{"id":432,"date":"2018-06-23T11:56:38","date_gmt":"2018-06-23T03:56:38","guid":{"rendered":"http:\/\/www.sniper97.cn\/?p=432"},"modified":"2018-06-23T11:56:38","modified_gmt":"2018-06-23T03:56:38","slug":"%e7%ac%ac%e5%85%ab%e7%ab%a0-%e7%89%b9%e6%ae%8a%e4%ba%91%e6%9c%ba%e5%88%b6","status":"publish","type":"post","link":"http:\/\/www.sniper97.cn\/index.php\/note\/cloud-computing-concepts%ef%bc%8ctechnology-and-architecture\/432\/","title":{"rendered":"\u7b2c\u516b\u7ae0 \u7279\u6b8a\u4e91\u673a\u5236"},"content":{"rendered":"<p>\u672c\u7ae0\u63cf\u8ff0\u7684\u7279\u6b8a\u7684\u4e91\u673a\u5236\uff1a<br \/>\n\uff081\uff09\u81ea\u52a8\u4f38\u7f29\u76d1\u542c\u5668<br \/>\n\uff082\uff09\u8d1f\u8f7d\u5747\u8861\u5668<br \/>\n\uff083\uff09SLA\u76d1\u63a7\u5668<br \/>\n\uff084\uff09\u6309\u4f7f\u7528\u4ed8\u8d39\u76d1\u63a7\u5668<br \/>\n\uff085\uff09\u5ba1\u8ba1\u76d1\u63a7\u5668<br \/>\n\uff086\uff09\u6545\u969c\u8f6c\u79fb\u7cfb\u7edf<br \/>\n\uff087\uff09\u865a\u62df\u673a\u76d1\u63a7\u5668<br \/>\n\uff088\uff09\u8d44\u6e90\u96c6\u7fa4<br \/>\n\uff089\uff09\u591a\u8bbe\u5907\u4ee3\u7406<br \/>\n\uff0810\uff09\u72b6\u6001\u7ba1\u7406\u6570\u636e\u5e93<br \/>\n&nbsp;<\/p>\n<h3>8.1\u81ea\u52a8\u4f38\u7f29\u76d1\u542c\u5668\uff08automated scaling listener\uff09<\/h3>\n<p>\u81ea\u52a8\u4f38\u7f29\u76d1\u542c\u5668\u673a\u5236\u662f\u4e00\u4e2a\u670d\u52a1\u4ee3\u7406\uff0c\u5b83\u76d1\u63a7\u548c\u8ffd\u8e2a\u4e91\u670d\u52a1\u7528\u6237\u548c\u4e91\u670d\u52a1\u4e4b\u95f4\u7684\u901a\u4fe1\uff0c\u7528\u4ee5\u52a8\u6001\u81ea\u52a8\u4f38\u7f29\u3002<br \/>\n<strong>The automated scaling listener mechanism is a service agent\u00a0that monitors and tracks communications between cloud service consumers and cloud services for dynamic scaling purposes.\u00a0<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-433 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201401.png\" alt=\"\" width=\"444\" height=\"527\" \/><\/p>\n<h3>8.2\u8d1f\u8f7d\u5747\u8861\u5668\uff08load balancer\uff09<\/h3>\n<p>\u8d1f\u8f7d\u5747\u8861\u5668\u673a\u5236\u662f\u4e00\u4e2a\u8fd0\u884c\u65f6\u4ee3\u7406\uff0c\u5176\u903b\u8f91\u57fa\u672c\u4e0a\u5c31\u662f\u57fa\u4e8e\u6c34\u5e73\u6269\u5c55\u7684\u601d\u60f3\u3002<br \/>\nThe\u00a0load balancer\u00a0mechanism is a runtime agent with logic fundamentally based on this premise.<br \/>\n\u5e38\u89c1\u7684\u6c34\u5e73\u6269\u5c55\u3002<br \/>\n\u8d1f\u8f7d\u5747\u8861\u5668\u529f\u80fd\uff1a<br \/>\n\uff081\uff09\u975e\u5bf9\u79f0\u5206\u914d\uff08asymmetric distribution\uff09\u2014\u2014\u8f83\u5927\u7684\u5de5\u4f5c\u8d1f\u8f7d\u88ab\u9001\u5230\u5177\u6709\u8f83\u5f3a\u5904\u7406\u80fd\u529b\u7684IT\u8d44\u6e90\u3002<br \/>\n\uff082\uff09\u8d1f\u8f7d\u4f18\u5148\u7ea7\uff08workload prioritization\uff09\u2014\u2014\u8d1f\u8f7d\u6839\u636e\u5176\u4f18\u5148\u7b49\u7ea7\u8fdb\u884c\u8c03\u52a8\u3001\u6392\u961f\u3001\u4e22\u5f03\u548c\u5206\u914d\u3002<br \/>\n\uff083\uff09\u4e0a\u4e0b\u6587\u611f\u77e5\u7684\u5206\u914d\uff08content-aware distribution\uff09\u2014\u2014\u6839\u636e\u8bf7\u6c42\u5185\u5bb9\u7684\u6307\u793a\u628a\u8bf7\u6c42\u5206\u914d\u5230\u4e0d\u540c\u7684IT\u8d44\u6e90\u3002<br \/>\n\uff084\uff09\u52b3\u52a8\u5206\u5de5\u7b97\u6cd5<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-459 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201406-1.png\" alt=\"\" width=\"665\" height=\"446\" \/><br \/>\n&nbsp;<\/p>\n<h3>8.3 SLA\u76d1\u63a7\u5668\uff08SLA monitor\uff09<\/h3>\n<p><strong>\u7b2c\u4e5d\u7ae0\u91cd\u70b9\u63cf\u8ff0<\/strong><br \/>\nSLA\u76d1\u63a7\u5668\u673a\u5236\u88ab\u7528\u6765\u4e13\u95e8\u89c2\u5bdf\u4e91\u670d\u52a1\u7684\u8fd0\u884c\u65f6\u6027\u80fd\uff0c\u786e\u4fdd\u4ed6\u4eec\u5c65\u884c\u4e86SLA\u4e2d\u516c\u5e03\u7684\u7ea6\u5b9aQoS\u9700\u6c42\u3002<br \/>\n<strong>The SLA monitor mechanism is used to specifically observe the runtime performance of cloud services.