Restricting resources consumed by ghost agents
First Claim
Patent Images
1. A method for restricting resources consumed by ghost agents within a grid computing environment, comprising the steps of:
- identifying a host, wherein said host is a software object operating within said grid environment and movable from one grid to another grid within the grid environment;
associating a ghost agent with said host, wherein said ghost agent is configured to execute at least one operation, wherein said operation comprises replicating and recording at least one action of said host, and wherein the ghost agent follows the movement of the associated host;
identifying computing resources used by the ghost agent;
determining a usage value for each computing resource used by the ghost agent;
calculating a resource utilization value for said ghost agent based on usage values determined for individual computing resources;
comparing said resource utilization value to a usage threshold value pre-established for the ghost agent, wherein the usage threshold value defines a maximum resource utilization value permitted; and
reducing a quantity of the computing resources used by the ghost agent if it is determined that the resource utilization value exceeds the usage threshold value,wherein said ghost agent can be deactivated and reactivated and said reducing step further comprises the steps of;
queuing attempted operations of the ghost agent during deactivation; and
executing operations from the queue after the ghost agent is reactivated.
1 Assignment
0 Petitions
Accused Products
Abstract
One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
28 Citations
7 Claims
-
1. A method for restricting resources consumed by ghost agents within a grid computing environment, comprising the steps of:
-
identifying a host, wherein said host is a software object operating within said grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with said host, wherein said ghost agent is configured to execute at least one operation, wherein said operation comprises replicating and recording at least one action of said host, and wherein the ghost agent follows the movement of the associated host; identifying computing resources used by the ghost agent; determining a usage value for each computing resource used by the ghost agent; calculating a resource utilization value for said ghost agent based on usage values determined for individual computing resources; comparing said resource utilization value to a usage threshold value pre-established for the ghost agent, wherein the usage threshold value defines a maximum resource utilization value permitted; and reducing a quantity of the computing resources used by the ghost agent if it is determined that the resource utilization value exceeds the usage threshold value, wherein said ghost agent can be deactivated and reactivated and said reducing step further comprises the steps of; queuing attempted operations of the ghost agent during deactivation; and executing operations from the queue after the ghost agent is reactivated. - View Dependent Claims (2)
-
-
3. A method for restricting resources consumed by ghost agents within a grid computing environment, comprising the steps of:
-
identifying a host, wherein said host is a software object operating within said grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with said host, wherein said ghost agent is configured to execute at least one operation, wherein said operation comprises replicating and recording at least one action of said host, and wherein the ghost agent follows the movement of the associated host; identifying computing resources used by the ghost agent; determining a usage value for each computing resource used by the ghost agent; calculating a resource utilization value for said ghost agent based on usage values determined for individual computing resources; comparing said resource utilization value to a usage threshold value pre-established for the ghost agent, wherein the usage threshold value defines a maximum resource utilization value permitted; and reducing a quantity of the computing resources used by the ghost agent if it is determined that the resource utilization value exceeds the usage threshold value, wherein said reducing step further comprises the steps of; deactivating said ghost agent; starting an idle timer; and
,reactivating said ghost agent when a current time of said idle timer exceeds a predetermined time threshold. - View Dependent Claims (4, 5)
-
-
6. A method for restricting resources consumed by ghost agents within a grid computing environment, comprising the steps of:
-
identifying a host, wherein said host is a software object operating within said grid environment and movable from one grid to another grid within the grid environment; associating a ghost agent with said host, wherein said ghost agent is configured to execute at least one operation, wherein said operation comprises replicating and recording at least one action of said host, and wherein the ghost agent follows the movement of the associated host; identifying computing resources used by the ghost agent; determining a usage value for each computing resource used by the ghost agent; calculating a resource utilization value for said ghost agent based on usage values determined for individual computing resources; comparing said resource utilization value to a usage threshold value pre-established for the ghost agent, wherein the usage threshold value defines a maximum resource utilization value permitted; and reducing a quantity of the computing resources used by the ghost agent if it is determined that the resource utilization value exceeds the usage threshold value, wherein the reducing step further comprises the step of; categorizing operations of the ghost agent into having a low resource requirement or a high resource requirement based on pre-determined criteria; and restricting to execution of operations that have a low resource requirement. - View Dependent Claims (7)
-
Specification