Using Virtualization Technology for the User Authorization System

被引:2
|
作者
Polenov, Maxim [1 ]
Guzik, Vyacheslav [1 ]
Lukyanov, Vladislav [1 ]
机构
[1] Southern Fed Univ, Dept Comp Engn, Taganrog, Russia
来源
SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3 | 2017年 / 575卷
关键词
Virtualization; Wireless network; Authorization system; Database; Virtual machine; Server;
D O I
10.1007/978-3-319-57141-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper deals with the use of virtualization technology for the development of software system that supports authorization of Wi-Fi networks users. The suggested approach is to use two databases of operators and users, implemented on MySQL, and two subsystems of registration and authorization to be placed on a virtual machine. The paper presents the organization and a general algorithm of the authorization system operation, as well as the load analysis of server with the authorization system. Here considered the graph of hardware resources loads used by the virtual machine. Using the hypervisor allows changing the configuration and provides the possibility to monitor the virtual machine, the necessary disk space, the memory consumption and CPU usage.
引用
收藏
页码:192 / 200
页数:9
相关论文
共 50 条
  • [21] Network Function Virtualization Technology: A Survey
    Wang J.-W.
    Zhang X.-L.
    Li Q.
    Wu J.-P.
    Jiang Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (02): : 415 - 436
  • [22] Virtualization at the Network Edge: A Technology Perspective
    Kakakhel, Syed Rameez Ullah
    Mukkala, Lauri
    Westerlund, Tomi
    Plosila, Juha
    2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, : 87 - 92
  • [23] Virtualization for Distributed Ledger Technology (vDLT)
    Yu, Fei Richard
    Liu, Jianmin
    He, Ying
    Si, Pengbo
    Zhang, Yanhua
    IEEE ACCESS, 2018, 6 : 25019 - 25028
  • [24] The application of Virtualization technology in Grid Computing
    Zhang Cheng
    He Dan
    Xiao Jianlian
    Li Yang
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1380 - 1383
  • [25] Virtage: Hitachi's Virtualization Technology
    Ueno, Hitoshi
    Hasegawa, Satomi
    2009 4TH INTERNATIONAL CONFERENCE ON GRID AND PERVASIVE COMPUTING WORKSHOPS: (GPC WORKSHOPS), 2009, : 117 - 123
  • [26] Building Fault-Tolerant Embedded System Using Virtualization
    Sohn, Sunghoon
    ADVANCED SCIENCE LETTERS, 2016, 22 (11) : 3628 - 3632
  • [27] Virtualization of Operating System Using Type-2 Hypervisor
    Vojtesek, Jiri
    Pipis, Martin
    SOFTWARE ENGINEERING PERSPECTIVES AND APPLICATION IN INTELLIGENT SYSTEMS, VOL 2, 2016, 465 : 239 - 247
  • [28] EVALUATION OF SCALABILITY AND PERFORMANCE OF SOLARIS TRUSTED EXTENSIONS USING CONTAINERS VIRTUALIZATION TECHNOLOGY
    Daci, Genti
    Vrenozaj, Enid
    4TH ANNUAL EUROMED CONFERENCE OF THE EUROMED ACADEMY OF BUSINESS: BUSINESS RESEARCH CHALLENGES IN A TURBULENT ERA, 2011, : 485 - 492
  • [29] Application of Virtualization Technology in Computer Experiments
    Zhao, Huiran
    Shi, Lei
    Zhu, Shujian
    2017 INTERNATIONAL CONFERENCE ON MATERIALS, ENERGY, CIVIL ENGINEERING AND COMPUTER (MATECC 2017), 2017, : 107 - 111
  • [30] Using Virtualization and Guacamole/VNC to Provide Adaptive User Interfaces to Disabled People in Cloud Computing
    Mulfari, Davide
    Celesti, Antonio
    Villari, Massimo
    Puliafito, Antonio
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 72 - 79