首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
移动IP是一种对IP移动性的支持的协议,能够使移动主机(MH),借由家乡代理(HA)和外地代理(FA),直接向通信主机(CH)发送数据包。然而,所发送的数据包却不得不经过三个不同的网络:通信主机所在的子网,家乡代理所在的子网和移动主机当前所在的子网。这样,就使得发往移动主机的数据包要经过比预期长得多的路径。这些多余的路径在移动IP中被称为“三角路由”。这个问题可以用路由优化来解决,它要求所有通信主机保证一个绑定缓存,通信主机将从家乡代理中得到的移动主机的转交地址(CoA)储存在绑定缓存中,然后直接与移动主机进行对话。  相似文献   

2.
针对传统虚拟机整合(VMC)方法难以保持主机工作负载长期稳定的问题,提出一种基于高斯混合模型的高效虚拟机整合(GMM-VMC)方法。为了准确地预测主机负载的变化趋势,首先,使用高斯混合模型(GMM)对活动物理主机的工作负载历史记录进行拟合;然后,根据活动物理主机工作负载的GMM和主机自身的资源配置情况计算主机的过载概率,并根据过载概率判定主机是否存在过载风险;对存在过载风险的物理主机,根据部署在该物理主机上的虚拟机对降低主机过载风险的贡献和虚拟机迁移所需的时间这两个指标进行待迁移虚拟机选择;最后,使用GMM估算待迁移虚拟机对各个目标主机过载风险的影响,并选择受影响最小的主机作为目标主机。通过CloudSim仿真平台模拟该GMM-VMC方法,并根据能源消耗、服务质量(QoS)、整合效率等指标与已有的整合方法进行对比,实验结果表明,GMM-VMC方法能够有效地降低数据中心能耗,提高服务质量。  相似文献   

3.
《A&S》2007,(B10):227-227
ST2000系列有线报警主机(以色列EL3000);Infinite BB宽带网络报警主机(以色列EL3000);Infinite prime中文无线双网报警主机(以色列EL3000);Arrow XL方向性幕帘探测器(以色列EL3000);1484/1486双鉴探测器(以色列EL3000)[第一段]  相似文献   

4.
超女连连看为超级女声迷门特别推出的连连看游戏,将超级女声人物头像作为连连看的基本画面,支持联机功能,联机时,任意一方建立主机,写上端口号(任意),另外一方连接主机,添上主机ip地址,添上端口号(就是建立主机时写的那个号)就能连上了,如果连接不上,则重新建主机,换个端口就行了。  相似文献   

5.
杨翎  姜春茂 《计算机应用》2021,41(4):990-998
虚拟机迁移技术作为云计算中降低数据中心能耗的重要手段被广泛应用。结合三支决策的分、治、效模型提出一种基于三支决策的虚拟机迁移调度策略(TWD-VMM)。首先,通过建立层次阈值树搜索所有可能取到的阈值,由此以数据中心能耗为优化目标得到总能耗最低的一对阈值,从而实现三分区域,即高负载区域、中负载区域和低负载区域。其次,针对不同负载的主机采取不同的迁移策略:对于高负载主机,以主机预迁出后的多维资源均衡度和主机负载下降幅度为目标;对于低负载主机,主要考虑主机预放置后的多维资源均衡度;对于中等负载主机,如果迁移过来的虚拟机依旧满足中负载特性,则可以接受迁入。实验采用CloudSim模拟器进行,将TWD-VMM算法分别与基于阈值调度算法(TVMS)、基于虚拟机迁移节能调度算法(EEVS)、云计算中心节能调度算法(REVMS)算法在主机负载、主机多维资源利用均衡度、数据中心总能耗等方面进行比较,结果表明TWD-VMM算法在提高主机资源利用率、均衡主机负载等方面有明显效果,且能耗平均降低了27%。  相似文献   

6.
德州仪器(TI)宣布新推出的SuperSpeed USB(USB3.O)四端口可扩展主机控制器(xHCI)通过USB实施者论坛(USB—IF)认证。除四端口主机控制器TUSB7340之外,TI的双端口主机控制器TUSB7320也获得该认证。两款控制器不仅支持笔记本、台式机、工作站、服务器、外接卡与ExpressCard等应用,  相似文献   

7.
提出对传统报警系统改进的办法:用PC机作为主机,用AT89S52单片机作为从机,采用RS485总线型网络系统。该系统的特点:(1)不仅主机可以呼叫从机,从机在必要时可以主动呼叫主机,避免了从机只能等待主机轮询访问的弊端,从而提高了系统实时性和可靠性;(2)由于报警的时间毕竟很少,因此没有必要让主机无休止地轮询访问各个从机。而且轮询的方式效率很低,主机未必能从多台从机中立刻定位到报警的那台从机。  相似文献   

8.
《现代计算机》2008,(9):32-32
航嘉巧管家是一款PC电源保护器(俗称插排),这款PC专用电源保护器在使用时,只需用电脑开关主机,即可完全控制与主机相关的外设电源断开情况,轻松实现关主机即关外设的功能。巧管家一共提供了5组插孔,使用的时候要求把主机的供电插头接驳在“主机“组,这样才能通过主机的工作状态来判断其他插孔的电压。  相似文献   

9.
《A&S》2006,(1):96-97
KB2000N型气体报警控制系统,AL238T/AL2316T家庭防盗报警主机,FiRMNESS(弗曼尼斯)2100系列报警主机,LHB3000智能小区报警系统,HT8008H电脑控制无线报警主机……  相似文献   

10.
针对异构网络中数据信息监测的要求,研究在网络异构环境中数据采集的实现方法。分析并使用简单网络管理协议(SNMP)和管理信息库(MIB),设计并实现一个能够对异构网络环境下的主机资源进行实时采集的系统软件。该系统使用关系数据库保存所有主机资源信息,并通过绘图的方式生成实时的主机资源占用曲线,以便对主机在一定时期内的资源占用状况进行综合分析。系统运行结果表明,可以有效地对网络主机资源进行全面监测,及时掌控网络资源运行状况。  相似文献   

11.
Quantum efficiency, driving voltage, color stability and recombination zone of organic white-light-emitting diodes (OWLEDs) with blue/orange/blue stacked emitting structure were correlated with host structure of emitting layer. A mixed host structure of 4,4′,4″-tris(N-carbazolyl)triphenylamine (TCTA) and 1,3,5-tris(N-phenylbenzimidazole-2-yl)benzene (TPBI) was used in orange emitting layer and host composition was critical to device performances of OWLEDs. TPBI host structure was better than other host structures in terms of quantum efficiency and color stability, while TCTA shows poor quantum efficiency in spite of good color stability. TCTA:TPBI mixed host structure showed better driving voltage than other host structures. In addition, recombination zone in blue/orange/blue stacked OWLEDs could be controlled by changing host structure in orange light-emitting layer. OWLEDs with TPBI host in orange emitting layer showed high quantum efficiency of 10.3% at 1000 cd/m2 with little change of Commission international De L’Eclairage coordinates of (0.32, 0.34) from 100 cd/m2 to 10,000 cd/m2.  相似文献   

12.
Varshney  U. 《Computer》1997,30(1):131-133
An implicit assumption underlying most networking research has been that two Internet users would be connected only by fixed links (wire lines). Increased use of portable computers, wireless networks and satellites has generated interest in supporting “computing on the move”, or mobile computing. Instead of maintaining a fixed position in a network, users in this environment are free to roam. Mobile computing raises interesting issues, such as how to route packets as the mobile user (host) moves about and how to guarantee the quality of service (QOS) that an application running on such a mobile host may need. Other issues include the choice of a transport protocol to use on top of a mobile host and how to deal with poor performance in wireless links. There are two possible approaches to supporting mobile computing over the Internet. The first uses a mobile IP (Internet Protocol), whereby packets (datagrams) are forwarded by a designated stationary host to the mobile host. The second approach involves wireless ATM (asynchronous transfer mode), with host mobility supported by rerouting/rearranging the end-to-end ATM connection between mobile and stationary hosts  相似文献   

13.
HPI的原理及其在DSP与单片机接口中的应用   总被引:5,自引:0,他引:5  
主机接口(HPI)是TI公司数字信号处理器(DSP)中用于和主机(通常是微处理器)进行双向数据通信的8位并行接口。本文介绍了HPI的基本原理,并给出了数字信号处理器TMS320C5402和单片机MSP430X33X的硬件接口电路和软件编程。  相似文献   

14.
朱晓锦  庞海珑  王健  邵勇 《计算机工程》2007,33(21):240-242
基于LPC2292(ARM7)为CPU、Nucleus PLUS为实时操作系统的测控系统平台,分析了以ISP1161A1 USB主机控制芯片构建USB主机模块的设计与实现方法,包括USB主机功能模块设计方案、嵌入式USB主机的硬件设计思路、嵌入式USB主机驱动程序的设计方法以及设计方案的实现方式和过程。针对主机驱动程序的主要相关功能、面向通用USB设备驱动程序接口和主机控制器驱动程序的下层数据管理等关键问题,给出了解决方案和实现方法,提供了关键数据结构和简明注释。  相似文献   

15.
针对容器化云环境中数据中心能耗较高的问题,提出了一种基于最佳能耗优先(Power Full,PF)物理机选择算法的虚拟资源配置策略。首先,提出容器云虚拟资源的配置和迁移方案,发现物理机选择策略对数据中心能耗有重要影响;其次,通过研究主机利用率与容器利用率,主机利用率与虚拟机利用率,主机利用率与数据中心能耗之间的数学关系,建立容器云数据中心能耗的数学模型,定义出优化目标函数;最后,通过对物理机的能耗函数使用线性插值进行模拟,依据邻近事物相类似的特性,提出改进的最佳能耗优先物理机选择算法。仿真实验将此算法与先来先得(First Fit,FF)、最低利用率优先(Least Fit,LF)、最高利用率优先(Most Full,MF)进行比较,实验结果表明,在有规律不同物理机群的计算服务中,其能耗比FF、LF、MF分别平均降低45%、53%和49%;在有规律相同物理机群的计算服务中,其能耗比FF、LF、MF分别平均降低56%、46%和58%;在无规律不同物理机群的计算服务中,其能耗比FF、LF、MF分别平均降低32%、24%和12%。所提算法实现了对容器云虚拟资源的合理配置,且在数据中心节能方面具有优越性。  相似文献   

16.

In the state-of-the-art parallel programming approaches OpenCL and CUDA, so-called host code is required for program’s execution. Efficiently implementing host code is often a cumbersome task, especially when executing OpenCL and CUDA programs on systems with multiple nodes, each comprising different devices, e.g., multi-core CPU and graphics processing units; the programmer is responsible for explicitly managing node’s and device’s memory, synchronizing computations with data transfers between devices of potentially different nodes and for optimizing data transfers between devices’ memories and nodes’ main memories, e.g., by using pinned main memory for accelerating data transfers and overlapping the transfers with computations. We develop distributed OpenCL/CUDA abstraction layer (dOCAL)—a novel high-level C++ library that simplifies the development of host code. dOCAL combines major advantages over the state-of-the-art high-level approaches: (1) it simplifies implementing both OpenCL and CUDA host code by providing a simple-to-use, high-level abstraction API; (2) it supports executing arbitrary OpenCL and CUDA programs; (3) it allows conveniently targeting the devices of different nodes by automatically managing node-to-node communications; (4) it simplifies implementing data transfer optimizations by providing different, specially allocated memory regions, e.g., pinned main memory for overlapping data transfers with computations; (5) it optimizes memory management by automatically avoiding unnecessary data transfers; (6) it enables interoperability between OpenCL and CUDA host code for systems with devices from different vendors. Our experiments show that dOCAL significantly simplifies the development of host code for heterogeneous and distributed systems, with a low runtime overhead.

  相似文献   

17.
In this paper, a new optimization algorithm to solve continuous and non-linear optimization problems is introduced. This algorithm is inspired by the optimal mechanism of viruses when infecting body cells. Special mechanism and function of viruses which includes the recognition of fittest viruses to infect body cells, reproduction (cloning) of these cells to prompt “invasion” operation of ready-to-infect regions and then escaping from infected regions (to avoid immune reaction) is the basis of this evolutionary optimization algorithm. Like many evolutionary algorithms, the Virulence Optimization Algorithm (VOA) starts the optimization process with an initial population consisting of viruses and host cells. The host cell population represents the resources available in host environment or the region containing the global optimum solution. The virus population infiltrates the host environment and attempts to infect it. In the optimization procedure, at first the viruses reside in the constituted regions or clusters of the environment called virus groups (via K-means clustering). Then they scatter in host environment through mutation (Drifting) and recombination (Shifting) operators. Then among the virus groups, the group with highest mean fitness is chosen as escape destination. Before the escape operation commences, the best viruses in each virus group are recognized and undergoes a cloning operation to spread the Virulence in the host environment. This procedure continues until the majority of the virus population is gathered in the region containing the maximum resources or the global optimum solution. The novelty of the proposed algorithm is achieved by simulating three important and major mechanisms in the virus life, namely (1) the reproduction and mutation mechanism, (2) the cloning mechanism to generate the best viruses for rapid and excessive infection of the host environment and (3) the mechanism of escaping from the infected region. Simulating the first mechanism in the virus life enables the proposed algorithm to generate new and fittest virus varieties. The cloning mechanism facilitates the excessive spread of the fittest viruses in the host environment to infect the host environment more quickly. Also, to avoid the immune response, the fittest viruses (with a great chance of survival) are duplicated through the cloning process, and scattered according to the Vicinity Region Radius of each region. Then, the fittest viruses escape the infected region to reside in a region which possess the resources necessary to survive (global optimum). The evaluation of this algorithm on 11 benchmark test functions has proven its capability to deal with complex and difficult optimization problems.  相似文献   

18.
基于主机的安全审计系统研究   总被引:8,自引:1,他引:8  
崔蔚  赵强  姜建国  黄钧  刘渊 《计算机应用》2004,24(4):124-126
文中综合入侵检测、访问控制等技术,提出了一种适用于涉密局域网中UNIX主机的主机(服务器)安全审计系统的原型系统,模型以多级安全策略为基础,以全面增强主机安全。通过实际的应用,验证了系统的可行性。  相似文献   

19.
基于SNMP协议的远程主机监测系统设计与实现   总被引:3,自引:1,他引:2  
针对远程监测主机的需求,研究远程主机监测的实现方法.分析并使用简单网络管理协议(SNMP)和管理信息库(MIB),设计实现一个能对远程主机的硬件,软件及系统性能进行实时监测的系统软件.同时,该系统借助SQL Server良好的数据备份功能,以便对主机的历史状况进行查询.系统测试结果表明,该系统可以有效地对远程主机进行全面监测.由此证明,基于SNMP协议对远程主机进行监测的方法简单、高效、通用,具有一定应用价值.  相似文献   

20.
基于主机的安全审计系统研究   总被引:3,自引:0,他引:3  
文章综合入侵检测、访问控制等技术,以P2DR安全模型为基础,提出了一种适用于涉密局域网中UNIX主机的主机(服务器)安全审计系统的原型系统,其可行性基本得到了验证。模型以多级安全策略为基础,以全面增强主机安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号