网格资源选择配置策略技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着当今Internet技术日渐成熟和第三代互联网的提出,网格计算的设想与实践已不再遥远,网格计算的核心是对异地异构资源非集中性控制的资源协调,通过通用开发的协议和接口,提供优质的服务,而网格资源选择性配置方案,就是为解决现今网格中资源的不合理利用所提出的。
     首先,本文针对服务网格中资源的安全共享问题,提出了在复合条件下认证服务的资源共享方案,通过消息认证、签名方案和访问控制等方法保证在服务网格环境下资源共享方和资源申请方的个人信息和共享资源安全。
     其次,本文为解决服务网格中资源的不合理利用,传输过程中瓶颈造成的封包被动式丢弃管理等问题,通过研究在有限容量条件下多元受限任务的等待,提出了网格资源选择性配置方案以及对应的封包主动式管理GRS,通过建立数学模型,验证了算法的稳定性和可靠性,并对模型进行了仿真计算,验证了模型的可行性。在仿真实验过程中,与以往的被动式管理进行了对比分析,初步证明了方案的实际价值,论文最后对所作的工作进行总结,并指出有待进一步开展的工作。
     本文基于对服务网格中资源的安全共享和网格中资源的不合理利用等问题进行了研究,通过算法分析和仿真实验初步证明了该方案具有一定应用价值。笔者认为,随着网格技术和信息通信安全技术不断发展,这里提出的网格资源选择性配置策略和在复合条件下认证服务的资源共享方案将不断拓宽网格技术的商业化发展道路,具有一定的探索和创新精神。
Nowadays, with increasingly sophisticated Internet technology and the third generation of the Internet suggested that the idea and practice of grid computing is no longer far away.The core of grid computing is resource coordination which focus on off-site heterogeneous resources controll by the non-concentrated.Through the Common Development Agreement and interfaces, it want to provide high quality service, while the selectivity of grid resource allocation solution is to solve the current irrational utilization in grid resources.
     First of all, the article focus on the security sharing of grid resource, it proposed the conditions of resource-sharing program in the composite certification services, through the message authentication, signature programs and access control and other methods to ensure that resource sharing and resource side applicant's personal information and sharing of resource security under the service grid environment.
     Secondly, the article is to address the irrational use of Service Grid resources and the process of discarding packets passive management issues caused by transmission bottlenecks.Through researching the waiting under the conditions of a limited capacity-constrained multi-task, the article apply the selective grid resource allocation programs and the corresponding packet active management---GRS.Establishing the mathematical models,it verifies the stability and reliability of the algorithm.And it verifies the model's feasibility simulation count. In the simulation process, with the previous passive management of the comparative analysis,it proves the real value of the program.Finally, the article sums up the work and notes that it needs to be further work in progress.
     Based on resource sharing and grid security of the irrational use of resources and other issues with a analysis of algorithms and simulation in the service grid. This article preliminary prove that the program has a certain value. I believe that, with the development of technology and information communication security technology, it presented for Grid Resource selective allocation strategies and resource-sharing program of certification services in the composite conditions will continue to broaden the commercialization of grid technology development.Thus it have a certain degree of exploration and innovation.
引文
[1]FOSTER I, KESSELMAN C. The Grid:Blueprint for a Future Computing Infrastructure [M]. San Francisco:Morgan Kaufmann Publishers,2000.
    [2]孔劫,吴晓,邓正宏.基于计算期望的网格资源管理模型[J].计算机工程与设计,2008,29(4):836-838..
    [3]尚明生.网格计算中的任务调度模型研究[J].计算机工程,2006..
    [4]洪一帆,荣冈面向对象的模型管理系统[J].科技通报,2002.
    [5]Ruohomaa S, Kutvonen L. Trust management survey [J].LNCS 3477. Berlin:Springer-Verlag,2005.
    [6]Abrams M D.Trusted system concepts [J].Computers and Security,2005.
    [7]王育民,刘建伟.通信网的安全.西安:西安电子科技大学出版社.1999.
    [8]纪其进.主动队列管理算法性能评价.通信学报,2005,26(11):100-105.
    [9]唐勇,唐雪飞,王玲.基于遗传算法的排课系统[J].计算机应用.2002(10)
    [10]都志辉,陈渝,刘鹏等网格计算.北京:清华大学出版社.2002.
    [11]陈国良.并行计算机体系结构[M].北京:高等教育出版社,2004.
    [12]Floyd S,Jacobson V.Random Early Detection Gateways forCongestion Avoidance[J].IEEE ACM Transactions on Networking,1993,1(4):397-413.
    [13]袁津生,郭敏哲.计算机网络与安全实用编程.北京:高等教育出版社,2005.
    [14]Braden B B,Clark D,Crowcroft J,et al.Recommendations on Queue Management and Congestion Avoidance in the Internet[S],1994.
    [15]宋玉银,褚秀萍,蔡复之.基于时间Perti网的实时并行设计过程建模研究.计算机集成制造系统---CMIS,1999.
    [16]LiChen,HongDeng,and Qinnai Deng et al,"A Research on the Frmaework of Grid Manufacturing",GCC2003, LNCS3032, Springer-Verlag Berlin Heidelberg,2004.
    [17]R.Braden,L.Zhang,S.Berson,et al,"Resource reSerVation Protocol(RSVP)-Versionl Functional Specification".RFC2205,Internet Engineering Task Force,Nov.1997.
    [18]黄元飞.信息安全与加密解密核心技术.浦东电子出版社.2001-7.
    [19]吕志,吕毅,高展.开放网格计算环境中的先进制造仿真.计算机集成制造系统.2005年.
    [20]余海燕,查礼,李伟.一种面向服务的网格作业管理机制.计算机研究与发展.第40卷第12期.2003年.
    [21]S.Basu,et al.,"mmGrid:Distributed Resource Management Infrastructure for Multimedia Applications".Proc.2003 Intenational Parallel and Distributed processing SymPosium,IPDPS'03,APr.2003.
    [22]S.Blake,et al,."An Architecture for Differentiated Service".internet RFC 2475, Internet Engineering Task Force,2008.
    [23]P.Chandra,et al,."Darwin:Customisable Resource Management for Value-Added Network Services"IEEE Network 15(1),Jan.2005.
    [24]H.Chu and K Nahrstedt."A CPU Service Classes for Multimedia Applications.Proc. IEEE Multimedia System99,2009.
    [25]CDN 2001 White Paper,"The Ins and Outs of Content Delivery Networks".http://www.stardust.com. Dec2008.
    [26]M.Day,et al,."A Model for Content Internetworking(CDI)".Internet Draft,IETF,Feb2007.
    [27]Microsoft Corporation.Web Service Security.Microsoft Corporation,2005.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700