis and logistic regression can be used for combined analysis.

(b)当逻辑连接失效时,边缘服务节点向云中心或移动边缘服务节点集合内的虚拟主节点报告迁移需求,末端用户主动寻找其它可能的接入对象并在成功接入后委托其向所述云中心或所述虚拟主节点报告;(b) When the logical connection fails, the edge service node reports the migration requirement to the cloud center or the virtual master node in the mobile edge service node set, and the end user actively searches for other possible access objects and entrusts them to the report from the cloud center or the virtual master node;

(c)所述云中心或所述虚拟主节点根据获得的欲迁移服务的发起节点和期望接纳迁移服务的接收节点的地址后,依据其维护与更新的云-边或边-边融合网路由图,确定迁移路径并进行迁移。(c) The cloud center or the virtual master node maintains and updates the cloud-edge or edge-edge fusion network route according to the obtained addresses of the initiating node of the service to be migrated and the receiving node of the service expected to receive the migration service. Figure, determine the migration path and carry out the migration.

若云中心或接替其工作的虚拟主节点能洞察端设备(即末端用户)接入行为轨迹,则有利于制定合理的迁移后服务副本留存策略以及通用基础服务缓存部署策略。根据迁移目的地服务运行环境状况确定待迁移服务的差异化部分,并合理分割成适合传输的基本单元,捎带搭载在同向传输路径的IP分组流中以减少网络带宽占用。若决定留存服务副本,则应进行“瘦身”处理以减少资源占用,包括对服务进行拆分处理、记录服务组件清单与组装流程、保留差异化组件,删除可以本地复制的共性组件。If the cloud center or the virtual master node that replaces its work can gain insight into the access behavior trajectory of end devices (ie end users), it is helpful to formulate a reasonable post-migration service copy retention strategy and a general basic service cache deployment strategy. The differentiated parts of the service to be migrated are determined according to the operating environment of the service at the migration destination, and are reasonably divided into basic units suitable for transmission, which are piggybacked into the IP packet flow of the same transmission path to reduce network bandwidth occupation. If you decide to keep a copy of the service, you should perform a "downsizing" process to reduce resource usage, including splitting the service, recording the service component list and assembly process, retaining differentiated components, and deleting common components that can be copied locally.

服务轻量化的目的是减少迁移时的传输量,以适应间歇断连与窄带弱连网络环境。同时,应具备快启动特点,以便于快速恢复因迁移而暂停的应用服务。借鉴容器技术,研究镜像分层机制与基础环境镜像预加载策略,采用适应边缘服务节点集合高度动态以及间歇断连与窄带弱连网络条件下服务轻量级容器化封装迁移方案(即服务轻量级容器化封装迁移技术,如图4),减少服务镜像的网络带宽消耗,提高迁移速度及快速恢复服务。The purpose of lightweight service is to reduce the amount of transmission during migration to adapt to intermittent disconnection and narrowband weak connection network environment. At the same time, it should have a fast startup feature to quickly resume application services suspended due to migration. Learn from container technology, study the image layering mechanism and the basic environment image preloading strategy, and adopt a lightweight containerized packaging and migration solution that adapts to the highly dynamic set of edge service nodes, intermittent disconnection and narrow-band weak network conditions (ie, service lightweight The high-level containerized packaging and migration technology, as shown in Figure 4), reduces the network bandwidth consumption of the service image, improves the migration speed and quickly restores the service.

基于容器技术开发的可交付使用的软件产品可视为一个容器应用服务镜像,即一个基于层次关系构建的应用程序,从下到上依次包括引导文件系统(如bootfs)、根文件系统(如rootfs)、开发环境工具(如emacs、apache)和应用程序。每个镜像层都有一份相应的json文件,其目的是提供在该镜像之上应该运行什么进程、应该为进程配置什么环境变量等信息。若要将容器应用服务镜像进行部署并提供服务,则需要容器守护进程依据镜像json 文件创建相应的容器应用服务容器,即根据静态的镜像生成动态的容器。当容器启动时,在容器应用服务镜像的最上面会新增一个容器层,运行一个或多个进程,每个进程都占用相应的内存、CPU、虚拟网络设备资源,以及容器镜像的镜像层文件提供的文件系统资源。容器中的进程对一个任务文件的写操作遵循Copy-on-Write机制,即首先将此文件从容器镜像层中拷贝至最上层的容器层,然后相关进程再对容器层中的副本进行写操作。由此可见,新数据或被修改的数据都存放在最上面的容器层,而镜像层的数据保持不变。基于镜像的合理分层,构建一个新的应用镜像就简化成复用公共镜像,并添加应用相关的业务逻辑程序。结合镜像仓库的增量上传和下载机制,可以将新的应用快速地上传到镜像仓库,之后再快速地分发到其它节点。A deliverable software product developed based on container technology can be regarded as a container application service image, that is, an application built based on a hierarchical relationship. From bottom to top, it includes a boot file system (such as bootfs), a root file system (such as rootfs) ), development environment tools (such as emacs, apache), and applications. Each image layer has a corresponding json file, the purpose of which is to provide information such as what process should run on top of the image, and what environment variables should be configured for the process. To deploy the container application service image and provide services, the container daemon needs to create a corresponding container application service container according to the image json file, that is, generate a dynamic container according to the static image. When the container starts, a container layer will be added on top of the container application service image to run one or more processes. Each process occupies the corresponding memory, CPU, virtual network device resources, and the image layer file of the container image. Provided file system resources. The process in the container writes a task file according to the Copy-on-Write mechanism, that is, the file is first copied from the container image layer to the top container layer, and then the relevant process writes to the copy in the container layer. . It can be seen that the new or modified data is stored in the top container layer, while the data of the mirror layer remains unchanged. Based on the reasonable layering of images, building a new application image is simplified to reuse public images and add application-related business logic programs. Combined with the incremental upload and download mechanism of the mirror warehouse, new applications can be quickly uploaded to the mirror warehouse, and then quickly distributed to other nodes.

