期刊文献+

智能网络存储系统负载均衡算法研究 被引量:2

Study of intelligent network storage system load balancing algorithm
下载PDF
导出
摘要 负载均衡是大规模基于对象存储系统必须要考虑的重要问题。探讨了几种经典的负载均衡调度算法,介绍了它们的算法流程及其优缺点,最后根据INSS存储系统结构模型及其I/O请求流程,提出了一种二级动态反馈负载均衡模型,能最大程度的减少系统的平均总响应时间。 Load balancing is based on the important problem of large-scale storage system must be considered. Discusses the load balancing several classic scheduling algorithms, introduces the algorithm process and their advantages and disadvantages, according to the INSS storage system architecture model and the I/O request process, feedback load balancing model of a two level dynamic forward, can reduce the system average response time.
作者 李昕
出处 《电子设计工程》 2013年第24期17-19,22,共4页 Electronic Design Engineering
关键词 负载均衡 调度算法 存储系统 模型 响应时间 Load balancing scheduling algorithm storage system model response time
  • 相关文献

参考文献4

二级参考文献36

共引文献23

同被引文献21

  • 1吴乃星,廖建新,杨孟辉,朱晓民.基于软交换的异构集群媒体服务器中一种LRV负载均衡算法[J].电子学报,2005,33(10):1745-1750. 被引量:6
  • 2Wang Li, Liu Jing, Hu Jing-tong,et al. Efficient task assignment on heterogeneous multicore systems con- sidering communication over-head [C]// Proc of the 12^th International Conference on Algorithms and Archi- tectures for Parallel Processing. Berlin; Springer-Ver- lag, 2012 : 171-185.
  • 3Mei Jing, Li Ken-li, Hu Jing-tong, et al. Energy-aware preemptive scheduling algorithm for sporadic tasks on DVS platform [J]. Micro-processors and Microsys- tems, 2013,37(1) : 99-114.
  • 4Yang Zhi-bang,Xu Cheng,Zhou Xu,et ak Heuristic tempe- ra-ture-aware DVS scheduling algorithm for MPSoC [J]. ln- ternationaljournal of advancements in computing Technolo- gy,2012,4(1) : 67-76.
  • 5Muthuvelu N, Vecchiola C, Chal I, et al. Task granu- larity policies for deploying bag-of-task applications on global grids [J]. Futurt Generation Computer Sys- tems, 2013,29(1) : 170-181.
  • 6Muthuvelu N, Chal I, Chikkannan, et al . On-line task granularity adaptation for dynamic grid applications[C]// Proc of the 12th International Corfferenee on Algorithms and Architectures for Pa-rallel Processing. Berlin: Spring- er, 2010: 266-277.
  • 7Ibraiml L, Petkovic M, Nikova S, et al. Ciphertext- policy at-tribute-based threshold decryption with flexi- ble delegation and revoca-tion of user attributes[R]. Enschede: University of Twente, 2009.
  • 8YU Shu-cheng, WANG Cong, REN Kui , et al. A- chieving secure, sealable, and fine-grained data access control in cloud computing[C]//Proc of the 29th Con- ference on Information Communications. Piscataway.. IEEE Press, 2010 : 534-542.
  • 9Narayan S, Gagne M, Safavi -Naini R. Privacy preser- ving HER system using attribute-based infrastructure [C] // Proc of ACM Cloud Computing Security Work- shop. New York: ACM Press, IEEE, 2010: 47-52.
  • 10Liang Xiao hui, Lu Rong-xing, Liu Xiao-dong, et al. Patient self-controllable access policy on phi in ehealth- care systems[C] //Proc of Advances in Health Infor- matics Conference. [s. 1. ]: IEEE,2010.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部