计算机应用 ›› 2014, Vol. 34 ›› Issue (9): 2523-2526.DOI: 10.11772/j.issn.1001-9081.2014.09.2523
收稿日期:
2014-04-02
修回日期:
2014-06-19
出版日期:
2014-09-01
发布日期:
2014-09-30
通讯作者:
李大为
作者简介:
LI Dawei,ZHAO Fengyu
Received:
2014-04-02
Revised:
2014-06-19
Online:
2014-09-01
Published:
2014-09-30
Contact:
LI Dawei
摘要:
在私有云平台中,现有的方法无法灵活地对虚拟机内存资源进行有效的监控和分配。针对以上问题,提出了内存实时监测和动态调度(MMS)模型,利用libvirt函数库和Xen提供的libxc函数库实现了对虚拟机内存紧缺、内存空闲时的实时监测和动态调度,并且提出虚拟机迁移策略,有效地缓解宿主机的内存紧缺问题。最后选取一台物理机作为主控节点,两台物理机作为子节点,利用Eucalyptus搭建一个小型的私有云平台。结果显示,当宿主机处于内存紧缺状态时,MMS系统通过启动虚拟机迁移策略有效地释放了内存空间;当虚拟机占用内存逼近初始最大内存时,MMS为其分配新的最大内存;当占用内容降低时,MMS系统对部分空闲的内存资源进行了回收,而且释放内存不超过150MB(最大内存512MB)时,其对虚拟机性能的影响不大。结果表明该模型对私有云平台中虚拟机内存进行实时监测和动态调度是有效的。
中图分类号:
李大为 赵逢禹. 私有云平台的虚拟机内存调度策略[J]. 计算机应用, 2014, 34(9): 2523-2526.
LI Dawei ZHAO Fengyu. Memory scheduling strategy for virtual machine in private cloud platform[J]. Journal of Computer Applications, 2014, 34(9): 2523-2526.
[1]Xen. The powerful opensource industry standard for virtualization [EB/OL]. [2014-03-01]. http://www.xen.org/.
[2]vSphere. The virtualization platform for building cloud infrastructures [EB/OL]. [2014-03-01]. http://www.vmware.com/products/vsphere.
[3]KVM. A full virtualization solution for Linux on x86 hardware containing virtualization extensions [EB/OL]. [2014-03-01]. http://www.linux-kvm.org/.
[4]VMware virtualization Software for Desktops, Servers & Virtual Machines for Public and Private Cloud Solutions [EB/OL]. [2014-03-01]. http://www.VMware.com/.
[5]WALDSPURGER C A. Memory resource management in VMware ESX server [C]// OSDI '02: ACM SIGOPS Operating Systems Review. Proceedings of the 5th Symposium on Operating Systems Design and Implementation. New York: ACM, 2002, 36(SI): 181-194.
[6]LU P, SHEN K. Virtual machine memory access tracing with hypervisor exclusive cache [C]// ATC'07: Proceedings of the 2007 USENIX Annual Technology Conference. Berkeley: USENIX Association, 2007: Article No. 3.
[7]GUPTA D, LEE S, VRABLE M, et al.Difference engine: harnessing memory redundancy in virtual machines [C]// Proceedings of the 8th USENIX Symposium on Operating System Design and Implementation. Berkeley: USENIX Association, 2008: 309-322.
[8]NAVAS-MOLINA J A, MISHRA S. Addressing memory exhaustion failures in virtual machines in a cloud environment [C]// Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Piscataway: IEEE, 2013:1-6.
[9]LIU L,CHU R, ZHU Y, et al.DMSS: a dynamic memory scheduling system in server consolidation environments [C]// Proceedings of the 2012 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops. Piscataway: IEEE, 2012: 70-75.
[10]Libvirt. The virtualization API [EB/OL]. [2014-03-01]. http://www.libvirt.org/.
[11]Eucalyptus. Open source AWS compatible private cloud [EB/OL]. [2014-03-01]. https://www.eucalyptus.com/.
[12]Apache JMeter. A 100% pure Java application designed to load test functional behavior and measure performance [EB/OL]. [2014-03-01]. http://jmeter.apache.org/.
[13]Apache Tomcat. An open source software implementation of the Java Servlet and JavaServer Pages technologies [EB/OL]. [2014-03-01]. http://tomcat.apache.org/. |
[1] | 毕文婷 林海涛 张立群. 基于多阶段演化信号博弈模型的移动目标防御决策算法[J]. 计算机应用, 0, (): 0-0. |
[2] | 朱玉娜, 张玉涛, 闫少阁, 范钰丹, 陈韩托. 基于半监督子空间聚类的协议识别方法[J]. 计算机应用, 2021, 41(10): 2900-2904. |
[3] | 肖跃雷, 邓小凡. 基于证书的有线局域网安全关联方案改进与分析[J]. 计算机应用, 2021, 41(7): 1970-1976. |
[4] | 杜心雨, 王化群. LTE-A网络中基于动态组的有效的身份认证和密钥协商方案[J]. 计算机应用, 2021, 41(6): 1715-1722. |
[5] | 王垚, 孙国梓. 基于聚类和实例硬度的入侵检测过采样方法[J]. 计算机应用, 2021, 41(6): 1709-1714. |
[6] | 葛丽娜, 胡雨谷, 张桂芬, 陈园园. 云计算环境基于客体属性匹配的逆向混合访问控制方案[J]. 计算机应用, 2021, 41(6): 1604-1610. |
[7] | 郭帅, 苏旸. 基于数据流的加密流量分类方法[J]. 计算机应用, 2021, 41(5): 1386-1391. |
[8] | 陈权 李莉 陈永乐 段跃兴. 面向深度学习可解释性的对抗攻击算法[J]. 计算机应用, 0, (): 0-0. |
[9] | 张全龙, 王怀彬. 基于膨胀卷积和门控循环单元组合的入侵检测模型[J]. 计算机应用, 2021, 41(5): 1372-1377. |
[10] | 唐延强, 李成海, 宋亚飞. 基于改进粒子群优化和极限学习机的网络安全态势预测[J]. 计算机应用, 2021, 41(3): 768-773. |
[11] | 杭梦鑫, 陈伟, 张仁杰. 基于改进的一维卷积神经网络的异常流量检测[J]. 计算机应用, 2021, 41(2): 433-440. |
[12] | 欧彬利, 钟夏汝, 代建华, 杨田. 基于变精度覆盖粗糙集的入侵检测方法[J]. 计算机应用, 2020, 40(12): 3465-3470. |
[13] | 杨建喜, 张媛利, 蒋华, 朱晓辰. 边缘计算中基于深度Q网络的物理层假冒攻击检测方法[J]. 计算机应用, 2020, 40(11): 3229-3235. |
[14] | 陈旖, 张美璟, 许发见. 基于一维卷积神经网络的HTTP慢速DoS攻击检测方法[J]. 计算机应用, 2020, 40(10): 2973-2979. |
[15] | 王韫烨, 程亚歌, 贾志娟, 付俊俊, 杨艳艳, 何宇矗, 马威. 基于安全多方的区块链可审计签名方案[J]. 计算机应用, 2020, 40(9): 2639-2645. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||