本申请提出容器分层机制,容器公共镜像从下往上分为系统内核层、操作系统层、公共组件层、开发语言层和开发框架层等。开发人员可以根据需求选择图1中左边由下往上任意层数的镜像层作为其基础镜像,以此为基础开发应用服务镜像。这样便可以充分利用容器分层特性最大化公共镜像的利用率。对一个具体的应用服务容器来说,只有镜像最上层的应用逻辑层和服务容器层的内容是该服务特有的东西,其它下层镜像都可以认为是支撑该服务的公共镜像层。因此,当需要迁移一个应用服务时,应该事先了解目的地的公共基础镜像的适配情况。若完全适配,则仅需迁移该服务特有的应用逻辑层和服务容器层的内容,以减少迁移时的传输量(服务容器层的内容可能包括进程恢复信息、环境变量配置要求、应用业务的中间结果、随行数据等,在形式上可以是一个类似json的文件)。若存在不适配情况,则可以针对公共基础镜像进行增量同步操作,也可以基于末端用户随遇接入行为的大数据分析结果指导公共基础镜像的预迁移。同时通知目的地对公共基础镜像进行预加载。若公共基础镜像需要增量同步操作,则应优先于应用逻辑层和服务容器层的内容的迁移操作,以尽量确保预加载的及时完成(即在应用逻辑层和服务容器层的内容到达目的地之前完成),从而加快服务恢复速度。This application proposes a container layering mechanism, and the container public image is divided into a system kernel layer, an operating system layer, a common component layer, a development language layer, and a development framework layer from bottom to top. Developers can choose any number of image layers from bottom to top on the left in Figure 1 as their base image, and develop application service images based on this. In this way, you can take full advantage of the container layering feature to maximize the utilization of public images. For a specific application service container, only the content of the application logic layer and service container layer at the top of the image is unique to the service, and other lower images can be considered as the public image layer supporting the service. Therefore, when you need to migrate an application service, you should know in advance the adaptation of the destination's public base image. If it is fully adapted, only the content of the application logic layer and service container layer specific to the service needs to be migrated to reduce the transmission amount during migration (the content of the service container layer may include process recovery information, environment variable configuration requirements, application business Intermediate results, accompanying data, etc., can be a json-like file in form). If there is an incompatibility, the incremental synchronization operation can be performed for the public basic image, or the pre-migration of the public basic image can be guided based on the big data analysis results of the end user's access behavior at will. Also inform the destination to preload the public base image. If the common base image requires incremental synchronization, it should take precedence over the content migration of the application logic layer and the service container layer to ensure the timely completion of preloading (that is, the content at the application logic layer and service container layer reaches the destination done before), thereby speeding up service recovery.

为了满足随遇接入“服务随行、数据随身”的需求,需要对欲迁移的多类型数据进行有效管理,快速抽取必要数据,为尽快迁移并快速恢复服务奠定基础。欲迁移的多类型数据包括服务容器层进程恢复信息、环境变量配置要求、应用业务的中间结果、随身携带的各种类型和各种格式数据等,这增加了数据管理的难度。为满足以数据单元为载体的面向各类服务与数据迁移场景以及信息同步的要求,研究数据单元化管理及按需快速抽取技术,期望降低数据管理的难度。In order to meet the requirement of "services and data on-the-go", it is necessary to effectively manage the multiple types of data to be migrated, quickly extract necessary data, and lay the foundation for migrating and restoring services as soon as possible. The multiple types of data to be migrated include service container layer process recovery information, environment variable configuration requirements, intermediate results of application services, and data of various types and formats that are carried around, which increases the difficulty of data management. In order to meet the requirements of various service and data migration scenarios and information synchronization based on data units, research on data unit management and on-demand rapid extraction technology is expected to reduce the difficulty of data management.

数据单元的本质是一个用户、服务、数据之间的动态关联与挂载服务。根据数据单元包含的数据或数据集合的类型,可将数据单元划分为不同的类型,并在数据单元中记录对数据依赖程度(如强依赖、弱依赖等)。数据单元的构成可以是单一数据、单一文件、数据库表、对象等。数据单元也同时具有可聚合性及可嵌套性,例如,多个文件组成的目录、或多个数据库表加多个文件的数据单元集合可以构成一个新的数据单元。同一文件允许成为多个数据单元的构成元素。一个数据单元的内容被允许纵向动态变化,但不允许横向变化。若需要横向变化,则只能再创建一个基于这个数据单元的数据单元。文件系统、关系型数据库、消息队列等存储服务也都可以由数据单元来管理。用户通过接入边缘信息服务系统来获得各种应用服务。若发生随遇接入行为,为了更靠近的接入点提供服务,则服务需要被迁移。这涉及与之相关的多类型、多格式、多来源数据的迁移,都可以包含在一个数据单元中,便于服务与数据的统一打包、统一迁移、快速恢复。The essence of a data unit is a dynamic association and mounting service between users, services, and data. According to the type of data or data set contained in the data unit, the data unit can be divided into different types, and the degree of dependence on the data (such as strong dependence, weak dependence, etc.) is recorded in the data unit. The composition of the data unit can be a single data, a single file, a database table, an object, and so on. Data units are also aggregatable and nestable at the same time. For example, a directory composed of multiple files, or a data unit collection of multiple database tables plus multiple files can form a new data unit. The same file is allowed to be a constituent element of multiple data units. The content of a data unit is allowed to dynamically change vertically, but not horizontally. If horizontal changes are required, only one more data unit based on this data unit can be created. Storage services such as file systems, relational databases, and message queues can also be managed by data units. Users can obtain various application services by accessing the edge information service system. In the event of random access behavior, services need to be migrated in order to provide services to closer access points. This involves the migration of related multi-type, multi-format, and multi-source data, which can be included in a data unit, which facilitates unified packaging, unified migration, and rapid recovery of services and data.

