期刊文献+

基于VMware View桌面虚拟化系统性能优化 被引量:2

Performance Tuning of Virtualization System Based on VMware View
下载PDF
导出
摘要 基于VMware View 5.0的桌面虚拟化项目,分析了影响虚拟桌面性能的主要因素和常见系统性能瓶颈,通过监测和分析找到了系统性能下降的根源,设计和实施了基于SSD的存储改造方案,成功地解决了启动风暴,系统运行不佳,用户体验较差等问题,从而提升了整个桌面虚拟化的性能。 In the process of implementing desktop virtuallzation project, the problem oflen encountered is poor system performance, user experience is poor, it is necessary to solve this problem for'system performance optimization. The article based on VMware View 5.0 desktop virtualizafion project as an example, analyzes the main factors influencing the performanee of virtual desktops and common system performance bottleneck by monitoring and analyzing the performance of the system to find the root causes of the decline, based on the design and implementation of SSD store renovation program, successfully resolved the boot storms and other issues, so as to enhance the performance of the entire desktop virtualization system.
作者 张德安
出处 《机电工程技术》 2015年第12期96-98,共3页 Mechanical & Electrical Engineering Technology
关键词 桌面虚拟化 虚拟桌面 VMWARE VIEW 性能调优 启动风暴 desktop virtualization virtual desktop VMware View performance tuning boot storm
  • 相关文献

参考文献5

二级参考文献23

  • 1Shawn Kung. Breaking Through The Storage I/O Barrier For Cloud Computing, 2011,4.
  • 2LIAO Xiao-fei, XIONG Xian-jie, JIN Hai, et al. LVD: A Lightweight Virtual Desktop Management Architecture [ C]//Proceeding of 2nd International DMTF Academic Alliance Workshop on Systems and Virtualization Manage- ment : Standards and New Technologies. Munich, Germa- ny : Springer-Verlag, 2008 : 25-36.
  • 3郑兴燕.安全虚拟桌面系统的设计与实现[D].北京:北京交通大学,2012.
  • 4GARFINKEL T, ROSENBLUM M. When Virtual Is Har- der than Real: Security Challenges in Virtual Machine Based Computing Environments [ C ]// In HOTOS '05 : Proceedings of the 10th conference on Hot Topics in Op- erating Systems,2005 : 20.
  • 5KING S T, CHEN P M. SubVirt: Implementing Malware with Virtual Machines[ C ]//Security and Privacy, 2006 IEEE Symposium. IEEE, 2006: 375.
  • 6SAILER R, JAEGER T. Building a MAC-based Security Architecture for the Xen Opensource Hypervisor [ C ]// Computer Security Applications Conference, 21st Annu- al. Tucson, AZ : IEEE, 2005 : 285.
  • 7Barham P,Dragovic B,Fraser K. Xen and the art ofvirtualization[J].ACM SIGOPS Operating Systems Review,2003,(05):164-177.
  • 8VMware,Inc. VMware[EB/OL].http://www.vmware.corn/,2013.
  • 9Gebhardt C,Dalton C I,Brown R. Preventing hypervisorbased rootkits with trusted execution technology[J].Network Security,2008,(11):7-12.
  • 10Hohmuth M,Peter M,Hartig H. Reducing TCB size by using untrusted components:Small kernels versus virtual-machine monitors[A].New York:ACM,2004.22.

共引文献11

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部