CN111800506B - Edge computing node deployment method and related device - Google Patents

Edge computing node deployment method and related device Download PDF

Info

Publication number
CN111800506B
CN111800506B CN202010641178.XA CN202010641178A CN111800506B CN 111800506 B CN111800506 B CN 111800506B CN 202010641178 A CN202010641178 A CN 202010641178A CN 111800506 B CN111800506 B CN 111800506B
Authority
CN
China
Prior art keywords
edge computing
virtual machine
node
host
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010641178.XA
Other languages
Chinese (zh)
Other versions
CN111800506A (en
Inventor
蒋海明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN202010641178.XA priority Critical patent/CN111800506B/en
Publication of CN111800506A publication Critical patent/CN111800506A/en
Application granted granted Critical
Publication of CN111800506B publication Critical patent/CN111800506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a method for deploying edge computing nodes, which comprises the following steps: the host creates an edge computing virtual machine according to the obtained node configuration file; registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server; an edge computing service program is deployed to the edge computing virtual machine to deploy a portion of the hardware capabilities of the host machine as edge computing nodes. The application also discloses a computer device, an edge computing node deployment system, a computer readable storage medium and a computer program product. According to the technical scheme, an edge computing node can be deployed in the host machine, edge computing is achieved, the node and the host machine are mutually isolated, hardware resources outside the virtual machine cannot be occupied, and all hardware resources of the host machine are prevented from being monopolized.

