WO2009149588A1 - 基于虚拟化技术的计算机***及虚拟机创建方法 - Google Patents

基于虚拟化技术的计算机***及虚拟机创建方法 Download PDF

Info

Publication number
WO2009149588A1
WO2009149588A1 PCT/CN2008/001730 CN2008001730W WO2009149588A1 WO 2009149588 A1 WO2009149588 A1 WO 2009149588A1 CN 2008001730 W CN2008001730 W CN 2008001730W WO 2009149588 A1 WO2009149588 A1 WO 2009149588A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
computer
operating system
virtual
media
Prior art date
Application number
PCT/CN2008/001730
Other languages
English (en)
French (fr)
Inventor
蔡光贤
Original Assignee
Cai Guangxian
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cai Guangxian filed Critical Cai Guangxian
Priority to PCT/CN2008/001730 priority Critical patent/WO2009149588A1/zh
Priority to CN200880131559.0A priority patent/CN102177503B/zh
Publication of WO2009149588A1 publication Critical patent/WO2009149588A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances

Definitions

  • the present invention relates to the field of computers, and more particularly to a computer system and a virtual machine creation method based on virtualization technology. Background technique
  • the invention provides a computer system and a virtual machine creation method based on virtualization technology.
  • the computer system is characterized in that: the hardware of the computer comprises a specific memory firmware having a second operating system other than the first operating system stored in the hard disk of the computer, when passing through the BIOS of the computer or When the EFI selects to enter the second operating system, the second operating system is read from the specific memory firmware, and the control of the computer is delivered to the second operating system; the second operating system is characterized by the media object when booting The number identifies the media in the network or local, and combines the media into virtual machines on the file system of the second operating system through various media interfaces.
  • the invention provides a method for creating a virtual machine on a computer, wherein a special memory firmware other than a hard disk is installed on a motherboard of the hardware of the computer, and the first memory stored in the hard disk is stored in the specific memory firmware.
  • a second operating system different from the operating system comprising: when entering the second operating system by using a BIOS or EFI of the computer, reading the second operating system from the specific memory firmware, and delivering control of the computer to the first a second operating system; the second operating system controls the computer to connect to the network wirelessly or by wire, and identifies the media in the network or the local media by the number of the media object; the second operating system mediaizes the file system of the second operating system through various media interfaces Synthesize the virtual machine; start the virtual machine and run the guest operating system in the virtual machine.
  • FIG. 1 is a general block diagram of the architecture of a computer system and its theory in accordance with the present invention
  • FIG. 2 is a schematic diagram of media life permissions in a network in accordance with the present invention
  • FIG. 3 is a diagram illustrating the principle of combining media in a network in accordance with the present invention.
  • FIG. 4 is a schematic diagram of two combined models of the media combination principle of FIG. 3;
  • FIG. 5 is a structural comparison diagram of a computer running a virtual machine and a conventional computer according to the present invention;
  • FIG. 6 is a flow chart of a method of creating a virtual machine on a virtual machine based computer system in accordance with an embodiment of the present invention
  • FIG. 7 is a diagram showing a comparison of a file system of a VIOS and a conventional PC file system according to an embodiment of the present invention.
  • Figure 8 is a diagram showing a combination of a stand-alone virtual machine and a distributed virtual machine according to the present invention.
  • FIG. 9 is a schematic diagram showing the structure of an operation interface of a user management portion of a virtual machine based operating system according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram showing another operation interface of a user management portion of a virtual machine based operating system according to an embodiment of the present invention.
  • Figure 11 is a diagram showing a computer, intelligent system, computer language, and cloud computing implementation in accordance with the present invention. detailed description
  • FIG. 1 is a diagram showing the overall architecture of a computer system in accordance with the present invention.
  • the computer system according to the present invention is referred to as a sub-computer system. Accordingly, in order to distinguish various concepts and terms in a sub-computer system according to the present invention from corresponding concepts and terms in the conventional sense, a word "sub" is added before each term. Each of the parts will be described below with reference to FIG. 1.
  • Sub-media Computer Authentication Identity Media
  • Sub-entities Media includes a variety of physical devices, such as network servers, computers, switches, routers, network storage devices, network printers, and more.
