期刊文献+

基于通用标准的虚拟化技术性能检测与分析 被引量:3

Examination and Analysis of Virtualization Technologies Based on Standard Benchmarks
原文传递
导出
摘要 虚拟化技术是提升已有计算机资源利用率的一种有效手段。尽管它已经在高性能计算系统中崭露出自己在提升物力资源利用率以及用户的安全性上的优势,但是却一直没有受到重视,文章利用各种基准以VMWare Server,Xen,and OpenVZ we这几种虚拟化产品在SMP性能、文件系统中的表现,对完全虚拟化、准虚拟化以及操作系统级虚拟化在HPC涉及到的各个方面进行评测。 Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computing (HPC) applications is currently limited despite its potential for both improving resource utilization and providing resource guarantees to its users. This paper evaluates various VMs by using various standard benchmarks. And by using VMWare Server, Xen, and OpenVZ, the suitability of full virtualization, paravirtualization and operating system-level virtualization in terms of SMP performance and file system performance is also examined.
出处 《通信技术》 2009年第5期164-166,共3页 Communications Technology
关键词 虚拟化技术 SMP性能 文件系统 virtualization technology SMP performance file system
  • 相关文献

参考文献7

  • 1胡碧峰,韦红军.基于网络流量预测模型的CFAR入侵检测方法研究[J].信息安全与通信保密,2008,30(8):112-115. 被引量:2
  • 2Adams K, Agesen O. A Comparison of Softwareand Hardware Techniques for x86 Virtualization[R].USA:ACM Press, 2005.
  • 3姬耀,刘海涛.文件数据的安全存储[J].信息安全与通信保密,2008,30(1):68-70. 被引量:10
  • 4Barham P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization[R]. USA:ACM Press, 2003.
  • 5Huang W, Liu J, Abali B, et al. A Case for High Performance Computing with Virtual Machines[R]. USA:ACM Press, 2004.
  • 6Bailey D, Barszcz E, Barton J, et al. The NAS Parallel Benchmarks[J]. International Journal of HPC Applications, 2004, 3(5):63-73.
  • 7Raj H, Schwan K. High Performance and Scalable I/O Virtualization via Self-Virtualized Devices[R]. USA:ACM Press, 2007.

二级参考文献9

  • 1邹柏贤,姚志强.一种网络流量平稳化方法[J].通信学报,2004,25(8):14-23. 被引量:18
  • 2[1]Solomon D A.Inside Microsoft Windows 2000,Third Edition[M].北京:机械工业出版社,2000.
  • 3[2]Andrew S Tanenbaum,Albert S Woodhull.操作系统:设计与实现(第二版)[M].北京:电子工业出版社,2000.
  • 4[3]William Stallings.密码编码学与网络安全[M].北京:电子工业出版社,2003.
  • 5[4]Rajeev Nagar.Windows NT File System Internals[M].O'REILLY,1997.
  • 6[1]Herringshaw C.Detecting attacks on network[J].Computer,1997,30:16-17.
  • 7[2]Lin Jia-Ling,Wang X S,Jajodia S.Abstraction-based misuse detection:high-level specifications and adaptable strategies[J].Computer Security Foundations Workshop.Proceedings.1998.11th IEEE,1998.6:190-201.
  • 8[3]JawL C,Wu N.Anomaly detection and reasoning with embedded physical model.Aerospace Conference Proceedings[J].2002.IEEE,vol.6:3073-3081.
  • 9[5]Di He,Herry Leung.A Novel CFAR Intrusion Detection Method Using Chaotic Stochastic Resonance Circuits and Systems[C].2004.ISCAS'04.Proceedings of the 2004 International Symposium on,2004.5,vol.4:23-26.

共引文献10

同被引文献15

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部