Description

Edge computing node deployment method and related device
Technical Field
The present application relates to the field of computer technology, and in particular, to an edge computing node deployment method, a computer device, an edge computing node deployment system, a computer readable storage medium, and a computer program product.
Background
As information technology continues to evolve, cloud computing technology emerges. In the existing internet application, the dependence on hardware resources can be reduced through a cloud computing technology, and a server is moved to the cloud. Further to increase the computing power of the cloud computing platform, application to edge computing services is required. Therefore, with the development of the edge devices and the internet of things, more and more nodes start to participate in cloud computing or edge computing services, namely, servers are large, personal PCs are small, and idle CPU (central processing units), bandwidth and storage resources are not utilized to provide services, so that the cloud computing or edge computing service nodes are formed.
In the prior art, the hardware devices and resources in the service node are generally used in the edge computing or cloud computing process, which results in monopolizing the performance resources of the hardware devices, the device control right is completely given to the cloud computing or edge computing service user, the service deployment of the hardware device owners is not facilitated, and the sharing aspect is poor.
Therefore, how to avoid having an edge node access to cloud computing or edge computing networks in an exclusive manner is a major concern for those skilled in the art.
Disclosure of Invention
The application mainly aims at providing an edge computing node deployment method, a computer device, an edge computing node deployment system, a computer readable storage medium and a computer program product, which aim at solving the problem of how to safely, conveniently and efficiently access an edge node into an edge computing network.
In order to achieve the above object, the present application provides a method for deploying edge computing nodes, the method comprising:
the host creates an edge computing virtual machine according to the obtained node configuration file;
registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
an edge computing service program is deployed to the edge computing virtual machine to deploy a portion of the hardware capabilities of the host machine as edge computing nodes.
Preferably, the host creates an edge computing virtual machine according to the obtained node configuration file, including:
the host receives the input configuration information through the web management system; the configuration information comprises a memory, a CPU, a storage path and a storage size;
saving the configuration information as the node configuration file;
and creating the edge computing virtual machine according to the node configuration file.
Preferably, creating the edge computing virtual machine according to the node configuration file includes:
the node configuration file is sent to a virtual machine management program through a preset interface;
and controlling the virtual machine management program to execute virtual machine creation operation according to the configuration information in the node configuration file to obtain the edge computer virtual machine.
Preferably, creating the edge computing virtual machine according to the node configuration file includes:
the host machine judges whether a virtual machine program exists locally;
if yes, controlling a virtual machine management program to create the edge computing virtual machine according to the node configuration file;
if not, downloading the target virtual machine program; and the control virtual machine management program creates the edge computing virtual machine according to the target virtual machine program and the node configuration file.
Preferably, the method further comprises:
before the host receives the unique identifier, the server calculates the unique identifier according to the overall platform scheduling information;
and sending the unique identification to the host.
Preferably, the method further comprises:
and collecting data of the edge computing service program, and uploading the data to the edge computing platform so as to monitor edge computing nodes.
To achieve the above object, the present application also provides a computer apparatus including a memory and a processor, the memory having stored thereon an edge computing node deployment program executable on the processor, the edge computing node deployment program implementing the steps of the edge computing node deployment method as described above when executed by the processor.
Preferably, the computer device is a node constituting a CDN network or a blockchain network.
To achieve the above object, the present application further provides an edge computing node deployment system, the system comprising:
the virtual machine creation module is used for creating an edge computing virtual machine according to the obtained node configuration file;
the virtual machine activation module is used for registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
the node deployment module is used for deploying the edge computing service program to the edge computing virtual machine so as to deploy part of hardware performance of the host machine as an edge computing node.
To achieve the above object, the present application also provides a computer-readable storage medium having stored thereon an edge computing node deployment program executable by one or more processors to implement the steps of the edge computing node deployment method as described above.
To achieve the above object, the present application also provides a computer program product comprising computer instructions which, when run on a computer, enable the computer to perform the steps of the edge computing node deployment method described above.
The application provides a method for deploying edge computing nodes, which comprises the following steps: the host creates an edge computing virtual machine according to the obtained node configuration file; registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server; an edge computing service program is deployed to the edge computing virtual machine to deploy a portion of the hardware capabilities of the host machine as edge computing nodes.
The edge computing virtual machine is firstly created in the host machine according to the node configuration file corresponding to the host machine, then the edge computing virtual machine is registered in the edge computing platform through the unique identifier distributed by the server instead of the host machine being integrally registered in the edge computing platform, and finally the edge computing service program is deployed to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, namely, part of hardware of the host machine is deployed as the edge computing node, one edge computing node is deployed in the host machine through the virtual machine, edge computing is realized, the node and the host machine are isolated from each other, hardware resources outside the virtual machine are not occupied, all hardware resources of the host machine are prevented from being exclusive, the virtual machine can be independently regulated without considering the situation of the host machine, the management and control efficiency of the node is improved, and the edge node is safely, conveniently and efficiently accessed into the edge computing network.
The computer device, the edge computing node deployment system, the computer readable storage medium and the computer program product provided by the application have the beneficial effects and are not described herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a first embodiment of the present application;
FIG. 2 is a flowchart of creating a virtual machine according to a first embodiment of the present application;
FIG. 3 is a flow chart of a second embodiment of the present application;