数据单元的创建时间不受限,可以在数据生命周期的任何时刻按需发起。例如,在数据采集期,采集者可以根据数据来源、数据时空属性、数据采集手段等方式划分数据单元;在数据存储期,存储发起者可以根据数据落地的目的位置,如某个目录、某个库、某个表来划分数据单元,因而增加了数据存储管理的灵活性;在数据处理期,处理者可以在数据处理过程中对数据集合声明为一个数据单元,然后将各种算子运用在该数据单元上,加快数据处理过程的速度;在数据分发共享期,所有者以数据单元为单位进行数据分发、数据共享和数据订阅过程。因此当需求迁移服务时,首先要根据应用逻辑层与服务容器层的内容特点,采用各自适合的内容保存形式(例如,能够适应快速恢复服务的保存形式),并以当前业务处理中间结果的状态模式确定其保存形式;然后依据应用业务逻辑快速抽取必要的随行数据或数据集合;最后基于已确定的各种类型数据保存形式创建数据单元来承载上述各类迁移数据。The creation time of data units is not limited and can be initiated on demand at any point in the data life cycle. For example, in the data collection period, the collector can divide the data units according to the data source, data space-time attributes, data collection methods, etc.; in the data storage period, the storage initiator can according to the destination of the data landing, such as a certain directory, a certain The data unit is divided into a database and a certain table, thus increasing the flexibility of data storage management; in the data processing period, the processor can declare the data set as a data unit during the data processing process, and then use various operators in On the data unit, the speed of the data processing process is accelerated; in the data distribution and sharing period, the owner performs the data distribution, data sharing and data subscription process in units of data units. Therefore, when a service needs to be migrated, first, according to the content characteristics of the application logic layer and the service container layer, a suitable content storage form (for example, a storage form that can adapt to the rapid recovery service) should be adopted, and the state of the intermediate result of the current business processing should be adopted. The mode determines its storage form; then quickly extracts necessary accompanying data or data sets according to the application business logic; finally, based on the determined storage forms of various types of data, data units are created to carry the above-mentioned various types of migration data.

用户、服务及数据互依赖关系如图2所示。具有合法身份的用户可以仅凭通过认证的身份标识获得“非数据访问型服务”的访问权,例如,发送自己的信息、提交感知的环境信息、询问非涉密信息等。但是,当它需要访问“数据访问型服务”时,必须凭借通过认证的身份标识与获得的授权令牌。“数据访问型服务”会涉及对数据的操作,因此,必须通过身份与权限验证才能被允许。首先,使用某个“数据访问型服务”的某用户身份是合法的,且有使用该“数据访问型服务”的权限,然后,该“数据访问型服务”的身份也是合法的,且有对某类型数据(例如,用户采集数据、服务处理数据、系统储存数据等)进行操作或处理的权限。The interdependence between users, services and data is shown in Figure 2. Users with legal identities can only obtain access rights to "non-data access services" based on authenticated identities, such as sending their own information, submitting perceived environmental information, asking for non-confidential information, etc. However, when it needs to access the "data access service", it must rely on the authenticated identity and the obtained authorization token. "Data access services" involve operations on data, and therefore, must pass identity and permission verification to be allowed. First, the identity of a user who uses a "data access service" is legal and has the right to use the "data access service". Then, the identity of the "data access service" is also legal, and there is a right to use the "data access service". The right to operate or process a certain type of data (for example, user collection data, service processing data, system storage data, etc.).

