-
公开(公告)号:US20240118927A1
公开(公告)日:2024-04-11
申请号:US18536885
申请日:2023-12-12
Applicant: Huawei Technologies Co., Ltd.
Inventor: Hongwei Sun , Guangcheng Li , Xiuqiao Li , Xiaoming Bao , Jun You
IPC: G06F9/50
CPC classification number: G06F9/5016 , G06F9/5072 , G06F2209/5011
Abstract: A server cluster determines a first memory requirement of a first distributed application, where the first memory requirement indicates a memory size. The server cluster determines N first server nodes in the server cluster based on the first memory requirement and an available memory resource of each server node in the server cluster, and constructs a first memory pool based on the N first server nodes. The server cluster provides a service for the first distributed application based on the first memory pool.
-
公开(公告)号:US20240012750A1
公开(公告)日:2024-01-11
申请号:US18473314
申请日:2023-09-25
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Hongwei Sun , Guangcheng Li , Peifeng Qin , Xiaoming Bao , Jun You , Xiuqiao Li
IPC: G06F12/02
CPC classification number: G06F12/023 , G06F2212/154 , G06F2212/1024
Abstract: In a memory expansion method, a first network device generates a memory topology based on memory requirement information of a target application and usage of a memory resource in a first memory pool, wherein the first memory pool is a logical memory comprising memory resources provided by a plurality of network devices, and the memory topology indicates capacities of different types of memory resources in one or more network devices that need to be occupied by the target application. The network device then establishes a second memory pool in the first memory pool based on the memory topology, wherein the second memory pool comprises a memory resource that is allowed to be used by the target application.
-
公开(公告)号:US20200150890A1
公开(公告)日:2020-05-14
申请号:US16738401
申请日:2020-01-09
Applicant: Huawei Technologies Co., Ltd.
Inventor: Yuguo Li , Jun You , Zongquan Zhang
IPC: G06F3/06 , G06F21/60 , G06F11/14 , G06F16/174
Abstract: A data deduplication method includes receiving an overwrite request sent by an external device, where the overwrite request carries a data block and a first address into which the data block is to be stored, determining whether an overwrite quantity of the first address exceeds a first threshold within a time period [t1, t2], where both t1 and t2 are time points, and t2 is later than t1, and when the overwrite quantity of the first address exceeds the first threshold within the time period [t1, t2], skipping performing a deduplication operation on the data block or when the overwrite quantity of the first address does not exceed the first threshold within the time period [t1, t2], performing a deduplication operation on the data block.
-
-