FIG. 4 is a schematic diagram illustrating an internal structure of a computer device according to a first embodiment of the present application;
fig. 5 is a block diagram of a third embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
In the prior art, the hardware devices and resources in the service node are generally used in the edge computing or cloud computing process, which results in monopolizing the performance resources of the hardware devices, the device control right is completely given to the cloud computing or edge computing service user, the service deployment of the hardware device owners is not facilitated, and the sharing aspect is poor.
Therefore, the application provides a method for deploying edge computing nodes, which comprises the steps of firstly creating an edge computing virtual machine in a host machine according to a node configuration file corresponding to the host machine, registering the edge computing virtual machine in an edge computing platform through a unique identifier distributed by a server instead of registering the whole host machine in the edge computing platform, and finally deploying an edge computing service program to the edge computing virtual machine, so that the edge computing virtual machine has the function of an edge computing node, namely, deploying part of hardware of the host machine as the edge computing node, and the edge computing node is deployed in the host machine through the virtual machine, thereby realizing edge computing, isolating the node from the host machine, avoiding occupying hardware resources outside the virtual machine, avoiding exclusive operation of all hardware resources of the host machine, independently adjusting the virtual machine without considering the situation of the host machine, improving the management and control efficiency of the node, and enabling the edge node to be more safely, conveniently and efficiently accessed into an edge computing network.
Specifically, an edge computing node deployment method provided by the application is described below through an embodiment.
Referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of the present application.
In a first embodiment, the method may include:
s101, the host machine creates an edge computing virtual machine according to the obtained node configuration file;
in this embodiment, the host computer will be simply referred to as a host for convenience of description. In this step, the node configuration file may be obtained through input of the user. Specifically, after configuration information input by a user is acquired through a web management system in a host machine, the configuration information is stored to obtain a node configuration file, and then an edge computing virtual machine is created according to the node configuration file. The configuration file includes, but is not limited to, memory, CPU, storage path, and storage size.
The configuration of the edge computing virtual machine is then controlled by the node configuration file. The configuration information in the node configuration file can be determined by default configuration of the web management system, can be determined by the web management system according to preset proportion and host configuration, and can be determined by information input by a user to the web management system. The node configuration file can influence the performance of the edge computing virtual machine, but in general, the edge computing virtual machine is virtualized in the host, the hardware performance of the edge computing virtual machine has independence, the data is isolated from the host, the data is not influenced, and the independent operation between the host and the virtual machine can be ensured.
The node profile may include the number of cores of the host's CPU used by the virtual machine, the size of the storage space used, and the like. For example, the processor of one PC is 8 cores and the memory space of the memory is 1TB. When a PC is used as a host, a CPU used by a virtual machine can be set as 4 cores in the setting information, and a memory space which can be used is 500GB. Therefore, after the virtual machine is operated, only the corresponding hardware resources are set in the setting information, and other resource hosts can operate other applications or programs and the like.
It is conceivable that in this embodiment, the performance resources and configuration of the edge computing virtual machine may be adjusted and controlled through the node configuration file, so as to form a good fit between the virtual machine and the host machine.
S102, registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
on the basis of S101, this step then requires that the edge computing virtual machine be registered with the edge computing platform, instead of registering the entire host device with the edge computing platform. It should be noted that, in this step, the process of registering the edge computing virtual machine to the edge computing platform is similar to the process of activating the edge computing virtual machine in the edge computing platform, and the edge computing virtual machine is recorded in the edge computing platform by the unique identifier, so that the edge computing platform operates the edge computing virtual machine by the unique identifier or other identifiers.
Specifically, the unique identifier in this step is obtained by sending the server to the host. The server may send the unique identifier to the host after the host creates the edge computing virtual machine and then sends the unique identifier to the server. Alternatively, the server may send the unique identifier to the host after the host sends the unique identifier request to the server during creation of the edge computing virtual machine. It is also possible that the unique identification request is sent to the server before the edge computing virtual machine is created, so that the server sends the unique identification to the host machine. The unique identifier request may be sent before the edge computing virtual machine is created, specifically, the unique identifier request may be sent while the node configuration file is acquired, or the unique identifier request may be sent when the virtual machine is downloaded. Therefore, the method for acquiring the unique identifier in this step is not unique, and the corresponding acquisition method can be selected according to the actual situation. The unique identifier acquiring scheme of the edge computing platform can be used as the acquiring scheme in the embodiment, and the details are not described here.
Preferably, the step may further include:
and before the host machine receives the unique identifier, the server calculates the unique identifier according to the overall platform scheduling information and sends the unique identifier to the host machine.
It can be seen that the present alternative mainly describes how the host obtains the unique identifier. Specifically, in the step, the server is used for calculating the overall scheduling information of the platform to obtain a unique identifier, and then the unique identifier is sent to the host. In general, when a server receives a unique identifier request sent by a host, the server calculates the unique identifier according to the overall platform scheduling information.
S103, deploying the edge computing service program to the edge computing virtual machine, so that the virtual machine becomes a computing node.
On the basis of S102, this step aims at deploying an edge computing service program to an edge computing virtual machine, that is, making the edge computing virtual machine have a function of performing edge computing.