如图3所示,通过请求注册,提交审核信息,获得审核通过的反馈后,用户便具有了在边缘信息服务系统的合法身份。基于用户的合法身份以及它提交的应用服务请求,系统通过分析其应用业务逻辑后,会为它授予合适的权限,确保它既能获得满意的服务,又不会造成对其他用户或系统权限的侵犯。与用户一样,任何应用程序若要部署到系统中,都要事先被认证,以确保来源的可追溯性。同时,需要为其授予合适的数据权限,以确保数据被安全使用。进入系统的数据根据其来源,由其采集者或发布者给出数据被应用服务访问的权限要求,系统的数据权限管理服务会对数据进行统一的权限设置、更新、发布等操作。针对用户采集的数据,用户会按采集的时间、地点、采集手段等进行数据的单元化处理,并相应附上数据访问策略,供数据权限管理服务进行处理时参考。应用服务在运行过程中,若产生的中间结果需要共享给相关协作伙伴,也可基于共享内容创建数据单元,并相应附上数据访问策略,供数据权限管理服务进行处理时参考。系统本身储存的数据也由数据权限管理服务进行管理,依照应用服务对数据类型、数据格式、数据处理手段等要求,进行数据单元化处理,并设置合理的被访问权限,在满足应用服务对数据访问需求的前提下,保障数据本身的安全。As shown in Figure 3, after requesting registration, submitting audit information, and getting feedback that the audit is passed, the user has a legal identity in the edge information service system. Based on the legal identity of the user and the application service request submitted by it, after analyzing its application business logic, the system will grant it appropriate permissions to ensure that it can obtain satisfactory services without causing other users or system permissions. violated. Like users, any application deployed to the system must be certified in advance to ensure traceability of the source. At the same time, it needs to be granted appropriate data permissions to ensure that the data is used safely. According to the source of the data entering the system, the collector or publisher gives the permission requirements for the data to be accessed by the application service. The data permission management service of the system will perform unified permission setting, update, and release operations on the data. For the data collected by the user, the user will process the data in a unitized manner according to the collection time, location, collection method, etc., and attach the data access policy accordingly for reference when the data rights management service is processing. During the operation of the application service, if the intermediate results generated need to be shared with relevant partners, a data unit can also be created based on the shared content, and a data access policy can be attached accordingly for reference by the data rights management service. The data stored in the system itself is also managed by the data rights management service. According to the application service's requirements for data types, data formats, data processing methods, etc., data unit processing is performed, and reasonable access rights are set to meet the application service's requirements for data. On the premise of access requirements, ensure the security of the data itself.

在确保网络连通和不确定的无线网络条件这两类网络条件下,研究服务与数据跨节点访问与迁移技术,使用“计算密集型”、“数据密集型”、“时延敏感型”、“容错控制型”、“交互频繁型”等五个维度的特征对机动环境下的应用服务特点进行表征,然后,阐述典型组合场景下服务与数据跨节点访问与迁移技术的技术途径。Under the network conditions of ensuring network connectivity and uncertain wireless network conditions, research services and data cross-node access and migration technologies, using "computation-intensive", "data-intensive", "delay-sensitive", " The characteristics of five dimensions, such as fault-tolerant control type and frequent interaction type, characterize the characteristics of application services in a mobile environment, and then describe the technical approaches of cross-node access and migration of services and data in typical combination scenarios.

“计算密集型”应用的主要特点:需要消耗大量CPU资源;通常一个计算任务同时占用大量计算节点;CPU的核心数应匹配并发子任务数量;典型应用有高清视频解码、深度学习训练过程等。The main characteristics of "computing-intensive" applications: need to consume a lot of CPU resources; usually a computing task occupies a large number of computing nodes at the same time; the number of CPU cores should match the number of concurrent subtasks; typical applications include high-definition video decoding, deep learning training process, etc.

“数据密集型”应用的主要特点:大量独立的数据分析处理任务被分布在松耦合的不同计算节点上处理;具有高度密集的海量数据I/O吞吐需求;通常具有数据流驱动流程;典型应用有Web应用、软件即服务型云设施、对海量和高速变化的数据的获取、管理、分析、理解能力有很高需求的信息系统等。这类应用需要依赖数据密集型计算能力,包括高性能计算能力、数据分析与挖掘能力等。The main characteristics of "data-intensive" applications: a large number of independent data analysis and processing tasks are distributed and processed on different loosely coupled computing nodes; it has highly intensive mass data I/O throughput requirements; usually has data flow-driven processes; typical applications There are Web applications, software-as-a-service cloud facilities, and information systems that have high demands on the ability to acquire, manage, analyze, and understand massive and rapidly changing data. Such applications need to rely on data-intensive computing capabilities, including high-performance computing capabilities, data analysis and mining capabilities.

“时延敏感型”应用的主要特点:大多数应用都对时延有一定要求,且通常有个能容忍的阈值。当这个阈值很小时,就需要高优先级的资源配置来保障。由于资源的有限性,保障的难度增大,不能得到有效保障的概率增大,用户的应用体验就很差。“时延敏感型”应用是指需要将时延阈值设置得很小才能满足业务要求的应用。具有“时延敏感型”特点的服务对逻辑连接的暂时中断也很敏感。Main characteristics of "delay-sensitive" applications: Most applications have certain requirements for delay, and usually have a threshold that can be tolerated. When this threshold is small, high-priority resource allocation is required to ensure it. Due to the limited resources, the difficulty of guarantee increases, the probability of not being able to be effectively guaranteed increases, and the user's application experience is very poor. "Latency-sensitive" applications refer to applications that require a very small delay threshold to meet business requirements. Services that are "latency-sensitive" are also sensitive to temporary interruptions in logical connections.

“容错控制型”应用的主要特点:这里的容错控制是特指当信息系统中某些功能部件失效时,信息系统仍能按期望的性能或在可接受的性能损失情况下提供服务。具有“容错控制型”特点的服务将更能容忍逻辑连接的暂时中断。The main features of "fault-tolerant control" applications: The fault-tolerant control here refers to that when some functional components in the information system fail, the information system can still provide services according to the expected performance or under the condition of acceptable performance loss. Services with a "fault-tolerant control" feature will be more tolerant of temporary interruptions in logical connections.

“交互频繁型”应用的主要特点:通常涉及网络传输、磁盘IO等IO密集型任务的执行,但对CPU资源的消耗很少,任务的大部分时间都在等待IO操作完成,典型的应用有Web应用等。The main features of "frequently interactive" applications: usually involve the execution of IO-intensive tasks such as network transmission and disk IO, but consume very little CPU resources, and most of the time of the task is waiting for the IO operation to complete. Typical applications include Web applications, etc.

机动环境下的应用业务可能包括从云中心获取综合情报数据和接收任务指令、将复杂计算任务推送到云中心执行、将海量数据支撑的服务部署在云中心而在边缘平台提供就近接入访问、边缘平台整合多个端上数据以便共享与综合决策、云中心执行计算密集型的智能训练任务而边缘基于训练模型做推断来满足“时延敏感型”应用的需要、遵循端、边、云顺序对数据进行由粗到精的分级处理以缓解传输压力,依照云、边、端顺序对服务进行逐级缓存以减少访问延时。The application business in the mobile environment may include obtaining comprehensive intelligence data and receiving task instructions from the cloud center, pushing complex computing tasks to the cloud center for execution, deploying services supported by massive data in the cloud center and providing nearby access access on the edge platform, The edge platform integrates multiple end-to-end data for sharing and comprehensive decision-making, the cloud center performs computationally intensive intelligent training tasks, and the edge makes inference based on the training model to meet the needs of "delay-sensitive" applications, following the order of end, edge, and cloud. Data is graded from coarse to fine to ease transmission pressure, and services are cached step by step in the order of cloud, edge, and end to reduce access latency.

鉴于机动环境下的业务应用特点,实际的服务类型具有丰富多样性,网络条件又具有高度动态变化的特性。因此,需要适应不同网络条件下不同服务特点的服务与数据跨节点访问与迁移技术,构建对相关接入请求方透明的一体化跨节点访问与迁移机制。重点突破云-边和边-边通联条件下自适应服务特点透明跨节点访问与迁移框架、不确定网络条件下自适应服务特点透明跨节点访问与迁移框架。In view of the characteristics of business applications in a mobile environment, the actual service types are rich and diverse, and the network conditions are highly dynamic. Therefore, cross-node access and migration technologies for services and data that adapt to different service characteristics under different network conditions are needed, and an integrated cross-node access and migration mechanism that is transparent to relevant access requesters is needed. The key breakthroughs are the transparent cross-node access and migration framework for adaptive service characteristics under cloud-edge and edge-edge communication conditions, and the transparent cross-node access and migration framework for adaptive service characteristics under uncertain network conditions.

在无线通联环境下跨节点访问与迁移的智能决策框架如图5所示(选择与其它连通子网机会性连通概率最大的边缘节点替代云中心行使协调职责,主要是为了在端设备跨越了非连通的两个子网时,便于其利用比其它边节点更高的机会连通概率进行接入认证与元信息同步。在这种间歇性弱连接环境下,需要对服务与数据在隔离的子网之间进行预同步。因此,功能组件化与数据单元化、以及基础性的共性功能组件与共性数据单元的准确预置极为重要。这有助于构建轻量化的迁移服务容器镜像,同时,也便于迁移服务仅携带个性化的增量数据单元以避免不必要的冗余迁移)。在该框架下,设置于边缘计算平台的边缘处理引擎负责接纳端设备的服务请求。无论是边缘计算平台独立决定为端设备建立服务,还是请求云中心协作共建服务,都会重定向服务请求到云中心的云处理引擎,借助云中心的海量数据支撑以及强大的计算能力进行智能分析与决策,以便得到连接维护策略。例如,若端设备离开当前接入的边节点,而随遇接入其它边节点,是使用基于边-边协作的服务迁移或数据迁移,还是采用云-边协同服务与数据迁移,需要通过智能决策来定夺。智能分析与决策模块基于已训练好的机器学习模型工作,该模型也可前推到边缘计算平台以缩小响应延时。端设备也会委托当前接入的边节点向云中心反馈随遇接入体验。云中心根据接收的各种反馈,结合服务特点、网络条件的动态变化等执行机器学习训练决策模型。The intelligent decision-making framework for cross-node access and migration in the wireless communication environment is shown in Figure 5 (the edge node with the highest probability of opportunistic connection with other connected subnets is selected to replace the cloud center to perform coordination duties, mainly for When two connected subnets are connected, it is convenient for them to use a higher probability of connection than other edge nodes to perform access authentication and meta-information synchronization. In this intermittent weak connection environment, it is necessary to ensure that services and data are separated between the isolated subnets. Pre-synchronization is performed between them. Therefore, it is very important to make functional components and data units, as well as to accurately pre-set basic common functional components and common data units. This helps to build a lightweight migration service container image, and at the same time, it is also convenient for The migration service only carries personalized incremental data units to avoid unnecessary redundant migrations). Under this framework, the edge processing engine set on the edge computing platform is responsible for receiving service requests from end devices. Whether the edge computing platform independently decides to establish a service for the terminal device or requests the cloud center to collaborate and build a service, it will redirect the service request to the cloud processing engine of the cloud center, and perform intelligent analysis with the support of massive data and powerful computing power of the cloud center and decisions in order to get the connection maintenance strategy. For example, if an end device leaves the currently accessed edge node and accesses other edge nodes as it encounters, whether to use edge-edge collaboration-based service migration or data migration, or cloud-edge collaboration service and data migration, it needs to be intelligently decision to decide. The intelligent analysis and decision-making module works based on the trained machine learning model, which can also be pushed forward to the edge computing platform to reduce the response delay. The end device will also entrust the currently connected edge node to feed back the random access experience to the cloud center. The cloud center executes machine learning to train the decision-making model according to various feedbacks received, combined with service characteristics and dynamic changes in network conditions.

