CN113360922A - Automatic configuration method for cloud computing platform of power system - Google Patents
Automatic configuration method for cloud computing platform of power system Download PDFInfo
- Publication number
- CN113360922A CN113360922A CN202110609084.9A CN202110609084A CN113360922A CN 113360922 A CN113360922 A CN 113360922A CN 202110609084 A CN202110609084 A CN 202110609084A CN 113360922 A CN113360922 A CN 113360922A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- power system
- computing platform
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 230000011218 segmentation Effects 0.000 claims abstract description 8
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000006837 decompression Effects 0.000 claims description 8
- 230000015654 memory Effects 0.000 claims description 4
- 230000006870 function Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses an automatic configuration method of a power system cloud computing platform, which comprises the following steps: the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored; carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, and judging the accuracy of the encrypted data; uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor; and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
Description
Technical Field
The application relates to an automatic configuration method of a computing platform, in particular to an automatic configuration method of a power system cloud computing platform.
Background
With the continuous enhancement of the functions of the power automation system, the application number is continuously expanded, the system scale is continuously enlarged, and the requirements of the system on the storage and the processing of mass data are higher and higher. Cloud computing technology has relatively mature distributed storage and mass data processing capabilities, and has begun to be applied to power automation systems. Cloud computing systems often consist of a large number of servers clustered to achieve distributed storage and parallel computing. How to enable a system builder to build a cloud computing platform consisting of a plurality of servers in a minimum time is an urgent problem to be solved. As the size of the node expands and the number of applications increases, the installation and stable operation of the system become new challenges.
The traditional automatic configuration method of the computing platform has certain defects, and all computing nodes are independent from each other and inconvenient to work in parallel, so that the automatic configuration efficiency of the computing platform is reduced. Therefore, an automatic configuration method for a cloud computing platform of a power system is provided for solving the above problems.
Content of application
An automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
Further, in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through a data line.
Furthermore, in the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
Further, in the step (2), the encrypted file is segmented so that the length of each segment is approximately the same, and the segments are labeled by natural numbers 1-n.
Further, in the step (2), random number selection is performed according to the segment numbers of the encrypted files, and samples of 40% -60% of the total sample capacity are subjected to spot check, namely 40% -60% of numbers are randomly selected from 001-n for check.
Further, in the step (2), if the decrypted encrypted file is compared with the corresponding part of the original instruction file, the encrypted file is completely deleted, the encryption processing is performed again, and then the segment checking processing is performed.
Furthermore, the original file is stored in the step (1), so that errors occur in the encryption process of the instruction file, the original file stored in the encrypted file is conveniently used for encryption again, the instruction file does not need to be uploaded again, and the working efficiency is improved.
Furthermore, the computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
Further, if one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the remaining computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
Furthermore, the decompression decoding device in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding device copies and stores the instruction files in calculation, so that the instruction files can be uploaded to the distributor conveniently when the calculation nodes are in failure, and the loss of the instruction files is avoided.
The beneficial effect of this application is: the application provides an automatic configuration method of a power system cloud computing platform, which has the functions of conveniently connecting more than two computing nodes in parallel and improving the computing efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flow chart of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
The first embodiment is as follows:
an automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
And (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
In the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
In the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
And (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 40% of the total sample capacity, namely 40% of numbers are randomly selected from 001-n for inspection.
And (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
The original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
The computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
If one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
The decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
The method is suitable for the automatic configuration method of the power system cloud computing platform with large instruction file size for transmitting and controlling the power system.
Example two:
an automatic configuration method of a power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
And (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
In the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
In the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
And (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 60% of the total sample capacity, namely, 60% of numbers are randomly selected from 001-n for inspection.
And (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
The original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
The computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
If one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
The decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
The method is suitable for the automatic configuration method of the power system cloud computing platform with small instruction file space for transmitting and controlling the power system
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. An automatic configuration method for a power system cloud computing platform is characterized by comprising the following steps: the automatic configuration method of the power system cloud computing platform comprises the following steps:
(1) the method comprises the steps that a user logs in a platform by using a password, then an instruction file for controlling the power system is uploaded to an encryption device, and the instruction file uploaded by the encryption device is encrypted and stored;
(2) carrying out segmentation processing on the encrypted file, carrying out label processing on the paragraph, randomly selecting numbers in the labels, decrypting the encrypted file corresponding to the numbers, comparing the decrypted file with the original file, judging the accuracy of the encrypted data, and if the encrypted data has errors, carrying out coding processing on the original file again;
(3) uploading the encrypted file to a distributor in a computing platform, and then distributing the encrypted file to a proper computing node by the distributor;
(4) and decoding and decompressing equipment arranged in the computing node decompresses and decodes the encrypted file, calculates the instruction file, and copies and stores the instruction file in calculation.
2. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (2) in the step (1), the command file is scanned and input into the encryption equipment through a camera scanning device, the camera scanning device is electrically connected with the encryption equipment through a data line, and the encryption equipment is electrically connected with the computing platform through the data line.
3. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: in the step (1), the user password is logged on the computing platform through a mouse and a keyboard, so that personal information is protected conveniently.
4. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: in the step (2), the encrypted file is segmented, so that the lengths of all the segments are approximately the same, and the segments are labeled by natural numbers 1-n.
5. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (3) in the step (2), random number selection is carried out according to the segment numbers of the encrypted files, and spot check is carried out on samples of 40% -60% of the total sample capacity, namely 40% -60% of numbers are randomly selected from 001-n for check.
6. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: and (3) if the encrypted file is decrypted and compared with the corresponding part of the original instruction file in the step (2), deleting all the encrypted files, carrying out encryption processing again, and then carrying out segmentation checking processing.
7. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the original file is stored in the step (1), so that errors can be generated in the encryption process of the instruction file conveniently, the original file stored in the encrypted file can be used for encryption processing again conveniently, the instruction file does not need to be uploaded again, and the working efficiency is improved.
8. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the computing nodes in the step (3) are provided with more than two groups, one end of the distributor is fixedly provided with a data transmission cable, each computing node is connected with the data transmission cable through a data line, the computing nodes are arranged in parallel, the computing nodes are electrically provided with space occupation detectors, and the space occupation detectors detect space memories occupied by internal computing operation of the computing nodes.
9. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: if one of the computing nodes in the step (3) has an equipment fault, the computing node uploads an instruction file which is running inside to the distributor, then the distributor distributes the instruction file to the rest computing nodes for calculation according to the indexes of the space occupation detectors, and if the indexes of the space occupation detectors on one of the computing nodes are far higher than the indexes of the other computing nodes, part of the instruction file in the computing node is extracted and distributed to the other computing nodes.
10. The method for automatically configuring the cloud computing platform of the power system according to claim 1, wherein the method comprises the following steps: the decompression decoding equipment in the step (4) is electrically connected with the data line through the connecting line, and the decompression decoding equipment copies and stores the instruction files in calculation, so that the instruction files can be conveniently uploaded to the distributor when the calculation nodes are in failure, and the instruction files are prevented from being lost.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110609084.9A CN113360922A (en) | 2021-06-01 | 2021-06-01 | Automatic configuration method for cloud computing platform of power system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110609084.9A CN113360922A (en) | 2021-06-01 | 2021-06-01 | Automatic configuration method for cloud computing platform of power system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113360922A true CN113360922A (en) | 2021-09-07 |
Family
ID=77530768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110609084.9A Pending CN113360922A (en) | 2021-06-01 | 2021-06-01 | Automatic configuration method for cloud computing platform of power system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113360922A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697130A (en) * | 2022-04-22 | 2022-07-01 | 国网安徽省电力有限公司信息通信分公司 | Intelligent mobile terminal information security encryption method for power system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075322A (en) * | 2010-12-06 | 2011-05-25 | 中兴通讯股份有限公司 | Storage method and terminal equipment of key parameters |
US20130254841A1 (en) * | 2012-03-26 | 2013-09-26 | Microsoft Corporation | Secure cloud computing platform |
WO2020199785A1 (en) * | 2019-03-29 | 2020-10-08 | 华控清交信息科技(北京)有限公司 | Processing method and computing method for private data, and applicable device |
-
2021
- 2021-06-01 CN CN202110609084.9A patent/CN113360922A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075322A (en) * | 2010-12-06 | 2011-05-25 | 中兴通讯股份有限公司 | Storage method and terminal equipment of key parameters |
US20130254841A1 (en) * | 2012-03-26 | 2013-09-26 | Microsoft Corporation | Secure cloud computing platform |
WO2020199785A1 (en) * | 2019-03-29 | 2020-10-08 | 华控清交信息科技(北京)有限公司 | Processing method and computing method for private data, and applicable device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697130A (en) * | 2022-04-22 | 2022-07-01 | 国网安徽省电力有限公司信息通信分公司 | Intelligent mobile terminal information security encryption method for power system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9813501B2 (en) | Allocating distributed storage and task execution resources | |
CA2757256A1 (en) | Cloud computing for an industrial automation and manufacturing system | |
US10437673B2 (en) | Internet based shared memory in a distributed computing system | |
US20130179413A1 (en) | Compressed Distributed Storage Systems And Methods For Providing Same | |
US20190266109A1 (en) | Priority level adaptation in a dispersed storage network | |
US11811532B2 (en) | Dynamically processing data in a vast data ingestion system | |
CN113360922A (en) | Automatic configuration method for cloud computing platform of power system | |
US20190288967A1 (en) | Lossy text source coding by word length | |
US10318445B2 (en) | Priority level adaptation in a dispersed storage network | |
CN111444017A (en) | Multimedia data processing method, device and system, electronic equipment and storage medium | |
US10769016B2 (en) | Storing a plurality of correlated data in a dispersed storage network | |
CN108960378B (en) | Data downloading method, system, device and storage medium | |
US20160036563A1 (en) | Distributed reed-solomon codes for simple multiple access networks | |
US10073737B2 (en) | Slice location identification | |
US11474958B1 (en) | Generating and queuing system messages with priorities in a storage network | |
CN111144495B (en) | Service distribution method, device and medium | |
US10476961B2 (en) | Changing rebuild priority for a class of data | |
CN104954280A (en) | Data message processing method and device | |
US10503592B2 (en) | Overcoming bottlenecks in partial and traditional rebuild operations | |
CN105677368B (en) | A method of it promoting Operation Network communication equipment the whole network and upgrades efficiency | |
KR102027546B1 (en) | Minimum bandwidth recovery encoding method based on clustered dispersion storage system in server communicating with a plurality of clusteres comprising a plurality of nodes amd server communicating with the plurality of clusters comprising the plurliaty of the nodes for the minimum bandwidth recovery encoding based on the clustered dispersion storage system | |
KR102692706B1 (en) | System for controlling MQTT message conversion of facility data and method thereof | |
US10585715B2 (en) | Partial task allocation in a dispersed storage network | |
CN102724332A (en) | Dynamic matching method of network service address | |
CN117271836A (en) | Data storage method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210907 |