Typically, the corresponding functions are implemented by requiring multiple plug-in modules to co-operate. Taking the example of the IaaS (Infrastructure as a Service infrastructure as a service) service function, the edge computing service program may include a basic plug-in module and an IaaS service plug-in module. The basic plug-in module comprises a service management system and is used for storage isolation, storage management, flow monitoring, process isolation, network isolation and various security monitoring. The above functional modules can be executed according to the need, and the execution mode can be selected to be executed in parallel or in sequence. For example, traffic monitoring is performed on the network and processes are isolated. And the service management system in the basic plug-in module can schedule, deploy and manage the IaaS service plug-in so as to deploy new IaaS service in the edge computing virtual machine, schedule the new IaaS service according to the requirement and manage the existing IaaS service. The service management system mainly manages the IaaS service through the IaaS service plug-in module. The IaaS service plug-in module comprises various service plug-ins and is used for executing different IaaS services.
It is conceivable that programs of other service functions may be deployed in this step, so as to implement different service functions, which are not described in detail herein.
Preferably, the step may further include:
and collecting data of the edge computing service program, and uploading the data to an edge computing platform so as to monitor edge computing nodes.
It can be seen that by this alternative, good monitoring and management of the edge computing node can be achieved. The acquired data includes, but is not limited to, performance data of the edge computing service program, network data and data processing state data.
Meanwhile, since the edge computing virtual machine does not monopolize all hardware resources of the host, unused hardware resources exist in the host. Thus, the edge computing virtual machine may be adjusted without regard to the hardware usage of the host.
In this embodiment, an edge computing virtual machine is first created in a host machine according to a configuration file, then the edge computing virtual machine is registered in an edge computing platform through a unique identifier allocated by a server, instead of registering the host machine in the edge computing platform as a whole, and finally an edge computing service program is deployed in the edge computing virtual machine, so that the edge computing virtual machine has a function of an edge computing node, instead of deploying all hardware of the host machine as the edge computing node, it is seen that one edge computing node is deployed in the host machine in a virtual machine manner, edge computing is achieved, data and the like between the node and the host machine are isolated from each other, hardware resources outside the virtual machine are not occupied, all hardware resources of the host machine are prevented from being monopolized, the virtual machine can be independently adjusted without considering the situation of the host machine, management and control efficiency of the node is improved, and the edge node is safer, more convenient and efficient to be accessed into the edge computing network.
As a preferred embodiment, please refer to fig. 2, fig. 2 is a flow chart of creating a virtual machine according to a first embodiment of the present application.
The process of creating the edge computing virtual machine according to the obtained node configuration file may include:
s201, the host receives input configuration information through the web management system; the configuration information comprises a memory, a CPU, a storage path and a storage size; saving the configuration information as a node configuration file;
the step aims at receiving configuration information input by a user through a web management system, namely a web-based management system, and storing the configuration information as a node configuration file, namely a local disk of a server is stored in a corresponding node configuration file. The configuration information comprises a memory, a CPU, a storage path and a storage size.
The configuration information may be input directly by the user through the computer device, or may be sent to the web management system after being input remotely by the user, or may be sent from the opposite terminal device through the network.
It is conceivable that the user may also further manage and adjust the edge computing virtual machine in the host through the web management system in this embodiment. Thus, the web management system includes, but is not limited to, a virtual machine configuration management page, a virtual machine data presentation page, and a virtual machine control management page.
S202, sending a node configuration file to a virtual machine management program through a preset interface;
on the basis of S201, this step aims at transmitting the node configuration file from the web management system to the virtual machine manager in the host through a preset interface. The preset interface may be an API (Application Programming Interface application program interface) interface, which is an API interface opened in a server form after the host machine creates the virtual machine management program.
S203, the virtual machine management program is controlled to execute virtual machine creation operation according to the configuration information in the node configuration file, and the edge computing virtual machine is obtained.
On the basis of S202, this step aims to control the virtual machine manager to execute virtual machine creation operation according to the configuration information in the node configuration file, so as to obtain an edge computing virtual machine. That is, in this step, the edge computing virtual machine is created mainly through the operation of the virtual machine manager. The virtual machine manager may be any virtual machine manager provided in the prior art, and is not specifically limited herein.
Preferably, the step may include:
step 1, a host machine judges whether a virtual machine program exists locally; if yes, executing the step 2; if not, executing the step 3;
step 2, controlling a virtual machine management program to create an edge computing virtual machine according to the node configuration file;
step 3, downloading a target virtual machine program; the control virtual machine manager creates an edge computing virtual machine from the target virtual machine program and the node configuration file.
It can be seen that in this alternative, it is mainly determined whether the virtual machine program already exists in the host machine. The virtual machine programs include, but are not limited to, vtrulbox, vmware, hyper-v. The edge computing virtual machine, if any, may be created directly using. And if the virtual machine does not exist, the corresponding target virtual machine needs to be downloaded, and finally, the virtual machine management program is controlled to create the edge computing virtual machine according to the target virtual machine program and the node configuration file.
Therefore, in this embodiment, the edge computing virtual machine is created in the host machine according to the node configuration file corresponding to the host machine, so that the edge computing node is ensured to be deployed into the edge computing virtual machine, so as to ensure isolation and security between the host machine and the edge computing node.
Based on the embodiments, the application provides a more specific edge computing node deployment method.
Referring to fig. 3, fig. 3 is a flow chart of a second embodiment of the present application.
In a second embodiment, the specific scenario of the application of the present scheme includes a host, a virtual machine manager, a virtual machine, an edge computing service program, and a web management system.
The host, namely the node which needs to be accessed currently, comprises a personal pc computer, an idle server, a professional mining machine and other devices, and can be used as a shared node access edge computing web management system through a virtualization technology to provide a virtual machine operation entrance for a user, wherein the virtual machine operation entrance comprises virtual machine start and stop, input configuration setting, income viewing and the like; the virtual machine management program downloads and installs different virtual machines and virtual machine images according to different host machine operating systems, and completes operations such as creation, start and stop, speed limit, disk management and the like of the virtual machines; and the virtual machine module is used for enabling the virtual machines to comprise virtualization schemes such as virtual box, vmware, hyper-v and the like and matched virtual machine mirror packages.
