-
公开(公告)号:US10686728B2
公开(公告)日:2020-06-16
申请号:US15643429
申请日:2017-07-06
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhenhua Hu , Xiaodi Ke , Khaled Ziya Aeen , Zhi Zhao , Zhigang Luo
IPC: H04L12/911 , H04L29/08 , G06F9/50
Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.
-
公开(公告)号:US10623333B2
公开(公告)日:2020-04-14
申请号:US15643429
申请日:2017-07-06
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhenhua Hu , Xiaodi Ke , Khaled Ziya Aeen , Zhi Zhao , Zhigang Luo
IPC: H04L12/911 , H04L29/08 , G06F9/50
Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.
-
公开(公告)号:US10528749B2
公开(公告)日:2020-01-07
申请号:US15463539
申请日:2017-03-20
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhigang Luo , Yuri Poeluev , Alan Pak-Lun Ho
Abstract: A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.
-
-