期刊文献+

计算机实验室服务器虚拟化技术实践方法 被引量:2

Practice Method of Virtualization Technology of Computer Lab Server
下载PDF
导出
摘要 随着虚拟化技术的发展,在实验室服务器系统中的运用优势显得尤为明显。在计算机实验室服务器虚拟化技术实践方法的研究过程中,首先提出在服务器虚拟化实验平台应用过程中对服务器虚拟化对供应要求以及服务器虚拟化产品介绍,从而提出计算机实验室服务器虚拟化技术实践,虚拟化的理念和解决方案会在实验室服务器的建设中发挥更大的作用。 With the development of virtualization technology, the advantages of the it in laboratory server system is particularly obvious. In the research process of virtualization technology practice in computer lab server, this paper first proposes the supply requirements for server virtualization in application process of server virtualization lab platform and the introduction of server virtualization products, so as to put forward the computer lab server virtualization technology. The virtualization concepts and solutions will play a greater role in construction of laboratory server.
作者 王兆华 熊能
出处 《现代工业经济和信息化》 2017年第21期18-19,共2页 Modern Industrial Economy and Informationization
基金 江西省教育厅青年科技项目"基于高校的私有云构建技术研究"(GJJ161402)
关键词 计算机实验室 服务区虚拟化 实践研究 computer lab service area virtualization practice research
  • 相关文献

参考文献7

二级参考文献82

  • 1胡玲琳.学术性学位与专业学位研究生培养模式的特性比较[J].学位与研究生教育,2006(4):22-26. 被引量:147
  • 2赵永利,张杰.OMNET++与网络仿真[M].北京:人民邮电出版社,2012.
  • 3KEROMYTIS A D, MISRA V, RUBENSTEIN D. SOS: an architec- ture for mitigating DDoS attacks[J]. IEEE Journal on Selected Areas in Communications, 2004, 22(1): 176-187.
  • 4STAVROU A, KEROMYTIS A D. Countering DoS attacks with state- less multipath overlays[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05[C]. Alexandria, V'trginia, USA, 2005. 249-259.
  • 5XUAN D, CHELLAPPAN S, WANG X, et al. Analyzing the secure overlay services architecture under intelligent DDoS attacks[A]. Pro- ceedings of the 24th International Conference on Distributed Comput- ing Systems[C]. Tokyo Japan, 2004.408-417.
  • 6WANG X, CHELLAPPAN S, BOYER P, et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems,2006,17(7):619-632.
  • 7IN C H, HONG C S, WEI J, et al. An enhanced SOS architecture for DDoS attack defense using active network technology[A]. Proceed- ings of Advanced Industrial Conference on Telecommunications/Ser- vice Assurance with Partial and Intermittent Resources Conference/ ELearning on Telecommunications Workshop[C]. Lisbon, Portugal, 2005.90-95.
  • 8KAUR R, SANGA A L, KUMAR K. Secure overlay services (SOS): a critical analysis[A]. 2012 2rid IEEE International Conference on Par- allel, Distributed and Grid Computing[C]. Ottawa, Canada, 2012. 457-462.
  • 9DINGS L, ZHAO X H. Analysis and improvement on Chord protocol for structured P2P[A]. IEEE 3rd International Conference on Commu- nication Software and Networks[C]. Xi'an, China, 2011.214-218.
  • 10THIRUVATHUKAL G K, HINSEN K, LALrFER K, et al. V'trtualiza- tion for computational scientists[J]. Computing in, Science & Engi- neering, 2010,12(4):52-60.

共引文献92

同被引文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部