The edge computing service program comprises a basic plug-in module and an IaaS service plug-in module. The basic plug-in module comprises a service management system, storage isolation and storage management, flow monitoring, process isolation, network isolation and various security monitoring; and the IaaS service plug-in module comprises various service plug-ins, and a service management system in the basic module plug-in can schedule, deploy and manage the IaaS service plug-ins.
On the basis, the method in the embodiment can comprise the following steps:
s301, the host receives configuration information input by a user through a web management system; the configuration information comprises a memory, a CPU, a storage path and a storage size; the configuration information is stored as a node configuration file;
s302, the web management system automatically downloads and installs a virtual machine management program and guides the user to start the virtual machine management program;
s303, after the virtual machine management program is started, a preset interface is opened outwards in a server form, and the web management system sends the stored node configuration file to the virtual machine management program;
s304, after receiving the node configuration file, the virtual machine management program automatically downloads the virtual machine, and then creates and starts an edge computing virtual machine according to the virtual machine configuration information;
s305, inputting a device activation code through the web management system, and calling an activation interface externally provided by the edge computing virtual machine by the virtual machine management program so as to activate the edge computing virtual machine, so that the edge computing virtual machine becomes a uniquely identified edge computing node;
s306, after the edge computing virtual machine is started, deploying and starting a basic plug-in module for the edge computing;
s307, when the basic plug-in module is started, the IaaS service program is scheduled and deployed from the server side, and various IaaS service plug-in data are collected.
It can be seen that, in this embodiment, an edge computing virtual machine is first created in a host machine according to a node configuration file corresponding to the host machine, then the edge computing virtual machine is registered in an edge computing platform through a unique identifier allocated by a server, instead of registering the host machine in the edge computing platform as a whole, and finally an edge computing service program is deployed to the edge computing virtual machine, so that the edge computing virtual machine has a function of an edge computing node, instead of deploying all hardware of the host machine as an edge computing node, and therefore, edge computing is implemented by deploying one edge computing node in the host machine through the virtual machine, and the node and the host machine are isolated from each other, so that hardware resources outside the virtual machine are not occupied, monopolizing all hardware resources of the host machine is avoided, and the virtual machine can be independently adjusted without considering the situation of the host machine, so that the management and control efficiency of the node is improved, and the edge node is safer, more convenient and efficient to access the edge node into an edge computing network.
Referring to fig. 4, fig. 4 is a schematic diagram illustrating an internal structure of a computer device according to a first embodiment of the present application.
In this embodiment, the computer apparatus 1 may be a PC (Personal Computer ), or may be a smart phone, a tablet computer, a palm computer, a portable computer, an intelligent router, a mining machine, a network storage device, or a terminal device.
The computer device 1 may include a memory 11, a processor 12 and a bus 13.
The memory 11 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the computer device 1, such as a hard disk of the computer device 1. The memory 11 may also be an external storage device of the computer apparatus 1 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the computer apparatus 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the computer apparatus 1. The memory 11 may be used not only for storing application software installed in the computer apparatus 1 and various types of data, such as codes of data communication programs, but also for temporarily storing data that has been output or is to be output.
The processor 12 may in some embodiments be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chip for running program code or processing data stored in the memory 11, e.g. executing an edge computing node deployment program or the like.
The bus 13 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
Alternatively, the computer apparatus 1 may be a node constituting a CDN network (Content Delivery Network ) or a blockchain network.
Further, the computer apparatus 1 may also comprise a network interface, which may optionally comprise a wired interface and/or a wireless interface (e.g. WI-FI interface, bluetooth interface, etc.), typically used for establishing a communication connection between the computer apparatus 1 and other electronic devices.
Optionally, the computer device 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the computer device 1 and for displaying a visual user interface.
Fig. 4 shows only the computer device 1 with components 11-13 and an edge computing node deployment program, it will be understood by those skilled in the art that the structure shown in fig. 4 is not limiting of the computer device 1 and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
The application provides an edge computing node deployment system.
Referring to fig. 5, fig. 5 is a block diagram of a third embodiment according to the present application.
In a fourth embodiment, the data communication system may include:
the virtual machine creation module 100 is configured to create an edge computing virtual machine according to the obtained node configuration file;
a virtual machine activation module 200, configured to register an edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
the node deployment module 300 is configured to deploy the edge computing service program to the edge computing virtual machine, so as to deploy a part of the hardware performance of the host as an edge computing node.
Embodiments of the present application also provide a computer readable storage medium having a data communication program thereon, the data communication program being executable by one or more processors to implement the steps of the edge computing node deployment method as in any of the embodiments above.
Embodiments of the present application also provide a computer program product comprising computer instructions which, when run on a computer, cause the computer to perform the steps of the edge computing node deployment method according to any of the embodiments described above.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the apparatus and system described above may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus, system and method may be implemented in other manners. For example, the system embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, indirect coupling or communication connection of devices or units, electrical, mechanical, or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be noted that, the foregoing reference numerals of the embodiments of the present application are merely for describing the embodiments, and do not represent the advantages and disadvantages of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.

