期刊文献+

基于共享内存的Xen虚拟机间通信的研究 被引量:11

Research on Xen Inter Domain Communication Based on Shared Memory
下载PDF
导出
摘要 当虚拟机技术应用在服务器整合等领域时,虚拟机之间的通信会非常频繁,虚拟机本身的通信机制将成为瓶颈。目前,在Xen中不同的虚拟机间进行通信时,不仅通信路径长,而且虚拟机间的切换会造成很大的性能开销。在深入研究Xen虚拟机通信机制的基础上,提出了一种基于共享内存的通信方法,用于提高同一台物理机器上不同虚拟机之间通信的性能。实验结果表明,该方法极大地增加了虚拟机之间的通信带宽,并且有效平衡了各个虚拟机的CPU利用率。 When the virtual machine technique is applied to many fields such as the server integration,the communication inter virtual machines will be very complex and frequent,and so the communication mechanism of the virtual machines themselves will become a bottleneck.Currently,when one guest virtual machine in Xen wants to communicate with another on the same physical machine,it must extend the data transfer path and degrade the inter-domain communication performance.On the basis of an intensive study of the communication of the Xen virtual machines,it puts forward a communicating method based on the shared memory,which is used to improve the performance of the communication between different virtual machines on one physical machine.The experimental result shows that this method has greatly increased the communication bandwidth between virtual machines,and effectively balanced the CPU utilization of every virtual machine as well.
出处 《计算机技术与发展》 2011年第7期5-8,12,共5页 Computer Technology and Development
基金 国家自然科学基金(60273087) 西北工业大学基础研究基金(W018101) 陕西省自然科学基金(SJ08F25)
关键词 虚拟机 通信 XEN 共享内存 带宽 virtual machine communication Xen shared memory bandwidth
  • 相关文献

参考文献12

  • 1怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:78
  • 2黄良良,韩军,汪伦伟.基于Xen硬件虚拟机的安全通信机制研究[J].计算机安全,2010(3):30-31. 被引量:5
  • 3Fraser K,Hand S,Neugebauer R,et al.Safe hardware access with the Xen virtual machine monitor[C]//Proceedings of the 1st Workshop on Operating System and Architectural Support for the,Demand IT Infrastructure(OASIS).Boston,USA:[s.n.],2004:1-10. 被引量:1
  • 4顾晓峰,王健.基于Intel VT-x的XEN全虚拟化实现[J].计算机技术与发展,2009,19(9):242-245. 被引量:7
  • 5Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[C]//The nineteenth ACM symposium on operating systems principles.New York,NY,USA:[s.n.],2003:164-177. 被引量:1
  • 6Cho Y C,Jeon J W.Sharing Data Between Process Running on Different Domains on Para-virutalized Xen[C]//International Conference on Control.Automation and Systems.[s.l.]:[s.n.],2007:1255-1260. 被引量:1
  • 7Menon A,Santos R J,Turner Y,et al.Diagnosing Performance Overheads in the Xen Virtual Machine Environment[C]//Proc of the tat ACM/USENIX International Conference on Virtual Execution Environments.Chicago,USA:[s.n.],2005:13-23. 被引量:1
  • 8Clark C,Fraser K,Hand S,et al.Live Migration of Virtual Machines[C]//Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation(NSDI).Boston,USA:[s.n.],2005:273-286. 被引量:1
  • 9张建..Xen虚拟机间通信优化研究与实现[D].上海交通大学,2008:
  • 10赖宗澐..Xen虚拟机存储系统优化[D].浙江大学,2007:

二级参考文献27

共引文献123

同被引文献60

  • 1王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 2董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. 被引量:63
  • 3何帆.一种虚拟可信计算平台框架的设计与实现.上海交通大学,2009. 被引量:1
  • 4Ahzadehzy M,Greenbergy A,Maltzy D A,et al. DCTCP[ C]/! Proc of SIGCOMM. [ s. 1. ] : [ s. n. ] ,2010. 被引量:1
  • 5Whiteaker J, Schneider F, Teixeira R. Explaining Packet I)e- lays under Virtualization [ J ]. Computer Communication Re- view,2011,41 ( 1 ) :38-44. 被引量:1
  • 6Kangarlou A, Gamage S, Kompella R R, et al. vSnoop. Impro- ving TCP Throughput in Virtualized Environments via Ac- knowledgement Offload [ C ]//Proc of the 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis. Washington, D C : IEEE Computer Society ,2010. 被引量:1
  • 7Wang Guohui ,Eugene Ng T S E. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center[ C ]// INFOCOM2010. [ s. 1. ] : [ s. n. ] ,2010. 被引量:1
  • 8TCG. TOGSpecificationArchitecture0verview, Version 1.2. https ://www. trustedApplictiongroup, org. 被引量:1
  • 9Xiao-Yong Li, Li-Tao Zhou, etc. A trusted computing environment model in cloud architecture. 2010 International Conference on Machine Learning and Cybernetics (ICMLC 2010), 11-14 July 2010,2843-8. 被引量:1
  • 10Bell D E, LaPadula L J. Secure computer systems: Mathematical foundations[R]. MITRE CORP BEDFORD MA, 1973. 被引量:1

引证文献11

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部