主权项 |
1. A method for dynamically distributing one or more services in a network comprised of a plurality of computers, the method comprising:
a) deriving a past chronological progression of a resource capacity required for a respective service according to a prescribed service requirement from a past chronological progression of a resource demand for the respective service in a predetermined time interval whereby, in order to determine the resource capacity at a point in time in the predetermined time interval, the chronological progression of the resource demand is statistically evaluated in a partial interval of the predetermined time interval by using the past chronological progression of the resource demand in the partial interval to determine a histogram, and deriving from the histogram the resource capacity that satisfies the prescribed service requirement in the partial interval, wherein the predetermined time interval contains the point in time or lies adjacent to this point in time; b) predicting a chronological progression of the resource capacity required for the respective service from the past chronological progression of the resource capacity required for the respective service; c) distributing, by a computer, the services performed on the computers based on one or more optimization criteria, wherein the optimization criterion or criteria includes that the respective computers provide enough resources for the services performed on the respective computers based on the predicted chronological progressions of the resource capacities required for the respective services; d) initializing a secure distribution of services on the computers, wherein the secure distribution is configured to guarantee that the resource demand of the services running on a respective computer according to the secure distribution will never cause a resource quantity provided by the respective computer to be exceeded, and wherein the services on a respective computer according to the secure distribution represent secure services, and services migrated to another computer due to a redistribution represent insecure services; and wherein an insecure service is described by a directed edge, which extends from the computer on which the insecure service is currently located to the computer on which the insecure service was located according to the secure distribution, thereby creating a directed graph structure. |