首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
针对云存储环境下突出的一些新问题,如网络的广域性与动态性、商业利益的追求、一致性与可用性的权衡等,提出了一种代价驱动的自适应副本策略CDRS.该副本策略通过引 入市场机制中的代价,综合考虑负载平衡及一致性与可用性的均衡,对副本进行自适应的操作,达到最小化副本开销和最大化副本收益的目标.实验结果表明,与传统的副本策略相比,该策略在副本收益以及负载均衡方面有着更大的优势.  相似文献   

2.
本文首先介绍了目前实现服务集群负载平衡的主要策略,然后阐述了Web文档分配对集群系统性能的影响,根据这种现象设计出了一个Web文档分配算法,并构建了一个基于DNS的负载平衡解决方案,最后对该方案的性能进行了测试,得出了结论。  相似文献   

3.
在广域网存储系统中,各存储节点之间的负载平衡调度是最常见的关键问题之一。本文基于广域网智能存储系统,提出了一种多层次动态负载平衡的策略,该策略具有保证各个存储节点的动态负载平衡的同时保证用户的网络延迟时间短的特点,有效调度了整个系统各个存储节点的负载,从而提高了整个系统的利用率。  相似文献   

4.
在传统同构数据库复制技术基础上,针对现有方案大多依赖于特定DBMS,提出一种新型的异构数据库复制方法.该方法采用通用的数据库接口和数据结构,实现了与DBMS无关的特性.在数据库集群系统中,应用该方法进行节点之间的数据复制,可显著提高集群系统的可用性和可扩展性.  相似文献   

5.
刘超 《人天科学研究》2011,(12):115-117
在现今网络时代,通过网络寻找信息的需求量越来越大,在网络节点上的服务器需要有相当的负载能力,而且越来越多的情况下还需要通过几台服务器来共同完成对需要的应答任务。介绍了一种多服务器共同负载并平衡工作的技术——负载平衡。首先概要性地描述了负载平衡的原理,并按照软件应用的执行过程,从软件层次至硬件平台,自上而下的顺序将常见的负载平衡方法分为软件级负载平衡、网络级负载平衡、硬件级负载平衡,并简明扼要地说明了各种负载平衡的使用范围、实现代价、可扩展性与及总体优缺点。  相似文献   

6.
并行分布式计算机系统中的多任务调度是一个NP完全问题。大多数基于复制的启发式调度算法复制当前节点前驱节点时会产生冗余副本。在CPFD/SD算法的基础上提出一种新的消除冗余副本(ERD)的方法,算法在调度的过程中记录下每个节点所使用数据的来源和产生结果的去向,调度完成后利用记录下的信息自底向上地消除冗余的副本节点。算法分析结果表明,这种算法可以有效减少现有的基于复制的任务调度算法的副本数量和处理机的使用数量。  相似文献   

7.
Internet/Intranet中使用集群负载平衡方案的地方十分广泛,尤其是大中型网站都难脱离这种技术,直接路由(Direct forwarding)、网络地址转换(NAT)、隧道技术(Tunneling)都会因需要而被采用。它在网络中的作用和被人们重视程度都是很高的。基于LVS的服务器集群系统相关技术研究的基础上,设计并实现了一种可伸缩的服务器集群系统的负载均衡。  相似文献   

8.
对任何一项计算机应用来讲,为保证数据库的完整、稳定,数据的容余、复制、备份、恢复等技术都是系统管理员最关心的问题。HDR(Hierachical Data Replication)技术是informixserver产品自带的一个功能,中文名称为:高可用性数据复制,它可以将一个数据库完整的复制到另外一台服务器上或第二个服务器的数据库与第一个服务器中的数据库做到同步复制,以随时保留生产数据的副本。下面我就以SCOUNIX506平台上,Informix online7.3数据库为例讲解详细的操作步骤:假如我们有两台服务器,hostname分别为SCOSVR1(主机)和SCOSVR2(备机),前提必须…  相似文献   

9.
WebLogic Server是业界一个优秀可用于集成开发、部署管理大型分布式Web应用的Java应用服务器。提供了基于软件的集群技术,部署和管理,具有很好的可用性和可伸缩性。该文针对WebLogic Server实例的构架建立过程中可能遇到的问题、提出一些经验的解决方法和优化设置的手段。特别是在大型系统中WebLogic Cluster集群应如何合理设置以及在运维的过程中,面对应用服务器节点众多的情况下,如何迅速定位故障节点和进行快速处理,给出了各种实践的技术和经验。  相似文献   

10.
Linux虚拟服务器(LVS)是一个虚拟的服务器集群系统。在大功率干扰下,LVS集群的抗扰动性能不好,无法有效实现IP负载均衡和任务调度。提出一种基于功率自激的大功率干扰下LVS负载均衡集群抗扰动算法。采用自适应神经模糊系统网络动态干扰监测模型构建网络信息鲁棒性评价模型及Linux嵌入式用户信任感知网络信息信任度评价,计算MAC层两个模糊概念之间的相似度。得到大功率干扰监测数学模型,假设干扰信号表现为一种动态随机噪声信号,实现对大功率干扰下的LVS网络的扰动容错方案设计,对簇节点的接收信号强度(RSSI)信息没有合理开发应用,在簇头生成过程中形成的帧没能实现自适应均衡处理,分析节点之间发射和接收信号的耦合效应,需要实现算法上的改进。仿真结果表明,该算法有效实现IP负载均衡和任务调度,延迟了网络生命周期,提高Linux虚拟服务器的抗扰动性能。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号