<\/strong><\/p>\n<h3>8.4\u6309\u4f7f\u7528\u4ed8\u8d39\u76d1\u63a7\u5668\uff08pay-per-use monitor\uff09<\/h3>\n<p>\u6309\u4f7f\u7528\u4ed8\u8d39\u76d1\u63a7\u5668\u673a\u5236\u6309\u7167\u9884\u5148\u5b9a\u4e49\u597d\u7684\u5b9a\u4ef7\u53c2\u6570\u6d4b\u91cf\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\u4f7f\u7528\uff0c\u5e76\u751f\u6210\u4f7f\u7528\u65e5\u5fd7\u7528\u4e8e\u8ba1\u7b97\u8d39\u7528\u3002<br \/>\n\u6309\u4f7f\u7528\u4ed8\u8d39\u76d1\u63a7\u5668\u6536\u96c6\u7684\u6570\u636e\u7531\u8ba1\u7b97\u4ed8\u6b3e\u8d39\u7528\u7684\u8ba1\u8d39\u7ba1\u7406\u7cfb\u7edf\u8fdb\u884c\u5904\u7406\u3002<br \/>\n<b>The data collected by the pay-per-use monitor is\u00a0 processed by a billing management system that calculates the payment fees.<\/b><span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u00a0<\/span><br \/>\n\u5178\u578b\u76d1\u63a7\u53d8\u91cf\uff1a<br \/>\n\uff081\uff09\u8bf7\u6c42\/\u54cd\u5e94\u6d88\u606f\u6570\u91cf<br \/>\n\uff082\uff09\u4f20\u9001\u7684\u6570\u636e\u91cf<br \/>\n\uff083\uff09\u5e26\u5bbd\u6d88\u8017<br \/>\n\u663e\u793a\u5b9e\u73b0\u8d44\u6e90\u4ee3\u7406\u7684\u6309\u4f7f\u7528\u4ed8\u8d39\u76d1\u63a7\u5668\uff0c\u7528\u6765\u786e\u5b9a\u865a\u62df\u670d\u52a1\u5668\u7684\u4f7f\u7528\u5468\u671f\uff1a<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-458 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201405-1.png\" alt=\"\" width=\"463\" height=\"540\" \/><br \/>\n&nbsp;<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-438 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201402.png\" alt=\"\" width=\"715\" height=\"445\" \/><\/p>\n<h3>8.5 \u5ba1\u8ba1\u76d1\u63a7\u5668<\/h3>\n<p>\u5ba1\u8ba1\u76d1\u63a7\u5668\u673a\u5236\u7528\u6765\u6536\u96c6\u7f51\u7edc\u548cIT\u8d44\u6e90\u7684\u5ba1\u8ba1\u8bb0\u5f55\u6570\u636e\uff0c\u7528\u4ee5\u6ee1\u8db3\u7ba1\u7406\u9700\u8981\u6216\u8005\u5408\u540c\u4e49\u52a1\uff0c\u6709\u65f6\u8fd9\u4e5f\u662f\u5f3a\u5236\u6027\u8981\u6c42\u3002<br \/>\n<strong>The\u00a0audit monitor\u00a0mechanism is used to collect audit tracking data for networks and IT resources.<\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-457 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201404-1.png\" alt=\"\" width=\"606\" height=\"336\" \/><\/p>\n<h3>8.6\u6545\u969c\u8f6c\u79fb\u7cfb\u7edf\uff08failover system\uff09<\/h3>\n<p>\u6545\u969c\u8f6c\u79fb\u7cfb\u7edf\u673a\u5236\u901a\u8fc7\u4f7f\u7528\u73b0\u6709\u7684\u96c6\u7fa4\u6280\u672f\u63d0\u4f9b\u5197\u4f59\u7684\u5b9e\u73b0\u6765\u589e\u52a0IT\u8d44\u6e90\u7684\u53ef\u9760\u6027\u548c\u53ef\u7528\u6027\u3002<br \/>\n<b>The\u00a0failover system\u00a0mechanism is used to increase\u00a0the reliability and availability of IT resources by using established clustering technology to provide redundant implementations.<\/b><br \/>\n\u6545\u969c\u8f6c\u79fb\u7cfb\u7edf\u901a\u5e38\u4f1a\u88ab\u914d\u7f6e\u6210\u53ea\u8981\u5f53\u524d\u6d3b\u8dc3\u7684IT\u8d44\u6e90\u4e0d\u53ef\u7528\u65f6\uff0c\u4fbf\u81ea\u52a8\u5207\u6362\u5230\u5197\u4f59\u6216\u8005\u5f85\u673a\u7684IT\u8d44\u6e90\u5b9e\u4f8b\u4e0a\u3002<br \/>\n\u6709\u4e24\u79cd\u57fa\u672c\u914d\u7f6e\uff1a<br \/>\n\uff081\uff09\u4e3b\u52a8\u2014\u2014\u4e3b\u52a8\uff1aIT\u8d44\u6e90\u7684\u5197\u4f59\u5b9e\u73b0\u4f1a\u4e3b\u52a8\u5730\u540c\u6b65\u670d\u52a1\u5de5\u4f5c\u8d1f\u8f7d\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-439 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201403.png\" alt=\"\" width=\"558\" height=\"412\" \/><br \/>\n\uff082\uff09\u4e3b\u52a8\u2014\u2014\u88ab\u52a8\uff1a\u5f85\u673a\u6216\u975e\u6d3b\u8dc3\u7684\u5b9e\u73b0\u4f1a\u88ab\u6fc0\u6d3b\uff0c\u4ece\u53d8\u5f97\u4e0d\u53ef\u7528\u7684IT\u8d44\u6e90\u5904\u63a5\u7ba1\u5904\u7406\u5de5\u4f5c\uff0c\u54cd\u5e94\u7684\u5de5\u4f5c\u8d1f\u8f7d\u5c31\u4f1a\u88ab\u91cd\u5b9a\u5411\u5230\u63a5\u7ba1\u64cd\u4f5c\u7684\u8fd9\u4e2a\u5b9e\u4f8b\u4e0a\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-441 