采用Q-Learning方法对机器学习过程进行建模。该方法包括reward表和Q表,它们都可以表示为以状态为行和以行动为列的二维矩阵,但reward表的值为给定状态中采取某一行动的收益,而Q表的值记录了行动的偏好。针对具有“计算密集型”、“数据密集型”、“时延敏感型”、“容错控制型”和“交互频繁型”等特点的服务,分别分析它们在基于边-边服务迁移保持有效接入环境下的逻辑连接的性能、基于边-边数据迁移保持有效接入环境下的逻辑连接的性能、基于云-边协同保持有效接入环境下的逻辑连接的性能。分析结果作为Q-Learning中reward表的初始值。该性能值即为逻辑连接上时延约束的端到端传输的应用性能吻合度,从端设备体验角度,使用不吻合、基本吻合、吻合来进行定性度量。The machine learning process is modeled using the Q-Learning method. The method includes a reward table and a Q table, both of which can be represented as a two-dimensional matrix with states as rows and actions as columns, but the value of the reward table is the payoff of taking an action in a given state, and the value of the Q table Action preferences are recorded. For services with characteristics of "computation-intensive", "data-intensive", "delay-sensitive", "fault-tolerant control" and "interaction-frequent", analyze their performance in maintaining effective connection based on edge-to-edge service migration. The performance of the logical connection in the entry environment, the performance of the logical connection in the effective access environment based on edge-edge data migration, and the performance of the logical connection in the effective access environment based on cloud-edge collaboration. The analysis result is used as the initial value of the reward table in Q-Learning. This performance value is the application performance conformity of the end-to-end transmission constrained by the delay on the logical connection. From the perspective of the end device experience, non-conformity, basic conformity, and conformity are used to qualitatively measure.

Q-Learning中状态集合可考虑“计算密集型”、“数据密集型”、“时延敏感型”、“容错控制型”和“交互频繁型”等反映服务特点的维度,以及请求服务的端设备跨节点接入的频度(如频繁跨节点接入、偶尔跨节点接入、不跨节点接入)等进行组合得到。Q-Learning中行动类型包括采用边-边服务迁移保障接入有效性的策略、采用边-边连接中继保障接入有效性的策略、采用云-边协同保障接入有效性的策略,以及不采用任何保障接入有效性的策略。The state set in Q-Learning can consider the dimensions that reflect the characteristics of the service, such as "computation-intensive", "data-intensive", "delay-sensitive", "fault-tolerant control" and "interaction frequently", as well as the end requesting service. The frequency of device cross-node access (such as frequent cross-node access, occasional cross-node access, and no cross-node access) is obtained by combining them. The types of actions in Q-Learning include the strategy of using edge-to-edge service migration to ensure access availability, the strategy of using edge-edge connection relays to ensure access availability, the strategy of using cloud-edge collaboration to ensure access availability, and Do not adopt any strategy to guarantee the validity of access.

当云中心收到边缘处理引擎重定向的服务请求后,通过智能分析与决策模块得出所请求服务的特点,用五个类型维度之一或其组合进行表征,再根据端设备接入行为的历史数据利用典型数据挖掘方法进行挖掘分析,得出跨节点接入的频度类别,由此得出端设备的当前状态。基于已训练的Q表,搜寻可行路径,将当前状态转换到能满足逻辑连接时延约束端到端传输应用性能吻合度的状态,而触发到达满意状态的行动即为期望找到的连接维护策略。端设备实际体验的及时反馈以及Q值更新函数的设计也关系到逻辑连接时延约束端到端传输应用性能的稳定性。When the cloud center receives the service request redirected by the edge processing engine, it obtains the characteristics of the requested service through the intelligent analysis and decision-making module, characterizes it with one of the five types of dimensions or a combination thereof, and then according to the history of the end device access behavior The data is mined and analyzed by typical data mining methods, and the frequency category of cross-node access is obtained, thereby obtaining the current state of the terminal equipment. Based on the trained Q table, a feasible path is searched, and the current state is converted to a state that can satisfy the logical connection delay constraint end-to-end transmission application performance consistency, and the action that triggers the satisfactory state is the desired connection maintenance strategy. The timely feedback of the actual experience of the end device and the design of the Q value update function are also related to the stability of the end-to-end transmission application performance constrained by the delay of the logical connection.

在机动环境下,随着环境的恶化,网络在同一时刻完全互联的可能性会逐渐下降。任一时刻都存在孤立的一个或若干个边-边互联子网,甚至完全孤立的边缘节点的可能性逐渐增大。同时,孤立的边-边互联子网或完全孤立的边缘节点也显现高度动态性,随时间时而聚合互联时而分离断连。一方面,采用不同移动模型(如随机路点、随机游走、随机方向、随机旅行、平滑随机移动、高速公路移动、曼哈顿网格移动)在不同节点规模场景下的网络拓扑动态变化趋势,探讨云边子网和边边子网维持通联的网络条件、建模机会连通概率模型,指导不确定无线环境下跨节点访问与迁移的智能决策框架设计。另一方面,采用“虚拟心跳线”机制,要求云-边融合网中每对节点之间彼此监测连通信息。为节省网络带宽,充分利用应用业务数据包进行捎带,前述的基于机会捎带搭载的流式迁移技术和面向业务特征与机会捎带的元信息同步负荷最小化技术也可以被利用来传输心跳信息包。基于心跳信息包交互的信息,与云隔离的边缘节点可以互相连接组成独立的连通子网,并选择与其它连通子网机会性连通概率最大的边缘节点替代云中心的角色,协调本连通子网内端设备的跨节点随遇接入连接工作,即在本连通子网内,为跨节点接入的端设备提供连通当前接入点与因移动而断链的接入点之间的路由,协助进行接入认证与元信息同步。In a mobile environment, the probability of the network being fully interconnected at the same time gradually decreases as the environment deteriorates. At any time, there is one or several isolated edge-edge interconnection subnets, and the possibility of even completely isolated edge nodes gradually increases. At the same time, isolated edge-edge interconnection subnets or completely isolated edge nodes also exhibit high dynamics, with time-to-time aggregation and interconnection and separation and disconnection. On the one hand, using different movement models (such as random waypoint, random walk, random direction, random travel, smooth random movement, highway movement, Manhattan grid movement), the dynamic change trend of network topology under different node scale scenarios is discussed. Cloud-edge subnets and edge-edge subnets maintain network conditions for connectivity, model opportunistic connectivity probability models, and guide the design of intelligent decision-making frameworks for cross-node access and migration in uncertain wireless environments. On the other hand, the "virtual heartbeat" mechanism is adopted, which requires each pair of nodes in the cloud-edge fusion network to monitor the connectivity information with each other. In order to save network bandwidth and make full use of application service data packets for piggybacking, the aforementioned streaming migration technology based on opportunistic piggybacking and meta-information synchronization load minimization technology oriented to service characteristics and opportunistic piggybacking can also be used to transmit heartbeat packets. Based on the information exchanged by heartbeat packets, edge nodes isolated from the cloud can be connected to each other to form an independent connected subnet, and the edge node with the highest probability of opportunistic connectivity with other connected subnets is selected to replace the role of the cloud center to coordinate this connected subnet. The cross-node access connection of the internal end device works on occasion, that is, in this connected subnet, it provides a route between the current access point and the access point disconnected due to movement for the end device connected across the nodes. Assists in access authentication and meta-information synchronization.

上述实施例只为说明本发明的技术构思及特点,其目的在于让熟悉此项技术的人士能够了解本发明的内容并据以实施,并不能以此限制本发明的保护范围。凡根据本发明精神实质所作的等效变化或修饰,都应涵盖在本发明的保护范围之内。The above-mentioned embodiments are only intended to illustrate the technical concept and characteristics of the present invention, and the purpose thereof is to enable those who are familiar with the art to understand the content of the present invention and implement them accordingly, and cannot limit the protection scope of the present invention. All equivalent changes or modifications made according to the spirit of the present invention should be included within the protection scope of the present invention.

Claims (6)

1. A method for service migration under narrowband weak networking conditions, comprising the steps of:
(a) enabling each edge service node and the end user served by the edge service node to monitor the state of the logical connection with each other through periodic beacon information;
(b) when the logic connection fails, the edge service node reports migration requirements to a virtual main node in a cloud center or a mobile edge service node set, and the end user actively searches other possible access objects and delegates the access objects to report to the cloud center or the virtual main node after successful access;
(c) and the cloud center or the virtual main node determines a migration path and migrates the migration path according to the maintained and updated cloud-edge or edge-edge fusion network routing graph after acquiring the addresses of the initiating node of the service to be migrated and the receiving node expected to receive the migration service.
2. The method of service migration under narrowband weak networking conditions of claim 1, wherein: in the step (a), the access state information of the end user is periodically reported to a virtual main node in a cloud center or a mobile edge service node set through the edge service node accessed by the end user.
3. The method of service migration under narrowband weak networking conditions of claim 2, wherein: in the step (a), the access state information includes an end user identification number and an end user current position, an accessed edge service node identification number and an edge service node current position, and successful access times, and the information content of the successful access times includes logic connection maintaining time of each access and is listed according to the time sequence of the requested access.
4. A method of service migration in narrowband weak networking conditions according to claim 2 or 3, characterized by: in the step (a), the cloud center or the virtual main node calculates the measurement values of the access request density and the average access maintenance time for each end user, and the measurement values are represented by a historical access time sequence diagram; the request density is the frequency of finding access objects and sending requests in a given time length to measure the frequency of one end user to encounter a certain edge service node, and the average access maintenance time is the average value of all successfully accessed connection maintenance time lengths in the given time length to measure the stability of connection.
5. The method of service migration under narrowband weak networking conditions of claim 2, wherein: in the step (a), the cloud center or the virtual master node performs clustering based on a k-means clustering algorithm by using the number of edge service nodes as a parameter k, edge service node coordinates as an initial clustering center, and a distance between an end user and the clustering center as a metric value, so as to generate k clusters.
6. The method for service migration in narrowband weak networking conditions of claim 1, wherein: in the step (c), the migration adopts a service lightweight containerization package migration technology.
CN202010234294.XA 2020-03-30 2020-03-30 A method for service migration under the condition of narrow-band weakly connected network Active CN111432005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010234294.XA CN111432005B (en) 2020-03-30 2020-03-30 A method for service migration under the condition of narrow-band weakly connected network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010234294.XA CN111432005B (en) 2020-03-30 2020-03-30 A method for service migration under the condition of narrow-band weakly connected network

