• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lu Xiaoyi, Lin Jian, Zha Li. Architecture and Key Technologies of LingCloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1111-1122.
Citation: Lu Xiaoyi, Lin Jian, Zha Li. Architecture and Key Technologies of LingCloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1111-1122.

Architecture and Key Technologies of LingCloud

More Information
  • Published Date: July 14, 2011
  • The research on basic model, architecture, key technologies and system implementation is the hot topic of cloud computing in academic community and IT industry. By analyzing the characteristics of two existed types of cloud computing systems, including vertical cloud system and hybrid cloud system, three important and challenging issues of building a production cloud computing system are observed, which are efficiently supporting of heterogeneous application load modes, multi-tenant resource leasing, and adopting a uniform system to consolidate massive cloud resources. Upon these problems, this paper introduces the construction and goals of LingCloud, presents an asset-leasing model based architecture of LingCloud, and analyses the key technologies of LingCloud, involving asset partition management, virtual network management, virtual appliance management, virtual cluster leasing framework, and global user management in cloud. At present, the LingCloud system has been implemented and deployed in the real-world environments. According to the evaluation, LingCloud is better than other related systems of OpenNebula and Enomaly ECP in the aspects of uniformity, flexibility, security, usability, and efficiency. The performance result shows that the logic deployment speed in LingCloud is 4.1 times of that in the OpenNebula and VIDA hybrid system in the case of 64 virtual machines deployment concurrently.
  • Related Articles

    [1]Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin. Survey of MPTCP-Based Multipath Transmission Optimization[J]. Journal of Computer Research and Development, 2016, 53(11): 2512-2529. DOI: 10.7544/issn1000-1239.2016.20150589
    [2]Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin. Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619. DOI: 10.7544/issn1000-1239.2015.20140244
    [3]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [4]Cai Hongyun, Tian Junfeng, Li Zhen, and He Lihui. Trust Model Based on Trust Area and Evaluation Credibility[J]. Journal of Computer Research and Development, 2011, 48(11): 2131-2138.
    [5]Li Zhoujun, Chen Shikun. Survey on QBF Evaluation Algorithms[J]. Journal of Computer Research and Development, 2011, 48(5): 811-822.
    [6]Luo Qing, Lin Yaping. Heuristic Traversal Path Algorithm Based on Linear Aggregation in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2010, 47(11): 1919-1927.
    [7]Luo Hao and Zeng Huaxin. Design and Implementation of a Distributed Multi-Point Concurrent Test System[J]. Journal of Computer Research and Development, 2009, 46(6): 920-926.
    [8]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [9]Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222.
    [10]Chi Lihua, Liu jie, and Hu Qingfeng. Evaluation and Test for Scalability of Numerical Parallel Computation[J]. Journal of Computer Research and Development, 2005, 42(6): 1073-1078.

Catalog

    Article views (935) PDF downloads (468) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return