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201404.png\" alt=\"\" width=\"672\" height=\"371\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-442 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201405.png\" alt=\"\" width=\"646\" height=\"357\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-443 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201406.png\" alt=\"\" width=\"668\" height=\"419\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-444 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201407.png\" alt=\"\" width=\"645\" height=\"383\" \/><\/p>\n<h3>8.7\u865a\u62df\u673a\u76d1\u63a7\u5668\uff08hypervisor\uff09<\/h3>\n<p>\u865a\u62df\u673a\u76d1\u63a7\u5668\u673a\u5236\u662f\u865a\u62df\u5316\u57fa\u7840\u8bbe\u65bd\u7684<strong>\u6700\u57fa\u7840\u90e8\u5206<\/strong>\uff0c\u4e3b\u8981\u7528\u6765<strong>\u5728\u7269\u7406\u670d\u52a1\u5668\u4e0a\u751f\u6210\u865a\u62df\u670d\u52a1\u5668\u5b9e\u4f8b<\/strong>\u3002<br \/>\n<strong>The hypervisor mechanism is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server.<\/strong><br \/>\n\u865a\u62df\u673a\u76d1\u63a7\u5668\u901a\u5e38\u9650\u4e8e\u4e00\u53f0\u7269\u7406\u670d\u52a1\u5668\uff0c\u56e0\u6b64\u53ea\u80fd\u521b\u5efa\u90a3\u53f0\u670d\u52a1\u5668\u7684\u865a\u62df\u6620\u50cf\u3002<br \/>\n\u865a\u62df\u673a\u76d1\u63a7\u5668\u53ea\u80fd\u628a\u81ea\u5df1\u521b\u5efa\u7684\u865a\u62df\u670d\u52a1\u5668\u5206\u914d\u5230\u4f4d\u4e8e\u540c\u4e00\u5e95\u5c42\u7269\u7406\u670d\u52a1\u5668\u4e0a\u7684\u8d44\u6e90\u6c60\u91cc\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-445 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201408.png\" alt=\"\" width=\"727\" height=\"432\" \/><br \/>\n\u865a\u62df\u673a\u76d1\u63a7\u5668\u8f6f\u4ef6\u53ef\u4ee5\u76f4\u63a5\u5b89\u88c5\u5728\u88f8\u673a\u670d\u52a1\u5668\u4e0a\uff0c\u63d0\u4f9b\u5bf9\u786c\u4ef6\u8d44\u6e90\u4f7f\u7528\u63a7\u5236\u3001\u5171\u4eab\u548c\u8c03\u5ea6\u529f\u80fd\u3002\u8fd9\u4e9b\u786c\u4ef6\u8d44\u6e90\u5305\u62ec\uff1a\u5904\u7406\u5668\u3001\u5185\u5b58\u3001I\/O\u3002<\/p>\n<h3>8.8\u8d44\u6e90\u96c6\u7fa4\uff08resource cluster\uff09<\/h3>\n<p>\u8d44\u6e90\u96c6\u7fa4\u673a\u5236\u662f\u628a\u591a\u4e2aIT\u8d44\u6e90\u5b9e\u4f8b\u5206\u4e3a\u4e00\u7ec4\uff0c\u4f7f\u5f97\u4ed6\u4eec\u80fd\u591f\u50cf\u4e00\u4e2aIT\u8d44\u6e90\u90a3\u6837\u8fdb\u884c\u64cd\u4f5c\u3002\u8fd9\u589e\u5f3a\u4e86IT\u8d44\u6e90\u7684\u7ec4\u5408\u8ba1\u7b97\u80fd\u529b\u3001\u8d1f\u8f7d\u5747\u8861\u80fd\u529b\u548c\u53ef\u7528\u6027\u3002<br \/>\n<strong><span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">The\u00a0resource cluster\u00a0mechanism increase the combined computing capacity, load balancing, and availability of the clustered IT resources.<\/span><\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-448 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201409.png\" alt=\"\" width=\"341\" height=\"137\" \/><br \/>\n\u5e38\u89c1\u7684\u8d44\u6e90\u96c6\u7fa4\u7c7b\u578b\uff1a<br \/>\n\uff081\uff09<strong>\u670d\u52a1\u5668\u96c6\u7fa4\uff08service cluster\uff09<\/strong>\u2014\u2014\u7269\u7406\u6216\u865a\u62df\u670d\u52a1\u5668\u7ec4\u6210\u96c6\u7fa4\u4ee5\u63d0\u9ad8\u6027\u80fd\u548c\u53ef\u7528\u6027\u3002<br \/>\n\uff082\uff09<strong>\u6570\u636e\u5e93\u96c6\u7fa4\uff08database cluster\uff09<\/strong>\u2014\u2014\u8fd9\u79cd\u9ad8\u53ef\u7528\u8d44\u6e90\u96c6\u7fa4\u7528\u4e8e\u6539\u8fdb\u6570\u636e\u53ef\u7528\u6027\uff0c\u5177\u6709\u540c\u6b65\u7684\u7279\u6027\uff0c\u53ef\u4ee5\u7ef4\u6301\u96c6\u7fa4\u4e2d\u4f7f\u7528\u5230\u7684\u5404\u79cd\u5b58\u50a8\u8bbe\u5907\u4e0a\u5b58\u50a8\u6570\u636e\u7684\u4e00\u81f4\u6027\u3002<br \/>\n\uff083\uff09<strong>\u5927\u6570\u636e\u96c6\u96c6\u7fa4\uff08large dataset cluster\uff09<\/strong>\u2014\u2014\u5b9e\u73b0\u4e86\u6570\u636e\u7684\u5206\u533a\u548c\u5206\u5e03\uff0c\u8fd9\u6837\u76ee\u6807\u6570\u636e\u96c6\u53ef\u4ee5\u5f88\u6709\u6548\u5730\u5212\u5206\u533a\u57df\uff0c\u800c\u4e0d\u9700\u8981\u7834\u574f\u6570\u636e\u7684\u5b8c\u6574\u6027\u548c\u8ba1\u7b97\u7684\u51c6\u786e\u6027\u3002<br \/>\n\u8d44\u6e90\u96c6\u7fa4\u7684\u4e24\u79cd\u57fa\u672c\u7c7b\u578b<br \/>\n\uff081\uff09<strong>\u8d1f\u8f7d\u5747\u8861\u7684\u96c6\u7fa4\uff08load balanced cluster\uff09<\/strong>\u2014\u2014\u8fd9\u79cd\u8d44\u6e90\u96c6\u7fa4\u7684\u4e13\u957f\u5728\u4e8e\u5728\u96c6\u7fa4\u8282\u70b9\u4e2d\u5206\u5e03\u5de5\u4f5c\u8d1f\u8f7d\u3002\u5b83\u901a\u5e38\u8981\u5b9e\u73b0\u4e00\u4e2a\u8d1f\u8f7d\u5747\u8861\u5668\u673a\u5236\u3002<br \/>\n\uff082\uff09<strong>HA\u96c6\u7fa4\uff08HA cluster\uff09<\/strong>\u2014\u2014\u5b83\u5b9e\u73b0\u4e00\u4e2a\u6545\u969c\u8f6c\u79fb\u7cfb\u7edf\u673a\u5236\uff0c\u76d1\u63a7\u5931\u6548\u60c5\u51b5\uff0c\u5e76\u81ea\u52a8\u5c06\u5de5\u4f5c\u8d1f\u8f7d\u91cd\u5b9a\u5411\u4e3a\u8fdc\u79bb\u6545\u969c\u8282\u70b9\u3002<\/p>\n<h3>8.9\u591a\u8bbe\u5907\u4ee3\u7406\uff08multi-device broker\uff09<\/h3>\n<p>\u591a\u8bbe\u5907\u4ee3\u7406\u673a\u5236\u7528\u6765\u5e2e\u52a9\u8fd0\u884c\u65f6\u7684\u6570\u636e\u8f6c\u6362\uff0c\u4f7f\u5f97\u4e91\u670d\u52a1\u80fd\u591f\u88ab\u66f4\u5e7f\u6cdb\u7684\u4e91\u670d\u52a1\u7528\u6237\u7a0b\u5e8f\u548c\u8bbe\u5907\u6240\u7528\u3002<br \/>\n<strong>The\u00a0multi-device broker\u00a0mechanism is used to facilitate runtime data transformation so as to make a cloud service accessible to a wider range of cloud service consumer programs and devices.<\/strong><br \/>\n\u514b\u670d\u4e91\u670d\u52a1\u548c\u8fe5\u5f02\u7684\u4e91\u670d\u52a1\u7528\u6237\u4e4b\u95f4\u7684\u4e0d\u517c\u5bb9\uff0c\u521b\u5efa\u6620\u5c04\u903b\u8f91\u6765\u6539\u53d8\uff08\u6216\u8f6c\u6362\uff09\u8fd0\u884c\u65f6\u4ea4\u6362\u7684\u4fe1\u606f\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-452 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201401-1.png\" alt=\"\" width=\"588\" height=\"442\" \/><br \/>\n\u591a\u8bbe\u5907\u4ee3\u7406\u901a\u5e38\u662f\u4f5c\u4e3a\u7f51\u5173\uff08gateway\uff09\u5b58\u5728\u7684\uff0c\u6216\u8005\u5305\u542b\u6709\u7f51\u5173\u7ec4\u4ef6\u3002<br \/>\n\u53ef\u521b\u5efa\u7684\u8f6c\u6362\u903b\u8f91\u5c42\u6b21\u5305\u62ec\uff1a<br \/>\n\uff081\uff09\u4f20\u8f93\u534f\u8bae<br \/>\n\uff082\uff09\u6d88\u606f\u534f\u8bae<br \/>\n\uff083\uff09\u5b58\u50a8\u8bbe\u5907\u534f\u8bae<br \/>\n\uff084\uff09\u6570\u636e\u6a21\u5f0f\/\u6570\u636e\u6a21\u578b<br \/>\n&nbsp;<\/p>\n<h3>8.10\u72b6\u6001\u7ba1\u7406\u6570\u636e\u5e93\uff08state management database\uff09<\/h3>\n<p>\u662f\u4e00\u79cd\u5b58\u50a8\u8bbe\u5907\uff0c\u7528\u6765\u6682\u65f6\u5730\u6301\u4e45\u5316\u8f6f\u4ef6\u7a0b\u5e8f\u7684\u72b6\u6001\u6570\u636e\u3002<br \/>\n<strong><span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">A\u00a0state management database\u00a0is a storage device that is used to temporarily\u00a0 persist state data for software programs.\u00a0\u00a0\u00a0<\/span><\/strong><br \/>\n\u72b6\u6001\u7ba1\u7406\u6570\u636e\u5e93\u901a\u5e38\u662f\u7531\u4e91\u670d\u52a1\u4f7f\u7528\u7684\uff0c\u7279\u522b\u662f\u6d89\u53ca\u957f\u65f6\u95f4\u8fd0\u884c\u65f6\u6d3b\u52a8\u7684\u670d\u52a1\u3002<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-453 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201402-1.png\" alt=\"\" width=\"463\" height=\"287\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-454 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch08\u2014\u201403-2.png\" alt=\"\" width=\"524\" height=\"339\" \/><br \/>\n&nbsp;<br \/>\n\u5178\u578b\u4f8b\u9898\uff1a<br \/>\n&nbsp;<br \/>\n<b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">\u4e00\u3001\u5224\u65ad\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">1<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The automated scaling listener mechanism is a service agent\u00a0that monitors and tracks communications between cloud service consumers and cloud services for static scaling purposes. \u00a0<\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff08F<\/span> \u00a0 <span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">(<strong>The automated scaling listener mechanism is a service agent\u00a0that monitors and tracks communications between cloud service consumers and cloud services for dynamic scaling purposes.\u00a0\u00a0<\/strong>) \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">2<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The\u00a0load balancer\u00a0mechanism is a runtime agent with logic fundamentally based on this premise.<\/span>\u00a0<span style=\"font-family: \u5b8b\u4f53;\">\uff08T<\/span>\u00a0 <span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">3The SLA monitor mechanism is used to specifically observe the runtime performance of cloud <\/span>s<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">ervices. \uff08T\uff09 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">4<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The data collected by the pay-per-use monitor is not processed by a billing management system that calculates the payment fees. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> \u00a0 F<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><\/span><br \/>\n\uff08<strong>The data collected by the pay-per-use monitor is\u00a0 processed by a billing management system that calculates the payment fees.<\/strong>\u00a0\u00a0\uff09<br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">5The\u00a0audit monitor\u00a0mechanism is used to collect audit tracking data for networks and IT resources. <\/span><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span> T\uff09 <span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">6<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The\u00a0failover system\u00a0mechanism is used to <\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">decrease<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0the reliability and availability of IT resources by using established clustering technology to provide redundant <\/span>implementations. (F\u00a0 )<\/span><br \/>\n\uff08<strong>The\u00a0failover system\u00a0mechanism is used to increase\u00a0the reliability and availability of IT resources by using established clustering technology to provide redundant implementations.<\/strong> \uff09<br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">7<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The hypervisor mechanism is a fundamental part of virtualization infrastructure that is primarily used to generate physical server instances of a virtual server. \u00a0\u00a0\u00a0\u00a0<\/span>( \u00a0 F\u00a0 )<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\uff08<strong>The hypervisor mechanism is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server.<\/strong> \uff09 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">8<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The\u00a0resource cluster\u00a0mechanism decreases the combined computing capacity, load balancing, and availability of the clustered IT resources. \u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 F <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><\/span><br \/>\n\uff08<strong>The\u00a0resource cluster\u00a0mechanism increase the combined computing capacity, load balancing, and availability of the clustered IT resources.<\/strong> \uff09<br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">9<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The\u00a0multi-device broker\u00a0mechanism is used to facilitate runtime data transformation so as to make a cloud service accessible to a wider range of cloud service consumer programs and <\/span>devices. (\u00a0 T )<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">10<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A\u00a0state management database\u00a0is a storage device that is used to <\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">permanently<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0persist state data for software programs. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 F <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0<\/span><\/span><br \/>\n\uff08<strong>A\u00a0state management database\u00a0is a storage device that is used to temporarily persist state data for software programs.\u00a0\u00a0\u00a0<\/strong>\uff09<\/p>\n<p align=\"justify\"><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u4e8c\u3001<\/span><b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\u9009\u62e9\u9898<\/span><\/span><\/b><\/span><b><\/b><\/p>\n<p><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">1<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">The\u00a0\u00a0mechanism is a service agent that monitors and tracks communications between cloud service consumers and cloud services for dynamic scaling purposes.(B)<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A\u3001<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Resource cluster \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0\u00a0B <\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001 <\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Automated scaling listener<\/span><\/strong><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">B\u3001<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Multi-device broker<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">2<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">which isn\u2019t the Common resource cluster types :(C)<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Server Cluster \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Database Cluster \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>backup cluster \u00a0\u00a0\u00a0<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0Large Dataset Cluster<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">3\u3001 <\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 A \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">mechanism is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Load Balancer<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit Monitor<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">4\u3001 <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0 D \u00a0 \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">mechanism is used to specifically observe the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements that are published in SLAs.<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit Monitor<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Load Balancer<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0\u00a0D<\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><\/strong><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">5\u3001\u00a0<\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> B \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">mechanism measures cloud-based IT resource usage in accordance with predefined pricing parameters and generates usage logs for fee calculations and billing purposes.<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit Monitor<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0\u00a0\u00a0\u00a0B<\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001 <\/span><\/span><\/strong><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>Pay-per-use monitor<\/strong>\u00a0<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">6<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 \u00a0\u00a0 A \u00a0 \u00a0\u00a0<\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> mechanism is used to collect audit tracking data for networks and IT resources in support of (or dictated by) regulatory and contractual obligations.