期刊文献+

Xen虚拟化技术在并行网络链路控制的应用 被引量:2

Application of Xen Virtualization Technology in Parallel Network Link Control
下载PDF
导出
摘要 Xen是一个开放源代码虚拟机监视器,采用Xen虚拟化技术进行并行网络链路控制,提高并行网络联络的访问控制性能和安全性能,传统方法采用内存虚拟化技术进行并行网络链路调度,并行网络虚拟机特权级控制容易受到网络的漏洞攻击,导致链路吞吐性能不好。提出一种基于Xen虚拟化技术的并行网络链路控制算法。构建了基于Xen虚拟化技术的并行网络链路结构模型,在并行网络链路结构中进行开放源代码的特征量分析和TDMA协议构建,以此为基础采用多普勒频移方法进行并行网络链路控制算法改进。仿真结果表明,采用该方法进行并行网络链路控制,有效降低了数据传输的丢包率,提高链路吞吐量,提高了并行网络链路的安全性和吞吐能力。 Xen is an open source virtual machine monitor. The Xen virtualization technology is used toimprove the access control performance and security performance. The traditional method uses memoryvirtualization technology to carry out parallel network link scheduling. A parallel network link controlalgorithm based on Xen virtualization technology is proposed. A parallel network link structure modelbased on Xen virtualization technology is constructed, and the characteristics of open source code andTDMA protocol are constructed in the parallel network link structure, which is based on the Dopplerfrequency shift method. Simulation results show that the proposed method is effective in reducing thepacket loss rate of data transmission, improving the link throughput, and improving the security andthroughput of the parallel network.
作者 何亮 何勇
出处 《科技通报》 北大核心 2016年第8期150-153,202,共5页 Bulletin of Science and Technology
基金 基金项目:基于GNN超混沌系统的视频加密方案研究与实现(15A520095)
关键词 虚拟化技术 并行网络 链路控制 Xen virtualization technology parallel network link control
  • 相关文献

参考文献2

二级参考文献24

  • 1张维明,毛捍东,陈锋.一种基于图论的网络安全分析方法研究[J].国防科技大学学报,2008,30(2):97-101. 被引量:9
  • 2张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4Choqueuse V, Marazin M, Coliin L, et al.. Blind recognition of linear space time block codes: a likelihood-based approach [J]. IEEE Transactions on Signal Processing, 2010, 58(3): 1290-1299.
  • 5Marey M, Dobre O A, and Liao B. Classification of STBC system over frequency-selective channels[J]. IEEE Transactions on Vehicular Technology, 2015, 64(5): 2159-2164.
  • 6Choqueuse V, Yao K, and Collin L. Hierarchical space-time block code recognition using correlation matrices[J]. IEEE Transactions on Wireless Communications, 2008, 7(9): 3526-3534.
  • 7Choqueuse V, Yao K, Collin L, et al.. Blind recognition of linear space time block codes[C]. Proceedings of IEEE International Conference Acoustics, Speech and Signal Processing, Las Vegas, USA, 2008: 2833-2836.
  • 8Marey M and Dobre O A. Blind modulation classification algorithm for single and multiple-antenna systems over frequency-selective channels[J]. IEEE Signal Processing Letters, 2014, 21(9): 1098-1102.
  • 9Eldemerdash Y A, Dobre O A, and Liao B J. Blind identification of SM and Alamouti STBC-OFDM signals[J]. IEEE Transactions on Wireless Communications, 2015 14(2): 972-982.
  • 10Shi M, Bar-Ness Y, and Su W. STC and BLAST MIMO modulation recognition[C]. IEEE Global Telecommunications Conference, Washington, D.C., USA, 2007: 3034-3039.

共引文献28

同被引文献17

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部