Claims (10)

1. A method of edge computing node deployment, the method comprising:
the host creates an edge computing virtual machine according to the obtained node configuration file; wherein the edge computing virtual machine is registered based on a portion of the resources of the host machine, rather than registering the host machine as a whole into an edge computing platform;
registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
an edge computing service program is deployed to the edge computing virtual machine to deploy a portion of the hardware capabilities of the host machine as edge computing nodes.
2. The edge computing node deployment method of claim 1 wherein the host creates an edge computing virtual machine from the acquired node configuration file, comprising:
the host receives the input configuration information through the web management system; the configuration information comprises a memory, a CPU, a storage path and a storage size;
saving the configuration information as the node configuration file;
and creating the edge computing virtual machine according to the node configuration file.
3. The edge computing node deployment method of claim 2, wherein creating the edge computing virtual machine from the node configuration file comprises:
the node configuration file is sent to a virtual machine management program through a preset interface;
and controlling the virtual machine management program to execute virtual machine creation operation according to the configuration information in the node configuration file to obtain the edge computer virtual machine.
4. The edge computing node deployment method of claim 2, wherein creating the edge computing virtual machine from the node configuration file comprises:
the host machine judges whether a virtual machine program exists locally;
if yes, controlling a virtual machine management program to create the edge computing virtual machine according to the node configuration file;
if not, downloading the target virtual machine program; and the control virtual machine management program creates the edge computing virtual machine according to the target virtual machine program and the node configuration file.
5. The edge computing node deployment method of claim 1, further comprising:
before the host receives the unique identifier, the server calculates the unique identifier according to the overall platform scheduling information;
and sending the unique identification to the host.
6. The edge computing node deployment method of claim 1, further comprising:
and collecting data of the edge computing service program, and uploading the data to the edge computing platform so as to monitor edge computing nodes.
7. A computer apparatus comprising a memory and a processor, the memory having stored thereon an edge computing node deployment program executable on the processor, the edge computing node deployment program when executed by the processor implementing the steps of the edge computing node deployment method of any of claims 1 to 6.
8. The apparatus of claim 7, wherein the computer means is a node comprising a CDN network or a blockchain network.
9. An edge computing node deployment system, the system comprising:
the virtual machine creation module is used for creating an edge computing virtual machine according to the obtained node configuration file; the edge computing virtual machine is registered based on partial resources of the host machine, and the host machine is not integrally registered in the edge computing platform;
the virtual machine activation module is used for registering the edge computing virtual machine to an edge computing platform according to the unique identifier received from the server;
the node deployment module is used for deploying the edge computing service program to the edge computing virtual machine so as to deploy part of hardware performance of the host machine as an edge computing node.
10. A computer readable storage medium having stored thereon an edge computing node deployment program executable by one or more processors to implement the steps of the edge computing node deployment method of any of claims 1 to 6.
CN202010641178.XA 2020-07-06 2020-07-06 Edge computing node deployment method and related device Active CN111800506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010641178.XA CN111800506B (en) 2020-07-06 2020-07-06 Edge computing node deployment method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010641178.XA CN111800506B (en) 2020-07-06 2020-07-06 Edge computing node deployment method and related device

Publications (2)

Publication Number Publication Date
CN111800506A CN111800506A (en) 2020-10-20
CN111800506B true CN111800506B (en) 2023-09-19

Family

ID=72811263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010641178.XA Active CN111800506B (en) 2020-07-06 2020-07-06 Edge computing node deployment method and related device

Country Status (1)

Country Link
CN (1) CN111800506B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114513770B (en) * 2020-10-29 2024-01-30 伊姆西Ip控股有限责任公司 Method, system and medium for deploying application
CN112506659B (en) * 2020-12-10 2023-09-22 腾讯科技(深圳)有限公司 Management method of edge equipment and related device
CN112422352B (en) * 2021-01-25 2021-04-20 华东交通大学 Edge computing node deployment method based on user data hotspot distribution
CN113595899A (en) * 2021-06-30 2021-11-02 上海云轴信息科技有限公司 Method and system for realizing multi-node point cloud routing
CN113726547B (en) * 2021-07-14 2023-08-15 阿里巴巴新加坡控股有限公司 Network system, network configuration method and device
CN114090246B (en) * 2021-11-17 2022-10-18 苏州和氏设计营造股份有限公司 Method and device for processing data of displayed and aged artwork based on big data
CN113821009B (en) * 2021-11-24 2022-03-11 北京和利时***工程有限公司 Edge controller and quality detection system
CN114339727B (en) * 2021-12-29 2023-08-15 中国联合网络通信集团有限公司 Edge platform, configuration method, device, terminal and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611704A (en) * 2012-03-20 2012-07-25 广东电子工业研究院有限公司 Cloud computing node registering system and cloud computing node registering method
CN102929687A (en) * 2012-10-12 2013-02-13 山东省计算中心 Energy-saving virtual machine placement method for cloud computing data center
CN102958166A (en) * 2011-08-29 2013-03-06 华为技术有限公司 Resource allocation method and resource management platform
CN103037002A (en) * 2012-12-21 2013-04-10 中标软件有限公司 Method and system for arranging server cluster in cloud computing cluster environment
CN103389909A (en) * 2012-05-09 2013-11-13 上海幻维数码创意科技有限公司 Rendering farm node virtualization deployment system and application thereof
CN103780433A (en) * 2014-02-18 2014-05-07 成都致云科技有限公司 Self-healing type virtual resource configuration management data architecture
CN104410699A (en) * 2014-12-04 2015-03-11 武汉邮电科学研究院 Resource management method and system of open type cloud computing
CN104767741A (en) * 2015-03-24 2015-07-08 杭州安恒信息技术有限公司 Calculation service separating and safety protecting system based on light virtual machine
CN106445733A (en) * 2016-08-30 2017-02-22 广州鼎甲计算机科技有限公司 KVM virtualization-based agency mode-free backup method and system
CN109471714A (en) * 2017-09-07 2019-03-15 龙芯中科技术有限公司 Platform deployment method, apparatus, equipment and storage medium
CN110517138A (en) * 2019-08-20 2019-11-29 深圳市网心科技有限公司 Intelligent contract processing method, device, computer equipment and storage medium
CN110784361A (en) * 2019-10-31 2020-02-11 国网河南省电力公司电力科学研究院 Virtualized cloud honey network deployment method, device, system and computer-readable storage medium
WO2020116223A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
WO2020116221A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7801128B2 (en) * 2006-03-31 2010-09-21 Amazon Technologies, Inc. Managing communications between computing nodes
US8806486B2 (en) * 2010-09-03 2014-08-12 Time Warner Cable Enterprises, Llc. Methods and systems for managing a virtual data center with embedded roles based access control
US10097410B2 (en) * 2014-06-26 2018-10-09 Vmware, Inc. Methods and apparatus to scale application deployments in cloud computing environments
US11582090B2 (en) * 2018-08-20 2023-02-14 Vmware, Inc. Service chaining of virtual network functions in a cloud computing system
US11824784B2 (en) * 2019-12-20 2023-11-21 Intel Corporation Automated platform resource management in edge computing environments