<\/span><\/span><br \/>\n<strong><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001 <\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit Monitor<\/span><\/strong><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Pay-per-use monitor\u00a0<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit monitor\u00a0mechanism \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">7\u3001<\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0\u00a0 B \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">mechanism is used to increase the reliability and availability of IT resources by using established clustering technology to provide redundant implementations.<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Audit Monitor<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0B<\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Failover\u00a0 system<\/span><\/strong><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">8\u3001<\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 A \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">mechanism \u00a0is used to group multiple IT resource instances so that they can be operated as a single IT resource.<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>Resource cluster<\/strong> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Failover system<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">SLA Monitor<\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">9\u3001<\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 D \u00a0 \u00a0 \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">mechanism is used to facilitate runtime data transformation so as to make a cloud service accessible to a wider range of cloud service consumer programs and devices<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Resource cluster \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Failover system<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisor \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0D<\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001 <\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Multi-device broker<\/span><\/strong><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">10<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 B \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">provides a range of features for administering multiple hypervisors across physical servers.<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0WEB \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>B<\/strong><\/span><strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><\/strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>VIM<\/strong> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0C<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">CPU \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\u3001<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">ISP<\/span><\/span><br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u672c\u7ae0\u63cf\u8ff0\u7684\u7279\u6b8a\u7684\u4e91\u673a\u5236\uff1a \uff081\uff09\u81ea\u52a8\u4f38\u7f29\u76d1\u542c\u5668 \uff082\uff09\u8d1f\u8f7d\u5747\u8861\u5668 \uff083\uff09SLA\u76d1\u63a7\u5668 \uff084\uff09\u6309\u4f7f\u7528\u4ed8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[27],"tags":[],"views":8931,"_links":{"self":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/432"}],"collection":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":0,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/432\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/categories?post=432"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/tags?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}