Figure 2 - available via license: Creative Commons Attribution 3.0 Unported
Content may be subject to copyright.
Deployment architecture of CSNS OpenStack 

Deployment architecture of CSNS OpenStack 

Source publication
Article
Full-text available
Cloud computing can allow for more flexible configuration of IT resources and optimized hardware utilization, it also can provide computing service according to the real need. We are applying this computing mode to the China Spallation Neutron Source(CSNS) computing environment. So, firstly, CSNS experiment and its computing scenarios and requireme...

Context in source publication

Context 1
... are applying openstack [3] to the China Spallation Neutron Source(CSNS) computing environment, and a testbed based on openstack has been deployed, as shown in Figure 2. In order to provide incessant services, we deploy two control nodes to provide basic control and network service, control service is the hot standby architecture and network service is the cold standby architecture. ...

Similar publications

Preprint
Full-text available
The performance levels of a computing machine running a given workload configuration are crucial for both users and providers of computing resources. Knowing how well a computing machine is running with a given workload configuration is critical to making proper computing resource allocation decisions. In this paper, we introduce a novel framework...
Article
Full-text available
This introduction begins by posing the question that this Special Issue addresses and briefly considers historical precedents and why the issue is important. The discussion then moves on to the consideration of important milestones in the history of computing, up until the present time. A brief specification of the essential components of computati...
Preprint
Full-text available
We report our progress on the project for solving larger scale quadratic assignment problems (QAPs). Our main approach to solve large scale NP-hard combinatorial optimization problems such as QAPs is a parallel branch-and-bound method efficiently implemented on a powerful computer system using the Ubiquity Generator (UG) framework that can utilize...
Article
Full-text available
Byte-addressable non-volatile memory (NVM) is going to reshape conventional computer systems. With advantages of low latency, byte-addressability, and non-volatility, NVM can be directly put on the memory bus to replace DRAM. As a result, both system and application softwares have to be adjusted to perceive the fact that the persistent layer moves...
Preprint
Full-text available
Microservice and serverless computing systems open up massive versatility and opportunity to distributed and datacenter-scale computing. In the meantime, the deployments of modern datacenter resources are moving to disaggregated architectures. With the flourishing growths from both sides, we believe this is high time to write this vision paper to p...

Citations

Article
Full-text available
To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.