KR20150086516A - Network resource management - Google Patents
Network resource management Download PDFInfo
- Publication number
- KR20150086516A KR20150086516A KR1020157016151A KR20157016151A KR20150086516A KR 20150086516 A KR20150086516 A KR 20150086516A KR 1020157016151 A KR1020157016151 A KR 1020157016151A KR 20157016151 A KR20157016151 A KR 20157016151A KR 20150086516 A KR20150086516 A KR 20150086516A
- Authority
- KR
- South Korea
- Prior art keywords
- policy
- model
- processor
- network
- cloud
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Abstract
A network resource management method includes: generating, by a processor, a model of an application; defining a plurality of substitution points in the model; and replacing the alternative point with an abstract model having a set of sub- , And codifying a number of policies representing which sourcing option to use for each alternate point.
Description
The present invention relates to network resource management.
Cloud computing services are becoming increasingly available to individuals and businesses to dynamically extend their information technology (IT) infrastructure and resources. These individuals and businesses often contract with cloud service providers when the internal IT infrastructure or resources of an individual or enterprise are inadequate to accommodate the increased use or increase of network activity. This increase in network activity may be due, for example, to an increase in the sales of their respective goods or services. Thus, individuals and businesses can take advantage of the economies of scale associated with open and other forms of cloud computing services.
The system and method of the present invention provides network resource management. The method includes, in a processor, creating a model of an application, defining a plurality of substitution points in the model, representing the alternate point as an abstraction model with a set of sub-types, And codifying a number of policies representing which sourcing option to use for the alternate point. The method may also include receiving a request to instantiate a model, applying a plurality of policies to select a resource candidate, and acquiring a selected candidate's resources.
The systems and methods of the present invention provide a cloud management device that may include a processor and a memory communicatively coupled to the processor. The cloud management device may also include a replacement module stored in memory for creating a model of the to-be-scaled application and defining a number of alternative points in the model when executed by the processor . The cloud management device also includes a static binding policy creation module, stored in memory, for creating a plurality of explicit statements that, when executed by the processor, define sub-types within the alternate point, And a dynamic binding policy generation step of generating, when executed by the processor, a plurality of policies including a scoring function evaluated at runtime informing the resource provider about the best sub-type to select, Module (dynamic binding policy creation module).
The systems and methods of the present invention may be implemented as computer program products for managing network resources, which may include computer readable storage media including computer usable program code embodied in computer readable storage media, . The computer usable program code includes computer usable program code for creating a model defining an application to be scaled and defining a plurality of alternative points in the model when executed by the processor. The computer usable program code also includes computer usable program code for generating a plurality of explicit statements that, when executed by the processor, define sub-types within the alternate point, and instructions that, when executed by the processor, May include computer usable program code for generating a plurality of policies including a scoring function evaluated at runtime that informs the resource provider about the policy.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings illustrate various examples of the principles set forth herein and form a part hereof. The illustrated example is provided for illustrative purposes only and does not limit the scope of the claims.
1 is a block diagram of a system for cloud bursting based on alternate point and bursting policy, in accordance with an example of the principles described herein.
2 is a block diagram of the cloud management device of FIG. 1, in accordance with an example of the principles described herein.
Figure 3 is a block diagram of an application model or dependency graph in an infrastructure as a service (IaaS) scenario, according to an example of the principles described herein.
4 is a block diagram of an application model or dependency graph in a software as a service (SaaS) scenario, according to an example of the principles described herein.
5 is a block diagram of an application model or dependency graph representing scale points and alternative points, in accordance with an example of the principles described herein.
6 is a flow chart illustrating a method for managing network resources, in accordance with an example of the principles described herein.
7 is a flow chart illustrating a method for managing network resources, according to another example of the principles described herein.
Figures 8 and 9 are flow charts illustrating a method for managing network resources in accordance with another example of the principles described herein.
Figure 10 is a block diagram of a dependency graph depicting the dependencies of a number of rules in a policy, according to another example of the principles described herein.
Throughout the drawings, like reference numerals designate similar but not necessarily identical elements.
The system and method provide network resource management. The method includes the steps of creating a model of an application, defining a plurality of alternative points in the model, representing the alternate point as an abstraction model with a set of sub-types, and for each alternate point And codifying a number of policies representing which sourcing option to use. The method may also include receiving a request to instantiate a model, applying a plurality of policies to select a resource candidate, and acquiring a selected candidate's resources.
The present systems and methods provide a cloud management device that may include a processor and a memory communicatively coupled to the processor. The cloud management device may also include a replacement module stored in memory for creating a model of the to-be-scaled application and defining a number of alternative points in the model when executed by the processor . The cloud management device also includes a static binding policy creation module, stored in memory, for creating a plurality of explicit statements that, when executed by the processor, define sub-types within the alternate point, And a dynamic binding policy generation step of generating, when executed by the processor, a plurality of policies including a scoring function evaluated at runtime informing the resource provider about the best sub-type to select, Module (dynamic binding policy creation module).
The system and method provide a computer program product for managing network resources that may include computer readable storage medium including computer usable program code embodied in computer readable storage medium do. The computer usable program code includes computer usable program code for creating a model defining an application to be scaled and defining a plurality of alternative points in the model when executed by the processor. The computer usable program code also includes computer usable program code for generating a plurality of explicit statements that, when executed by the processor, define sub-types within the alternate point, and instructions that, when executed by the processor, May include computer usable program code for generating a plurality of policies including a scoring function evaluated at runtime that informs the resource provider about the policy.
As illustrated above, it may be difficult for an individual or business to decide when to purchase an external cloud service or to purchase more or less of these services. For example, individuals or businesses may not understand at some point whether this purchase of external cloud services will be economically feasible for their underlying business activities. For example, an internal or private network that is currently being used by a market, an individual or a business that will use the external cloud service and is going to scale out, a scaling-out of what remains in the internal dedicated network to an external cloud service Some environmental factors such as economic advantages can be considered.
Cloudbusting can be used to perform additional workloads on one or more external clouds or networks on an internal resource at a given point in time and to perform additional workloads on an on- It may be more economical to trigger a shift to use. A spike in demand on an application within an internal resource can be handled dynamically by adding the capacity provided by the third-party provider to the external resource. The degree of association associated with internal resources can be an aspect of the cloud busting that you want to control.
For example, an information technology (IT) organization can use cloud bursting to deploy new releases of applications for testing and evaluation purposes. In this case, the tested application runs in the cloud and is not connected to internal resources at all. Similarly, a development project may provide a smoke test that is triggered by its own continuous build environment to determine if there is a simple obstacle that is sufficiently large to reject the prospective software release. You can use cloud busting to provision. Thus, the use of cloud bursting shifts capital expenditure to operational expenditure for their test bed.
In the above two situations, cloud resources are loosely coupled with internal IT resources. Cloud bursts are tightly coupled with internal resources when provisioned resources in the cloud require frequent data sharing and communication with internal resources. Not all applications or application components lend themselves to cloud busting. Whether it is tightly or loosely coupled, or whether the requested service is at the infrastructure level or the service level, cloud bursting may not be an improvise operation when a spike occurs. Cloudbusting is an inherent part of a particular application design and user's deployment model. The present system and method help an administrator in determining which applications utilized in an internal network can be deployed in an external network using cloud busting technology and how those particular applications can be deployed in an external application .
As used in this specification and in the claims that follow, the expression "cloud " has a broader meaning to any network that delivers the requested virtual resource as a service. In one example, a cloud network may provide a computing environment in which a user may have access to applications or computing resources as a service from anywhere through a user's connected device. These services may be provided by an entity referred to as a cloud service provider. Examples of services that can be provided through the cloud network include infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), storage as a service (STaaS) ), A test environment as a service (TEaaS), and an application program interface (API) as a service (API). Throughout this specification and in the appended claims, the expression "network" may include a cloud network as defined above or any other form of network.
Also, as used in this specification and the appended claims, the expression "public cloud" is intended to encompass a wide variety of applications, storage and other resources, As a service of a broad sense. In one example, these services are provided by the service provider through a pay-per-use model. In this example, the public cloud service provider owns and operates the infrastructure. In another example, a public cloud service provider provides access through an open network, such as the Internet, and no direct connectivity is provided. Examples of cloud services provided within the public cloud include AMAZON WEB SERVICES, developed and sold as a service by Amazon.com, Inc., and RACKSPACE CLOUD web application hosting services developed and provided by Rackspace US, Inc.
As used in this specification and the appended claims, the expression "private cloud " has a broader meaning as any cloud computing environment in which access is exclusively restricted to individuals or businesses. In one example, a private cloud may be any cloud infrastructure that is operated solely for an individual or enterprise. In one example, the private cloud is managed internally by the owner of the private cloud infrastructure. In another example, the private cloud is managed by a third party and is hosted internally or externally.
As used in this specification and the appended claims, the expression "hybrid cloud" has a broader meaning as any cloud computing environment including a plurality of public cloud resources and a plurality of private cloud resources . In one example, a hybrid cloud includes a number of cloud networks, such as private clouds and public clouds, which are maintained as separate networks but are associated to provide multiple services.
As used in this specification and the appended claims, the expression "scaling out" or similar expressions may be used to refer to a second or third cloud computing environment for a first or original cloud computing environment, Has a broadly understood meaning as any activity that initially allocates or consumes additional resources within the computing environment. Similarly, the term "scaling in" or similar language, as used in this specification and the appended claims, may be used to release, freely or in part, free up " or " discharge " Scaling out and scaling in may generally be referred to as "horizontal" scaling or "cloud bursting. &Quot;
As used in this specification and the appended claims, the expression "scaling up" or similar language is intended to encompass additional resources within the cloud computing environment to accommodate an increase in network activity in the cloud computing environment. It has a broadly understood meaning as any activity that is assigned or consumed. Similarly, as used herein and in the appended claims, a "scaling down" or similar language representation may be used to release, free, or free some or all of the resources in the cloud computing environment It has a broadly understood meaning as any activity. Scaling up and scaling down can be generally referred to as "vertical" scaling.
Also, as used in this specification and the appended claims, the expression "a plurality" or similar language has a broader meaning as any positive integer, including 1 to infinity, It means that there is no number and no number.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present systems and methods. However, it will be apparent to those skilled in the art that the present apparatus, systems and methods may be practiced without these specific details. Reference in the present specification to "example" or similar language means that a particular feature, structure, or characteristic described in connection with the example is included as described, but may not be included in another example.
Referring to Figure 1, a block diagram of a
In another example, the network is a cloud service network as defined above. Throughout this specification and the figures, network A 104 and network B 106 will be described as a cloud service network. However, any type of network may be employed in achieving the goals of the present systems and methods.
In one example, the
In another example, the
The network 104, 106 may include
The hardware layers 121 and 141 support a
In addition, a plurality of
In one example,
The cloud service management layers 125 and 145 in the networks 104 and 106 provide management of the cloud services residing on the
A number of
In this example, for simplicity of illustration, the
In another example, the
In another example, the
In one example, a global load balancer 170 may likewise be communicatively coupled to the
The
As discussed above, the
2 is a block diagram of the
In another example, the
In order to achieve the required functionality of the
The
The
The
In general, the
The
The
The
The
Referring back to Figure 1, which illustrates the
3 is a block diagram of an application model or
In the example of FIG. 3, the replacement module (240 of FIG. 2) has determined that the application requires a CentOS Unix-based operating system, as indicated by
The sub-types of servers that may be provided by the cloud network service provider may include an internal virtual machine (VM) such as a virtual machine residing on server A (120 in FIG. 1) on network A 104 have. Other examples of server sub-types include the ELASTIC COMPUTER CLOUD (EC2) cloud computing platform developed and provided by Amazon.com, Inc. or the THE RACKSPACE CLOUD cloud computing platform developed and provided by RackSpace US, Inc. And a plurality of external VMs, such as virtual machines, residing on server B (140 in FIG. 1) on network B 106. The example of the server shown in Fig. 3 is not limited to this.
The dependency graph, such as the
4 is a block diagram of an application model or
In the example of FIG. 4, the replacement module (240 of FIG. 2) identifies the SaaS replacement point at block 404. At this time, the replacement module (240 in FIG. 2) identifies a number of sub-types of emails available to the user in blocks 406 and 408. The "<< Extends >>" in FIG. 4 represents a sub-type of a base application (e. G., E-mail account service) available to the user as an option for the base application. The number and type of sub-types will depend on what type of base application the system is constrained to work with.
Sub-types of email accounts that may be provided by a cloud network service provider may include, for example, an EXCHANGE SERVER email account developed and distributed by Microsoft Corporation and a GMAIL email account service developed and distributed by Google Inc. The example of the e-mail account service illustrated in Fig. 4 is not limited to this.
As described above with reference to FIG. 3, the dependency graph, such as the
5, there is shown a block diagram of an application model or
Scale point 518 is also shown in the dependency graph as a point in network usage where a cloud burst scenario occurs. In one example, range cardinality is expressed as a reference to the represented variable in
In the example above, up to 20 instances and at least one instance of the application can be scaled out to another network at the start of the horizontal scaling process. This range cardinality is just an example. In another example, the
The
With reference to Figures 3-5, a dependency graph is generated for each instance of horizontal scaling of the application. In this manner, whenever an application is run on an internal network, such as network A (104 in FIG. 1), and an instance of the application is horizontally scaled out to an external network such as network B (106 in FIG. 1) The replacement module (240 in FIG. 2) of the
Referring again to FIG. 2, the
In addition, the
In addition, the
A method of using the various hardware and software elements of the
In one example, the policy may be expressed based on information contained within network A 104, network B 106,
There are two types of policy: static binding policy and dynamic binding policy. A static binding policy is a definitive selection of a specific device or service that can be done spontaneously or by an administrator (160 of FIG. 1) that defines a number of specific devices or services. For example, the
A dynamic binding policy is a codified rule that ranks various devices or services based on the fitness of various devices or services or the best score based on a particular purpose or situation. For example, the
7 is a flow chart illustrating a method for managing network resources, according to another example of the principles described herein. The method shown in Fig. 7 is performed for all instances of horizontal scaling of an application and is referred to as a runtime process performed after the design time described with respect to Fig.
The method may be initiated by a processor (202 in FIG. 2) receiving a request to instantiate a model (block 702). This request is a request to horizontally scale an application to an external network, such as network B 106. [ The
The method of FIG. 7 also includes obtaining (706) the resources of the selected candidate. In one example, only one candidate is returned at
In another example, more than one candidate may be returned. In this example, more than one candidate may be filtered by a system that meets the criteria set by rules and policies. The administrator can select from any of the plurality of candidates returned.
The results in Figures 6 and 7 are a list of the resources of these providers that meet the criteria set by cloud computing service providers and static binding policies and dynamic binding policies. For example, if the static binding policy and the dynamic binding policy determine that the
The designated networking environment may also include services provided by a cloud computing service provider, such as a payment service that a user of an application when implemented on an external network may use to purchase, for example, goods or services that the application provides to these users . If the network B 106 meets the criteria set by the static binding policy and the dynamic binding policy, any number and any combination of static binding policies and dynamic binding policies may be used to scale the application horizontally into the external network B 106 .
Figures 8 and 9 are flow charts illustrating a method for managing network resources in accordance with another example of the principles described herein. The method of Figures 7 and 8 is a more detailed representation of the method of Figures 6 and 7 where each dependency graph model is generated by a processor 202 (block 802) to generate a plurality of dependency graph models ) May be initiated to execute the replacement module (240 of FIG. 2). The replacement module (240 in FIG. 2) determines which part of the dependency graph model is a replacement point (block 804). Therefore, at
The system determines whether the alternate point is explicitly defined as a sub-type by the administrator (block 806). As described above, static binding policies and dynamic binding policies are used to filter possible cloud computing service providers to find a large number of cloud computing service providers that meet the criteria defined by static binding policies and dynamic binding policies. The static binding policy is generated using the static binding
Similarly, the dynamic binding policy is generated using the dynamic binding
If the replacement point is explicitly defined as a sub-type by the administrator (determined as YES in block 806), the policy is a static binding policy and the
At
As shown in FIG. 10, the
Since the policy is used to select the best resource among the resources provided by the cloud computing resource provider, the system can be used by the cloud computing resource provider as a candidate to obtain the best matching resource provided by the best-matching cloud computing resource provider Use static binding and dynamic binding policies to filter through the available resources provided. Referring again to Figures 8 and 9, the
The
The
Examples of XML code resources and examples of rule languages are described below. As described above, the candidates are the inputs and outputs of the
In one example, rules may also have relationships between themselves. In this example, the action of the rule may also lead to another rule. for example:
Rule rule1: when predicate1 then rule2
Rule rule2: when predicate2 then candidate
A rule can also have a priority from zero to infinity. The higher the number, the higher the priority of the rule. In one example, 0 is the default priority number. for example,
Rule rule1 Priority 1: when predicate1 then candidate
Rule rule2 Priority 0: when predicate2 then candidate
Predicate logic can be used for a symbolic formal system such as first-order logic, second-order logic, many-sorted logic, or infinite logic. It is a general term. The formatting system of the present application is distinguished from other systems in that the formula includes variables that can be quantified. A predicate calculus symbol can represent either a variable, a constant, a function, or a predicate. Constants refer to specific objects or properties in the domain of discourse. Therefore, George, tree, tall, and blue are examples of well formed constant symbols. Constants (true) and (false) are sometimes included.
The variable symbol is used to specify the overall class, object, or property in the domain of the discourse. A function represents a mapping to a unique element of another set of multiple elements (the range of functions) in a set (called the domain of a function). The elements of domain and range are objects in Disco's world. Every function symbol has an associated arity that indicates the number of elements in the domain that are mapped onto each element of the range.
In a rule policy, a constant is typically a number, a type of resource, a required value of a resource element. The variable is typically generic data, or input data from the
A function is a function provided by an instance, a model, a static binding policy, and a package resource. These functions are used to help get the value of the element. The function may also be a mathematical calculation, a composition of constant, a variable or a function. The keywords "Maximum" and "Minimum" can be defined as one type of function.
Constants and variables can be defined directly in the predicate logic. The function may be a complex function, and evaluations 918 and 920 are provided for expressing them. In predicate logic, variables can be used to represent these functions. for example,
Predicate: cpu is greater than 5; cpu is the variable to represent function below.
Evaluation: cpu is getAttributeValue (instance, attributename, tag)
A function can also end with a function. for example,
Predicate: value is Maximum;
Evaluation: value is formula (0.5 \ * cpu \ + 0.5 * memory);
cpu is getAttributeValue (instance, attributename, tag) \ ---> in predicate calculus, the attributename will bind to "cpu"
memory is getAttributeValue (instance, attributename, tag) \ -> in predicate calculus, the attributename will bind to "memory"
Thus, the
Here is an example XML resource:
Example rule language:
Like the
The above-described method may be accomplished by a computer program product comprising a computer readable medium having computer usable program code embodied in the computer readable medium, which, when executed, performs the method described above. In particular, the computer usable program code may be used to create a model of the application, define a number of alternative points in the model, represent the alternate point as an abstraction model with a set of sub-types, You can use a number of policies to express the option to use.
The computer usable program code may also receive a request to instantiate the model, apply a number of policies to select a resource candidate, and obtain the resources of the selected candidate.
In addition, the computer usable program code, when executed by the processor, may perform the process described above with respect to Figures 3 to 10. [ In one example, the computer readable medium is a computer readable storage medium as described above. In this example, the computer-readable storage medium may be a tangible or non-volatile medium.
The specification and drawings describe a method and system for network resource management. The method comprises the steps of: generating, by a processor, a model of an application; defining a plurality of alternative points in the model; representing the alternate point as an abstraction model with a set of sub-types; And a step of coordinating a number of policies representing which sourcing options are to be used. The method may also include receiving a request to instantiate a model, applying a plurality of policies to select a resource candidate, and obtaining a selected candidate's resources. These systems and methods have the advantages of: (1) helping an administrator determine if an application used in the internal network can be deployed to an external network using cloud bursting technology; and (2) Including the benefits of assisting the administrator in determining how it can be deployed within the enterprise.
The foregoing description is provided to illustrate and describe examples of the principles disclosed herein. This description is not intended to be exhaustive or to limit the invention to the precise form disclosed. Numerous modifications and variations are possible in light of the above teachings.
Claims (15)
With the processor,
Creating a model of the application;
Defining a plurality of substitution points in the model;
Expressing the alternate point as an abstract model having a set of sub-types; And
Codifying a plurality of policies representing which sourcing option to use for each said alternate point;
The network resource management method comprising:
Receiving a request to instantiate a model;
Applying a plurality of policies to select a resource candidate; And
Acquiring a resource of the selected candidate
The method comprising the steps of:
Wherein the policy comprises a plurality of static binding policies and a plurality of dynamic binding policies.
Determining if the alternate point is explicitly defined as a sub-type;
If the replacement point is explicitly defined as a sub-type, storing the explicitly defined sub-type as a static binding policy; And
If the alternate point is not explicitly defined as a sub-type, then creating a plurality of dynamic binding policies
The method comprising the steps of:
Wherein the generating the plurality of dynamic binding policies comprises:
Defining a plurality of parameters of the abstraction model as a policy for selecting a sub-type of the abstraction model;
Compiling a number of rules used to create the dynamic binding policy; And
Storing the dynamic binding policy
/ RTI > The method of claim 1,
Further comprising informing a provisioning system that a portion of the model will be replaced.
Further comprising determining a number of resource candidates for scaling the application.
Wherein applying a plurality of policies to select the resource candidates comprises:
Applying the static binding policy and the dynamic binding policy to filter the resource candidates; And
Returning a plurality of resource candidates matching the conditions defined by the static binding policy and the dynamic binding policy
/ RTI > The method of claim 1,
Wherein the static binding policy is defined by an administrator and the dynamic binding policy is defined by a number of rules defined in the dynamic binding policy.
A processor; And
A memory communicatively coupled to the processor,
Wherein the memory comprises:
An alternative module stored in the memory for creating a model of a to-be-scaled application and defining a plurality of alternative points in the model when executed by the processor;
A static binding policy creation module stored in the memory for generating a plurality of explicit statements that, when executed by the processor, define sub-types within the alternate point; And
Stored in the memory, for generating a plurality of policies including a scoring function evaluated at runtime that, when executed by the processor, informs the resource provider about the best sub-type to select; (dynamic binding policy creation module)
And a cloud management device.
A policy execution module for executing the static binding policy and the dynamic binding policy to filter a plurality of resource candidates matching a constraint provided by a static binding policy and a dynamic binding policy, Includes a cloud management device.
Wherein the cloud management device is integrated into a network in which the application to be scaled is located.
A computer readable storage medium comprising computer usable program code embodied in a computer readable storage medium, the computer usable program code comprising:
Computer usable program code, when executed by a processor, for creating a model defining an application to be scaled and defining a plurality of alternative points in the model;
Computer-usable program code for generating, when executed by a processor, a plurality of explicit statements defining sub-types within the alternate point; And
Computer-usable program code for generating a plurality of policies, including a scoring function evaluated at runtime, that when executed by a processor informs the resource provider about the best sub-type to select;
A computer program product for managing network resources.
Further comprising computer usable program code for executing the static binding policy and the dynamic binding policy to filter a plurality of resource candidates when executed by a processor that conforms to the constraints provided by the static binding policy and the dynamic binding policy , A computer program product for managing network resources.
Wherein the policy is expressed based on information included by a system for which scaling is to occur, a system for which scaling occurs, or a combination thereof.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020157016151A KR20150086516A (en) | 2012-12-07 | 2012-12-07 | Network resource management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020157016151A KR20150086516A (en) | 2012-12-07 | 2012-12-07 | Network resource management |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150086516A true KR20150086516A (en) | 2015-07-28 |
Family
ID=53875661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020157016151A KR20150086516A (en) | 2012-12-07 | 2012-12-07 | Network resource management |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150086516A (en) |
-
2012
- 2012-12-07 KR KR1020157016151A patent/KR20150086516A/en not_active Application Discontinuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10057183B2 (en) | Network resource management | |
US8806003B2 (en) | Forecasting capacity available for processing workloads in a networked computing environment | |
US9009294B2 (en) | Dynamic provisioning of resources within a cloud computing environment | |
US9418146B2 (en) | Optimizing a clustered virtual computing environment | |
US9225604B2 (en) | Mapping requirements to a system topology in a networked computing environment | |
US9503549B2 (en) | Real-time data analysis for resource provisioning among systems in a networked computing environment | |
US8745233B2 (en) | Management of service application migration in a networked computing environment | |
US10686891B2 (en) | Migration of applications to a computing environment | |
US20140344808A1 (en) | Dynamically modifying workload patterns in a cloud | |
Jrad et al. | A utility–based approach for customised cloud service selection | |
US9996888B2 (en) | Obtaining software asset insight by analyzing collected metrics using analytic services | |
US10305752B2 (en) | Automatically orchestrating the compliance of cloud services to selected standards and policies | |
GB2582223A (en) | Determining an optimal computing environment for running an image | |
US20170222888A1 (en) | Assessing a service offering in a networked computing environment | |
US20130262189A1 (en) | Analyzing metered cost effects of deployment patterns in a networked computing environment | |
JP2022538897A (en) | container-based application | |
US10574527B2 (en) | Compartmentalized overcommitting of resources | |
US10530842B2 (en) | Domain-specific pattern design | |
JP7257726B2 (en) | Method, computer system and program for implementing dynamic and automatic modification of user profiles for improved performance | |
Singh et al. | A review: towards quality of service in cloud computing | |
Aldawsari et al. | A survey of resource management challenges in multi-cloud environment: Taxonomy and empirical analysis | |
KR20150086516A (en) | Network resource management | |
Thakur et al. | Interoperability issues and standard architecture for service delivery in federated cloud: A review | |
JP2023541470A (en) | Detecting and handling excessive resource usage in distributed computing environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |