CN113961323A - Security-aware task scheduling method and system for hybrid cloud - Google Patents
Security-aware task scheduling method and system for hybrid cloud Download PDFInfo
- Publication number
- CN113961323A CN113961323A CN202111221481.5A CN202111221481A CN113961323A CN 113961323 A CN113961323 A CN 113961323A CN 202111221481 A CN202111221481 A CN 202111221481A CN 113961323 A CN113961323 A CN 113961323A
- Authority
- CN
- China
- Prior art keywords
- task
- cloud
- scheduled
- tasks
- public cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
Abstract
The invention relates to a security perception task scheduling method and system facing a hybrid cloud, aiming at all tasks to be executed, tasks which have no security requirement and can be completed on a public cloud are pre-scheduled to the public cloud, limited private cloud resources are reserved as much as possible, the public cloud resources with rich computing resources are used for meeting the task requirement without the security requirement, the richness of the public cloud computing resources is fully utilized, then the tasks which are not pre-scheduled to the public cloud and can be completed on the private cloud are scheduled to the private cloud, the requirement of as many tasks as possible is met, and finally the tasks which can be completed on the private cloud in the tasks pre-scheduled to the public cloud are scheduled to the private cloud, so that the renting cost of the public cloud is reduced, the private cloud resources with low cost are fully utilized, and the use efficiency of the resources is improved.
Description
Technical Field
The invention relates to a security perception task scheduling method and system facing a hybrid cloud.
Background
In recent decades, cloud computing has been paid attention to the business and academic circles due to its many advantages, and more providers adopt a cloud computing mode to provide services for their users. Although cloud computing resources are "unlimited" to users, in reality private cloud resources owned by an enterprise are limited, especially for small to medium enterprises. In order to solve the problems, a hybrid cloud technology is proposed, which provides a scheme for elastic resource expansion for enterprise private clouds through public clouds and is pursued by broad providers. Although the public cloud can provide rich computing resources, the network latency and bandwidth performance of the public cloud are relatively poor, and the public cloud cannot guarantee the safety of the task executed by the public cloud. Security is a primary factor for enterprises to decide whether to outsource their user requests to the public cloud. Therefore, when the request task is processed, the task with the security requirement can only be processed on the private cloud, and the task without the security requirement can be processed on the private cloud and the public cloud.
In the hybrid cloud environment, in order to provide quality of service and resource use efficiency, much work has been focused on the design of a task scheduling method for processing by reasonably mapping a user's request task to a hybrid cloud resource. However, the existing task scheduling methods do not consider safe execution of tasks, which greatly limits the application scope of the tasks. In addition, the existing security awareness scheduling methods preferentially use private cloud resources, and only when the private cloud resources are insufficient, the task is scheduled to the public cloud for processing. The task without the security requirement is preferentially scheduled to the private cloud by preferentially using the private cloud resources, so that the private cloud resources with limited resources are more scarce when the task with the security requirement is processed.
Disclosure of Invention
The invention provides a security perception task scheduling method and system facing a hybrid cloud, which are used for solving the technical problem that private cloud resources are more scarce when processing tasks with security requirements due to the fact that the private cloud resources are preferentially used.
The invention adopts the following technical scheme:
a safety perception task scheduling method facing to a hybrid cloud comprises the following steps:
step S1: for all tasks to be executed, pre-scheduling the tasks which have no safety requirement and can be completed on the public cloud to the public cloud;
step S2: scheduling the tasks which are not pre-scheduled to the public cloud and can be completed on the private cloud in all the tasks to be executed to the private cloud;
step S3: and aiming at the tasks which are pre-scheduled on the public cloud, scheduling the tasks which can be completed on the private cloud in the tasks which are pre-scheduled on the public cloud to the private cloud.
Further, in step S1, the task that can be completed on the public cloud is specifically: for a task scheduled on a public cloud, the completion time for completing the task is no later than the deadline for the task.
