Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

69 results about "Nested virtualization" patented technology

Virtualization, in computing, refers to the act of creating a virtual version of something, including but not limited to a virtual computer hardware platform, operating system, storage device, or computer network resources. A hypervisor is a software layer that creates the virtualization by abstracting away the underlying physical infrastructure and presenting virtual resources to the system. The term virtual machine typically refers to an encapsulated entity which includes the operating system, the applications running inside it as well as meta data that define it. It is treated as a "guest" which runs on top of a physical server which serves as the "host". Virtualization is often considered the key enabling technology in delivering infrastructure as a service solutions. Nested virtualization refers to the act of creating an additional layer of abstraction and encapsulation in a pre-existing virtualized environment.

Storage pool building method and system

The invention discloses a storage pool building method and system. The method comprises the steps that a storage environment is set up; LUN mapping is created, and a host scans LUN mapping to conduct initialization; management service of a storage pool is conducted by means of sanlock service and agent service; a storage pool command is created by means of LVM, a corresponding physical volume and volume group are created for each LUN separately, the LUNs are in one-to-one correspondence with the LVM storage pools, a logical volume is created, and lockspace of the sanlock service is initialized according to an incoming path of the logical volume; a lightweight storage pool building method is achieved; for storage virtualization, hardware resource storing is shown in an abstraction mode, scattered storage spaces are integrated, and partition and distribution are conducted again to meet the requirements of different applications on performance and capacity. Meanwhile, data security of backup of stored data, failure recovery and the like can be planed uniformly.
Owner:INSPUR BEIJING ELECTRONICS INFORMATION IND

Virtual gateway protection method, virtual security gateway and system for server virtualization

The invention provides a virtual gateway protection method, a virtual security gateway and a system for server virtualization. The method comprises the following steps that: the virtual security gateway is established on a server virtualization platform and accessed to virtual sub-networks to be protected; the virtual security gateway isolates and monitors the communication traffic between the virtual sub-networks, when the communication traffic is against a preset security strategy, the virtual security gateway makes an unexpected response, and when the communication traffic conforms to the security strategy, the virtual security gateway makes a normal response. The method disclosed by the invention establishes the virtual security gateway on the server virtualization platform so as to isolate and monitor the communication traffic between virtual machines, so that the virtual security gateway can make a response in time when the security of the protected virtual machines is threatened, and the virtual machines in a whole virtual network are protected from being influenced.
Owner:BEIJING LEADSEC TECH

Lightweight nested virtualization implementation method based on physical resource penetration mechanism

ActiveCN103995733AAvoid Performance Isolation ProblemsPerformance Isolation GuaranteeProgram loading/initiatingSoftware simulation/interpretation/emulationComputer hardwareResource virtualization
The invention discloses a lightweight nested virtualization implementation method based on a physical resource penetration mechanism. The lightweight nested virtualization implementation method is different from physical resource virtualization through a traditional nested virtualization technology, the method mainly emphasizes management and monitoring on physical resources, and extra performance expenditure caused by virtualization on the physical resources is avoided. Besides, through resource management and control based on NUMA codes, the performance isolation of the traditional virtualization technology on NUMA architecture is avoided. Due to the method, physical equipment is grouped by a host hypervisor, guest hypervisors directly run on different resource groups, and therefore not only can performance loads caused by resource scheduling and sharing be avoided, but also the MUNA characteristic can be fully used for improving the system performance and guaranteeing the performance isolation between different guest hypervisors.
Owner:XI AN JIAOTONG UNIV

Embedded network virtualization environment VirtIO (virtual input and output) network virtualization working method

The invention provides an embedded network virtualization environment VirtIO virtualization working method. The embedded network virtualization environment VirtIO virtualization working method comprises, for a VirtIO front drive program, introducing a delay mechanism to a VirtIO network so that a client does not immediately transfer the control right to a host when performing network data I / O (input / output) but caching the data into a queue, and after a certain time, performs context switching to inform the host to obtain the data from the cache queue. The embedded network virtualization environment VirtIO virtualization working method can obviously reduce the number of times of context switching between the client and the host, save a large number of CPU (central processing unit) resources to process more network I / O. Experiments show that, within a set time delay, network throughput can be increased by more than three times.
Owner:SHANGHAI JIAO TONG UNIV

Data disk technology simultaneously supporting 3V desktop virtualization architecture

The invention discloses a data disk technology simultaneously supporting a 3V desktop virtualization architecture. The invention relates to the technical field of desktop virtualization, in particularto a desktop virtualization system which comprises three user login clients including a VDI client, a VOI client and an IDV client, and a user registers in a Keystone and is bound with a system mirror image, a network data disk and an MAC address. Data disks of three desktop virtualization architectures of VDI, VOI and IDV are connected. A user uses any desktop virtualization; the data of the user can be accessed; a universal network disk technology irrelevant to a virtualization architecture is used; the identity authentication of the cloud desktop is passed; the same part of data belongingto the user can be directly accessed; according to the method, the processes of network disk login, different cloud desktop data synchronization and the like do not need to be executed again, the technology is suitable for a scene of simultaneously reading and writing data on various desktop virtualization architectures, and the requirement of a user for accessing the same data on different desktops, different physical devices, different networks and different positions can be met.
Owner:北京和信创天科技股份有限公司

A method and a device for realizing dual-live disaster recovery for a server virtualization system

The invention provides a method and a device for realizing dual-live disaster recovery for a server virtualization system. The method includes: configuring a server virtualization system ICS, and creating a CFS storage domain and a shared storage pool; Modifying the storage domain profile to set the heartbeat timeout to be greater than the dual live storage recovery time. The device comprises a license adding module, which is used for adding an ICS license of a server virtualization system; A host adding module, configured to add a server virtualization system host; A storage domain creation module for creating a server virtualized system storage domain; A storage pool creation module for creating a server virtualization system storage pool; A virtual machine creation module for creating avirtual machine; The storage domain background configuration module used for modifying the storage domain background configuration file and setting the heartbeat timeout time to be greater than the dual-live storage recovery time. The invention enhances the safety of data access, more adapts to the needs of enterprise-level customers, and promotes the perfection of the functions of the company'svirtualized products.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products