Using Virtualization Technology for the User Authorization System

被引:2
|
作者
Polenov, Maxim [1 ]
Guzik, Vyacheslav [1 ]
Lukyanov, Vladislav [1 ]
机构
[1] Southern Fed Univ, Dept Comp Engn, Taganrog, Russia
来源
SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3 | 2017年 / 575卷
关键词
Virtualization; Wireless network; Authorization system; Database; Virtual machine; Server;
D O I
10.1007/978-3-319-57141-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper deals with the use of virtualization technology for the development of software system that supports authorization of Wi-Fi networks users. The suggested approach is to use two databases of operators and users, implemented on MySQL, and two subsystems of registration and authorization to be placed on a virtual machine. The paper presents the organization and a general algorithm of the authorization system operation, as well as the load analysis of server with the authorization system. Here considered the graph of hardware resources loads used by the virtual machine. Using the hypervisor allows changing the configuration and provides the possibility to monitor the virtual machine, the necessary disk space, the memory consumption and CPU usage.
引用
收藏
页码:192 / 200
页数:9
相关论文
共 50 条
  • [31] Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology
    Wen, Yan
    Zhao, Jinjing
    Chen, Hua
    Huang, Minhuan
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 31 - 38
  • [32] Process virtualization theory and the impact of information technology
    Overby, Eric
    ORGANIZATION SCIENCE, 2008, 19 (02) : 277 - 291
  • [33] Research on Application of Virtualization in Network Technology Course
    Ou ZhiQiu
    Zhou Yue
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 357 - 359
  • [34] VIRTUALIZATION TECHNICAL THINKING WITHIN THE INFORMATION TECHNOLOGY
    Lis, Robert
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2014, 8 (24): : 90 - 95
  • [35] Integration of Virtualization Technology into Network Security Laboratory
    Li, Peng
    Mohammed, Tijjani
    FIE: 2008 IEEE FRONTIERS IN EDUCATION CONFERENCE, VOLS 1-3, 2008, : 1252 - 1257
  • [36] User Oriented Resource Management With Virtualization: A Hierarchical Game Approach
    Wang, Lingxia
    Yang, Chungang
    Wang, Xinwei
    Yu, F. Richard
    Leung, Victor C. M.
    IEEE ACCESS, 2018, 6 : 37070 - 37083
  • [37] Improving the user experience of the rCUDA remote GPU virtualization framework
    Reano, Carlos
    Silla, Federico
    Castello, Adrian
    Pena, Antonio J.
    Mayo, Rafael
    Quintana-Orti, Enrique S.
    Duato, Jose
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (14) : 3746 - 3770
  • [38] Identifying critical factors for corporate implementing virtualization technology
    Li, Shing-Han
    Yen, David C.
    Hu, Chung-Chiang
    Lu, Wen-Hui
    Chiu, Yung-Chen
    COMPUTERS IN HUMAN BEHAVIOR, 2012, 28 (06) : 2244 - 2257
  • [39] I/O Scheduling by Using Multi-network Interfaces of Virtualization System
    Xie, Xia
    Zhu, Haiqing
    Cao, Wenzhi
    Jin, Hai
    Yuan, Pingpeng
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1347 - 1354
  • [40] FPGA virtualization deployment based on Docker container technology
    Long, Xiangmeng
    Liu, Baohua
    Jiang, Feng
    Zhang, Qingjie
    Zhi, Xiaoli
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 469 - 472