Further, the calculation formula of the completion time of the task scheduled to the public cloud is:
wherein, tiTo schedule the ith task to the public cloud, ftiAs task tiCompletion time of ti-1To schedule the i-1 st task to the public cloud, fti-1As task ti-1Completion time of oiAs task tiAmount of output data of oi-1As task ti-1Amount of output data of aiAs task tiAmount of computing resources required, ai-1As task ti-1Amount of computing resources required, iniAs task tiC is the computing resource amount of the public cloud, up is the uplink bandwidth of the public cloud, and down is the downlink bandwidth of the public cloud.
Further, in step S2, the task that can be completed on the private cloud is specifically: for a task scheduled onto the private cloud, the completion time to complete the task is no later than the deadline for the task.
In one step, the calculation formula of the completion time of the task scheduled to the private cloud is:
wherein, TjFor the jth task scheduled to the private cloud, FTjFor task TjCompletion time of (D), Tj-1For the j-1 st task scheduled to the private cloud, FTj-1For task Tj-1Completion time of (1), OjFor task TjAmount of output data of Oj-1For task Tj-1Amount of output data of AjFor task TjAmount of computing resources required, Aj-1For task Tj-1Amount of computing resources required, INjFor task TjC is the amount of computing resources of the private cloud, r is the bandwidth of the private cloud for reading data in the local file system, and w is the bandwidth of the private cloud for writing data in the local file system.
A hybrid cloud-oriented security-aware task scheduling system comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the hybrid cloud-oriented security-aware task scheduling method when executing the computer program.
The invention has the beneficial effects that: the method comprises the steps of firstly pre-scheduling all tasks which have no safety requirement and can be completed on a public cloud to the public cloud, fully utilizing abundant public cloud resources to complete tasks which have no safety requirement as much as possible, reserving private cloud resources as much as possible, then scheduling all tasks which are not pre-scheduled to the public cloud and can be completed on the private cloud to the private cloud, processing the tasks which need to be processed through the private cloud by utilizing the private cloud resources, improving the safety of task processing, and finally scheduling the tasks which can be completed on the private cloud in the tasks which are pre-scheduled to the public cloud to the private cloud, so that the resource amount on the public cloud is reduced, and the use efficiency of rented cloud resources is improved. Therefore, the hybrid cloud-oriented security perception task scheduling method provided by the invention fully reserves limited private cloud resources as much as possible, meets the task requirement without security requirement by utilizing public cloud resources with rich computing resources, and fully utilizes the richness of the public cloud computing resources; then, private cloud resources are utilized to meet the requirements of as many tasks as possible; and finally, the task scheduled on the public cloud is rescheduled to the private cloud, so that the renting cost of the public cloud is reduced, the low-cost private cloud resources are fully utilized, the use efficiency of the resources is improved, and the technical problem that the private cloud resources with limited resources are more scarce when the task with the safety requirement is processed by preferentially using the private cloud resources is solved.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
fig. 1 is a schematic overall flow diagram of a hybrid cloud-oriented security-aware task scheduling method according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
In order to explain the technical means described in the present application, the following description will be given by way of specific embodiments.
Referring to fig. 1, it is a flowchart of a hybrid cloud-oriented security-aware task scheduling method provided in an embodiment of the present application, and for convenience of description, only a part related to the embodiment of the present application is shown.
Step S1: for all tasks to be executed, pre-scheduling tasks to the public cloud, wherein the tasks have no security requirements and can be completed on the public cloud:
and for all tasks to be executed, pre-scheduling the tasks which have no safety requirement and can be completed on the public cloud to the public cloud. The scheduling policy corresponding to this step is a deadline first policy. Whether the task has the safety requirement is set according to actual requirements, for example, a safety requirement judgment condition is preset, all tasks to be executed are input into the safety requirement judgment condition, if the safety requirement judgment condition is met, the task is represented as a task with the safety requirement, and otherwise, the task is a task without the safety requirement. It should be understood that the safety requirement judgment condition is set by actual requirements, such as human setting. Pre-scheduling to a public cloud means scheduling to a public cloud first.
The tasks that can be completed on the public cloud are specifically: for a task scheduled onto the public cloud, the completion time to complete the task is earlier than the deadline for the task. Namely: for a task, if the task is scheduled on the public cloud, it can be completed before or when the deadline for the task comes. That is, the following formula is satisfied for any task scheduled to the public cloud:
fti≤di
wherein, tiTo schedule the ith task to the public cloud, ftiAs task tiCompletion time of diAs task tiA number of less than or equal to represents the task tiIs not later than its deadline.
In this embodiment, task tiThe completion time of (d) is calculated as:
wherein max () is a maximum function, the same as below; t is ti-1To schedule the i-1 st task to the public cloud, fti-1As task ti-1Completion time of oiAs task tiOutput of (2)Amount of data, oi-1As task ti-1Amount of output data of aiAs task tiAmount of computing resources required, ai-1As task ti-1Amount of computing resources required, iniAs task tiC is the computing resource amount of the public cloud, up is the uplink bandwidth of the public cloud, and down is the downlink bandwidth of the public cloud.
It should be understood that task t is given aboveiThe specific calculation mode of the completion time relates to various related data information, and the task t can be accurately calculatediThe completion time of the task scheduling is shortened, and the accuracy of the task scheduling is improved. As another embodiment, other calculation processes may be used for calculation.
Step S2: scheduling, to a private cloud, a task that is not pre-scheduled to the public cloud and that can be completed on the private cloud, of the all tasks to be executed:
after step S1, tasks that are not pre-scheduled to the public cloud remain, and then tasks that can be completed on the private cloud are scheduled to the private cloud, among all tasks to be executed, that are not pre-scheduled to the public cloud. The scheduling strategy corresponding to the step is also a deadline first strategy.
The tasks that can be completed on the private cloud are specifically: for a task scheduled onto the private cloud, the completion time to complete the task is no later than the deadline for the task. Namely: for a task, if the task is scheduled on the private cloud, it can be completed before or when the deadline for the task comes. That is, the following formula is satisfied for any task scheduled to the private cloud:
FTj≤Dj
wherein, TjFor the jth task scheduled to the private cloud, FTjFor task TjCompletion time of (D)jFor task TjA number of less than or equal to represents the task TjIs not later than its deadline.
In this embodiment, task TjFormula for calculating completion time ofComprises the following steps:
wherein, Tj-1For the j-1 st task scheduled to the private cloud, FTj-1For task Tj-1Completion time of (1), OjFor task TjAmount of output data of Oj-1For task Tj-1Amount of output data of AjFor task TjAmount of computing resources required, Aj-1For task Tj-1Amount of computing resources required, INjFor task TjC is the amount of computing resources of the private cloud, r is the bandwidth of the private cloud for reading data in the local file system, and w is the bandwidth of the private cloud for writing data in the local file system.
It should be understood that task T is given abovejThe specific calculation mode of the completion time relates to various related data information, and the task T can be accurately calculatedjThe completion time of the task scheduling is shortened, and the accuracy of the task scheduling is improved. As another embodiment, other calculation processes may be used for calculation.
Step S3: aiming at tasks which are pre-scheduled to the public cloud, scheduling the tasks which can be completed on the private cloud in the tasks which are pre-scheduled to the public cloud to the private cloud:
after the task that can be completed on the private cloud is scheduled to the private cloud in step S2, the task that is pre-scheduled to the public cloud in step S1 is re-processed as follows: and scheduling the tasks which can be completed on the private cloud in the tasks which are pre-scheduled on the public cloud to the private cloud, so that the low-cost private cloud resources are fully utilized, and the use efficiency of the private cloud resources is improved.
The embodiment also provides a security-aware task scheduling system for a hybrid cloud, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, the steps of the security-aware task scheduling method for the hybrid cloud are implemented.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.
Claims (6)
1. A safety perception task scheduling method facing to a hybrid cloud is characterized by comprising the following steps:
step S1: for all tasks to be executed, pre-scheduling the tasks which have no safety requirement and can be completed on the public cloud to the public cloud;
step S2: scheduling the tasks which are not pre-scheduled to the public cloud and can be completed on the private cloud in all the tasks to be executed to the private cloud;
step S3: and aiming at the tasks which are pre-scheduled on the public cloud, scheduling the tasks which can be completed on the private cloud in the tasks which are pre-scheduled on the public cloud to the private cloud.
2. The hybrid cloud-oriented security-aware task scheduling method of claim 1,
in step S1, the task that can be completed on the public cloud is specifically: for a task scheduled on a public cloud, the completion time for completing the task is no later than the deadline for the task.
3. The hybrid cloud-oriented security-aware task scheduling method of claim 2,
the calculation formula of the completion time of the task scheduled on the public cloud is:
wherein, tiTo schedule the ith task to the public cloud, ftiAs task tiCompletion time of ti-1To schedule the i-1 st task to the public cloud, fti-1As task ti-1Completion time of oiAs task tiAmount of output data of oi-1As task ti-1Amount of output data of aiAs task tiAmount of computing resources required, ai-1As task ti-1Amount of computing resources required, iniAs task tiC is the computing resource amount of the public cloud, up is the uplink bandwidth of the public cloud, and down is the downlink bandwidth of the public cloud.
4. The hybrid cloud-oriented security-aware task scheduling method of claim 1,
in step S2, the task that can be completed on the private cloud is specifically: for a task scheduled onto the private cloud, the completion time to complete the task is no later than the deadline for the task.
5. The hybrid cloud-oriented security-aware task scheduling method of claim 4,
the calculation formula for the completion time of the task scheduled onto the private cloud is:
wherein, TjFor the jth task scheduled to the private cloud, FTjFor task TjCompletion time of (D), Tj-1For the j-1 st task scheduled to the private cloud, FTj-1For task Tj-1Completion time of (1), OjFor task TjAmount of output data of Oj-1For task Tj-1Amount of output data of AjIs a taskAffair TjAmount of computing resources required, Aj-1For task Tj-1Amount of computing resources required, INjFor task TjC is the amount of computing resources of the private cloud, r is the bandwidth of the private cloud for reading data in the local file system, and w is the bandwidth of the private cloud for writing data in the local file system.
6. A hybrid cloud-oriented security-aware task scheduling system comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps of the hybrid cloud-oriented security-aware task scheduling method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111221481.5A CN113961323B (en) | 2021-10-20 | 2021-10-20 | Hybrid cloud-oriented security perception task scheduling method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111221481.5A CN113961323B (en) | 2021-10-20 | 2021-10-20 | Hybrid cloud-oriented security perception task scheduling method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113961323A true CN113961323A (en) | 2022-01-21 |
CN113961323B CN113961323B (en) | 2022-06-14 |
Family
ID=79465702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111221481.5A Active CN113961323B (en) | 2021-10-20 | 2021-10-20 | Hybrid cloud-oriented security perception task scheduling method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113961323B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657220A (en) * | 2015-03-12 | 2015-05-27 | 广东石油化工学院 | Model and method for scheduling for mixed cloud based on deadline and cost constraints |
CN107292419A (en) * | 2017-05-22 | 2017-10-24 | 四川大学 | The Cost Optimization strategy that dynamic Multi-workflow scheduling is performed in a kind of mixing cloud environment |
CN107659433A (en) * | 2017-09-08 | 2018-02-02 | 中国联合网络通信集团有限公司 | A kind of cloud resource dispatching method and equipment |
CN107908458A (en) * | 2017-11-10 | 2018-04-13 | 苏州铭冠软件科技有限公司 | A kind of cloud computing data resource dispatching method for considering time and expense |
CN109710392A (en) * | 2018-12-21 | 2019-05-03 | 万达信息股份有限公司 | A kind of heterogeneous resource dispatching method based on mixed cloud |
CN110377411A (en) * | 2019-07-22 | 2019-10-25 | 郑州轻工业学院 | A kind of the workflow task dispatching method and system of Based on Distributed cloud |
US20190332431A1 (en) * | 2017-11-20 | 2019-10-31 | International Business Machines Corporation | Allocating tasks in a computing environment |
WO2022041271A1 (en) * | 2020-08-31 | 2022-03-03 | 苏州铭冠软件科技有限公司 | Cloud data resource scheduling method considering time and expense in rail transit applications |
-
2021
- 2021-10-20 CN CN202111221481.5A patent/CN113961323B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657220A (en) * | 2015-03-12 | 2015-05-27 | 广东石油化工学院 | Model and method for scheduling for mixed cloud based on deadline and cost constraints |
CN107292419A (en) * | 2017-05-22 | 2017-10-24 | 四川大学 | The Cost Optimization strategy that dynamic Multi-workflow scheduling is performed in a kind of mixing cloud environment |
CN107659433A (en) * | 2017-09-08 | 2018-02-02 | 中国联合网络通信集团有限公司 | A kind of cloud resource dispatching method and equipment |
CN107908458A (en) * | 2017-11-10 | 2018-04-13 | 苏州铭冠软件科技有限公司 | A kind of cloud computing data resource dispatching method for considering time and expense |
US20190332431A1 (en) * | 2017-11-20 | 2019-10-31 | International Business Machines Corporation | Allocating tasks in a computing environment |
CN109710392A (en) * | 2018-12-21 | 2019-05-03 | 万达信息股份有限公司 | A kind of heterogeneous resource dispatching method based on mixed cloud |
CN110377411A (en) * | 2019-07-22 | 2019-10-25 | 郑州轻工业学院 | A kind of the workflow task dispatching method and system of Based on Distributed cloud |
WO2022041271A1 (en) * | 2020-08-31 | 2022-03-03 | 苏州铭冠软件科技有限公司 | Cloud data resource scheduling method considering time and expense in rail transit applications |
Non-Patent Citations (5)
Title |
---|
H. ABRISHAMI等: "Scheduling in hybrid cloud to maintain data privacy", 《FIFTH INTERNATIONAL CONFERENCE ON THE INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2015)》 * |
VAHID ARABNEJAD等: "Scheduling deadline constrained scientific workflows on dynamically provisioned cloud resources", 《FUTURE GENERATION COMPUTER SYSTEMS》 * |
卢莉等: "合云环境中调度执行多工作流费用优化算法", 《现代计算机》 * |
左利云等: "混合云中基于截止时间和费用约束的调度方法研究", 《计算机应用研究》 * |
马红娟等: "云环境下安全感知的实时并行任务调度算法", 《控制工程》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113961323B (en) | 2022-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8424007B1 (en) | Prioritizing tasks from virtual machines | |
US6886164B2 (en) | Selection of a resource in a distributed computer system | |
EP2893444B1 (en) | Quota-based resource management | |
US20160217008A1 (en) | Resource health based scheduling of workload tasks | |
US8239869B2 (en) | Method, system and apparatus for scheduling computer micro-jobs to execute at non-disruptive times and modifying a minimum wait time between the utilization windows for monitoring the resources | |
US9225494B2 (en) | Network and user behavior based time-shifted mobile data transmission | |
US9078277B2 (en) | Network and user behavior based time-shifted mobile data transmission | |
US20200159587A1 (en) | Releasable resource based preemptive scheduling | |
CN105187327A (en) | Distributed message queue middleware | |
US20120324466A1 (en) | Scheduling Execution Requests to Allow Partial Results | |
CN106095581B (en) | Network storage virtualization scheduling method under private cloud condition | |
US9135064B2 (en) | Fine grained adaptive throttling of background processes | |
CN113961323B (en) | Hybrid cloud-oriented security perception task scheduling method and system | |
US20080168125A1 (en) | Method and system for prioritizing requests | |
CN112650449A (en) | Release method and release system of cache space, electronic device and storage medium | |
CN109462663B (en) | Method for limiting system resource occupation, voice interaction system and storage medium | |
CN113590324B (en) | Heuristic task scheduling method and system for cloud side-end collaborative computing | |
CN106648874B (en) | Processing method and device for batch tasks | |
CN114489463B (en) | Method and device for dynamically adjusting QOS of storage volume and computing equipment | |
Marchand et al. | Dynamic scheduling of periodic skippable tasks in an overloaded real-time system | |
CN112114967B (en) | GPU resource reservation method based on service priority | |
US10887381B1 (en) | Management of allocated computing resources in networked environment | |
JP5641300B2 (en) | Storage system and memory cache area control method for storage system | |
CN107479965B (en) | Cluster program scheduling method based on multi-dimensional utility combination | |
Campoy et al. | Schedulability analysis in EDF scheduler with cache memories |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |