WO2022143061A1 - 一种虚拟机接入方法、终端及存储介质 - Google Patents

一种虚拟机接入方法、终端及存储介质 Download PDF

Info

Publication number
WO2022143061A1
WO2022143061A1 PCT/CN2021/136440 CN2021136440W WO2022143061A1 WO 2022143061 A1 WO2022143061 A1 WO 2022143061A1 CN 2021136440 W CN2021136440 W CN 2021136440W WO 2022143061 A1 WO2022143061 A1 WO 2022143061A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
operator
virtual machine
terminal
home location
Prior art date
Application number
PCT/CN2021/136440
Other languages
English (en)
French (fr)
Inventor
徐浪平
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2022143061A1 publication Critical patent/WO2022143061A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5691Access to open networks; Ingress point selection, e.g. ISP selection
    • H04L12/5692Selection among different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/0864Round trip delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route

Definitions

  • the present disclosure relates to the technical field of cloud computing, and in particular, to a virtual machine access method, a terminal and a storage medium.
  • Virtual Machine (VM) technology allows multiple operating systems to run on the same physical machine and provides reliable isolation, which greatly improves the reusability of physical resources.
  • virtual machine technology can be used on cloud servers. Multiple cloud virtual machines. It should be noted that cloud virtual machines can also be called cloud desktops, cloud computers, and so on.
  • the process for the terminal to access the cloud virtual machine may be as follows: the terminal sends a login request to the cloud management system, the cloud management system allocates the cloud virtual machine to the terminal, and at the same time, the access management platform allocates a gateway node to the terminal. In this way, the terminal Gateway nodes can be connected to access cloud virtual machines.
  • the foregoing method may cause excessive network delay when the user uses the cloud virtual machine, which affects the user experience.
  • the present disclosure provides a virtual machine access method, a terminal, and a storage medium, so as to reduce the network delay when a user uses a cloud virtual machine.
  • the present disclosure provides a method for accessing a virtual machine for a terminal, the method comprising: in the case of determining a cloud virtual machine to be connected, comparing the attribution of the terminal with the attribution of the operator or the cloud virtual machine and operator as the target home location and target operator; determine the target gateway node according to the target home location and the target operator; access the cloud virtual machine through the target gateway node.
  • the present disclosure provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program executes the virtual machine access method according to the first aspect when the computer program is run.
  • the present disclosure provides a terminal including a processor and a memory; the memory is configured to store a computer program; the processor is configured to run the computer program to execute the virtual machine access method according to the first aspect.
  • FIG. 1 is a schematic diagram of an architecture of a cloud system
  • FIG. 2 is a schematic diagram of a communication link between a terminal and a cloud virtual machine in some cases
  • FIG. 3 is a schematic flowchart of a method for accessing a virtual machine provided by the present disclosure
  • FIG. 4 is a schematic diagram of an optional application scenario of the present disclosure.
  • FIG. 5 is a schematic diagram of another optional application scenario of the present disclosure.
  • FIG. 6 is a schematic flowchart of step S20 in the present disclosure.
  • FIG. 7 is a schematic diagram of gateway configuration information in the present disclosure.
  • Fig. 8 is a kind of schematic diagram after a plurality of gateway nodes in Fig. 7 are sorted according to the order of priority from high to low;
  • FIG. 9 is a schematic flowchart of selecting a target gateway node in the present disclosure.
  • FIG. 10 is a schematic block diagram of a structure of a terminal provided by the present disclosure.
  • FIG. 1 is a schematic diagram of an architecture of a cloud system, wherein the cloud server 101 is usually deployed in the demilitarized zone (DMZ) of different regions (eg, different cities), that is, the cloud server 101 is usually deployed in a distributed manner and is located in In the intranet, for example, the cloud server 101A can be deployed in Shenzhen, the cloud server 101B can be deployed in Nanjing, and the cloud server C can be deployed in Xi'an.
  • DMZ demilitarized zone
  • the gateway node can be set ) to realize data intercommunication between the two, so that the terminal 103 can log in to the cloud virtual machine.
  • the gateway node 102 is usually deployed in a distributed manner.
  • the gateway node 102A can be deployed in Shenzhen
  • the gateway node 102B can be deployed in Nanjing
  • the gateway node 102C can be deployed in Xi'an.
  • a cloud server 101 may run a plurality of cloud virtual machines, and the device form of the terminal may be a mobile terminal 101A, a set-top box 102B, a computer 103C, and the like.
  • the cloud management system when a terminal needs to log in to a cloud virtual machine, the cloud management system will allocate a cloud virtual machine running on a cloud server to the terminal, and at the same time, the access management platform will allocate a gateway node to the terminal.
  • the cloud management system It may also be called a desktop management system, a virtual machine management system, etc., and the access management platform is usually a network element entity. Since the allocation strategy of the access management platform is usually random allocation, it may lead to excessive network delay when the user uses the cloud virtual machine.
  • the operator is Shenzhen Telecom
  • the home and operator of gateway node 2 is Changsha Unicom
  • the cloud server 1 is deployed in Shenzhen
  • the cloud server 2 is deployed in Changsha.
  • the gateway node assigned to the terminal by the access management platform is the gateway node 2
  • the communication link between the terminal and the cloud virtual machine can be shown as the dotted line in Figure 2, that is, the terminal is connected to the gateway node 2
  • the gateway node 2 is connected to the cloud server 2 in its region, and the cloud server 2 is connected to the cloud server 1 in the intranet. It can be found that the communication link between the terminal and the cloud virtual machine is too long in communication distance. There is also a cross-operator problem in the cloud, so in some cases, the network delay of the user when using the cloud virtual machine may be too large, which affects the user experience. Based on this, the present disclosure provides a virtual machine access method, so as to reduce the network delay when a user uses a cloud virtual machine.
  • a method for accessing a virtual machine provided by the present disclosure can be used for a terminal, and the method may include, but is not limited to, steps S10 to S20.
  • Step S10 when the cloud virtual machine to be connected is determined, the home location and operator of the terminal or the home location and operator of the cloud virtual machine are taken as the target home location and the target operator.
  • the terminal can send a login request to the cloud management system according to the user's login operation, so that the cloud management system can allocate the cloud virtual machine to the terminal according to the login request, that is, the cloud virtual machine to be connected has been determined.
  • the terminal can take its own home and operator as the target home and the target operator, or take the cloud virtual machine's home and operator as the target home and the target operator, so as to facilitate the subsequent determination of the target
  • the gateway node it should be noted that in general, the location and operator of the cloud virtual machine mainly depend on the network configuration of the corresponding cloud server.
  • step S10 may include, but is not limited to, the following content: the pre-received access indication policy is used to indicate that the terminal is In the case of access, obtain the home location and operator of the terminal as the target home location and target operator; in addition, in step S10, "use the home location and operator of the cloud virtual machine as the target home location and target operator" It may include, but is not limited to, the following: in the case that the pre-received access indication policy is used to instruct access to the cloud virtual machine, obtaining the home location and operator of the cloud virtual machine as the target home location and target operator.
  • the cloud management system may issue the corresponding access indication policy to the terminal, wherein, when the access indication policy is used to instruct the terminal to access, the terminal assigns its own home The location and operator are used as the target home location and target operator, and when the access indication policy is used to indicate access to a cloud virtual machine, the terminal takes the cloud virtual machine's home location and operator as the target home location and target operator .
  • "obtaining the home location and operator of the terminal” may include, but is not limited to, the following contents: acquiring the home location and operator of a virtual private network (Virtual Private Networks, VPN) to which the terminal belongs, and converting the virtual private network The home and operator of the terminal are used as the home and operator of the terminal.
  • a virtual private network Virtual Private Networks, VPN
  • the private network can be understood as a private cloud.
  • the virtual private network is deployed close to the terminal. Therefore, the home and operator of the virtual private network It can be regarded as the home location and operator of the terminal.
  • the terminal can receive an IP address returned by the virtual private network by parsing the automatic gateway of the virtual private network to which it belongs. Further, the home location and operator of the virtual private network are determined according to the IP address, and it is used as the home location and operator of the terminal.
  • a terminal such as a smart phone, can determine the home location and operator through the present disclosure or its own detection.
  • the home location and operator of the virtual private network to which the terminal belongs is Shenzhen Telecom.
  • the terminal receives the access instruction policy in advance, Obtain the home location and operator of the virtual private network and use them as the target home location and target operator, that is, the target home location and the target operator are Shenzhen Telecom, so as to facilitate the subsequent determination of the target gateway node.
  • "obtaining the home and operator of the cloud virtual machine” may include, but is not limited to, the following content: obtaining the home and operator of the cloud virtual machine according to pre-acquired attribute information of the cloud virtual machine, wherein , the attribute information of the cloud virtual machine is the information sent to the terminal when the cloud management system determines the cloud virtual machine for the terminal.
  • the cloud management system can send the attribute information of the cloud virtual machine to the terminal.
  • the attribute information can include the ID, home location, operator, etc. of the cloud virtual machine. Therefore,
  • the access instruction policy is used to instruct the terminal to access the cloud virtual machine in the nearest access mode to the cloud virtual machine, the terminal can obtain the corresponding home and operator according to the pre-obtained attribute information.
  • the cloud management system assigns the terminal to the terminal and the cloud virtual machine whose operator is Nanjing Telecom. Based on this, the terminal can obtain the home and the cloud virtual machine according to the access instruction policy received in advance.
  • the operator takes it as the target home location and the target operator, that is, the target home location and the target operator are Nanjing Telecom, so as to facilitate the subsequent determination of the target gateway node.
  • Step S20 Determine the target gateway node according to the target home location and the target operator, and access the cloud virtual machine through the target gateway node.
  • the terminal After determining the target attribution and target operator, the terminal can determine the target gateway node according to the two, and then connect to the target gateway node. In this way, the terminal accesses the cloud virtual machine through the target gateway node. It can be understood that since the target gateway node is It is determined according to the attribution of the terminal or the cloud virtual machine, so the communication distance of the communication link between the terminal and the cloud virtual machine can be effectively shortened, thereby reducing the network delay of the user when using the cloud virtual machine.
  • the gateway node is determined according to the operator of the terminal or the operator of the cloud virtual machine. In some cases, there is no cross-operator problem between the terminal and the cloud virtual machine, thus further reducing the user experience when using the cloud virtual machine. network delay.
  • the present disclosure can not only reduce the network delay of the user when using the cloud virtual machine, but also because the target gateway node is determined by the terminal itself, so there is no need to additionally set other physical devices such as an access management platform, effectively reducing the network delay. cost.
  • the cloud server 1 is deployed in Shenzhen
  • the cloud server 2 is deployed in Nanjing
  • the home location and operator of the gateway node 1 are: Shenzhen Telecom
  • the home and operator of gateway node 2 is Nanjing Unicom.
  • the terminal can take its own home and operator as the target home and the target operator, or take the cloud virtual machine's home and operator as the target home and the target operator, that is, the target home and the target The operator is Shenzhen Telecom, and the terminal can use gateway node 1 as the target gateway node according to the target attribution and target operator, and access the aforementioned cloud virtual machine through gateway node 1. It can be understood that the connection between the terminal and the cloud virtual machine is The communication link is shown as link A in the figure.
  • the gateway node allocated to the terminal is the gateway node 2
  • the communication link between the terminal and the cloud virtual machine is shown as link B in the figure
  • the communication distance of the link A in the present disclosure is significantly shorter than that of the link B in some cases, thus reducing the network delay of the user when using the cloud virtual machine;
  • the terminal due to the terminal, The operators of the gateway node 2 and the cloud virtual machine are different, so there is still the problem of cross-operator.
  • the operators of the terminal, the gateway node 1 and the cloud virtual machine are all telecom, so there is no cross-operator problem. It further reduces the network delay of users when using cloud virtual machines.
  • the gateway node 1 is deployed.
  • the attribution and operator of gateway node 2 is Shenzhen Telecom
  • the attribution and operator of gateway node 2 is Nanjing Unicom
  • the attribution and operator of gateway node 3 is Changsha Mobile.
  • the terminal can use its own home location and operator as the target home location and target operator, that is, The target home location and target operator are Shenzhen Telecom, and then the terminal can use gateway node 1 as the target gateway node according to the target home location and target operator, and access the aforementioned cloud virtual machine through gateway node 1.
  • the terminal and cloud The communication link between the virtual machines is shown as link A in the figure; in some embodiments, the terminal may regard the home and operator of the cloud virtual machine as the target home and target operator, that is, the target home and the target The operator is Changsha Mobile, and the terminal can use the gateway node 3 as the target gateway node according to the target attribution and target operator, and access the aforementioned cloud virtual machine through the gateway node 3. It can be understood that the connection between the terminal and the cloud virtual machine is The communication link is shown as link B in the figure. In some cases, due to the random allocation strategy of the access management platform, if the gateway node allocated to the terminal is the gateway node 2, the communication link between the terminal and the cloud virtual machine is shown as link C in the figure.
  • the communication distance of link A and link B in the present disclosure is significantly shorter than link C in some cases, thus reducing the network delay when users use cloud virtual machines;
  • There are cross-operator problems between terminal and gateway node 2, gateway node 2 and cloud virtual machine, while there is only a cross-operator problem between gateway node 1 and cloud virtual machine on link A, and there is only terminal and gateway node on link B. 3 so compared with some situations, the present disclosure can further reduce the network delay of the user when using the cloud virtual machine.
  • the way that the terminal accesses the cloud virtual machine through the gateway node 3 does not require the participation of the cloud server 1 or the cloud server 2, so the network bandwidth load of the cloud server 1 or the cloud server 2 can be effectively reduced.
  • the terminal can effectively reduce the network bandwidth load of the cloud server according to the location of the cloud virtual machine and the manner in which the operator determines the target gateway node.
  • step S20 may include, but is not limited to, steps S201 to S202 .
  • Step S201 Determine the respective priorities of multiple gateway nodes in the gateway configuration information obtained in advance, where the priorities are used to represent the degree of correlation between the gateway node and the target home location and the target operator.
  • the terminal may obtain gateway configuration information from the cloud management system.
  • the gateway configuration information includes the configuration information of each gateway node in the cloud system, wherein the configuration information at least includes the home location and the operator, for example , the gateway configuration information can be shown in Figure 7.
  • the terminal can determine the priority of each gateway node in the gateway configuration information. Therefore, the higher the priority of the gateway node, the higher the program related to the target home and the target operator.
  • the priority can be understood as sorting the gateway nodes, and the gateway node with the first ranking has the highest priority.
  • the target home and target operator can be Nanjing Telecom, then in the gateway configuration information shown in Figure 7, because If the home and operator of the gateway node 7 is Nanjing Telecom, the priority of the gateway node 7 is the highest.
  • the terminal can regularly update the gateway configuration information to ensure the real-time nature of the data and improve the reliability of the present disclosure.
  • step S201 may include, but is not limited to, the following contents: determining the respective main priorities of the multiple gateway nodes according to the proximity between the respective home locations and the target home locations of the multiple gateway nodes, and, when there is a When the primary priorities of the multiple gateway nodes are the same, the respective secondary priorities of the multiple gateway nodes with the same primary priority are determined according to the target operator, so as to determine the respective priorities of the multiple gateway nodes.
  • the terminal can first determine the primary priority of each gateway node according to the proximity between the home location of each gateway node and the target home location in the gateway configuration information
  • the degree of proximity between the gateway node's attribution and the target's attribution refers to the distance between the gateway node's geographical location and the target's attribution. It can be understood that the closer the gateway node is to the target's attribution, The higher the degree of proximity, the higher the corresponding primary priority.
  • the target home can be Shenzhen, then in the gateway configuration information shown in Figure 7, the home is Shenzhen's gateway nodes 1, 4, 5 and The proximity of the target home is the highest, and the main priority is the highest; the gateway node 3,6 whose home is Changsha is the next closest to the target home, and the main priority is next, and the gateway node 2,7 and the home are Nanjing.
  • the target belongs to the lowest degree of proximity and has the lowest primary priority.
  • the terminal can further determine the secondary priority of these gateway nodes according to the target operator, that is, determine the priority between these gateway nodes.
  • the sub-priority of the gateway node whose operator is consistent with the target operator is higher than that of the gateway node whose operator is inconsistent with the target operator.
  • the target operator can be Telecom
  • the gateway node 1, 4 , 5 is the gateway node 1 with the second higher priority
  • the gateway node 3, 6 has the second higher priority is the gateway node 6
  • the gateway nodes 2, 7 has the second higher priority is the gateway node 7. Therefore, it can be understood from the above that according to the primary priority and secondary priority of the gateway node, its priority among multiple gateway nodes in the gateway configuration information can be determined.
  • the multiple gateway nodes shown in FIG. The order of level from high to low can be sorted as shown in Figure 8.
  • the present disclosure can also determine the priority in combination with other strategies.
  • the operators of the gateway nodes 4 and 5 in FIG. 7 are inconsistent with the target operator, so a random strategy can be used to determine the priority of the two. high and low.
  • Step S202 Perform connection detection on multiple gateway nodes in order from high to low priority until a gateway node that can be successfully connected is detected and used as the target gateway node.
  • connection detection can be performed in order from high to low priority, and stop when a gateway node that can be successfully connected is detected. Detection, it can be understood that the gateway node is a better gateway node, so it can be used as the target gateway node.
  • the purpose of connection detection is to determine whether the gateway node is available. For example, the terminal can send a connection request to the gateway node , it may be determined that the gateway node is available if the gateway node responds to the aforementioned connection request, and it may be determined that the gateway node is unavailable if the gateway node does not respond to the aforementioned connection request.
  • the method may further include, but is not limited to, the following content: performing network quality detection on the gateway node that can be successfully connected, and if the result of the network quality detection meets the standard , take the gateway node as the target gateway node, and continue to detect when the result of the network quality detection is not up to the standard, until a gateway node that can be successfully connected and the result of the network quality detection is up to standard is detected, and it is taken as the target gateway node.
  • the network quality detection of the gateway node can also be performed.
  • a simple understanding is to detect whether the gateway node is stuck or not.
  • the gateway node can be used as the target gateway node, and if the result of the network quality detection fails to meet the standard, the next gateway node is continuously selected for detection.
  • the network quality detection of the gateway node by the terminal can be implemented by some detection tools.
  • the terminal can be detected by the network diagnostic tool (Packet Internet Groper, PING), for example, through the detection command "ping the IP address of the gateway node” In this way, the detection result "estimated time of the round trip" can be obtained.
  • PING Packet Internet Groper
  • the estimated time of the round trip reaches the standard (for example, the estimated time value of the round trip is lower than the preset threshold), it can be determined that the result of the network quality detection meets the standard, and In the case that the estimated time of the round trip does not meet the standard (for example, the estimated time value of the round trip exceeds a preset threshold), it may be determined that the result of the network quality detection does not meet the standard.
  • the standard for example, the estimated time value of the round trip is lower than the preset threshold
  • the terminal when the cloud virtual machine to be connected is determined, the terminal can take its own home and operator as the target home and target operator, or use the cloud The home and operator of the virtual machine are used as the target home and the target operator. In this way, the terminal can determine the target gateway node according to the target home and the target operator, and then access the cloud virtual machine through the target gateway node.
  • the target gateway node is determined according to the home location and operator of the terminal or the home location and operator of the cloud virtual machine, the network delay of the user when using the cloud virtual machine can be effectively reduced, and since the target gateway node It is determined by the terminal itself, so there is no need to additionally set up other physical devices such as an access management platform, which effectively reduces the cost.
  • the present disclosure also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is run, any one of the virtual machine access methods provided by the present disclosure is executed.
  • the present disclosure also provides a terminal, as shown in FIG. 10 , comprising a processor and a memory, where the memory is configured to store a computer program; the processor is configured to run the computer program to execute any one of the virtual machine access methods provided by the present disclosure .
  • the processor may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSP), application specific integrated circuits (Application Specific Integrated circuits) Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor can be a microprocessor or the processor can also be any conventional processor or the like.
  • computer-readable storage medium includes volatile and non-volatile and non-volatile storage media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules or other data. Volatile, removable and non-removable media.
  • Computer-readable storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, Or any other medium that can be used to store the desired information and that can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media, as is well known to those of ordinary skill in the art .
  • the computer-readable storage medium may be an internal storage unit of the terminal of the foregoing embodiment, such as a hard disk or a memory of the terminal.
  • the computer-readable storage medium can also be an external storage device of the terminal, such as a plug-in hard disk equipped on the terminal, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, and a flash memory card (Flash Card). )Wait.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提供了一种虚拟机接入方法、终端及存储介质,该方法包括:在待连接的云虚拟机确定的情况下,终端可以将自身的归属地和运营商作为目标归属地和目标运营商,或者,将云虚拟机的归属地和运营商作为目标归属地和目标运营商,如此,终端可以根据目标归属地和目标运营商确定目标网关节点,进而通过目标网关节点接入云虚拟机。

Description

一种虚拟机接入方法、终端及存储介质
相关申请的交叉引用
本公开要求享有2020年12月31日提交的名称为“一种虚拟机接入方法、终端及存储介质”的中国专利申请CN202011641560.7的优先权,其全部内容通过引用并入本公开中。
技术领域
本公开涉及云计算技术领域,尤其涉及一种虚拟机接入方法、终端及存储介质。
背景技术
虚拟机(Virtual Machine,VM)技术让多个操作系统可以运行在同一个物理机上并提供可靠的隔离,大大提高了物理资源的复用性,例如,通过虚拟机技术可以在云服务器上虚拟出多台云虚拟机,需要说明的是,云虚拟机也可称为云桌面、云电脑等等。在一些情形中,终端接入云虚拟机的过程可以为:终端向云管理系统发送登录请求,云管理系统为终端分配云虚拟机,同时,接入管理平台为终端分配网关节点,如此,终端可以连接网关节点以接入云虚拟机。但是,前述方式可能会导致用户在使用云虚拟机时的网络时延过大,影响用户体验。
发明内容
基于此,本公开提供了一种虚拟机接入方法、终端及存储介质,以降低用户在使用云虚拟机时的网络时延。
第一方面,本公开提供了一种虚拟机接入方法,用于终端,方法包括:在待连接的云虚拟机确定的情况下,将终端的归属地和运营商或云虚拟机的归属地和运营商作为目标归属地和目标运营商;根据目标归属地和目标运营商,确定目标网关节点;通过目标网关节点接入云虚拟机。
第二方面,本公开提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被运行时执行如第一方面的虚拟机接入方法。
第三方面,本公开提供了一种终端,包括处理器与存储器;存储器配置为存储计算机程 序;处理器配置为运行计算机程序以执行如第一方面的虚拟机接入方法。
附图说明
图1为云系统的一种架构示意图;
图2为一些情形中终端与云虚拟机的通信链路的一种示意图;
图3为本公开提供的虚拟机接入方法的一种流程示意图;
图4为本公开一个可选的应用场景示意图;
图5为本公开另一个可选的应用场景示意图;
图6为本公开中步骤S20的一种流程示意图;
图7为本公开中网关配置信息的一种示意图;
图8为图7中多个网关节点按照优先级从高到低的顺序进行排序后的一种示意图;
图9为本公开中选择目标网关节点的一种流程示意图;
图10为本公开提供的终端的一种结构示意性框图。
具体实施方式
下面将结合本公开中的附图,对本公开中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
附图中所示的流程图仅是示例说明,不是必须包括所有的内容和操作/步骤,也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解、组合或部分合并,因此实际执行的顺序有可能根据实际情况改变。
下面结合附图,对本公开的一些实施方式作详细说明。在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。
云虚拟机又称为云桌面、云电脑等等,在实施云虚拟机技术后,用户可以在任何地点和时间点,通过不同的终端访问部署在云服务器上的云虚拟机。基于此,图1为云系统的一种架构示意图,其中,云服务器101通常部署在不同区域(例如不同城市)的隔离区(demilitarized zone,DMZ),即云服务器101通常为分布式部署且处于内网中,例如,云服务器101A可 以部署在深圳,云服务器101B可以部署在南京,云服务器C可以部署在西安。而由于云服务器101处于内网中,终端103无法直接访问云服务器101,即终端103无法直接登录云虚拟机,因此可以设置云桌面接入网关102(CoudDesk Aceess Gate,CAG,以下简称为网关节点),以实现两者之间的数据互通,使得终端103可以登录云虚拟机。其中,网关节点102通常也是分布式部署,例如,网关节点102A可以部署在深圳,网关节点102B可以部署在南京,网关节点102C可以部署在西安。另外,一个云服务器101上可以运行有多个云虚拟机,并且,终端的设备形式可以是移动终端101A、机顶盒102B、计算机103C等等。
在一些情形中,当终端需要登录云虚拟机时,云管理系统会为终端分配某一云服务器上运行的云虚拟机,同时,接入管理平台会为终端分配网关节点,其中,云管理系统也可称为桌面管理系统、虚拟机管理系统等等,接入管理平台通常为网元实体。由于接入管理平台的分配策略通常为随机分配,因此可能会导致用户在使用云虚拟机时的网络时延过大,在一示例性实施例中,如图2所示,若终端的归属地和运营商为深圳电信,网关节点2的归属地和运营商为长沙联通,云服务器1部署在深圳,云服务器2部署在长沙,基于此,若云管理系统为终端分配的是云服务器1上运行的云虚拟机,接入管理平台为终端分配的网关节点为网关节点2,则终端与云虚拟机之间的通信链路可以如图2中的虚线所示,即终端连接网关节点2,网关节点2连接其所属区域的云服务器2,云服务器2在内网中连接云服务器1,可以发现,终端与云虚拟机之间的通信链路在通信距离上过长,另外,此通信链路还存在跨运营商的问题,因此一些情形可能会导致用户在使用云虚拟机时的网络时延过大,影响用户体验。基于此,本公开提供一种虚拟机接入方法,以降低用户在使用云虚拟机时的网络时延。
本公开提供的一种虚拟机接入方法,如图3所示,可以用于终端,该方法可以包括但不限于步骤S10至步骤S20。
步骤S10,在待连接的云虚拟机确定的情况下,将终端的归属地和运营商或云虚拟机的归属地和运营商作为目标归属地和目标运营商。
当用户需要使用云虚拟机时,终端可以根据用户的登录操作向云管理系统发送登录请求,以使云管理系统可以根据该登录请求为终端分配云虚拟机,即待连接的云虚拟已确定。在此情况下,终端可以将自身的归属地和运营商作为目标归属地和目标运营商,或者,将云虚拟机的归属地和运营商作为目标归属地和目标运营商,以便于后续确定目标网关节点,需要说明的是,在通常情况下云虚拟机的归属地和运营商主要取决于相应云服务器的网络配置。
在一些实施例中,步骤S10中的“将终端的归属地和运营商作为目标归属地和目标运营商”可以包括但不限于如下内容:在预先接收到的接入指示策略用于指示以终端接入的情况 下,获取终端的归属地和运营商并作为目标归属地和目标运营商;另外,步骤S10中的“将云虚拟机的归属地和运营商作为目标归属地和目标运营商”可以包括但不限于如下内容:在预先接收到的接入指示策略用于指示以云虚拟机接入的情况下,获取云虚拟机的归属地和运营商并作为目标归属地和目标运营商。
在云管理系统为终端分配云虚拟机时,云管理系统可以将相应的接入指示策略下发给终端,其中,当接入指示策略用于指示以终端接入时,则终端将自身的归属地和运营商作为目标归属地和目标运营商,而当接入指示策略用于指示以云虚拟机接入时,则终端将云虚拟机的归属地和运营商作为目标归属地和目标运营商。
在一些实施方式中,“获取终端的归属地和运营商”可以包括但不限于如下内容:获取终端所属的虚拟专用网(Virtual Private Networks,VPN)的归属地和运营商,并将虚拟专用网的归属地和运营商作为终端的归属地和运营商。
对于部分终端而言,它们可以通过其所属的虚拟专用网访问专用网络,专用网络可以理解为私有云,而通常情况下虚拟专用网又靠近终端部署,因此,虚拟专用网的归属地和运营商可以看作终端的归属地和运营商。基于此,当接入指示策略用于指示终端以终端就近接入方式接入云虚拟机时,终端可以通过解析其所属虚拟专用网的自动网关,以接收该虚拟专用网返回的一个IP地址,进而根据这个IP地址确定虚拟专用网的归属地和运营商,并将其作为终端的归属地和运营商。可以理解,对于部分不具备检测自身归属地和运营商能力的终端,例如机顶盒等,通过本公开也可以确定自身的归属地和运营商,当然,对于部分具备检测自身归属地和运营商能力的终端,比如智能手机,其可以通过本公开或自身检测确定归属地和运营商。在一示例性实施例中,终端所属的虚拟专用网的归属地和运营商为深圳电信,基于此,当云管理系统为终端确定云虚拟机时,终端根据预先接收到的接入指示策略,获取虚拟专用网的归属地和运营商并将其作为目标归属地和目标运营商,即目标归属地和目标运营商为深圳电信,以便于后续确定目标网关节点。
在一些实施方式中,“获取云虚拟机的归属地和运营商”可以包括但不限于如下内容:根据预先获取到的云虚拟机的属性信息,得到云虚拟机的归属地和运营商,其中,云虚拟机的属性信息是云管理系统为终端确定云虚拟机时向终端发送的信息。
在云管理系统为终端分配云虚拟机时,云管理系统可以将该云虚拟机的属性信息发送给终端,例如,属性信息可以包括云虚拟机的ID、归属地、运营商等等,因此,当接入指示策略用于指示终端以云虚拟机就近接入方式接入云虚拟机时,终端可以根据预先获取到的属性信息,得到相应的归属地和运营商。在一示例性实施例中,云管理系统为终端分配归属地和 运营商为南京电信的云虚拟机,基于此,终端可以根据预先接收到的接入指示策略,获取云虚拟机的归属地和运营商并将其作为目标归属地和目标运营商,即目标归属地和目标运营商为南京电信,以便于后续确定目标网关节点。
步骤S20,根据目标归属地和目标运营商,确定目标网关节点,并通过目标网关节点接入云虚拟机。
在确定目标归属地和目标运营商后,终端可以根据这两者确定目标网关节点,进而连接目标网关节点,如此终端就通过目标网关节点接入了云虚拟机,可以理解,由于目标网关节点为根据终端的归属地或云虚拟机的归属地确定的,因此可以有效缩短终端与云虚拟机之间通信链路的通信距离,从而降低用户在使用云虚拟机时的网络时延,同时,目标网关节点为根据终端的运营商或云虚拟机的运营商确定的,在部分情况下使得终端与云虚拟机之间不存在跨运营商的问题,因此进一步降低了用户在使用云虚拟机时的网络时延。与一些情形相比,本公开不仅可以降低用户在使用云虚拟机时的网络时延,并且由于目标网关节点由终端自身确定的,因此不需要额外设置接入管理平台等其他实体设备,有效降低了成本。
在一示例性实施例中,如图4所示,若终端的归属地和运营商为深圳电信,云服务器1部署在深圳,云服务器2部署在南京,网关节点1的归属地和运营商为深圳电信,网关节点2的归属地和运营商为南京联通,基于此,若云管理系统为终端分配的云虚拟机为云服务器1上运行的某一个云虚拟机,其归属地和运营商为深圳电信,则终端可以将自身的归属地和运营商作为目标归属地和目标运营商,或者,将云虚拟机的归属地和运营商作为目标归属地和目标运营商,即目标归属地和目标运营商为深圳电信,进而终端可以根据目标归属地和目标运营商,将网关节点1作为目标网关节点,并通过网关节点1接入前述云虚拟机,可以理解,终端与云虚拟机之间的通信链路如图中链路A所示。而在一些情形中,由于接入管理平台的随机分配策略,若其分配给终端的网关节点为网关节点2,则终端与云虚拟机之间的通信链路如图中链路B所示,可以理解,本公开中的链路A在通信距离上明显短于一些情形中的链路B,因此降低了用户在使用云虚拟机时的网络时延;另外,在一些情形中,由于终端、网关节点2和云虚拟机的运营商不尽相同,因此还存在跨运营商的问题,而在本公开中,终端、网关节点1和云虚拟机的运营商均为电信,因此不存在跨运营商的问题,进一步降低了用户在使用云虚拟机时的网络时延。
在一示例性实施例中,如图5所示,若终端的归属地和运营商为深圳电信,云服务器1部署在深圳,云服务器2部署在南京,云服务器3部署在长沙,网关节点1的归属地和运营商为深圳电信,网关节点2的归属地和运营商为南京联通,网关节点3的归属地和运营商为 长沙移动,基于此,若云管理系统为终端分配的云虚拟机为云服务器3上运行的某一个云虚拟机,其归属地和运营商为长沙移动,则在一些实施方式中,终端可以将自身的归属地和运营商作为目标归属地和目标运营商,即目标归属地和目标运营商为深圳电信,进而终端可以根据目标归属地和目标运营商,将网关节点1作为目标网关节点,并通过网关节点1接入前述云虚拟机,可以理解,终端与云虚拟机之间的通信链路如图中链路A所示;在一些实施方式中,终端可以将云虚拟机的归属地和运营商作为目标归属地和目标运营商,即目标归属地和目标运营商为长沙移动,进而终端可以根据目标归属地和目标运营商,将网关节点3作为目标网关节点,并通过网关节点3接入前述云虚拟机,可以理解,终端与云虚拟机之间的通信链路如图中链路B所示。而在一些情形中,由于接入管理平台的随机分配策略,若其分配给终端的网关节点为网关节点2,则终端与云虚拟机之间的通信链路如图中链路C所示。可以理解,本公开中的链路A和链路B在通信距离上明显短于一些情形中的链路C,因此降低了用户在使用云虚拟机时的网络时延;另外,链路C上存在终端与网关节点2、网关节点2与云虚拟机的跨运营商问题,而链路A上仅存在网关节点1与云虚拟机的跨运营商问题,链路B上仅存在终端与网关节点3的跨运营商问题,因此与一些情形相比,本公开还可以进一步降低用户在使用云虚拟机时的网络时延。此外还值得一提的是,终端通过网关节点3接入云虚拟机的方式,不需要云服务器1或云服务器2的参与,因此可以有效减小云服务器1或云服务器2的网络带宽负载,换言之,终端根据云虚拟机的归属地和运营商确定目标网关节点的方式,能够有效减小云服务器的网络带宽负载。
在一些实施例中,如图6所示,步骤S20中的“根据目标归属地和目标运营商,确定目标网关节点”可以包括但不限于步骤S201至步骤S202。
步骤S201,确定预先获取到的网关配置信息中的多个网关节点各自的优先级,其中,优先级用于表征网关节点与目标归属地以及目标运营商的相关程度。
在终端执行本公开所提供的方法前,终端可以先向云管理系统获取网关配置信息,网关配置信息中包括云系统中各个网关节点的配置信息,其中配置信息至少包括归属地和运营商,例如,网关配置信息可以如图7所示。基于此,终端可以确定网关配置信息中各个网关节点的优先级,因此网关节点的优先级越高,其与目标归属地以及目标运营商的相关程序就越高,简单理解,确定各个网关节点的优先级可以理解为对网关节点进行排序,排序第一的网关节点的优先级最高,例如,目标归属地和目标运营商可以为南京电信,则在如图7所示的网关配置信息中,由于网关节点7的归属地和运营商为南京电信,则网关节点7的优先级最高。此外还需要的是,终端可以定期更新网关配置信息,以确保数据的实时性,提高本公开的可 靠性。
在一些实施方式中,步骤S201可以包括但不限于如下内容:根据多个网关节点各自的归属地和目标归属地之间的接近程度,确定多个网关节点各自的主优先级,以及,当存在多个网关节点的主优先级一致的情况下,根据目标运营商确定主优先级一致的多个网关节点各自的次优先级,以确定多个网关节点各自的优先级。
为了使得目标网关节点能够有效缩短终端和云虚拟机之间的通信距离,终端可以先根据网关配置信息中各个网关节点的归属地与目标归属地之间的接近程度,确定各个网关节点的主优先级,其中,网关节点的归属地与目标归属地之间的接近程度,指的是网关节点在地理位置上与目标归属地之间距离的远近,可以理解,网关节点离目标归属地越近,则接近程度越高,相应的主优先级就越高,例如,目标归属地可以是深圳,则在如图7所示的网关配置信息中,归属地为深圳的网关节点1,4,5与目标归属地的接近程度最高,主优先级最高;归属地为长沙的网关节点3,6与目标归属地的接近程度次之,主优先级次之,归属地为南京的网关节点2,7与目标归属地的接近程度最低,主优先级最低。另外,由前述可知可能会存在多个网关节点的主优先级一致,则对于这些网关节点,终端还可以根据目标运营商进一步确定这些网关节点的次优先级,即确定这些网关节点之间的优先级高低,可以理解,运营商与目标运营商一致的网关节点的次优先级,要高于运营商与目标运营商不一致的网关节点,例如,目标运营商可以是电信,则网关节点1,4,5中次优先级较高的是网关节点1,网关节点3,6中次优先级较高的是网关节点6,网关节点2,7中次优先级较高的是网关节点7。因此综上可以理解,根据网关节点的主优先级和次优先级,就可以确定其在网关配置信息中多个网关节点中的优先级,例如图7所示的多个网关节点,若按照优先级从高到低的顺序进行排序,则排序后可以如图8所示。此外需要说明的是,本公开还可以结合其他策略确定优先级,例如,图7中的网关节点4,5的运营商均与目标运营商不一致,因此可以采用随机策略等确定两者的优先级高低。
步骤S202,按照优先级从高到低的顺序依次对多个网关节点进行连接检测,直至检测到能够成功连接的网关节点,并将其作为目标网关节点。
由于优先级越高的网关节点与目标归属地以及目标运营商的相关程度越高,因此可以按照优先级从高到低的顺序依次进行连接检测,并在检测到能够成功连接的网关节点时停止检测,可以理解,该网关节点为较优的网关节点,因此可以将其作为目标网关节点,其中,连接检测的目的是为了确定该网关节点可不可用,例如,终端可以向该网关节点发送连接请求,在该网关节点响应了前述连接请求的情况下可以确定该网关节点可用,在该网关节点没有响 应前述连接请求的情况下可以确定该网关节点不可用。
在一些实施方式中,在检测到能够成功连接的网关节点之后,该方法还可以包括但不限于如下内容:对能够成功连接的网关节点进行网络质量检测,在网络质量检测的结果达标的情况下,将该网关节点作为目标网关节点,在网络质量检测的结果不达标的情况下继续进行检测,直至检测到能够成功连接且网络质量检测的结果达标的网关节点,并将其作为目标网关节点。
在检测到某一网关节点能够连接成功时,还可以对该网关节点进行网络质量检测,简单理解即检测该网关节点卡不卡,如图9所示,在网络质量检测的结果达标的情况下,可以将该网关节点作为目标网关节点,而在网络质量检测的结果不达标的情况下,则继续选择下一个网关节点进行检测。需要说明的是,终端对网关节点进行网络质量检测可以通过一些检测工具实施,例如,终端可以通过网络诊断工具(Packet Internet Groper,PING)进行检测,比如通过检测命令“ping网关节点的IP地址”进行检测,如此可以得到检测结果“往返行程的估计时间”,在往返行程的估计时间达标(比如往返行程的估计时间值低于预设阈值)的情况下可以确定网络质量检测的结果达标,而在往返行程的估计时间不达标(比如往返行程的估计时间值超过预设阈值)的情况下可以确定网络质量检测的结果不达标。
综上所述,本公开提供的虚拟机接入方法,在待连接的云虚拟机确定的情况下,终端可以将自身的归属地和运营商作为目标归属地和目标运营商,或者,将云虚拟机的归属地和运营商作为目标归属地和目标运营商,如此,终端可以根据目标归属地和目标运营商确定目标网关节点,进而通过目标网关节点接入云虚拟机。可以理解,由于目标网关节点为根据终端的归属地和运营商或云虚拟机的归属地和运营商确定的,因此可以有效降低用户在使用云虚拟机时的网络时延,并且由于目标网关节点由终端自身确定的,因此不需要额外设置接入管理平台等其他实体设备,有效降低了成本。
本公开还提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被运行时执行本公开提供的任一项虚拟机接入方法。
本公开还提供一种终端,如图10所示,包括处理器与存储器,该存储器配置为存储计算机程序;该处理器配置为运行计算机程序以执行本公开提供的任一项虚拟机接入方法。
应当理解的是,处理器可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。 其中,通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读存储介质上,计算机可读存储介质可以包括计算机可读存储介质(或非暂时性介质)和通信介质(或暂时性介质)。
如本领域普通技术人员公知的,术语计算机可读存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机可读存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
在一示例性实施例中,计算机可读存储介质可以是前述实施例的终端的内部存储单元,例如终端的硬盘或内存。计算机可读存储介质也可以是终端的外部存储设备,例如终端上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以权利要求的保护范围为准。

Claims (9)

  1. 一种虚拟机接入方法,用于终端,所述方法包括:
    在待连接的云虚拟机确定的情况下,将所述终端的归属地和运营商或所述云虚拟机的归属地和运营商作为目标归属地和目标运营商;
    根据所述目标归属地和所述目标运营商,确定目标网关节点;
    通过所述目标网关节点接入所述云虚拟机。
  2. 根据权利要求1所述的方法,其中,所述根据所述目标归属地和所述目标运营商,确定目标网关节点,包括:
    确定预先获取到的网关配置信息中的多个网关节点各自的优先级,所述优先级用于表征所述网关节点与所述目标归属地以及所述目标运营商的相关程度;
    按照优先级从高到低的顺序依次对所述多个网关节点进行连接检测,直至检测到能够成功连接的网关节点,并将所述能够成功连接的网关节点作为所述目标网关节点。
  3. 根据权利要求2所述的方法,其中,在所述检测到能够成功连接的网关节点之后,进一步包括:
    对所述能够成功连接的网关节点进行网络质量检测,在所述网络质量检测的结果达标的情况下,将所述能够成功连接的网关节点作为所述目标网关节点,在所述网络质量检测的结果不达标的情况下继续进行检测,直至检测到能够成功连接且所述网络质量检测的结果达标的网关节点,并将所述能够成功连接且所述网络质量检测的结果达标的网关节点作为目标网关节点。
  4. 根据权利要求2或3所述的方法,其中,所述确定预先获取到的网关配置信息中的多个网关节点各自的优先级,包括:
    根据所述多个网关节点各自的归属地和所述目标归属地之间的接近程度,确定所述多个网关节点各自的主优先级,以及,当存在多个网关节点的主优先级一致的情况下,根据所述目标运营商确定主优先级一致的所述多个网关节点各自的次优先级,以确定所述多个网关节点各自的优先级。
  5. 根据权利要求1-3任一所述的方法,其中,所述将所述终端的归属地和运营商作为目标归属地和目标运营商,包括:
    在预先接收到的接入指示策略用于指示以所述终端接入的情况下,获取所述终端的归属 地和运营商并作为所述目标归属地和所述目标运营商;
    所述将所述云虚拟机的归属地和运营商作为目标归属地和目标运营商,包括:
    在预先接收到的接入指示策略用于指示以所述云虚拟机接入的情况下,获取所述云虚拟机的归属地和运营商并作为所述目标归属地和所述目标运营商。
  6. 根据权利要求5所述的方法,其中,所述获取所述终端的归属地和运营商,包括:
    获取所述终端所属的虚拟专用网的归属地和运营商,并将所述虚拟专用网的归属地和运营商作为所述终端的归属地和运营商。
  7. 根据权利要求5所述的方法,其中,所述获取所述云虚拟机的归属地和运营商,包括:
    根据预先获取到的所述云虚拟机的属性信息,得到所述云虚拟机的归属地和运营商,其中,所述云虚拟机的属性信息是云管理系统为所述终端确定所述云虚拟机时向所述终端发送的信息。
  8. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被运行时执行所述权利要求1至7中任一项所述的虚拟机接入方法。
  9. 一种终端,包括处理器与存储器,
    所述存储器配置为存储计算机程序;
    所述处理器配置为运行所述计算机程序以执行所述权利要求1至7中任一项所述的虚拟机接入方法。
PCT/CN2021/136440 2020-12-31 2021-12-08 一种虚拟机接入方法、终端及存储介质 WO2022143061A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011641560.7A CN114697266A (zh) 2020-12-31 2020-12-31 一种虚拟机接入方法、终端及存储介质
CN202011641560.7 2020-12-31

Publications (1)

Publication Number Publication Date
WO2022143061A1 true WO2022143061A1 (zh) 2022-07-07

Family

ID=82135876

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/136440 WO2022143061A1 (zh) 2020-12-31 2021-12-08 一种虚拟机接入方法、终端及存储介质

Country Status (2)

Country Link
CN (1) CN114697266A (zh)
WO (1) WO2022143061A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420762A (zh) * 2007-10-23 2009-04-29 中国移动通信集团公司 接入网关的选择方法、系统及网关选择执行节点
CN101754277A (zh) * 2008-12-19 2010-06-23 Ut斯达康通讯有限公司 一种选择接入网关的方法和接入网关控制节点
CN107707622A (zh) * 2017-08-30 2018-02-16 华为技术有限公司 一种访问桌面云虚拟机的方法、装置及桌面云控制器
CN110191428A (zh) * 2019-05-27 2019-08-30 北京鸿联九五信息产业有限公司 一种基于智能云平台的数据分配方法
US20200220746A1 (en) * 2017-08-28 2020-07-09 Luminati Networks Ltd. System and Method for Improving Content Fetching by Selecting Tunnel Devices
CN111585800A (zh) * 2020-04-29 2020-08-25 平安科技(深圳)有限公司 基于虚拟私有云的网关节点的配置方法、装置和介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420762A (zh) * 2007-10-23 2009-04-29 中国移动通信集团公司 接入网关的选择方法、系统及网关选择执行节点
CN101754277A (zh) * 2008-12-19 2010-06-23 Ut斯达康通讯有限公司 一种选择接入网关的方法和接入网关控制节点
US20200220746A1 (en) * 2017-08-28 2020-07-09 Luminati Networks Ltd. System and Method for Improving Content Fetching by Selecting Tunnel Devices
CN107707622A (zh) * 2017-08-30 2018-02-16 华为技术有限公司 一种访问桌面云虚拟机的方法、装置及桌面云控制器
CN110191428A (zh) * 2019-05-27 2019-08-30 北京鸿联九五信息产业有限公司 一种基于智能云平台的数据分配方法
CN111585800A (zh) * 2020-04-29 2020-08-25 平安科技(深圳)有限公司 基于虚拟私有云的网关节点的配置方法、装置和介质

Also Published As

Publication number Publication date
CN114697266A (zh) 2022-07-01

Similar Documents

Publication Publication Date Title
US10447793B2 (en) Detecting shared access
CN108989352B (zh) 防火墙实现方法、装置、计算机设备及存储介质
US11822453B2 (en) Methods and systems for status determination
US11132229B2 (en) Method, storage medium storing instructions, and apparatus for implementing hardware resource allocation according to user-requested resource quantity
US20210048956A1 (en) Storage system, and method and apparatus for allocating storage resources
US10476746B2 (en) Network management method, device, and system
US20170249180A1 (en) Virtual Machine Start Method and Apparatus
US20220318071A1 (en) Load balancing method and related device
WO2017185615A1 (zh) 一种业务处理设备的业务状态确定方法及调度设备
CN111405052A (zh) 基于端口预测的p2p穿透方法、电子设备及介质
WO2023050933A1 (zh) 确定失陷主机的方法及装置
CN111031129B (zh) 访问请求处理方法、处理装置、电子设备及存储介质
US20200213233A1 (en) Balancing load
CN109039694B (zh) 一种面向业务的全局网络资源分配方法及装置
CN108235800B (zh) 一种网络故障探测方法、控制中心设备及计算机存储介质
CN108228272B (zh) Web容器生成处理方法、设备以及服务器
EP3672203A1 (en) Distribution method for distributed data computing, device, server and storage medium
WO2022143061A1 (zh) 一种虚拟机接入方法、终端及存储介质
US11695639B2 (en) Method and apparatus for searching for maintenance end point (MEP), and storage medium
CN113612866A (zh) 地址检测方法、装置、计算机设备和存储介质
US10951732B2 (en) Service processing method and device
CN113076187A (zh) 分布式锁管理方法及装置
US20210004308A1 (en) Data processing method and system
CN114979286A (zh) 容器服务的访问控制方法、装置、设备及计算机存储介质
US11271859B2 (en) Method and apparatus for realizing intelligent traffic scheduling, computer readable storage medium thereof and computer device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21913802

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13/11/2023)