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102958166A (en) * 2011-08-29 2013-03-06 华为技术有限公司 Resource allocation method and resource management platform
CN102611704A (en) * 2012-03-20 2012-07-25 广东电子工业研究院有限公司 Cloud computing node registering system and cloud computing node registering method
CN103389909A (en) * 2012-05-09 2013-11-13 上海幻维数码创意科技有限公司 Rendering farm node virtualization deployment system and application thereof
CN102929687A (en) * 2012-10-12 2013-02-13 山东省计算中心 Energy-saving virtual machine placement method for cloud computing data center
CN103037002A (en) * 2012-12-21 2013-04-10 中标软件有限公司 Method and system for arranging server cluster in cloud computing cluster environment
CN103780433A (en) * 2014-02-18 2014-05-07 成都致云科技有限公司 Self-healing type virtual resource configuration management data architecture
CN104410699A (en) * 2014-12-04 2015-03-11 武汉邮电科学研究院 Resource management method and system of open type cloud computing
CN104767741A (en) * 2015-03-24 2015-07-08 杭州安恒信息技术有限公司 Calculation service separating and safety protecting system based on light virtual machine
CN106445733A (en) * 2016-08-30 2017-02-22 广州鼎甲计算机科技有限公司 KVM virtualization-based agency mode-free backup method and system
CN109471714A (en) * 2017-09-07 2019-03-15 龙芯中科技术有限公司 Platform deployment method, apparatus, equipment and storage medium
WO2020116223A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
WO2020116221A1 (en) * 2018-12-04 2020-06-11 日本電信電話株式会社 Ict resource management device, ict resource management method and ict resource management program
CN110517138A (en) * 2019-08-20 2019-11-29 深圳市网心科技有限公司 Intelligent contract processing method, device, computer equipment and storage medium
CN110784361A (en) * 2019-10-31 2020-02-11 国网河南省电力公司电力科学研究院 Virtualized cloud honey network deployment method, device, system and computer-readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
云数据中心I/O资源池化;王展;安学军;;集成技术(第01期);全文 *
网络功能虚拟化技术研究综述;周伟林;杨芫;徐明伟;;计算机研究与发展(第04期);全文 *

Also Published As

Publication number Publication date
CN111800506A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN111800506B (en) Edge computing node deployment method and related device
EP3355193B1 (en) Security-based container scheduling
CN108206847B (en) CDN management system, method and device
CN108255497B (en) Application deployment method and device
CN108462760B (en) Electronic device, automatic cluster access domain name generation method and storage medium
CN108717379B (en) Electronic device, distributed task scheduling method and storage medium
US20110004687A1 (en) Information processing apparatus, information processing system, setting program transmission method and server setting program
US8332490B2 (en) Method, apparatus and program product for provisioning a computer system
US8621081B2 (en) Hypervisor controlled user device that enables available user device resources to be used for cloud computing
KR101369428B1 (en) Application management apparatus and method for mobile terminal for supporting different type guest operating system
JP5129770B2 (en) Network equipment
CN109218356B (en) Method and apparatus for managing stateful applications on a server
US9729610B2 (en) Method for intercepting an instruction produced by an application on a computer
EP3637252A1 (en) Virtual machine deployment method and omm virtual machine
CN110908753A (en) Intelligent fusion cloud desktop server, client and system
CN110708366A (en) Plug-in process management method, related method and related device
CN112130960A (en) Lightweight mobile edge computing node and construction method
CN110855746A (en) Middleware management method, electronic device and storage medium
CN102662884A (en) Device driving program configuration method based on network
JP2016091555A (en) Data staging management system
CN107045452B (en) Virtual machine scheduling method and device
CN107659621B (en) RAID control card configuration method and device
CN111294220A (en) Network isolation configuration method and device based on nginx
CN111082982B (en) Data transmission method, electronic device, system and medium
CN114662102A (en) File processing method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant