期刊文献+

测控基带资源池的设计与实现 被引量:5

Design and Implementation of TT&C Baseband Equipment Resource Pool
下载PDF
导出
摘要 针对传统测控基带紧耦合架构引起的扩展性差、资源冗余和布线复杂等问题,提出了资源池化的测控基带云管理方法。基于构建测控基带资源池的目的,在综合分析业内各类虚拟化技术的基础上,提出了基于I/O融合技术的基带设备虚拟化方案,采用UDP确认传输协议确保端到端信息传输高效可靠,结合应用需求制定了关键指标测试方案。测试结果表明,虚拟化后的基带板卡在模式重构时间、典型数据传输时延和传输性能等方面均有提升,在集约型航天测控地面系统中有广阔的应用前景。 Aiming at the problems of poor scalability,resource redundancy and complex wiring caused by the traditional tight coupling structure of TT&C equipment,a resource pooling management method is proposed.On the basis of comprehensive analysis of I/O device virtualization technology in the industry,the baseband equipment virtualization scheme based on I/O fusion technology is adopted,and the UDP-based confirmation transfer protocol is briefly introduced.The experimental results show that the virtualized baseband card has been improved in reconfiguration time,typical data transmission delay and transmission performance.It has broad application prospects in TT&C ground system.
作者 党赟 高群福 贾丙强 刘云杰 DANG Yun;GAO Qunfu;JIA Bingqiang;LIU Yunjie(The 54th Research Institute of CETC,Shijiazhuang 050081,China)
出处 《无线电工程》 2019年第4期308-313,共6页 Radio Engineering
基金 中国电子科技集团公司航天信息应用技术重点实验室开放基金资助项目(XX17629X009)
关键词 测控系统 I/O设备 虚拟化 资源池 云平台 TT&C system I/O equipment virtualization resource pool cloud platform
  • 相关文献

参考文献19

二级参考文献215

  • 1王迪,薛巍,舒继武,沈美明.海量存储网络中的虚拟盘副本容错技术[J].计算机研究与发展,2006,43(10):1849-1854. 被引量:15
  • 2孙毓忠.虚拟化的复兴.中国计算机学会通讯,2008,4(4):1-3.
  • 3BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 4GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 5KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 6Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 7TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 8SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.
  • 9Leavitt N. Is Cloud Computing Really Ready for Prime Time? [J]. IEEE Computer Society Press, 2009,42 ( 1 ) :15 20.
  • 10Armbrust M, Fox A, Grith R, et al. Above the clouds:A Berkeley View of Cloud Computing[R]. UCB/EECS-2009-28. Berkeley, USA:Electrical Engineering and Computer Sciences, University of California at Berkeley, 2009.

共引文献1445

同被引文献39

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部