期刊文献+

基于自动网络加速器的云计算能耗降低的方法研究

Research on Lower Energy Consumption of Cloud Computing with Automatic Network Accelerator
下载PDF
导出
摘要 虚拟计算机在云计算中被广泛使用时,会导致用户到服务器的距离比以前更长,引起虚拟计算机的性能退化,这会带来服务质量的恶化和ICT(information communication technology)设备能源消耗的增加;针对该问题,提出了把网络加速器自动应用到云计算网络中的方法;为了使用当前主流的网络加速器,方案采用了基于mSCTP的数据传输,该协议在迁移前后使用不同的传输控制协议(TCP)连接的;文章没有考虑动态迁移本身会使虚拟计算机的性能退化,实验结果表明,虽然需要安装网络加速器作为云资源的一部分并暂时地增加通信链路的数据包传输速度,但是文章提出的使用网络加速器方法,可明显地降低ICT设备的能源消耗,其降低量是原来不使用网络加速器时的1/3。 Virtual computer is widely used in cloud computing,can cause the user to the server of the distance is longer than before,cause the performance degradation of virtual computer,this will lead to the deterioration of quality of service and ICT (Information Communication Technology) equipment energy consumption increase.According to this problem,this paper presents a network accelerator automatically applied to the method in the cloud computing network.In order to use the current mainstream network accelerator,scheme adopted based the data transmission on mSCTP.The protocol uses the transmission control protocol in different before and after the migration (TCP)connection.This article does not consider the dynamic migration itself can make a virtual computer performance degradation,The experimental results show that,although the need to install the network accelerator as part of cloud resources and increase the communication link for data packet transmission speed,the network accelerator method which is proposed in this paper can significantly reduce the energy consumption of ICT devices.Power consumption with network accelerator could be reduced to one-third of that without network accelerator.
作者 吴国芳
出处 《计算机测量与控制》 北大核心 2014年第12期4143-4146,共4页 Computer Measurement &Control
基金 浙江省教育厅高等学校访问学者专业发展项目(FX2013236) 浙江省教育厅科研项目(Y201225529)
关键词 云计算 网络加速器 能源消耗 服务性能 动态迁移 cloud computing network accelerator energy consumption service performance dynamic migration
  • 相关文献

参考文献8

  • 1Cozzocrea A,Gunopulos D.Efficiently computing and Querying multidimensional OLAP data CBES over probabilistic relational Data[J] .Computer Science,2011,6259:132-148.
  • 2Kuribayashi S.Reducing total power consumption method in cloud computing environments[J] .International Journal of Computer Networks & Communications (IJCNC),2012,4 (2):34-44.
  • 3Franke H,Nelms T,Yu H.Exploiting heterogeneous multicore-processor systems for high-performance network processing[J] .IBM Journal of Research and Development,2010,54 (1):1-14.
  • 4杨照峰,王启明,吕海莲.基于任务延迟的云计算资源调度算法研究[J].计算机测量与控制,2014,22(2):499-502. 被引量:54
  • 5Liu H,Xu C Z,Jin H,Gong J,et al.Performance and Energy Modeling for Live Migration of Virtual Machines[A] .HPDC' 11[C] .2011:389-399.
  • 6Wang Y,Wang X,Chen M,et al.Partic:Power-aware response time control for virtualized webservers[J] .IEEE Transactions on Parallel and Distributes Systems,2011,22 (2):323-225.
  • 7马宜科,常晓涛,范东睿,刘志勇.混合体系结构中有状态硬件加速器的优化[J].计算机学报,2011,34(7):1314-1322. 被引量:2
  • 8叶可江,吴朝晖,姜晓红,何钦铭.虚拟化云计算平台的能耗管理[J].计算机学报,2012,35(6):1262-1285. 被引量:179

二级参考文献25

  • 1孙雪冬,徐晓飞,王刚.基于有向超图的工作流资源分配均衡优化方法[J].电子学报,2005,33(8):1370-1374. 被引量:12
  • 2唐磊,廖渊,李明树,淮晓永.面向普适计算的服务构件动态部署问题及算法[J].计算机研究与发展,2007,44(5):815-822. 被引量:10
  • 3Yu H, Franke H, Biran G et al.Stateful hardware decompression in networking envlronments//Proceedlngs of the 4th ACM/IEEE Symposium on Architecture for Networking and Communications Systems. San Jose, CA, 2008: 141-150.
  • 4Siriwong K, Lipsky L, Ammar R. Study of bursty Internet traffic//Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA 2007). 2007:53-60.
  • 5Johnson C, Allen D H, Brown J et al. A wire-speed Pow- erTM processor: 2.3GHz 45nm SOI with 16 Cores and 64 threads//Proeeedings of the 2010 IEEE International SolidState Circuits Conference. 2010:104-105.
  • 6Bohrer P, Peterson J, Elnozahy M et al. Mambo: A full system simulator for the PowerPC architecture. ACM Sigmetrics Performance Evaluation Review, 2004, 31(4): 8-12.
  • 7Ziv J, Lempel A. A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977, 23(3): 337-343.
  • 8LaPotin D P, Daijavad S, Johnson D Pet al. Workload and network-optimized computing systems. IBM Journal of Re search and Development, 2010, 54 ( 1), Paper 1 : 1-12.
  • 9Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996.
  • 10van Lunteren Jan. High-performance pattern-matching for intrusion detection//Proceedings of the IEEE INFOCOM. Barcelona, Spain, 2006: 1-13.

共引文献232

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部