Publications (2)

Publication Number Publication Date
CN111432005A true CN111432005A (en) 2020-07-17
CN111432005B CN111432005B (en) 2022-07-29

Family

ID=71549890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010234294.XA Active CN111432005B (en) 2020-03-30 2020-03-30 A method for service migration under the condition of narrow-band weakly connected network

Country Status (1)

Country Link
CN (1) CN111432005B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751924A (en) * 2020-12-29 2021-05-04 北京奇艺世纪科技有限公司 Data pushing method, system and device
CN113489787A (en) * 2021-07-06 2021-10-08 北京邮电大学 Method and device for collaborative migration of mobile edge computing service and data
CN113852693A (en) * 2021-09-26 2021-12-28 北京邮电大学 A Migration Method for Edge Computing Services
WO2023016309A1 (en) * 2021-08-09 2023-02-16 International Business Machines Corporation Distributed machine learning in edge computing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015034435A1 (en) * 2013-09-03 2015-03-12 Nanyang Technological University A method for managing a data center network
CN107864055A (en) * 2017-10-31 2018-03-30 云宏信息科技股份有限公司 The management method and platform of virtualization system
CN110275758A (en) * 2019-05-09 2019-09-24 重庆邮电大学 A method for intelligent migration of virtual network functions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015034435A1 (en) * 2013-09-03 2015-03-12 Nanyang Technological University A method for managing a data center network
CN107864055A (en) * 2017-10-31 2018-03-30 云宏信息科技股份有限公司 The management method and platform of virtualization system
CN110275758A (en) * 2019-05-09 2019-09-24 重庆邮电大学 A method for intelligent migration of virtual network functions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
彭军,等: "一种车载服务的快速深度Q学习网络边云迁移策略", 《电子与信息学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751924A (en) * 2020-12-29 2021-05-04 北京奇艺世纪科技有限公司 Data pushing method, system and device
CN113489787A (en) * 2021-07-06 2021-10-08 北京邮电大学 Method and device for collaborative migration of mobile edge computing service and data
CN113489787B (en) * 2021-07-06 2023-01-17 北京邮电大学 A method and device for collaborative migration of services and data in mobile edge computing
WO2023016309A1 (en) * 2021-08-09 2023-02-16 International Business Machines Corporation Distributed machine learning in edge computing
US11770305B2 (en) 2021-08-09 2023-09-26 International Business Machines Corporation Distributed machine learning in edge computing
CN113852693A (en) * 2021-09-26 2021-12-28 北京邮电大学 A Migration Method for Edge Computing Services

Also Published As

Publication number Publication date
CN111432005B (en) 2022-07-29

Similar Documents

Publication Publication Date Title
CN111432005B (en) A method for service migration under the condition of narrow-band weakly connected network
Sonbol et al. EdgeKV: Decentralized, scalable, and consistent storage for the edge
Cardellini et al. Optimal operator deployment and replication for elastic distributed data stream processing
Lakshmanan et al. Placement strategies for internet-scale data stream systems
EP3069228B1 (en) Partition-based data stream processing framework
CN101697526A (en) Method and system for load balancing of metadata management in distributed file system
CN110688213B (en) Resource management method, system and electronic device based on edge computing
Mansouri et al. Hierarchical data replication strategy to improve performance in cloud computing
CN103581332A (en) HDFS framework and pressure decomposition method for NameNodes in HDFS framework
US11947555B1 (en) Intelligent query routing across shards of scalable database tables
Dou et al. Architecture of virtual edge data center with intelligent metadata service of a geo-distributed file system
Guo et al. Energy-efficient fault-tolerant scheduling algorithm for real-time tasks in cloud-based 5G networks
Taghizadeh et al. An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment
Panigrahi et al. DATALET: An approach to manage big volume of data in cyber foraged environment
Zyrianoff et al. Cache-it: A distributed architecture for proactive edge caching in heterogeneous iot scenarios
Li et al. Neighborhood search-based job scheduling for IoT big data real-time processing in distributed edge-cloud computing environment
Zarei et al. Past, present and future of hadoop: a survey
CN102882943B (en) Service copy reading/writing method and system
Maghsoudloo et al. Elastic HDFS: interconnected distributed architecture for availability–scalability enhancement of large-scale cloud storages
Ali et al. ProKube: Proactive kubernetes orchestrator for inference in heterogeneous edge computing
Saravanakumar et al. An Efficient Technique for Virtual Machine Clustering and Communications Using Task‐Based Scheduling in Cloud Computing
US20230176913A1 (en) Cross-domain cabin computing system and method based on data resource distribution
US12105692B1 (en) Shard management for scaling database tables
US11381468B1 (en) Identifying correlated resource behaviors for resource allocation
CN115934748A (en) Switch distribution and metrics collection and summary system and method based on distributed SQL

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20241129

Address after: B-1608, 16th Floor, Building 1, No. 18 Zhongguancun East Road, Haidian District, Beijing 100190

Patentee after: Beijing Zhongke Frontier Technology Co.,Ltd.

Country or region after: China

Address before: 215123 unit g1-701, No. 88 Jinjihu Avenue Road, Suzhou Industrial Park, Jiangsu Province

Patentee before: EDGE INTELLIGENCE OF CAS Co.,Ltd.

Country or region before: China