期刊文献+

网络传输数据存储负荷均衡管理仿真

Simulation of Load Balancing Management of Network Transmission Data Storage
下载PDF
导出
摘要 对网络传输数据的存储负荷进行均衡管理,能够降低系统的存储负荷。网络传输数据存储负荷的均衡管理,需要选取电势最高源节点赋予存储空间,迁移数据进行重分配,完成数据存储负荷的均衡管理。传统方法先确定节点至存储位置间距离,设定存储阈值进行数据时隙分配,但忽略了重分配迁移数据,导致均衡管理效果不理想。提出基于最小化重分配策略的网络传输数据存储负荷均衡管理方法。调整数据重分配过程,以最小化重分配总负荷为目标构建目标函数。将势能函数引入目标函数转变最小跳数问题,数据项存储目的节点选取其相应电势最高的源节点赋予数据存储空间,源节点选取最近的许诺节点进行数据迁移,直至全部节点卸载溢出数据项为止,完成数据重分配过程,实现均衡管理。实验结果表明,所提方法进行网络传输数据存储,能降低系统存储负荷,节省存储开销。 The load balancing management of data storage in network transmission can,reduce the storage load of system.The traditional method ignores the redistribution of the migration data,leading to the unsatisfactory management effect.In this paper,we focus on a method of load balaneing management in network transmission based on the minimum redistribution strategy.Firstly,we adjusted the process of data redistribution.In order to minimize the total load of redistribution,the objective function was constructed.Then,the potential energy function was introduced to the objective function to transform the minimum hops.In addition,the source node with the highest electric potential is selected as the data storage space.Finally,the source node selected the nearest promised node for the data migration until all nodes unloaded the spillover data.Thus,we completed the data redistribution process and realized the balancing management.Simulation results show that the proposed method can reduce system storage load and save storage cost during the data storage in network transmission.
作者 叶伦强 YE Lun-qiang(Southwest Minzu University,Sichuan Chengdu 610225,China)
机构地区 西南民族大学
出处 《计算机仿真》 北大核心 2018年第12期438-441,共4页 Computer Simulation
基金 西南民族大学中央高校基本科研业务费专项资金资助项目"基于虚拟化的民族高校慕课云架构研究--以西南民族大学为例"(2015NZYQN40)
关键词 网络 传输数据 存储 负荷 均衡管理 Network Transmission data Storage Load Balancing management
  • 相关文献

参考文献10

二级参考文献105

  • 1韩鸿泉,朱红松,孟军.无线传感器网络技术[J].计算机系统应用,2005,14(2):38-41. 被引量:29
  • 2马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 3王永杰,孟令奎,赵春宇.基于Hilbert空间排列码的海量空间数据划分算法研究[J].武汉大学学报(信息科学版),2007,32(7):650-653. 被引量:18
  • 4陈颖文,徐明,吴一.无线传感器网络网内数据处理节点的优化选取[J].软件学报,2007,18(12):3104-3114. 被引量:8
  • 5POPA R A, LORCH J R, MOLNAR D, et al. Enabling security in cloud storage SLAs with Cloud-Proof[C]//USENIX Annual Technical Conference. Portland, Oregon, USA: USENIX Association, 2011(242): 355-368. 被引量:1
  • 6ITANI W, A KAYSSI, CHEHAB A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures[C]//Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. New Jersey, USA: IEEE Computer Society, 2009: 711-716. 被引量:1
  • 7RYAN M D. Cloud computing security: the scientific challenge, and a survey of solutions[J]. Journal of Systems and Software, 2013, 86(9): 2263-2268. 被引量:1
  • 8JUELS A, KALISKI JR B S. PORs: Proofs of retrievability for large files[C]//14th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2007: 584-597. 被引量:1
  • 9YAMAGUCHI T, HASHIYAMA T, OKUMA S. A study on reconfigurable computing system for cryptography[C]//2000 IEEE International Conference on in Systems, Man, and Cybernetics. New Jersey, USA: IEEE Computer Society, 2000: 2965-2968. 被引量:1
  • 10KAMARA S, LAUTER K, Cryptographic cloud storage[C]//14th Financial Cryptograpy and Data Security International Conference. Berlin, Germany: Springer-Verlag, 2010: 136-149. 被引量:1

共引文献171

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部