期刊文献+

基于虚拟化技术的双活数据中心方案设计 被引量:7

Scheme design of double active data center based on virtualization technology
下载PDF
导出
摘要 介绍了基于虚拟化技术的双活数据中心方案设计。首先描述了数据中心的总体架构,然后从网络层面、应用层面、数据库层面、存储层面描述了如何实现双活设计,最后总结了实现双活设计的难点,并展望了双活数据中心发展的方向。方案实现了两个中心并行运行,一个中心断了,另一个中心正常运行,用户应用不受影响,避免了备中心长期处于闲置状态的情况,提高了资源利用率,并提供了双倍的服务能力。 The text introduced the design of active-active data center based on virtualization technology. Firstly it described the overall architecture of the data center. Then it described how to realize the active-active design on the network level,the application level,the database level and the storage level. Finally,it summarized the difficulty to achieve the active-active design and looked forward to the direction of the active-active data center development. It realized two centers running at the same time. Once a center was broken,then another center was in normal operation. The application was not affected. It avoided the situation when a center was idle in a long period,improved resource utilization ratio,and provided a double service capacity.
作者 侯红祥 Hou Hongxiang(Taizhou Branch of China Telecom Co.,Taizhou 225300,China)
出处 《信息技术与网络安全》 2019年第1期90-93,共4页 Information Technology and Network Security
关键词 虚拟化 双活数据中心 方案设计 云计算 virtualization active-active data center scheme design cloud computing
  • 相关文献

参考文献2

二级参考文献34

  • 1王鹏,黄华峰,曹珂.云计算:中国未来的IT战略.北京:人民邮电出版社,2010.
  • 2Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
  • 3Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
  • 4Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy.O'Reilly Media,2009.
  • 5Yanfeng Zhang,Cuirong Wang,Yuan Gao.A QoS-oriented network architecture based on virtualization.Proceedings of First International Workshop on Education Technology and Computer Science,Wuhan,China,2009:959~963.
  • 6Sehgal N K,Ganguli M.Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology(ICIT),Mumbai,India,2006:2 752~2 755.
  • 7Xiaorui Wang,Yefu Wang.Coordinating power control and performance management for virtualized server clusters.IEEE Transactions on Parallel and Distributed Systems,2011,22(2):245~259.
  • 8Xen Introduction.http://xen.xensource.com/media/xen/player.html.
  • 9Challener D,Yoder K,Catherman R,et al.A Practical Guide to Trusted Computing.IBM Press,2008.
  • 10Chen P M,Noble B D.When virtual is better than real.Proceedings of the 8th Workshop on HotTopics in Operating Systems,IEEE Computer Society,Washington,DC,USA,2001.

共引文献53

同被引文献52

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部