期刊文献+

Xen虚拟网卡自适应中断调度优化策略

Adaptive scheduling optimization mechanism for virtual NIC interrupt on Xen
下载PDF
导出
摘要 对于Xen网络工作模式来说,高负荷网络环境下大量的CPU资源将会被频繁到达的网卡中断占用,导致系统遭遇性能瓶颈,提出一种可以根据网络繁忙程度进行轮询的中断自适应调整机制,通过定义面向两种优先级不同的虚拟缓冲区,根据缓冲区中数据队列长度进行判断处理,以保证不同业务的服务质量。该机制不需要增加额外的处理单元。实验表明,当外部网络数据频繁到达时也不会引发过多的CPU中断,从而提高了CPU的利用率。 For the Xen network model, high load under the environment of network causes bottle- neck of the system where most CPU resources are occupied by frequent interrupt from the NIC. To alle- viate this problem, an adaptive interrupt latency scheduling mechanism based on Xen is proposed, which uses the polling or interrupt method in accordance with the queue length of virtual buffer without sup- plementing any additional processing units. And the mechanism can guarantee different qualities of service to some extent through the definition of the two types of priority virtual buffers. Experimental results show that, so that the CPU when frequent interrupt from the NIC occurs, CPU will not be interrupted frequently utilization is improved.
作者 李国庆
出处 《计算机工程与科学》 CSCD 北大核心 2014年第10期1937-1942,共6页 Computer Engineering & Science
基金 河南省科技攻关资助项目(132102210491)
关键词 虚拟化 中断 延迟 虚拟缓冲区 virtualization interrupt latency virtual buffer
  • 相关文献

参考文献11

  • 1Atif M,Strazdins P.An evaluation of multiple communication interfaces for virtualized SMP clusters[C]∥Proc of the3rd Workshop on System-Level Virtualization for High Performance Computing(HPCVirt’09),2009:9-16.
  • 2Gurav U,Shaikh R.Virtualization-A key feature of cloud computing[C]∥Proc of ACM ICWET’10,2010:227-229.
  • 3Kim H,Jo H,Lee J.Xhive:Efficient cooperative caching for virtual machines[J].IEEE Transactions on Computers,2010,60(1):106-119.
  • 4Desai A,Oza R,Sharma P,et al.Hypervisor:A survey on concepts and taxonomy[J].International Journal of Innovative Technology and Exploring Engineering,2013,2(3):222-225.
  • 5王静,徐开勇,赵彬.一种Xen细粒度强制访问控制框架的设计与实现[J].计算机应用与软件,2012,29(12):99-102. 被引量:4
  • 6Liu Jiu-xing,Abali B.Virtualization polling engine(VPE):Using dedicated CPU cores to accelerate I/O virtualization[C]∥Proc of the 23rd ACM International Conference on Supercomputing,2009:225-230.
  • 7Yu Young-jin,Shin D,Eom H,et al.NCQ vs.I/O Scheduler:Preventing unexpected misbehaviors[J].ACM Transactions on Storage(TOS),2010,6(1):15-27.
  • 8Ahmadi M R,Maleki D.Effect of virtual techniques in data storage access[C]∥Proc of the 24th IEEE International Conference on Advanced Information Networking and Applications,2010:91-96.
  • 9Oi H,Nakajima F.Performance analysis of large receive offload in an Xen virtualized system[C]∥Proc of International Conference on Computer Engineering and Technology,2009:375-480.
  • 10杨洪波.高性能网络虚拟化技术研究[D].上海:上海交通大学,2011.

二级参考文献12

  • 1Barham P,Dragovic B,Fraiser K,et al.Xen and the art of virtualization[C]//Proc.19th ACM Symposium on Operating Systems Principles(SOSP-19),Bolton Landing,New York,USA,October2003.
  • 2Nguyen Anh Quynh,Keio University.Centralized Security Policy Sup-port for Virtual Machine[C]//20 th Large Installation System Adminis-tration Conference,2006.
  • 3Smalley S,Vance C,Salamon W.Implementing SELinux as a Linux Se-curity Modulep Nailabs report[R].NAI Labs,2005.
  • 4LIDS team.Linux Intrusion Detection System[S/OL].2005.http://www.lids.org.
  • 5Ruder,Andrew.Trustees ACL[CP/OL].2006.http://trustees.aer-uder.net/.
  • 6AppArmor team.AppArmor project[CP/OL].2006.http://en.open-suse.org/Apparmor.
  • 7Richard Haines.GNU General Public License[S/M].The SELinux Notebook,2010.
  • 8George Coker.National Information Assurance Research Lab,National Security Agency(NSA)Xen Security Modules(XSM)[CP/OL].2007.http://www.xensource.com/xen/xensummit.html.
  • 9Sandra Rueda,Hayawardh Vijayakumar,Trent Jaeger.Systems and Internet Infrastructure Security Laboratory.Analysis of Virtual Machine System Policies[S].2010.
  • 10Reiner Sailer Trent Jaeger Enriquillo Valdez.Building a General-Pur-pose Secure Virtual Machine Monitor[R].IBM Research Report,Computer Science,RC23537(W0502-132),2005.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部