Service-Oriented Virtual Machine Placement Optimization
- 格式:pdf
- 大小:1.05 MB
- 文档页数:11
云计算技术英语Title: Understanding Cloud Computing TechnologiesCloud computing has revolutionized the way businesses and individuals interact with technology. At its core, cloud computing is the delivery of computing resources and data storage over the internet. These resources are provided on-demand and can be scaled up or down as needed. Thisflexibility allows users to pay only for the services they use, rather than investing in expensive hardware and software that may not always be fully utilized.The foundation of cloud computing is built upon a myriadof technologies that work in harmony to provide seamless services. These technologies include virtualization, utility computing, service-oriented architecture, autonomic computing, and network-based computing, among others. Let's delve deeper into each of these key technologies.Virtualization is a cornerstone of cloud computing. It enables the creation of virtual machines (VMs) which are software-based emulations of physical servers. These VMs can run multiple operating systems and applications on a single physical server, maximizing resource utilization and reducing costs. Virtualization also allows for the rapid deployment and decommissioning of environments, providing agility and scalability to cloud services.Utility computing extends the concept of virtualization by treating computing resources like a metered service, similar to how utilities like electricity are billed based on consumption. This model allows cloud providers to offer flexible pricing plans that charge for the exact resources used, without requiring long-term contracts or minimum usage commitments.Service-Oriented Architecture (SOA) is a design pattern that structures an application as a set of interoperableservices. Each service performs a unique task and can be accessed independently through well-defined interfaces and protocols. In the cloud, SOA enables the creation of modular, scalable, and reusable services that can be quickly assembled into complex applications.Autonomic computing is a self-managing system that can automatically optimize its performance without human intervention. It uses advanced algorithms and feedback mechanisms to monitor and adjust resources in real-time. This technology is essential in the cloud where the demand for resources can fluctuate rapidly, and immediate responses are necessary to maintain optimal performance.Network-based computing focuses on the connectivity between devices and the efficiency of data transmission. Cloud providers invest heavily in high-speed networks to ensure low latency and high bandwidth for their services. The reliability and security of these networks are paramount toensure uninterrupted access to cloud resources and to protect sensitive data from breaches.In addition to these foundational technologies, cloud computing also relies on advanced security measures, such as encryption and multi-factor authentication, to safeguard data and applications. Disaster recovery strategies, includingdata backups and replication across multiple geographic locations, are also critical to ensure business continuity in the event of a failure or disaster.Cloud computing models are typically categorized intothree types: Infrastructure as a Service (IaaS), Platform asa Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized infrastructure resources such as servers, storage, and networking. PaaS offers a platform fordevelopers to build, test, and deploy applications, while abstracting the underlying infrastructure layers. SaaSdelivers complete software applications to end-users via theinternet, eliminating the need for local installations and maintenance.Choosing the right cloud service provider is crucial for businesses looking to leverage cloud computing. Providerslike Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) offer a range of services tailored to different needs and budgets. These platforms are designed to be highly scalable, reliable, and secure, with features such as automated scaling, load balancing, and comprehensive monitoring tools.Furthermore, cloud providers often offer specialized services for specific industries or use cases. For example, AWS offers Amazon S3 for object storage, Amazon EC2 for virtual servers, and Amazon RDS for managed databases. Microsoft Azure provides Azure Active Directory for identity management and Azure Machine Learning for building predictivemodels. GCP offers BigQuery for big data analytics and App Engine for scalable web application hosting.As cloud computing continues to evolve, new trends and innovations emerge. Edge computing, for instance, aims to bring computation closer to data sources by processing data at the edge of the network, reducing latency and bandwidth usage. Serverless computing, another rising trend, allows developers to focus solely on writing code without worrying about the underlying infrastructure, as the cloud provider dynamically manages the execution environment.In conclusion, cloud computing technologies have enabled a paradigm shift in how we approach IT resource management and consumption. By understanding the various technologies and models at play, businesses can make informed decisions about adopting cloud solutions that align with their strategic goals. As the landscape of cloud computing continues to mature, it will undoubtedly present newopportunities and challenges that must be navigated with a keen eye on technological advancements and market dynamics.。
⼤⼯17秋《专业英语(计算机英语)》在线测试123满分⼤⼯17秋《专业英语(计算机英语)》在线测试1需要QQ2959415429 微信 open4511⼀、单选题 (共 20 道试题,共 80 分)1.(), difference between the lowest and highest frequencies transmitted in a particular channel or system.A.AmplitudeB.BandwidthC.Bridgework2.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer3.( ) programs are used to recover deleted or damaged(corrupted) files.A.Data recoveryB.System callC.System crashD.System software4.( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.( ) refers to the physical equipment that can perform the basic functions contained within the data processing cycle.A.SoftwareB.HardwareC.MemoryD.CPU6.Which one is a word processing and text editing tool?A.PhotoshopB.WordC.Extreme 3DD.Premiere7.( ) are the peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.A.RAMB.ROMC.Input devicesD.Memory8.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors9.() performs arithmetic, comparison, and logic operations. It is one part of the CPU.A.RAMB.ROMC.CPUD.ALU10.( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures11.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit12.A ( ) can be written to once. After that they can be read many times without deterioration but cannot be written on or erased.A.CD-RB.CD-ROMC.CD-RWD.DVD13.( ) provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.A.TCPB.ARPC.UDPD.IP14.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design15.Linux is an operating system similar to ( ) that is becoming more and more popular.A.Windows 98B.Windows 2000C.Windows XPD.Unix16.( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.A.MIDIB.WAVC.RAD.Audio17.In a ( ) network, all microcomputers and other communication devices are connected to a continuous loop.A.busB.starC.treeD.ring18.() have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD19.In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at( )invented the transistor computer.A.BaiduB.MicrosoftC.AT&T's Bell LabsD.Yahoo20.( ), to send files from a user's microcomputer to another computer. Compare with download.A.UploadB.TelecommutingC.HypertextD.Online service⼆、判断题 (共 10 道试题,共 20 分)1.Mouse belongs to output.()A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确N, communications network that covers a wide geographical area, such as a state or a country.( )A.错误B.正确4.WWW stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.A.错误B.正确5.The transistor computer did not last as long as the vacuum tube computer lasted, but it was less important in the advancement of computer technology.A.错误B.正确6.Object Oriented Programming(OOP) is a programming method that combines data and the instructions for processing that data into a self-sufficient "object" that can be used in other programs.()A.错误B.正确7.Windows versions before Windows 95 rely on DOS as the operating system.()A.错误B.正确 is an E-mail address.A.错误B.正确9.An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.错误B.正确10.View shortcut menus by right-clicking with the mouse.()A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试2⼀、单选题 (共 20 道试题,共 80 分)1.The two components of the CPU are connected by a kind of electronic roadway called a(an) ().BB.busC.portD.keyboard2.The operation system ( ).A.manages the disks and filesB.manages the computer's resourcesC.manages the computer's memoryD.All of the above3.() ,also known as service programs, perform specific tasks related to managing computer resources.A.Utilities programsB.System softwareC.Operating systemD.none of the above4.():In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.A () port is an interface that connects devices by transferring more than one bit at a time.A.serialB.parallelBD.none of the above6.( ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.A.FirewallB.ModemC.HypertextD.TCP7.The common input devices are the ()and the keyboard.A.printerB.speakerC.monitorD.mouse8.A ( ) channel allows simultaneous message exchange in both directions.It really consists of two simplex channels, a forward channel and a reverse channel,linking the same points.A.half-duplexB.full-duplexC.simplexD.none of the above9.(), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.A.Lossy compressionB.Lossless compressionC.BitmapD.Vector image10.( ) have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD11.The ( ) is automatically loaded into RAM soon after you turn on, or "boot" the computer.A.application softwareB.operating softwareC.shellpiler12.The ( ) is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.A.InternetB.WWWC.ARPANETD.ISP13.A()is a cable which is capable of carrying signals representing data from one place to another.A.busB.byteC.bitD.disk14.A backup program ( ).A.makes a copy of files you selectB.returns you to the previous programC.undoes the last change you madeD.None of the above15.A ( ) is an electronic device that operates under the control of instructions stored in its own memory, which can according to specified rules, produce results,and store the results for future use.puterB.CPUC.input deviceD.output device16.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of( ).A.microprocessorB.transistorC.chipD.circuit17.We abbreviate Virtual Private Networks to ( ).A.NICB.VPNC.HUBD.MODEM18.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory19.( ), interface that enables dissimilar networks to communicate with one another.A.GatewayB.BridgeC.BandwidthD.none of the above20.ERP is ( ).A.Enterprise resource planning softwareB.Enterprise Application IntegrationC.Electronic Application IntegrationD.None of the above.⼆、判断题 (共 10 道试题,共 20 分)1.Output devices are peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.( )A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确3.An ISP is a company that provides access to the Internet.A.错误B.正确4.Memory also called main memory, primary storage, RAM, is an internal storage area in the computer, where data and programs designed for immediate processing are held.A.错误B.正确5.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确6.A compilier is software that looks at an entire high-level program before translating it into machine language.A.错误B.正确7.A location in RAM memory is accessed by its address.()A.错误B.正确8.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确9.Software also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.A.错误B.正确10.Java is a compiled object-oriented programming language used to write applets.A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试3-0012⼀、单选题 (共 20 道试题,共 80 分)1.An ( ) is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.Electronic CommerceB.Credit cardC.Online paymentD.none of the above2.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory3.( ), the process of changing plaintext data into enciphered text through an algorithm.B.EncryptionC.AuthenticateD.Hacker4.( ), also called communications network; a system of interconnected computers, telephones, or other communications devices.A.ProtocolB.NodeC.Packetwork5.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit6.A (),also called a silicon chip or semiconductor,is a small piece of silicon that contains thousands of microminiature electronic circuit components, mainly transistors.A.busB.chipC.portD.keyboard7.() is the electronic device that interprets and carries out the basic instructions that operate the computer.A.ProcessorB.hardwareC.memoryD.CPU8.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer9.The process of translating instructions into commands is called ( ).A.decodingB.registerC.digitalD.port10.A ()is a communication device that enables computers to communicate via telephone lines or cable.A.modemB.hardwareC.software11.( ) is a way of transferring files over the Internet from one computer to another.A.InternetB.FTPC.E-mailD.ISP12.()(Reduced Instruction Set Computer) refers to processors that support fewer instructions than CISC chips. The reduced number of instructions enables them to execute instructions faster.A.CISCB.RISCC.RAMD.ROM13.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors14.() (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.A.JPEGB.MPEGC.MIDID.none of the above15.() controls how you enter data or instructions and how information is displayed on the computer screen.er interfacenguage translatorsC.Utilities programsD.System software16.The standard protocol used for sending Internet e-mail is called ( ). It works in conjunction with POP servers.A.SMTPB.WWWC.TCPD.UDP17.The common input devices are the ( ) and the ( ).A.keyboard,printerB.keyboard,microphoneC.mouse,monitorD.mouse,keyboard18.() will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.A.AnimationB.WAVC.MultimediaD.none of the above19.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design20.A ( ) converts the programmer's procedural language program, called the source code, into a machine language code, called the object code.pilerB.AssemblerC.InterpreterD.Code generator⼆、判断题 (共 10 道试题,共 20 分)1.A bus is a cable which is capable of carrying signals representing data from one place to another.( )A.错误B.正确2.Application software consists of programs that perform specific tasks for users.( )A.错误B.正确3.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确4.The ENIAC used thousands of vacuum tubes,which took up a lot of space and gave off a great deal of heat just like light bulbs do.A.错误B.正确5.Asymmetric key(Public Key),in encryption, one key is used to both lock and unlock data.( )A.错误B.正确6.CPU is the soul of a computer.A.错误B.正确7.View shortcut menus by right-clicking with the mouse.()A.错误B.正确8.ERP is Enterprise resource planning software.A.错误B.正确9.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确10.A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A.错误B.正确。
J2EE常见术语及缩写RMIRmote Method Invocation(远程方法调用)用于Java平台中的远程方法调用。
它具有分布式垃圾收集、可自动下载类文件等功能。
位于java.rmi包中。
注意:RMI只能在Java平台中使用。
通过RMI传输的参数必须可以序列化CORBACommon Object Request Broker Architecture(公共对象请求代理体系结构)用于实现独立于平台及编程语言的分布式应用ORBObject Request Broker(对象请求代理)负责具体的网络通信,是构建分布式应用的基础。
STUB与SKELETON存根与骨架无论是RMI还是ORB,其实现本质都是采用了代理模式。
其中存根为客户端使用的代理,拥有通过网络访问远程对象的能力;骨架为远程对象的代理,用来接受存根的调用,并返回结果。
附:在CORBA和JAVA 5中也支持动态调用,即存根不是必须存在的。
RMI-IIOPRemote Method Invocation over the Internet-ORB Protocol(基于互联网的对象请求代理协议实现的远程方法调用)J2EE和EJB事实上的网络通信标准,基于RMI,同时又兼容CORBA,使得EJB组件可以被Java 之外的客户端调用。
位于javax.rmi包中。
话题1:为何J2EE要兼容CORBACORBA是OMG(对象管理组织)推出的成功的分布式对象通信标准,为了占领企业级市场,EJB必须考虑和遗留系统的集成,以及为异构系统提供服务,这都需要采用更加通用的CORBA,而不是只能在Java平台下使用的RMI。
话题2:引入CORBA之后面临的问题1,分布式垃圾收集:并非所有支持CORBA的语言都有垃圾收集机制。
2,窄化(Narrowing):当通过RMI或RMI-IIOP获取一远程对象时,实际上获取的是其存根(Stub)。
在RMI中,会自动下载此存根;而CORBA没有这个机制,必须用额外的方法解决(其实是通过javax.rmi.PortableRemoteObject的narrow方法解决的)。
1G 2G 2.5G 3G 3.5G 4G802.11a 802.11b 802.11gAcceptable use policy (AUP)可接受使用政策Access control访问控制Active tokens主动证书Ad management广告管理Ad views广告观点Address Verification System (AVS)地址核实系统Admediaries广告中介Advance planning and scheduling (APS) systems高级计划和排程系统Advergaming广告游戏Advertising networks广告网络Advertorial社论式广告Affiliate marketing关联营销Affiliate marketing加盟营销Application firewall防火墙Application-level proxy应用级代理Associate ad display (text links)关联显示Auction拍卖Auditing审计authentication认证Authorization授权Automated clearing house (ACH) networkAutomatic crash notification (ACN)自动撞击通知Availability有效性Avatars虚拟人B2B portals B2B门户网站Back end后端Banking Trojan银行特洛伊木马Banner exchanges横幅广告交易Banner swapping横幅交换Banner横幅Bartering exchange实物交易市场Bartering exchange实物交易所Bartering实物交换Bastion gateway堡垒网关Biometric system生物特征识别Biometric生物特征Blackberry黑莓Bluetooth蓝牙Botnet傀儡网络Brick-and-mortar (old-economy) organizations 砖瓦加水泥(旧经济)企业Brick-and-mortar retailers砖瓦加水泥零售商Build-to-order (pull system)按单生产Bullwhip effect牛鞭效应Business impact analysis (BIA)业务影响分析Business model商业模式business network商业网络Business-to-business (B2B)企业-企业Business-to-business e-commerce (B2B EC)企业-企业电子商务Business-to-business-to-consumer (B2B2C)企业-企业-消费者Business-to-consumer (B2C)企业-消费者Business-to-employees (B2E)企业-员工Buy-side e-marketplace买方电子交易市场Buy-side e-marketplace买方电子市场Card verification number (CVN)Certificate authorities (CAs)认证中心Channel conflict渠道冲突Chatterbots聊天机器人CIA security triad (CIA triad)Ciphertext密文Click (click-through or ad click)Click-and-mortar retailers鼠标加水泥零售商Click-an-mortar (click-and-brick) organizations鼠标加水泥企业Clickstream behavior点击流行为Clickstream data点击流数据Click-through rateClick-through-ratioCollaboration hub协作中心Collaborative commerce (c-commerce)Collaborative commerce (c-commerce)协作商务Collaborative filtering协同过滤Collaborative planning协作计划Collaborative planning, forecasting, and replenishment (CPFR)协作计划、预测和补充Collaborative portals协作门户Common (security) vulnerabilities and exposures (CVEs)通用漏洞暴露Compact hypertext markup language (c HTML)Company-centric EC以企业为中心的电子商务Competitive forces model竞争力模式Computing Technology Industry Association (Comp TIA)Confidentiality机密性Consortium trading exchange (CTE)Consumer-to-business (C2B)消费者-企业Consumer-to-consumer (C2C)消费者-消费者Contact cardContactless (proximity) cardContextual computing情境计算Conversion rateCookieCorporate (enterprise) portal企业门户Corporate portal企业门户CPM (cost per thousand impressions)CrimewareCSI/FBI Computer Crime and Security ReportCustomer-to-customer (C2C)消费者-消费者Customization 客制化服务Cybermediation (electronic intermediation )电子中介Data conferencing数据会议Data Encryption Standard (DES) DES加密算法Demilitarized zone (DMZ) 非军事化区Denial of service (DOS) attack拒绝服务攻击Desktop purchasing桌面采购Desktop search桌面搜索Detection measuresDifferentiation差异化Digital economy数字经济Digital enterprise数字企业Digital envelope数字信封Digital products电子产品Digital signature (digital certificate)数字签名(数字认证)Direct marketing直销Direct materials直接物料Disintermediation无中介化Disintermediation无中介化disruptors变革者Distance learning远程学习Domain name system (DNS)域名系统Double auction双向拍卖Dynamic pricing动态定价Dynamic trading动态交易e-bartering (electronic bartering)电子实物交换E-book电子书E-business电子业务EC security program电子商务安全程序EC security strategy电子商务安全策略e-check电子支票E-co-ops采购群体e-distributor电子分销商Edutainment教育与娱乐为一体E-government电子政务e-grocer电子杂货店ElasticityE-learning电子学习E-learning在线学习electronic (online) banking (e-banking)电子银行electronic auction (e-auction)电子拍卖electronic bill presentment and payment (EBPP) electronic catalog电子目录Electronic commerce (EC)电子商务electronic data interchange (EDI)电子数据交换Electronic market (e-marketplace)电子市场Electronic Product Code (EPC)电子产品代码electronic retailing (e-tailing)电子零售商electronic shopping cart电子购物车Electronic voting电子选举e-loyalty电子忠诚度e-marketplace电子市场e-micropayment网上小额支付Encryption algorithm加密算法Encryption加密enterprise invoice presentment and payment (EIPP)e-procurement电子采购e-sourcing电子资源e-supply chain电子供应链e-supply chain management (e-SCM)电子供应链管理e-tailers电子零售商E-tailing网络零售Exchange (electronic)交易所exchanges (trading exchanges or trading communities)贸易交易市场Exchange-to-exchange (E2E) 交易所对交易所Expert location systems专家定位系统Exposure暴露Extranet 外联网E-zines电子杂志Firewall防火墙forward auction正向拍卖Fraud欺骗front end前端Government-to-business (G2B)Government-to-citizens (G2C)政府和民众间的电子政务Government-to-employees (G2E)政府和雇员间的电子政务Government-to-government (G2G)政府间的电子政务Grid computing网格计算Group decision support system (GDSS)群决策支持系统group purchasingGroup purchasing群体采购Groupware群件Hashhit点击Honeynet蜜网Honeypots 蜜罐Horizontal exchange横向交易所Horizontal marketplace横向市场Hotfixhotspot接入点Human firewallIndirect materials间接物料infomediaries信息中介Information assurance (IA)信息保障Information intelligenceInformation portalsinformation portal信息门户Integrity完整性interactive marketing交互销售intermediary中介Internal procurement marketplace内部采购市场Internet ecosystem互联网生态系统Internet radio互联网广播Internet-based (web) EDI基于互联网的EDI Interorganizational information systems (IOSs) 企业间信息系统Interstitial插播式广告Intrabusiness EC企业内部电子商务Intranet内联网Intrusion detection system (IDS) 入侵检测系统Key space密钥空间Keyword banners关键字横幅Knowledge management (KM)知识管理Knowledge portal知识门户letter of credit (LC)Localization地区化Location-based commerce (LBC)定区电子商务Location-based commerce (l-commerce)定位商务Macro virus (macro worm)宏病毒Malware恶意软件Market liquidityMarket makerMarket segmentations市场细分Marketspace市场空间mashups混搭Maverick buyingM-business移动业务Merchant brokering商业经纪人Message digest报文摘要Mobile commerce (m-commerce)移动商务Mobile computing移动计算Mobile portal移动门户MRO (maintenance, repair, and operation)multichannel business model多渠道商业模式Name-your-own-price model开价模式Netizen网民Nonrepudiation不可否认性Nontechnical attack非技术性入侵on-demand delivery service按需送货服务One-to-one marketing一对一营销Online intermediary电子中介Online publishing网络出版Organizational knowledge base组织知识库Packet filter包过滤Packet-filtering router包过滤路由器Packet包Partner relationship management (PRM)Passive token被动证书Patch补丁payment card支付卡payment service provider (PSP)支付服务提供商Peer-to-peer (P2P) 端到端应用Permission advertising (permission marketing)许可广告Personal firewall个人防火墙Personalization个性化Personalization个性化person-to-person lending个人对个人贷款Phishing网络欺诈Plaintext明文Podcast播客PodcasterPolicy of least privilege (POLP)Pop-under ads弹底广告Pop-up ads弹出广告PretextingPrevention measurePrivate e-marketplaces私有电子市场Private key私钥Private marketplaces私有市场Procurement采购Procurement management采购管理Product brokering产品经纪人Product lifecycle management (PLM)产品生命周期管理Protocol tunneling协议隧道Proxies代理Public (asymmetric) key encryption 公钥加密Public e-marketplaces公共电子市场Public key infrastructure (PKI) 公钥基础设施purchasing card (p-card)采购卡Radio frequency identification (RFID)射频识别技术Random banners随机横幅Reintermediation再中介化Reintermediation再中介化Request for quote (RFQ)报价申请Revenue model收益模式Reverse auction (bidding or tendering system)逆向拍卖Rijndael劫持Rootkit隐匿技术RSARuBeeScreen sharing software屏幕共享软件Search engine搜索引擎search engine搜索引擎Secure Socket Layer (SSL) 安全套接层Sell-side e-marketplace买方电子市场Sell-side e-marketplace卖方电子市场semantic web语义网Service pack服务包Service-oriented architecture服务导向型架构settlement交易结算shopping portals购物门户网站shopping robots (shopbots or shopping agents)购物机器人smart card智能卡smart card operating system智能卡操作系统smart card reader智能卡读卡器SMEs中小型企业social bookmarking社交书签Social computing社会计算Social engineering社会型攻击social marketplace社会市场social media社会媒体social network analysis (SNA)社交网络分析Social networks社交网络social network社交网络Software (intelligent ) agent软件(智能)代理Spamming垃圾邮件兜售Spot buying实时采购Spy-phishingSpywareGuide 间谍软件Spyware间谍软件Standard of due care应有关注标准Stickiness粘性stored-value card储值卡Storefront网上店铺Strategic (systematic) sourcing战略式采购Supplier relationship management (SRM)Supply chain 供应链Supply chain management (SCM)供应链管理Symmetric (private) key system对称密钥(私钥)系统Technical attacks技术型攻击Teleconferencing电信会议Tendering (bidding) system投标系统Time-to-exploitation入侵时间Transaction log事务日志Transport Layer Security (TLS)传输层安全Trojan horse特洛伊木马Tronjan-Phisher-ReberyTrust信任度Unique visitUniversal man-in-the-middle phishing kitUser profile用户资料Value proposition价值主张Value-added networks (VANs)增值网络Vendor-management inventory (VMI)供应商管理库存Vertical exchange纵向交易所Vertical marketplaces垂直市场Video teleconference视频电信会议Viral marketing病毒营销Viral marketing病毒营销virtual (Internet ) community虚拟社区virtual (pure-play) e-tailers虚拟电子零售商Virtual (pure-play) organizations虚拟企业virtual credit card虚拟信用卡Virtual meetings虚拟会议Virtual private network (VPN) 虚拟专用网Virtual university虚拟大学Voice portal语音门户Voice-over-IP (VoIP)Vortals纵向门户Web 2.0Web bugs网络爬虫Web mining网页挖掘Web Services网络服务Webcasting网络广播Webcasting网络广播Webinars在线研讨会Weblogging (blogging)微博客WikiLog (wikilog or wiki)维基博客Workflow工作流Workflow management工作流管理Workflow systems工作流系统XBRL (eXtensible Business Reporting Language)可扩展商业报告语言XML (eXtensible Markup Language)可扩展标记语言Zero-day incident零日事故Zombie僵尸。
毕业设计说明书英文文献及中文翻译学生姓名:学号:计算机与控制工程学院:专指导教师:2017 年 6 月英文文献Cloud Computing1。
Cloud Computing at a Higher LevelIn many ways,cloud computing is simply a metaphor for the Internet, the increasing movement of compute and data resources onto the Web. But there's a difference: cloud computing represents a new tipping point for the value of network computing. It delivers higher efficiency, massive scalability, and faster,easier software development. It's about new programming models,new IT infrastructure, and the enabling of new business models。
For those developers and enterprises who want to embrace cloud computing, Sun is developing critical technologies to deliver enterprise scale and systemic qualities to this new paradigm:(1) Interoperability —while most current clouds offer closed platforms and vendor lock—in, developers clamor for interoperability。
CCF推荐国际学术期刊中国计算机学会推荐国际学术期刊 (计算机系统与⾼性能计算)⼀、A类序号刊物简称刊物全称出版社⽹址1TOCS ACM Transactions on Computer Systems ACM2TOC IEEE Transactions on Computers IEEE3TPDS IEEE Transactions on Parallel and DistributedSystemsIEEE⼆、B类序号刊物简称刊物全称出版社⽹址1TACO ACM Transactions on Architecture and Code OptimizationACM2TAAS ACM Transactions on Autonomous andAdaptive SystemsACM3TODAES ACM Transactions on Design Automation ofElectronic SystemsACM4TECS ACM Transactions on Embedded ComputingSystemsnACM5TRETS ACM Transactions on ReconfigurableTechnology and SystemsACM6TOS ACM Transactions on Storage ACM7TCAD IEEE Transactions on COMPUTER-AIDEDDESIGN of Integrated Circuits and SystemsIEEE8TVLSI IEEE Transactions on VLSI Systems IEEE 9JPDC Journal of Parallel and Distributed Computing Elsevier 10 PARCO Parallel Computing Elsevier11Performance Evaluation: An InternationalJournalElsevier三、C类序号刊物简称刊物全称出版社⽹址1Concurrency and Computation: Practice andExperienceWiley2DC Distributed Computing Springer 3FGCS Future Generation Computer Systems Elsevier 4Integration Integration, the VLSI Journal Elsevier5 JSA The Journal of Systems Architecture: EmbeddedSoftware DesignElsevier6Microprocessors and Microsystems: EmbeddedHardware DesignElsevier7JGC The Journal of Grid computing Springer 8TJSC The Journal of Supercomputing Springer9JETC The ACM Journal on Emerging Technologies inComputing SystemsACM10JET Journal of Electronic Testing-Theory andApplicationsSpringer中国计算机学会推荐国际学术刊物(计算机⽹络)⼀、A类序号刊物简称刊物全称出版社⽹址1TON IEEE/ACM Transactions on Networking IEEE, ACM2JSAC IEEE Journal of Selected Areas inCommunicationsIEEE3TMC IEEE Transactions on Mobile Computing IEEE⼆、B类序号刊物简称刊物全称出版社⽹址1TOIT ACM Transactions on Internet Technology ACM2TOMCCAP ACM Transactions on Multimedia Computing, Communications and ApplicationsACM3TOSN ACM Transactions on Sensor Networks ACM4CN Computer Networks Elsevier5TOC IEEE Transactions on Communications IEEE6TWC IEEE Transactions on Wireless Communications IEEE三、C类序号刊物简称刊物全称出版社⽹址1Ad hoc Networks Elsevier2CC Computer Communications Elsevier3TNSM IEEE Transactions on Network and ServiceManagementIEEE4IET Communications IET 5JNCA Journal of Network and Computer Applications Elsevier 6MONET Mobile Networks & Applications Springer 7Networks Wiley 8PPNA Peer-to-Peer Networking and Applications Springer9WCMC Wireless Communications & Mobile Computing Wiley.10Wireless Networks Springer中国计算机学会推荐国际学术刊物 (⽹络与信息安全)⼀、A类序号刊物简称刊物全称出版社⽹址1TDSC IEEE Transactions on Dependable and SecureComputingIEEE2TIFS IEEE Transactions on Information Forensicsand SecurityIEEE3 Journal of Cryptology Springer⼆、B类序号刊物简称刊物全称出版社⽹址1TISSEC ACM Transactions on Information and SystemSecurityACM2 Computers & Security Elsevier3 Designs, Codes and Cryptography Springer4JCS Journal of Computer Security IOS Press三、C类序号刊物简称刊物全称出版社⽹址1CLSR Computer Law and Security Reports Elsevier2 EURASIP Journal on Information Security Springer3 IET Information Security IET4IMCS Information Management & Computer Security Emerald5ISTR Information Security Technical Report Elsevier6IJISP International Journal of InformationSecurity and PrivacyIdea GroupInc7IJICS International Journal of Information andComputer SecurityInderscience8SCN Security and Communication Networks Wiley中国计算机学会推荐国际学术刊物 (软件⼯程、系统软件与程序设计语⾔)⼀、A类序号刊物简称刊物全称出版社⽹址1TOPLAS ACM Transactions on ProgrammingLanguages & SystemsACM2TOSEM ACM Transactions on Software Engineering MethodologyACM3TSE IEEE Transactions on Software Engineering IEEE⼆、B类序号刊物简称刊物全称出版社⽹址1ASE Automated Software Engineering Springer2Empirical Software Engineering Springer3 TSC IEEE Transactions on Service Computing IEEE4 IETS IET Software IET5 IST Information and Software Technology Elsevier6JFP Journal of Functional Programming Cambridge University Press7Journal of Software: Evolution and Process Wiley8JSS Journal of Systems and Software Elsevier9RE Requirements Engineering Springer10SCP Science of Computer Programming Elsevier11SoSyM Software and System Modeling Springer12SPE Software: Practice and Experience Wiley13STVR Software Testing, Verification and Reliability Wiley三、C类序号刊物简称刊物全称出版社⽹址1Computer Languages, Systems and Structures Elsevier2IJSEKE International Journal on Software Engineering andKnowledge EngineeringWorld Scientific3STTT International Journal on Software Tools forTechnology TransferSpringer4Journal of Logic and Algebraic Programming Elsevier5JWE Journal of Web Engineering Rinton Press6Service Oriented Computing and Applications Springer 7 SQJ Software Quality Journal Springer8TPLP Theory and Practice of Logic Programming Cambridge University Press中国计算机学会推荐国际学术刊物 (数据库、数据挖掘与内容检索)⼀、A类序号刊物简称刊物全称出版社⽹址1TODS ACM Transactions on Database Systems ACM2TOIS ACM Transactions on Information andSystemsACM3TKDE IEEE Transactions on Knowledge and DataEngineeringIEEE ComputerSociety4VLDBJ VLDB Journal Springer-Verlag⼆、B类序号刊物简称刊物全称出版社⽹址1TKDD ACM Transactions on Knowledge Discoveryfrom DataACM2AEI Advanced Engineering Informatics Elsevier3DKE Data and Knowledge Engineering Elsevier4DMKD Data Mining and Knowledge Discovery Springer5EJIS European Journal of Information Systems The OR Society 6GeoInformatica Springer7IPM Information Processing and Management Elsevier8Information Sciences Elsevier9IS Information Systems Elsevier10JASIST Journal of the American Society for InformationScience and Technology American Society for Information Science andTechnology11JWS Journal of Web Semantics Elsevier12KIS Knowledge and Information Systems Springer13 TWEB ACM Transactions on the Web ACM三、C类序号刊物简称刊物全称出版社⽹址1DPD Distributed and Parallel Databases Springer2I&M Information and Management Elsevier3IPL Information Processing Letters Elsevier4Information Retrieval Springer5IJCIS International Journal of Cooperative InformationSystemsWorld Scientific6IJGIS International Journal of GeographicalInformation ScienceTaylor & Francis7IJIS International Journal of Intelligent Systems Wiley 8IJKM International Journal of Knowledge Management IGI9IJSWIS International Journal on Semantic Web andInformation SystemsIGI10JCIS Journal of Computer Information Systems IACIS 11JDM Journal of Database Management IGI-Global12JGITM Journal of Global Information TechnologyManagementIvy LeaguePublishing13JIIS Journal of Intelligent Information Systems Springer14JSIS Journal of Strategic Information Systems Elsevier中国计算机学会推荐国际学术刊物 (计算机科学理论)⼀、A类序号刊物简称刊物全称出版社⽹址1IANDC Information and Computation Elsevier2SICOMP SIAM Journal on Computing SIAM⼆、B类序号刊物简称刊物全称出版社⽹址1TALG ACM Transactions on Algorithms ACM2TOCL ACM Transactions on ComputationalLogicACM3TOMS ACM Transactions on MathematicalSoftwareACM4Algorithmica Springer 5Computational complexity Springer 6FAC Formal Aspects of Computing Springer 7Formal Methods in System Design Springer 8INFORMS Journal on Computing INFORMS9JCSS Journal of Computer and SystemSciencesElsevier10JGO Journal of Global Optimization Springer 11Journal of Symbolic Computation Elsevier12MSCS Mathematical Structures in ComputerScienceCambridgeUniversityPress13TCS Theoretical Computer Science Elsevier三、C类序号刊物简称刊物全称出版社⽹址1Annals of Pure and Applied Logic Elsevier2Acta Informatica Springer3Discrete Applied Mathematics Elsevier4Fundamenta Informaticae IOS Press5Higher-Order and SymbolicComputationSpringer6Information Processing Letters Elsevier 7JCOMPLEXITY Journal of Complexity Elsevier8LOGCOM Journal of Logic and ComputationOxford University Press9Journal of Symbolic Logic Association for Symbolic Logic10LMCS Logical Methods in Computer Science LMCS11SIDMA SIAM Journal on Discrete Mathematics SIAM12Theory of Computing Systems Springer中国计算机学会推荐国际学术期刊(计算机图形学与多媒体)⼀、A类序号刊物简称刊物全称出版社⽹址1TOG ACM Transactions on Graphics ACM2TIP IEEE Transactions on Image Processing IEEE3TVCG IEEE Transactions on Visualization andComputer GraphicsIEEE⼆、B类序号刊物简称刊物全称出版社⽹址1TOMCCAP ACM Transactions on MultimediaComputing, Communications andApplicationACM2CAD Computer-Aided Design Elsevier 3CAGD Computer Aided Geometric Design Elsevier 4CGF Computer Graphics Forum Wiley 5GM Graphical Models Elsevier6 TCSVT IEEE Transactions on Circuits andSystems for Video TechnologyIEEE7TMM IEEE Transactions on Multimedia IEEE8JASA Journal of The Acoustical Society ofAmericaAIP9SIIMS SIAM Journal on Imaging Sciences SIAM10SpeechComSpeech Communication Elsevier三、C类序号刊物简称刊物全称出版社⽹址1CAVW Computer Animation and Virtual Worlds Wiley2C&G Computers & Graphics-UK Elsevier3CGTA Computational Geometry: Theory andApplicationsElsevier4DCG Discrete & Computational Geometry Springer 5IET Image Processing IET 6IEEE Signal Processing Letter IEEE7JVCIR Journal of Visual Communication and Image RepresentationElsevier8MS Multimedia Systems Springer9MTA Multimedia Tools and Applications Springer10Signal Processing Elsevier11Signal procesing:image communication Elsevier12TVC The Visual Computer Springer中国计算机学会推荐国际学术刊物(⼈⼯智能与模式识别)⼀、A类序号刊物简称刊物全称出版社⽹址1AI Artificial Intelligence Elsevier2TPAMI IEEE Trans on Pattern Analysis and Machine IntelligenceIEEE3IJCV International Journal of Computer Vision Springer4JMLR Journal of Machine Learning Research MIT Press⼆、B类序号刊物简称刊物全称出版社⽹址1TAP ACM Transactions on Applied Perception ACM2TSLP ACM Transactions on Speech andLanguage ProcessingACM3Computational Linguistics MIT Press 4CVIU Computer Vision and Image Understanding Elsevier5DKE Data and Knowledge Engineering Elsevier6Evolutionary Computation MIT Press7TAC IEEE Transactions on Affective Computing IEEE8TASLP IEEE Transactions on Audio, Speech, andLanguage ProcessingIEEE9IEEE Transactions on Cybernetics IEEE10TEC IEEE Transactions on EvolutionaryComputation IEEE11TFS IEEE Transactions on Fuzzy Systems IEEE12TNNLS IEEE Transactions on Neural Networks andlearning systemsIEEE13IJAR International Journal of ApproximateReasoningElsevier14JAIR Journal of AI Research AAAI 15Journal of Automated Reasoning Springer16JSLHR Journal of Speech, Language, and HearingResearchAmericanSpeech-LanguageHearingAssociation17Machine Learning Springer18Neural Computation MIT Press19Neural Networks Elsevier20Pattern Recognition Elsevier三、C类序号刊物简称刊物全称出版社⽹址1TALIP ACM Transactions on Asian LanguageInformation ProcessingACM3Applied Intelligence Springer 4AIM Artificial Intelligence in Medicine Elsevier 5Artificial Life MIT Press6AAMAS Autonomous Agents and Multi-AgentSystemsSpringer7Computational Intelligence Wiley8Computer Speech and Language Elsevier9Connection Science Taylor & Francis10DSS Decision Support Systems Elsevier 11EAAI Engineering Applications of Artificial Intelligence Elsevier 12Expert Systems Blackwell/Wiley 13ESWA Expert Systems with Applications Elsevier 14Fuzzy Sets and Systems Elsevier15T-CIAIG IEEE Transactions on ComputationalIntelligence and AI in GamesIEEE16IET Computer Vision IET 17IET Signal Processing IET 18IVC Image and Vision Computing Elsevier 19IDA Intelligent Data Analysis Elsevier20IJCIA International Journal of ComputationalIntelligence and ApplicationsWorld Scientific21IJDAR International Journal on Document Analysisand RecognitionSpringer22IJIS International Journal of Intelligent Systems Wiley23IJNS International Journal of Neural Systems World Scientific24IJPRAI International Journal of Pattern Recognitionand Artificial IntelligenceWorld Scientific25International Journal of Uncertainty,Fuzziness and KBSWorld Scientific26JETAI Journal of Experimental and TheoreticalArtificial IntelligenceTaylor & Francis27KBS Knowledge-Based Systems Elsevier 28Machine Translation Springer 29Machine Vision and Applications Springer 30Natural Computing Springer31NLE Natural Language Engineering Cambridge University32NCA Neural Computing & Applications Springer 33NPL Neural Processing Letters Springer 34Neurocomputing Elsevier 35PAA Pattern Analysis and Applications Springer 36PRL Pattern Recognition Letters Elsevier 37Soft Computing Springer38WIAS Web Intelligence and Agent Systems IOS Press中国计算机学会推荐国际学术期刊(⼈机交互与普适计算)⼀、A类序号刊物简称刊物全称出版社⽹址1TOCHI ACM Transactions on Computer-HumanInteractionACM2IJHCS International Journal of Human Computer Studies Elsevier⼆、B类序号刊物简称刊物全称出版社⽹址1CSCW Computer Supported Cooperative Work Springer2HCI Human Computer Interaction Taylor & Francis3IWC Interacting with ComputersOxford University Press4UMUAI User Modeling and User-Adapted Interaction Springer三、C类序号刊物简称刊物全称出版社⽹址1BIT Behaviour & Information Technology Taylor & Francis2IJHCI International Journal of Human-ComputerInteractionTaylor & Francis3PMC Pervasive and Mobile Computing Elsevier4PUC Personal and Ubiquitous Computing Springer中国计算机学会推荐国际学术期刊(前沿、交叉与综合)⼀、A类序号刊物简称刊物全称出版社⽹址1Proc. IEEE Proceedings of the IEEE IEEE2JACM Journal of the ACM ACM⼆、B类序号刊物简称刊物全称出版社⽹址1Bioinformatics Oxford UniversityPress2Briefings in Bioinformatics Oxford UniversityPress3Cognition Cognition:International Journal ofCognitive ScienceElsevier4PLOS Computational Biology Public Libraryof Science5TMI IEEE Transactions on Medical Imaging IEEE6TGARS IEEE Transactions on Geoscienceand Remote SensingIEEE7TITS IEEE Transactions on IntelligentTransportation SystemsIEEE8TR IEEE Transactions on Robotics IEEE9TASAE IEEE Transactions on AutomationScience and EngineeringIEEE10JCST Journal of Computer Science andTechnologySCIENCEPRESS/Springer11JAMIA Journal of the American MedicalInformatics AssociationBMJ Journals12Science China Information Sciences Science in China Press/Springer13The Computer Journal Oxford UniversityPress三、C类序号刊物简称刊物全称出版社⽹址1BMC Bioinformatics BioMed Central2Cybernetics and Systems Taylor & Francis3IEEE Geoscience and RemoteSensing LettersIEEE4TITB IEEE Transactions on InformationTechnology in BiomedicineIEEE5TCBB IEEE-ACM Transactions onComputational Biology andBioinformaticsIEEE/ACM6IET Intelligent Transport Systems IET 7Medical Image Analysis Elsevier8FCS Frontiers of Computer Science Higher EducationPress。
1.1computer 计算机information processing 信息处理hardware 硬件software 软件program 程序general-purpose machine 通用(计算)机special-purpose machine 专用(计算)机instruction 指令set of instruction 指令集,指令系统input device 输入设备output device 输出设备Input/Output (I/O) 输入/输出main memory 主存储器central processing unit (CPU) 中央处理器bus 总线microcomputer 微型计算机minicomputer 小型计算机mainframe主机,特大型机desktop computer 台式计算机personal computer (PC) 个人计算机operating system 操作系统disk 磁盘Digital Video Disk (DVD) 数字视[频光]盘Computer Disk Read-Only Memory (CD-ROM) 光盘只读存储器keyboard 键盘mouse 鼠标audio 声[音]频的,声音的interface 接口peripheral 外围,外围设备monitor 监视,监视器reset 复位1.2instruction 指令instruction set 指令系统,指令集processor 处理器operation 操作、操作码、操作码指令operand 操作数register 寄存器clock 时钟megahert(MHz) 兆赫control unit 控制器,控制部件decode 译码,解码arithmetic and logic unit (ALU) 算术/逻辑部件word size (word length) 字长machine language 机器语言1.3hierarchical memory 存储器层次结构cache 高速缓冲存储器,高速缓存chip 芯片on-chip cache 单片高速缓存silicon-die 硅片magnetic disk 磁盘main memory 主存储器paged virtual memory 页式虚拟存储器Random Access Memory (RAM)随机(访问)存储器Read Only Memory (ROM) 只读存储器boot 引导,启动,自举Compact Disk ROM (CD ROM) 只读光盘disk drive 磁盘驱动器floppy disk (diskette) 软磁盘write once, read many (WORM) 一次写多次读magnetic tape 磁带register file 寄存器组latency 潜伏时间、等待时间page frame 页帧real memory (storage) 实存储器Dynamic RAM (DRAM) 动态随机存储器benchmark 基准测试程序,基准[程序],测试标准,基准volatile 易失性laser storage 激光存储器1.4latency 等待时间bandwidth 带宽(外设与存储器的传送速率范围)modem 调制解调器hard disk 硬(磁)盘code conversion 代码转换programmed I/O 程序控制I/O coprocessor I/O 协处理器I/O memory mapped I/O 存储器映射I/O interrupt 中断path 通路,路径multiprocessor 多处理器synchronization 同步化coherency 相关,相干direct memory access(DMA)直接存储器存取channel 信道,通道input/output system 输入输出系统buffering 缓冲accumulator 累加器peripheral 外围,外围设备pattern of bits 位模式load 装入,加载4.1computer network 计算机网络network architecture 网络体系结构protocol 协议open system interconnection reference model (OSI/RM) 开放系统互连参考模型Transmission Control Protocol/Internet Protocol (TCP/IP)传输控制协议/互联网协议channel 信道frame 帧packet 分组,包message 报文,消息connectionless 无连接的connection oriented 面向连接的user datagram protocol (UDP) 用户数据报协议data communication 数据通信resource sharing 资源共享data format 数据格式layer-based 分层次的physical medium 物理媒体(介质)International Standards Organization (ISO)国际标准化组织Department Of Defense (DOD)(美国)国防部industrial standard 行业标准transport layer 传输层,运输层network layer 网络层application layer 应用层end-to-end 端对端,终点到终点byte stream 字节流virtual terminal 虚拟终端4.2LAN (Local Area Network) 局域网client-server 客户服务器(方式)peer-to-peer 对等(方式)hub 集线器switch 交换机topology 拓扑(结构)star topology 星型拓扑Ethernet 以太(局域)网randomly 随机地CSMA/CD (Carrier Sense Multiple Access/Collision Detection) 载波侦听多路访问/冲突检测UTP (Unshielded Twisted Pair) 非屏蔽双绞线coaxial cable 同轴电缆NIC (Network Interface Card) 网络接口卡(网卡)multi-port bridge 多端口网桥router 路由器ASIC (Application-Specific Integrated Circuit)专用集成电路Gigabit Ethernet 千兆位以太网fiber-optic 光纤FDDI (Fiber Distributed Data Interface)光纤分布式数据接口ATM (Asynchronous Transfer Mode)异步转移(传输)模式WLAN (Wireless Local Area Network) 无线局域网ISM (Industrial, Scientific, and Medical) band工业、科学和医药频段FHSS (Frequency Hopping Spread Spectrum)跳频扩频DSSS (Direct Sequence Spread Spectrum) 直序扩频CDMA (Code Division Multiple Access) 码分多址MAC (Medium Access Control) 媒体访问控制WAP (Wireless Application Protocol)无线应用协议cell phone 蜂窝电话pager 寻呼机wireless bridge 无线网桥leased line 租用线4.3WAN (Wide Area Network) 广域网packet switching network 分组交换网priority code 优先级代码source address 源地址destination address 目的地址datagram 数据报virtual circuit 虚电路(SVC) Switched Virtual Circuit交换式虚电路(PVC) Permanent Virtual Circuit永久式虚电路multiplex 多路复用leased line network 租用线(路)网frame relay 帧中继CPE(Customer Premises Equipment)客户设备access line 接入线port 端口route 路由,路径backbone 主干网,骨干网trunk 干线,[ 局内]中继线,信息通路5.1 Internet 因特网ARPAnet ARPA计算机网,阿帕网Packet switching network分组交换网,包交换网interoperability 互操作性WWW(world wide web万维网,环球信息网hypertext 超文本client 客户browser 浏览器download 下载HTTP(hypertext transfer protocol)超文本传送协议URL(uniform resource locator)统一资源定位地址search engine 搜索引擎search criteria 搜索条件Web page 网页GUI(graphical user interface)图形用户接口IE(Internet Explorer)(微软公司的)浏览器软件Mosaic 美国计算机安全协会(NCSA)的公共WWW浏览器Navig (网景公司的)浏览器electronic mail 电子邮件SMTP(Simple Mail Transfer Protocol)简单邮件传送协议POP(Post Office Protocol)邮局协议FTP(File Transfer Protocol)文件传送协议Telnet(Telecommunication network)远程通信网远程登录(服务)TCP/IP(Transmission Control Protocol/ Internet Protocol)传输控制协议/互联网协议5.5network security 网络安全virus 病毒unauthorized access 非授权访问firewall 防火墙boot 自举,引导,启动sector (磁盘)扇区,扇面macro virus 宏病毒floppy disk 软(磁)盘download 下载,卸载identification 识别,验证,鉴定authentication 验证,鉴别password 口令,密码access card 存取卡biometric device 生物统计仪器filter 过滤,滤波block 封锁NFS(Network File System) 网络文件系统gateway 网关relay service 中继业务packet filtering 分组(包)过滤circuit gateway 电路网关application-level gateway 应用级网关screening router 屏蔽路由器bastion host 堡垒主机dual-homed gateway 双宿主网关screened-host gateway 屏蔽主机网关screened subnet 屏蔽子网6.2electronic commerce 电子商务Electronic Funds Transfer (EFT)电子资金传送(转账),电子汇款Business-to-Business (B to B, B2B)商业对商业transaction 事务[处理],交易,会刊,学报Electronic Data Interchange (EDI)电子数据交换communications medium 通信媒体digital form 数字格式revenue 税收,收入,收益6.6Web 万维网medium(复media) 媒体sharing 共享desktop 台式,桌面desktop computer 台式计算机notebook computer 笔记本计算机pocket computer 袖珍计算机Personal Digital Assistant (PDA)个人数字助理mobile phone 移动电话Hyper-Text Markup Language (HTML)超文本标记语言Web page 万维网网页Web site 万维网网站Interactivity 交互性service-oriented 面向服务的Application Programming Interface (API)应用编程界面Asynchronous JavaScript and XML (AJAX) 异步Java过程语言和扩展的标记语言9.1database 数据库data element 数据元retrieval 检索,恢复magnetizable media 可磁化介质linkage 链接system software package 系统软件包database record 数据库记录operating system (OS) 操作系统search 搜索,查找probe 探查query 查询file-oriented system 面向文件的系统communications path 通信通道database management system (DBMS)数据库管理信息系统management information system (MIS)管理信息系统decision making 决策information flow 信息流user 用户9.3Structured Query Language (SQL)结构化查询语言thread scheduling 线程调度memory management 存储管理I/O management 输入/输出管理relational engine 关系引擎type system 类型系统buffer pool management 缓冲槽管理resource management 资源管理synchronization primitives 同步化原语deadlock 死锁background maintenance jobs 后台维护作业multitasking 多(重)任务作业Applications Program Interface (API)应用程序接口log 记录Storage Engine 存储引擎Tabular Data Stream (TDS) 表格数据流character strings 字符串textual data 文本数据User-Defined composite Types (UDTs)用户定义的组合类型Dynamic Management Views (DMVs)动态管理视图constraint 约束value added services 增值服务self-tuning 自调谐(节)digital media formats 数字媒体格式bit-stream 比特流storage backend 存储后端eXtensible Markup Language (XML)可扩展的标记语言spatial data type 空间数据类型unstructured data 非结构化数据semi-structured data 半结构化数据metadata 元数据backing up 备份,备用hierarchical data 层次型数据recursive query 递归查询9.4data warehouse 数据仓库information technology (IT) 信息技术decision support 决策支持operational data 操作数据platform 平台transaction 事务(处理)distributed system 分布式系统infrastructure 基础设施client 客户mass storage 大容量存储器,海量存储器data refresh 数据刷新information pool 信息库On-Line Analytical Processing联机(在线)分析处理技术iterative approach 迭代方法database recovery 数据库恢复9.5Enterprise Resource Planning (ERP)企业资源计划Customer Relationship Management (CRM)客户关系管理log 日志,(运行)记录,对数pattern 模式,图形(案),特性曲线Intelligence Quotient (IQ) 智商predictable 可预测的attribute 属性dataset 数据集subset 子集recursive 递归training process 训练过程root node 根节点leaf node 叶子节点algorithm 算法decision tree 决策树,判定树cluster 聚类,簇,群集association 关联,结合,协(学)会time series 时(间)序(列)prediction 预测churn analysis 周转分析Structured Query Language (SQL)结构化查询语言9.6online ordering 在线订货browser 浏览器peer-to-peer 对等的retrieval 检索E-Commerce 电子商务E-Business 电子企业script 脚本(文件),稿本,过程dynamic web page 动态web网页static web page 静态web网页hyperlink 超(级),链接form 表单,表格,窗体database query 数据库查询middleware 中间件CGI (Common Gateway Interface)公用网关接口API (Application Program Interface)应用程序接口PHP (Personal Home Page) 个人家庭主页ASP (Active Server Page) 现用服务器页,动态服务器主页11.1computer graphics (CG) 计算机图形(学)video game 视频游戏render 渲染three-dimensional computer graphics三维计算机图形scene 景物,景色,场景image 图像,影(映)像,成像photograph 照片medical imaging system 医疗成像系统monitor 监视器paint program 绘图程序model 模型computer-simulated world 计算机模拟世界11.2GUI (graphics user interface) 图形用户界面DTP (desktop publishing) 桌面出版resolution 分辨率image-setter 激光照排机paste-board 粘贴板HTML (hypertext markup language)超文本标记语言PDF (portable document format)可移植文档格式PDL (page description language)页面描述语言graphics software 图形软件WP(Word Processing) (文)字处理typescript 打印文稿(原稿)laser printer 激光打印机dpi (dots per inch) 每英寸点数lay out 排版Electronic Publishing 电子出版video 视频animation 动画hyperlink 超链接suite of software 软件套件11.4image processing 图像处理sensor 传感器acquisition 采集,获取illumination 光照digitization 数字化coordinate transformation 坐标变换motion blur 运动模糊tomography X线断层技术chromosome 染色体background 背景gray value 灰度值visual system 视觉系统multimedia 多媒体brightness 亮度contrast 对比度pixel 像素distortion 失真,畸变filter 滤波,过滤11.5bitmap 位图raster image 光栅图像decompress 解压gray-scale 灰度magic number 幻数LUT(look up table) 查找表file format 文件格式proprietary 所有人的,所有的,专利的TIFF (Tagged Image File Format)标记图像文件格式GIF (Graphics Interchange Format)图形交换格式index 索引RLE (Run-Length Encoding) 游程编码JPEG (Joint Photographic Experts Group)联合(静态)图像专家组第一组1.Primitive types 基本(数据)类型2. heuristics 启发式研究3.criteria 标准4.performance speed 运行速度5.the nature of the application 应用的性质6.vector quantization 矢量量化7.the preceding frames 之前帧8.consecutive frames 连续帧9.formula 公式10.inequality 不等式11.cumulative errors 累计错误12.JPEG(Joint Photographic Experts Group) 联合图像专家小组13.spatial position 空间位置14.matrix 矩阵15.binary array 二进制数组16. decompress 解压缩17. sophisticated 复杂的18. subunits 子单元第二组1.hybrid n.混合物adj.混合的2.backpropagation 反向传播3.fusions . 融合4.parameters 参数;系数5.optimized adj. 最佳化的6.fuzzy 模糊的;失真的7.conventional . 传统的;惯例的8.integrated. 综合的;完整的9.fuzzy logic 模糊逻辑10.perceptron . 感知器11.hierarchical 分层的;等级体系的putation 估计,计算13.coordinate 坐标;vt. 整合adj. 同等的vi. 协调)14.converges 聚合,会聚15. neurons 神经元16.bias 偏执量17.nonlinear function 非线性函数18.purelin 线性19.genetic algorithm 遗传算法20.simultaneous 同时发生的,同步的21.polygonal approximation algorithms多边形近似算法22.dynamic 动态的23.data fusion 数据融合24.robust 鲁棒的.强健的,坚定的第三组1.contemporary 当代的、现代的2.cryptography 密码学3.authentication 身份验证4.interdisciplinary 跨学科的5.designate vt. 指定;指派6.identical adj. 同一的;完全相同的7.interactive adj. 交互式的;相互作用的8.iterative(adj. 迭代的;重复的,反复的9.endeavor n.努力;尽力.10.integration n.集成;综合11.heterogeneous(adj. [化学] 多相的;异种的;[化学] 不均匀的;由不同成分形成的))12.interpretation(n. 解释;翻译;演出)13.validation(n. 确认;批准;生效)14.disciplines(n.纪律;训练;学科)15.identified(vt.鉴定;识别,辨认出,认出;认明;把…看成一样)16.interpretable(adj.可说明的;可解释的;可翻译的)17.scalable(adj.可测量的;可伸缩的;可攀登的)18.associations(联合;联想)19.transactionsn. 处理,[图情] 会报;汇报20.investigated(v. 调查;研究)21.versus(prep. 对;与...相对;对抗)22.unified(adj. 统一的;一致标准的)23.subsequent(adj. 后来的,随后的)24.violations[va??'le??nz]侵害,违反25.protocol ['pro?t?k??l]草案;协议26.vulnerabilities[v?ln?r?'b?l?t?z]脆弱点27.misuse [?m?s'ju?s]误用;滥用28.anomaly[?'nɑ?m?li]异常;反常29.captured?['k?pt??r]捕获;占领30.rationale基本原理;基础理论31.clustering['kl?st?r??]聚类;群32.thrust刺;推力;要旨第四租1.Taxonomy 分类标准2.by virtue of 凭借,依靠第五组1.Blend 混合2.Render 渲染3.Defeat 使失效,弱化4.Pleasing 令人满意的5.artifact6.state-of-the-art 一流的,先进的,到目前为止最好的7.Formulation配方;构想,规划;公式化8.Hierarchical 分层的9.Potent有效的,强有力的;有权势的;烈性的;有说服力的10.Temporal暂存的11.Quadratically 二次12.Homogeneous同性质的,同类的13.Shades 阴影14.Attained 达到;获得15.Problematic成问题的,有疑问的,不确定的16.fine-tuned 对…进行微调;细调17.identical images 相同的图像18.shading effects阴影效应19.Generic类的,属性的;一般的20.Opaquely不透明地21.Fringe边缘的,外围的第六组1.extraction 取出;抽出;拔出2.Binarization 二值化3.retrieval 检索4.dissemination 宣传;散播;传染5.integrated? 综合的;完整的;互相协调的)6.delimiters 分隔符7.Deviation 偏离8.feeding into 流入,输入9.loose-leaf 活页式的10.with respect to 关于11.isolate 隔离,孤立12.table of contents entries 目录项13.syntactic 句法的14.appropriate adj.适当的;相称的15.meta-data(n.元数据,16.heterogeneous adj.异种的;异质的第七组Disassemble 反汇编。
Java名称缩写⼤全名称缩写RDB--->redis database 储存复制数据库AOF--->Append-only file 仅追加⽂件IOC--->inversion of control 控制反转AOP--->Aspect Oriented Programming ⾯向切⾯编程SOA--->Service-Oriented Architecture ⾯向服务的结构RPC--->Remote Produce Call 远程过程调⽤RMI--->Remote Method Invocation 远程⽅法调⽤RPM--->Red-Hat Package Manager RPM软件包管理器JVM--->Java Virtual Machine Java虚拟机OOP--->Object Oriented Programming ⾯向对象程序设计HTTP--->Hypertext Transfer Protocol 超⽂本传输协议JWT--->JSON Web Token json web令牌HA--->Hig h A vailable 双机集群系统SPOF--->single point of failure 单点故障SSO--->SingleSignOn 单点登录API--->Application Programming Interface 应⽤程序编程接⼝IDE--->Integrated Development Environment 集成开发环境JDK--->JavaDevelopmentKit Java开发⼯具包JRE--->Java Runtime Environment Java运⾏环境JDBC--->Java DataBase Connectivity java数据库连接DBCP---> DataBase connection pool 数据库连接池DI--->Data Input 数据输⼊JMS--->Java Message Service Java消息服务MQ--->Message Queue 消息队列SQL--->Structured Query Language 结构化查询语⾔DDL--->Data Definition Language 数据库模式定义语⾔DML--->Data Manipulation Language 数据操纵语⾔UUID---> Universally Unique Identifier 通⽤唯⼀识别码VO--->value object 值对象PO--->persistant object 持久对象ARP--->Address Resolution Protocol 地址解析协议LB--->LoadBalance 负载均衡。
API (Application Programming Interface) 应用编程接口JRE (Java Runtime Enviroment) Java 运行时环境JDK (Java Development Kit) Java开发工具包SDK(Software Development Kit, 即软件开发工具包)JVM (Java Virtual Machine) Java虚拟机JNI (Java Native Interface) Java本地接口AWT (Abstract Windows Toolekit) 抽象窗口工具箱JNDI (Java Naming & Directory Interface) JAVA命名目录服务.主要提供的功能是:提供一个目录系统,让其它各地的应用程序在其上面留下自己的索引,从而满足快速查找和定位分布式应用程序的功能。
JMS (Java Message Service)JAVA消息服务.主要实现各个应用程序之间的通讯.包括点对点和广播.JTA (Java Transcation API) JAVA事务服务.提供各种分布式事务服务.应用程序只需调用其提供的接口即可.JAF (Java Action FrameWork) JAVA安全认证框架.提供一些安全控制方面的框架.让开发者通过各种部署和自定义实现自己的个性安全控制策略.RMI (Remote Method Interface) 远程方法调用CVS (Concurrent Versions System) 版本控制器SVN (Subversion) 版本控制器TC (Test Case) 测试用例,是为某个特殊目标而编制的一组测试输入、执行条件以及预期结果,以便测试某个程序路径或核实是否满足某个特定需求。
指对一项特定的软件产品进行测试任务的描述,体现测试方案、方法、技术和策略。
内容包括测试目标、测试环境、输入数据、测试步骤、预期结果、测试脚本等,并形成文档。
《计算机英语》参考答案Chapter 11.(1) 中央处理器(Central Processing Unit)(2) 随机访问内存(Random-access Memory)(3) 美国国际商用机器公司(International Business Machine)(4) 集成电路(Integrated Circuit)(5) 大规模集成电路(Large Scale Integration)(6) 超大规模集成电路(Very Large Scale Integration)(7) 个人数字助理(Personal Digital Assistant)(8) 图形用户界面(Graphical User Interface)2.(1) data(2) software(3) IC(4) ENIAC(5) supercomputer(6) superconductivity3.(1) F (ENIAC is the second digital computer after Atanasoff-Berry Computer)(2) T(3) F (Data is a unorganized)(4) T(5) T(6) T4.(1) 人工智能(2) 光计算机(3) 神经网络(4) 操作系统(5) 并行处理(6) vacuum tube(7) integrated circuit(8) electrical resistance(9) silicon chip(10) minicomputer5.数据是未经组织的内容的集合,数据可以包括字符、数字、图形和声音。
计算机管理数据,并将数据处理生成信息。
向计算机输入的数据称为输入,处理的结果称为输出。
计算机能在某一个称为存储器的地方保存数据和信息以备后用。
输入、处理、输出和存储的整个周期称为信息处理周期。
与计算机交互或使用计算机所产生信息的人称为用户。
1.(1) 发光二极管(Light-Emitting Diode)(2) 静态随机存储器(Static Random Access Memory)(3) 只读存储器(Read Only Memory)(4) 运算器(Arithmetic and Logical Unit)(5) 阴极射线管(Cathode Ray Tube)(6) 视频显示单元(Visual Display Unit)(7) 可编程只读存储器(Programmable Read Only Memory)(8) 液晶显示屏(Liquid Crystal Display)2.(1) CPU(2) peripheral(3) memory(4) modem(5) control unit(6) byte3.(1) T(2) T(3) F (RAM is volatile memory because the information within the computer chips is erased as soon as the computer is powered off whereas ROM is nonvolatile)(4) T(5) T(6) F (Microphones and digital cameras are input devices)4.(1) 寄存器组(2) 主机(3) 二进制的(4) 算法(5) 光盘(6) CD-RW(7) logic operation(8) barcode(9) peripheral device(10) volatile memory5.计算机的内存可被视为一系列的单元,可以在单元中存取数字。
Service-Oriented Virtual Machine Placement Optimization for Green Data CenterFan-Hsun Tseng 1&Chi-Yuan Chen 2&Li-Der Chou 1&Han-Chieh Chao 2,3,4&Jian-Wei Niu 5Published online:9May 2015#Springer Science+Business Media New York 2015Abstract The first service-oriented virtual machine (VM)placement for green data center is designed in this work.In-teger Linear Programming (ILP)is the problem design basis.The Tree algorithm is proposed to place VM role instances at the lowest communication cost,economizing the construction cost with fewer physical servers.Another Forest algorithm is also proposed for balancing the computation load between the physical machines.Both of the proposed algorithms are for-mulated on the graph theoretic technique and evaluated and analyzed using the Best Fit algorithm in the simulations.Al-though the total power consumption and average utility of both proposed algorithms are slightly impaired,theunnecessary outbound communication cost is significantly eliminated and decreased,especially in the immense number of services.The results show that the proposed Tree and Forest algorithms provide lower communication cost than the Best Fit algorithm,and achieve green communications for large scale environment such as cloud or green data center.Keywords Service-oriented placement .Virtual machine .Data center .Integer linear programming .Load balancing1IntroductionVirtualization technology was announced by the International Business Machines (IBM)Corporation in 1971[1].Many researchers have regarded it as the first step in migrating existing services into the cloud environment [2].A cloud ser-vice is executed using various virtual machines (VMs).These VMs are packaged in a physical server or spread over several physical machines.Due to the increased popularity of cloud computing researchers have intensely investigated virtualization technology [3].The renowned market research company Gartner [4]predicted this technique might be the first of ten important technologies in 2009[5].As mentioned,the virtualization technique is regarded as the principal step,fueling the evolution of cloud computing since 2009.Cloud computing was noted the most important technology Gartner predicted in 2010[6]and 2011[7],and it remained on the prediction list in 2012[8].According to state-of-the-art cloud development,it is obvious that virtualization technology must be extensively discussed and investigated.Various virtual technique issues have been widely investi-gated widely.The problems that come from virtualization can be divided into two categories,the preliminary construction*Han-Chieh Chaohcc@.twFan-Hsun Tsengfanhsuntseng@ Chi-Y uan Chenchiyuan.chen@ Li-Der Choucld@.tw Jian-Wei Niuniujianwei@1Department of Computer Science and Information Engineering,National Central University,Taoyuan,Taiwan2Department of Computer Science and Information Engineering,National Ilan University,I-Lan,Taiwan3Department of Electrical Engineering,National Dong Hwa University,Hualien,Taiwan4School of Information Science and Engineering,Fujian University of Technology,Fujian,China5School of Computer Science and Engineering,Beihang University,Beijing,ChinaMobile Netw Appl (2015)20:556–566DOI 10.1007/s11036-015-0600-9[9–11]and the subsequent management[12–14].For instance, the resource allocation[15]and provisioning problem[16]for VMs placement in the data center.Researchers conducted an optimization strategy between the deployment cost and sys-tem performance.Researchers proposed a blind scheduling algorithm[17]to maintain the fairness at each time point in mobile media cloud,and further proposed a blind online scheduling algorithm[18]to achieve asymptotic optimality. Other researchers studied the VM migration condition and strategy,such as[19,20].When physical machine resources are exhausted the virtual machine migrates from the current infrastructure to other available machines.However,the existing services and tasks should be continued uninterrupted.A novel technology for VM management called Live Migration[21]has become well-known in recent years.This paper investigates the Service-Oriented VM Place-ment Optimization problem(or simply SOVMPO throughout this paper)defined based on Integer Linear Programming (ILP).We propose two algorithms named the Tree and Forest algorithms for solving the SOVMPO problem.Both proposed algorithms are formulated based on the graph theoretical tech-nique.The Forest algorithm is proposed for balancing the traffic load between VMs,but wastes construction and com-munication cost.The Tree algorithm is designed to minimize the communication cost between VMs that belong to the same service.This research has three major contributions:1)we formulate the service-oriented VM placement problem which is called SOVMPO and propose two algorithms based on graph theory for solving this problem;2)the calculation time for both algorithms increases linearly with the increased num-ber of services;3).The Tree algorithm reduces the total power consumption,enhances the average utility of physical servers and reduces the communication cost as well.This paper is organized as follows.Section II introduces current VM placement research and compares the different approaches.Section III defines the ILP model for optimizing the VM placement problem and explains the proposed algo-rithms.In section IV we present the optimization results and discuss the simulation results.Conclusions from this research are drawn in section V.2Background and related worksThe VM data center related problem was studied extensively in past literature,such as VM placement,resource allocation, resource provisioning,minimizing construction cost and net-work traffic load.This paper focuses on minimizing the com-munication cost[22,23]based service-oriented virtual ma-chine placement in data center networks.The data center net-work infrastructure and communication cost are discussed and studied.The differences in VM role instances are introduced because a job or service may be executed using several VM role instances in cloud computing.2.1Data center infrastructureThe Cisco data center network infrastructure is a three-tier architecture[24]that includes the core common services,ag-gregation and server access.The data center infrastructure is shown in Fig.1,composed of a tree structure according to the current data center architecture diagram.The network archi-tecture and topology effect on the network resource in data center[25].The three-layer architecture is adopted in most of enterprises and data centers.Most of intra-data traffic traverses within switch and physical server,thereby we consider and investigate the service-oriented VM placement.Although the fat-tree architecture is mentioned and studied in recent re-searches[26,27],we adopted the original three-tier architec-ture structured as a tree topology in the data center infrastruc-ture.Because this architecture is more suitable for fitting the real data center environment data center infrastructure modi-fication is unneeded.The top layer is the core router which connects with all middle-tier aggregations but does not connect with other core routers.The middle layer is the aggregation that only connects to one or two edge switches for access.This implies that the switches and physical servers under the middle-tier aggrega-tion comprise a local area network(LAN).The bottom layer is the edge switch,with one or more physical servers accessing the edge switch for routing data information.Without loss of generality,the communication cost for two arbitrary physical servers in the same LAN is lower than two separate LANs.In other words,the cost of inbound communication within a LAN is lower than the cost of outbound communication be-tween two LANs.2.2VM role instancesThe identity of VM role instances is determined according to their working categories.For instance,the different VM role instances are in charge of different works.Windows Azure [28]has two VM roles which are web role and worker role.The first type of VM instance is the web role instance.It executes the interactions between web applications or HTTP services.The web role instance is responsible for the commu-nication between user and the operating process.On the other hand,the worker role instance is a background process that executes the tasks or jobs in Windows Azure.In order to achieve the elastic computing in cloud environment an appli-cation service or job may be executed by many VM instances. When the computing resource is insufficient in the same ser-vice type,the number of worker role instances can be in-creased and scaled up dynamically.Therefore,the number of worker role instances is always greater than the web roleinstances.Two types of VM instances are considered by this research in the SOVMPO problem.The communication cost and utility rate are calculated from these VM role instances. We assume that a service is preceded by a web role and four worker role instances.2.3Related worksIn the existing literature some researchers focused on placing VMs in different data center architectures[26,27,29]while others investigated the VM placement in distinct orientations [30,31].The works most related to ours are[26,27,30,31].In[26, 27],the three-tier architecture in data center is also considered. However,the researchers in[26]surveyed the influences of TCP Incast and congestion notification unlike the communi-cation cost of inbound and outbound in our work.The traffic characteristic is not covered in[26]but we eliminate the costs from the outbound communication,which minimizes the traf-fic loads within different LANs.Although the data center architecture is considered,two parts differentiate[27]our work.First,in spite of the considered architecture,the VL2 [32],fat-tree[26]and BCube[33]architecture are adopted in [27],but we follow the three-tier architecture of traditional data center networks in this work.Second,the proposed work in[27]is based on traffic-aware VM placement while in our work the proposed algorithms are based on service-oriented VM placement.In[30,31]both researches are based on application-aware viz.AppAware.Although the proposed scheme in[30]is based on the graph theoretical technique as our work,the authors focus on the application-aware VM migration unlike the data center placement problem in our work.The VM demand,physical machine capacity and com-munication are considered in[30]which is similar to our work,but the authors investigated the communication fre-quency performance unlike the communication cost in this paper.Finally,the distinct orientation towards VM placement is considered in[31],but some parts are still different.First of all,the AppAware orientation is completely differentiated from our service-oriented VM placement algorithms.The au-thors propose an application-aware VM placement algorithm based on the convex optimization theory unlike the proposed algorithms in this paper based on ILP model and graph theo-retical technique.We propose a novel VM placement scheme based on service and investigate a vital issue minimizing the inbound and outbound communication costs which are fre-quently neglected in other studies.3Proposed algorithms3.1Problem definitionThe virtual machine optimization problem for service-oriented cloud networks is formulated based on integer linear programming(ILP).The definitions of variables used in SOVMPO are listed in Table1.In the cloud infrastructure a tree structure is used to connect the hardware which includes the routers,middle-tier aggrega-tions,switches and servers.The same structure is also applied to the virtual machines within the physical servers.Therefore, we let V be a set of nodes and E be a set of edges between nodes.Given a graph G=(V,E),where V=V1∪V2and E=E1∪E2.It can be easily shown that V1∩V2=∅and E1∩E2=∅.Assume that V1={z1,…,z k}with|V1|=k,and V2={q1,…,q s} with|V2|=s.The nodes in V1are the equipment in cloud infrastructure, which can be core routers,middle-tier aggregations,edgeCore RouterMiddle-tier AggregationEdge SwitchPhysical ServerFig.1Data center network infrastructureswitches and physical servers.Hence,z i ∈{0,m CR ,m MA ,m ES ,m PS }.We then consider the available links between z i and z j in V 1.Let available linkx i ;j ¼1;if z i ;z j ÀÁ∈E 1and z i ⋅z j ≠00;otherwise &:ð1ÞThe nodes in V 2are the virtual machines within the phys-ical servers,which can be classified into web and worker roles within two types of instances.That is,q i ∈{0,n Web ,n worker }.The same structure is also applied to the virtual machine,in which each cloud service contains one worker role instance and may contain multiple worker role instances.We next consider the available links between the physical server z i and virtual machine q j .The available links between web role instance q i and worker role instance q j are consid-ered.Let available linky i ;j ¼1;if z i ;q j ∉∅and z i ⋅q j ≠01;if q i ;q j ∈E 2and q i ⋅q j ≠00;otherwise8>><>>::ð2ÞThe web role instance q i must be executed in a physical server,defined as w q j ¼w PS ,where q j ∈n Web .However,a worker role instance q j may subordinated a physical server or a web role instance,which is defined asw q j ¼w PS ;if q j is nested in a physical server w web ;if q j is nested in a web role instance 0;if q j¼0:8<:ð3ÞFor service-oriented virtual machine optimization,because a single service may be executed by several virtual machines,we consider the communication cost between the virtual ma-chine instances in a service.The virtual machine service type q j is defined as ξk q j ,where k ∈Νand q i ≠0.Moreover,the utility of a virtual machine q j in a physical server z i is considered in our model,which is defined as u i ;j ¼y i ;j w q j .In this given tree graph we assume that a communication cost exists for each available link between two vertices.The communication cost between virtual machine q i and q j in ser-vice k is defined asCost ki ;j ¼C ki ;j ;if x i ;j ⋅y i ;j ≠00;if x i ;j ⋅y i ;j ¼0&:ð4ÞThe ILP model for SOVMPO problem is defined as follows.Minimize X i i ¼1X j j ¼1X kk ¼1C k i ;jð5Þsubject to z k ≥0;for ∀k ∈V ð6Þq s ≥0;for ∀s ∈E ð7Þx i ;j ∈0;1f g ;for ∀i ;j ∈E 1ð8Þy i ;j ∈0;1f g ;for ∀i ;j ∈E 2ð9Þξk q j ≥0;for ∀k ∈N ð10ÞXu i ;j ≤δ;for ∀i ∈V 1and ∀k ∈V 2ð11ÞC k i ;j ≥0;for ∀i ;j ∈Vð12Þ3.2Tree algorithmThe Tree algorithm is proposed to optimize the web role in-stances and worker role instances such that the communica-tion cost is minimized.Some notations are clarified before introducing the Tree algorithm.The definition of the vector q ,whose i -th element denotes the placement condition on the corresponding position.From this point of view,q x denotes the role instance in the vector q corre-sponding to the vertex x ∈V 2.For example,if a web role instance is placed on the vertex x ,then from the indication vector point of view,q x =c web .This concept can be generalized so that q X is well-defined,where X ⊆V 2.The definition of vector z ,whose i -th element denotes the physical server condition on the corre-sponding location.For example,z x denotes the physical server in the vector z corresponding to the vertex x ∈V 1.Moreover,we define the U (z )as the utility of the physical server z .Table 1Definition of symbolsVariableDefinitionV 1={z 1,…,z k }Set of equipment in the cloud infrastructures |V 1|=k Number of equipment in the cloud infrastructures V 2={q 1,…,q s }Set of virtual machines in the physical servers|V 2|=s Number of virtual machines in the physical servers E 1Set of links within cloud infrastructuresE 2Set of links between a physical server and a virtual machine m CR (MA ,ES ,PS )The core router (or middle-tier aggregation,edge router,physical server)is placed in V 1x i,jThe available links within an equipment i and an equipment j n Web (Worker )The web role (or worker role)instance is placed in V 2y i,j The available links within a physical server i and a virtual machine j w qiThe subordination of virtual machine q j ξk q iThe service type of virtual machine q jC i ,jkThe communication cost between virtual machine q i and q j in service k u i,j The utility of a virtual machine q j in a physical server z i δiThe maximum utility of a physical server iLet G =(V ,E )be a graph.Denote X and Y as subsets of verti-ces.Then,f d (G ,X ,Y )is used to generate a descendant ordered list S of the elements in X acccording to the adjacent number of vertices in Y based on G .For example,if there are 3and 4adjacent vertices in Y for the vertex x 1∈X and x 2∈X ,respective-ly,then x 1is behind x 2in the ordered list S .Note that the order of the vertices with the same degree can be arbitrary.Since S is an ordered list,S [i ]is denoted as the i -th vertex in S .In addition,N (G ,x )is defined as the set of neighboring vertices of the vertex x on the graph G.γ(G ,X )be the vertex-induced subgraph of G with the set of vertices V \X .After introducing the functions,the descriptions of Tree algorithm are shown as Algorithm 1.Algorithm 1:Tree Algorithm (G ,z ,δ)Input:G :underlying graphz :vector indicating the placement of web and worker role instanceδ:maximum utility of physical server 01Ω1=V 1,Ω2=V 2,Δ=ϕ02repeat03S =f d (G ,Ω1,Ω2)04Δ=Δ?S [1]05Ω1=Ω1\S [1]and Ω2=Ω2\N (G ,S [1])06until Ω2=ϕ07G r ¼γG ;Ω1ðÞ;where G r ¼V G ;E G r ðÞ08q V G r ¼n worker ,where ξk V G r ¼k09while G r is disconnected and U (z )<δ10S =f d (G r ,V 1\Ω1,Ω1)11G r =γ(G ,Ω1?S [1])12z V G r ¼n web 13repeat14S ¼f d G r ;V G r ;Ω2ðÞ15z s [1]=n web16until U (z )=δLines 2to 8are used to determine the service type in the subset of virtual machine.The chosen subset in the Tree algo-rithm is based on the number of covered virtual machines given as the same service type.Since the same virtual machine service type in lines 2to 8could be disconnected,lines 9to 12are used to link the unconnected virtual machines.In line 13to 16,we examined the utility of a physical server.The physical server utility property should be limited within δ.Because the characteristic of our problem,the linear programming in the paper is always able to have a feasible solution.The Tree algorithm performance is dominated by lines 2to 6.A sorting of O (n )elements is required in each iteration leading to O (nlog n )time complexity.O (n )iterations are needed in the worst case.Therefore,O (n 2log n )time complexity is required.3.3Forest algorithmAccording to the Tree algorithm notations we introduce only the new functions used in the Forest algorithm.Let BFS (G ,x )be a subgraph constructed by applying breath-first-search on the graph G rooted at the vertex x .Let f B FS ;ξk G ðÞbe the graph composed of subgraphs constructed by service type ξk q j breadth-first-search on the graph G .The Forest algorithm de-scriptions are shown as Algorithm 2after introducing the functions.Algorithm 2:Forest Algorithm (G ,z ,δ)Input:G :underlying graphz :vector indicating the placement of web and worker role instanceδ:maximum utility of physical server 01Ω1=V 1,Ω2=V 2,Δ=ϕ02repeat03S =f d (G ,Ω1,Ω2)04Δ=Δ?S [1]05Ω1=Ω1\S [1]and Ω2=Ω2\N (G ,S [1])06until Ω2=ϕ07G r ¼γG ;Ω1ðÞ;where G r ¼V G ;E G r ðÞ08i =0,Ω1′=Ω109repeat 10i =i +111randomly choose a vertex x from V G r12G i s =BFS (G r ,x ),where G i s =(V i s ,E i s)13Ω1′=Ω1′/x 14until Ω1′=ϕ15for j =1to i 16S =f d (G j s ,Ω1,Ω2)17z s 1½ ¼n we b and z s ∖s 1½ ¼n worker ;wher e ξk V G r ¼k ,18while U (z )≤δ19S =f d (G r ,Ω1,Ω2)20z s [1]=n web21until U (z )=δIn Algorithm 2,lines 2to 14are used to construct the physical server subset on which either the web role instance or work role instance are appropriately executed.Note that the selected phys-ical server is still empty now and the web role or work role instance placement needs to be determined later.Since the phys-ical server selected in lines 2to 14could constitute a forest,line 15to 17are used to place at least one web role in each service type.Lines 18to 21are used to guarantee that the utility of vertex z does not exceed the maximum utility of a physical server.The Forest algorithm performance is dominated by lines 2to 6.A sorting of O (n )elements is required in each iteration leading to O (nlog n )time complexity.O (n )iterations are needed in the worst case.Therefore,O (n 2log n )time com-plexity is required.3.4Proof of NP-hard problemIn this subsection we prove that the SOVMPO problem in cloud computing environment is a NP-hard problem.Therefore it cannot be solved in polynomial time.In other words,there is no efficient algorithm for minimizing the communication cost between VM role instances.We find the traveling-salesman problem(TSP)[34]is quite similar to our SOVMPO problem.TSP is a classical and well-known NP-hard problem.A brief description is given below.A list of cities and their pair distances,the TSP problem is to find out the shortest potential route that visits each city once and then back to the original city.Given an undirected graph G=(V,E),and each edge(u,v)∈E has a non-negative integer cost c(u,v).Then,find a Hamiltonian cycle of G with min-imum cost∑c(u,v).After introducing the TSP problem we prove that the pro-posed problem is polynomial time reducible to TSP problem, that is SOVMPO≤p TSP.The given graph G in TSP problem corresponds to the given graph G in the SOVMPO problem, which means the geographic map is fully mapped to the cloud environment,including the infrastructure,physical and virtual machines.The set of cities V is mapped to the cloud infrastruc-tures V1and VM role instance V2.The set of edges E is mapped to the communication links E1and E2.Finally,the non-negative integer cost c(u,v)in TSP can be matched with the proposed communication cost C i,j k between the virtual ma-chines q i and q j in service k.In other words,to find a Hamil-tonian cycle of G with minimum cost is equal to finding a service-oriented VM placement method with minimum cost. From the above explanation,the proposed SOVMPO problem can be reduced to the TSP problem.Because the TSP problem is NP-hard,we conclude that the SOVMPO problem in our approach is also a NP-hard problem.3.5Queuing analysisLetλ,r source,and n be the rate at which messages arrive at physical servers,the rate the virtual machines emit a message, and the average number of virtual machines associated with a physical,respectively.For simplicity,we assume that the pro-cessing time at physical machines can be neglected.Afterwards,we can regard the physical server as an M/G/1 queuing system due to the fact that the arrival process is Poisson with a rateλ.Let the random variable s and p denote the message service time and the probability that the queue is idle when a message is incoming,respectively.In addition, assume that the rate at which the physical server emits the message is r PS¼1TPS.As for the service time s,with the prob-ability p it will experience an average service time T PS2and with the probability1–p its average service time is T PS.After the calculation,we can obtainE s½ ¼p⋅T PS2þ1ÀpðÞT PS;ð13Þand E s2Âüp⋅T2PS3þ1ÀpðÞT2PS:ð14ÞIn addition,we can also know from the queuing theory that p=1−λ⋅s.Then,we haveE s½ ¼T PS2−λ⋅T PS;ð15ÞandE s2Âü1ÀλE s½ðÞT2PS3þλ⋅E s½ ⋅T2PS:ð16ÞAs a result,the average delay d for each message at the physical server can be calculated asd¼E s½ þλE2s½ þE s2½ÀÁ2⋅1−λE s½ðÞ:ð17Þ4Simulation results4.1Planning caseWe illustrate the Tree and Forest algorithm with a simulated optimization case in this section.In this VM optimization case there are12physical servers and4service types,which means that4web role instance are placed within12servers.More-over,there are14worker role instances in4service types.The network topology of the cloud infrastructure is constructed as a fat-tree structure.The VM placement results for Tree and Forest algorithms are shown in Figs.2and3.Before explaining the optimization result we have four as-sumptions in our optimization algorithm.First,we assume that all network equipment are connected,which means there are no disconnection links between the current layer and upper layer.For instance,the physical server can connect with the edge switch and the edge switch is able to connect to the middle-tier aggregation.The same situation exists with the middle-tier aggregation and core router.Second,we assume that there are two kinds of communication costs between vir-tual machines.The first is the inbound communication cost which represents that the web role and work role instances exist within the same physical server.The second one is the outbound communication cost,which means that the work role instance is placed in a different physical server than the web role instance.Then,we utilize subnetting approach to subnet data center network.The left child under a middle-tier aggregation is assigned to the same class,and the right child is another class.Therefore,we can evaluate the number of inbound and outbound communication cost by calculating the classified packets.One thing should be mentioned,the outbound communication cost outweighs the inboundcommunication cost.The third assumption is that the power consumption of each physical server is calculated.Moreover, the server can be shut down if the utility is lower than a spec-ified threshold.Finally,we assume that the web role instance must be connected directly to a physical server.Unlike the web role instance,the worker role instance is able to connect with a physical server or a web role instance,which means that the worker role instance can link to the physical server through a web role instance.The VM optimization result for the Tree algorithm is shown in Fig.2.The Tree algorithm inclines the VM place-ment in the same physical server until the utility reaches theCore RouterMiddle-tier AggregationEdge SwitchPhysicalVirtualWeb RoleWorker Role Fig.2The VM optimization result by Tree algorithmCore RouterMiddle-tier AggregationEdge SwitchPhysical ServerVirtual MachineWeb RoleWorker Role Fig.3The VM optimization result by Forest algorithmmaximum utility δ.This implies that the depth-first-search method is applied in the Tree algorithm.We adopt the concept of service-oriented when deploy the different types of VMs.In order to decrease the unnecessary outbound communication cost,the proposed Tree algorithm utilizes depth-first-search approach to place the same service type of VMs into the same physical server.According to our assumptions the Tree algo-rithm achieves high power consumption efficiency with a lower communication cost.Furthermore,most of the idle servers are able to shut down to eliminate consuming power.However,an implicit problem of the Tree algorithm is that used servers are always in high utility.If the workloads of these servers increase,the server and system may crash due to overload.Therefore,the Tree algorithm requires a compat-ible migration mechanism.The VM optimization result for the Forest algorithm is shown in Fig.3.According to the breath-first-search method applied to the Forest algorithm,most physical servers are ex-ecuted using few VM role instances.The Forest algorithm achieves better computation load balancing between physical servers,hence the probability of system failure is much lower than that for the Tree algorithm.Nevertheless,parts of VM role instances in the same service may execute between dif-ferent physical servers.As stated before,the outbound com-munication cost of the Forest algorithm is greater than that forthe Tree algorithm.The average server utility is low,meaning that most of the power consumption is wasted.4.2Simulation resultsTo verify the performance and improvement we used Dev-C++5to implement the proposed algorithms.Each result is repeatedly simulated five times to the average.The proposed algorithms are compared with the benchmark method named Best Fit algorithm,which represents the VM placement meth-od without the service-oriented concept.The Best Fit algo-rithm always places the most suitable VM in the same phys-ical server according to its ’utility and deploys the VMs to a new physical server until the utility of previous server is full.In the simulation experiment the number of physical servers was 30.Each service includes at least one web role instance and one worker role instance.Therefore,we assume that the number of web roles is the same as the number of services and the worker role instances are always three times the number of web role instances.For example,if the number of services is 100,the number of web role instances is also 100and the worker role instances number 300.There are 50web role instances and 150worker role instances in the general simu-lation case.The cloud infrastructure network topology is theTable 2Simulation parametersVariables/parameters Value Number of physical servers 30Number of services50Number of web role instances 50Number of worker role instances 150Cloud infrastructure topology Tree Maximum power of one server 500(W)Server idle status threshold 30(%)Maximum utility rate90(%)Fig.4Simulation results of calculationtime Fig.5Simulation results of total powerconsumptionFig.6Simulation results of average utility。