  • Sub-virtual media includes a variety of virtual devices such as virtual computers, virtual hard disks, virtual switches, virtual optical drives, virtual processors, and more.
  • the only individual object in the cyberspace that can be distinguished from other sub-medias is the sub-number (CAI), which refers to the encoded form of the sub-media's individual object name.
  • the sub-virtual media individual object number is called the sub-virtual number.
  • the individual object number of the sub-media in the sub-system environment is called the real number (AID).
  • CAIMAI Sub-Media Application Interface
  • Sub-media media interface which is a standardized interface for sub-media media
  • Sub-virtual media interface which is a standardized interface for sub-virtual media.
  • the cyberspace in which submedias live is defined as the subnetwork (CAINET).
  • the specific network location in which sub-media survives in the sub-network space is defined as the sub-network address.
  • the sub-media communication protocol contains a set of mutually trusted secure network communication rules for communication between all sub-medias on the sub-network (ie, sub-virtual media and sub-media media), including the format that information must be used for network communication. And the meaning of the format, the syntax of the information format specified by the communication between the sub-media, the semantics of communication between the sub-media, and the sequence of the sequence of event processing when the sub-media communicates.
  • the difference in organizational structure between the subnet structure and the Internet structure is that there is no distinction between the physical characteristics of the server and the personal computer on the Asian Computer (CAIPC), only the sub
  • CAIPC Asian Computer
  • the sub-operating system on the sub-computer combines the information transfer and reflection (two-way transfer) service between sub-systems on the sub-network through the matt combination principle (described in detail later) into a cluster sub-server and gives other sub-servers.
  • the computer provides services.
  • the network address space is characterized by a similar subnetwork address distribution of the flat structure that is evenly distributed over the Earth's surface. Assign sub-media to the network address protocol on this sub-network space.
  • a distributed protocol for network address vector topology defined as the Subnetwork Address Protocol (CAIW ET).
  • the main communication method between sub-medias on the sub-network is a flat network vector structure supplemented by the wireless network as the main wired network.
  • the wired network different from the current Internet is the multi-layer network with the backbone wireless network as the information hotspot. Topological structure characteristics. Asian media exists in the Asian cyberspace environment under the Asian Media Survival License Agreement.
  • Each sub-media completes its creation in this sub-environment with a specific way of life performance and life cycle.
  • the agreement on the process of survival and death is defined as the sub-survival permit.
  • Sub-media survival mode has different characteristics and forms. Individual ILIC (private License), shared SLIC (Shareware), free WLIC (freeware), removable QLIC (Carry), non-removable XLIC (fiXed) cloneable CLIC (Clone), unclonable OLIC ( Only), overall
  • Each sub-media has its own unique sub-life cycle (Cycle), and each sub-media completes its process of generation and growth and extinction in this life cycle.
  • the definition of the time scale on the sub-life cycle is based on the observer's perceived perspective as the entry point. Seconds and minutes are the dividing points, one is the microscopic direction to subdivide the way to classify, and the other is the way in which the living habits are oriented in a macro direction.
  • the classification principle is the classification of the past and the present, and the classification of the "macroscopic and microscopic" methods.
  • the subspace of the classification of time and period is like the two sides of the copper coin.
  • the positive side is the time unit of the observer's normal time concept.
  • the starting point is continuously combined into hours, days, weeks, months, years, scorpions or centuries to Endless empty space; the negative side is the second minute to the end point to form a leap second, subtle, nanosecond, picosecond, femtosecond, Asian seconds to stop and still;
  • the time and the static of the yin are interconnected, the stop of synthesis is endless, and the end of time and space is the time and space of time. This is the sub-space concept of sub-media, time and space in sub-temporal environment.
  • Kunps Kun
  • the Asian Computer is a special form of sub-media, including sub-solid machines and sub-virtual machines. Virtual machines can only run on top of physical machines.
  • the physical machine TPC (Tme PC) is composed of different physical media into one computer. It is a container for virtual media and virtual machines to survive, also known as a host.
  • the virtual machine VPC (Virtual PC) is an application software. On this virtual machine, a real operating system such as Windows and Linux can be installed to provide services for customers, also called clients. There is a mother-child relationship between the host and the client, and the child machine can only run on the parent machine.
  • It is a physical computer that is the basis for the survival of sub-virtual media and sub-virtual computers. It is a container for sub-virtual media and its synthetic sub-virtual computer system. Sub-physical computers are a special form of sub-media media.
  • a sub-virtual computer is an application software.
  • the sub-virtual computer is a special form of sub-virtual media.
  • the sub-file system provides sub-virtual media in the form of sub-media files stored in this container.
  • the sub-media is stored as a file on the sub-file system in a sub-computer and combined into sub-virtual machines through these sub-media files.
  • Sub-media files can be logically divided into sub-media application interface files and sub-media data manipulation files.
  • the sub-operating system on the sub-computer in the sub-network space-time environment combines several sub-medias into a sub-virtual machine system, which can be based on the matt combination principle (RGB-10) of 2nd and 3rd order mixed model computers (described later) ) to run computer systems in parallel and pool into cloud computing and logical virtual subservices Computer operating system - sub-operating system
  • the Computer Authentication Identity Virtual Operation System (CAIVOS) is installed on a physical machine, is a sub-operating system that can run a virtual machine, and is an implementation form of the CAIPC model QPC (QPC is only a computer according to the present invention defined herein).
  • QPC is only a computer according to the present invention defined herein.
  • the sub-operating system is embedded in the operation, and the English cartridge is called VIOS (Virtual Inner Operation System).
  • the sub-system is a real operating system running on a sub-virtual machine. It is an operating system running in a sub-virtual machine on VI0S, such as Red Hat Linux, Windows, etc.
  • the sub-operating system plays a role between sub-physical computers and sub-virtual computers.
  • VIOS network communication and sub-network media resource sharing and management on the sub-computer, which is a guest operating system that is different from the sub-subsystem running for the actual application.
  • VIOS is the parent environment for the generation and operation of sub-virtual machines. It provides a sub-media application interface that can be identified on a sub-network. It must be closely integrated with the hardware to take full advantage of the hardware and virtual machine performance.
  • the sub-operating system consists of the system core, sub-interface, and user interaction interface.
  • the system core of the sub-operating system includes: process management, memory management, external storage management, hardware device driver, sub-file system driver, sub-network management protocol, sub-combination protocol, sub-life license agreement and other core components.
  • the sub-interface includes: a standardized physical media interface (ie, a physical application driver interface) and a virtual media interface (ie, an interface such as a standardized full virtual drive and a semi-virtual drive).
  • a standardized physical media interface ie, a physical application driver interface
  • a virtual media interface ie, an interface such as a standardized full virtual drive and a semi-virtual drive.
  • the subinterface exists on the sub-OS in the form of a sub-interface application file.
  • the user interaction interface includes the HMI (Hypervisor Manager Interface) and the sub-subsystem application TMI (Top Manager Interface).
  • HMI and TMI implement the user interaction menu through the management toolbars HMB (Hypervisor Manager Bar) and TMB (Top Manager Bar). HMB and TMB can switch between each other.
  • HMI is a user management interface for managing QPC, including user management, system settings, network applications, sub-virtual machine management, command line interaction and entertainment management.
  • HMI is the internal management interaction interface of VIOS, which can be closed by HMI users. Taiwan entity sub-computer.
  • TMI is the user management interface of each sub-virtual machine in QPC, including each The sub-system running on the local sub-virtual machine and the remote computer operate a unified sub-computer user application management interface, and the user can quickly switch the sub-sub-operating system running on different virtual machines on the TMI on the VIOS, or The sub-virtual machine running on the QPC forcibly shutting down at TMI.
  • the sub-protocol is a protocol that uses the principle of matt combination. It is a combined protocol of identifiable nodes on the sub-network. Each identifiable node complies with this basic protocol and combines and changes into different sub-system combinations.
  • the matt combination principle (RGJB-10) is the theoretical basis for the design of the sub-computer system (iYAF4PC) model.
  • the sub-computer system model is combined based on this sub-mathematical theory and logical operation combination.
  • the principle of matt combination is based on a sub-mathematical mathematics (CAI1 UM), with the sub-number (CAIONE) as the research object, and the sub-matrix for the sub-mathematical field of the new concept of logical operation processing. It is based on the concept of sub-spacetime (CAIXNET), and uses the sub-combination law as the basis law for the study of sub-images and defines and infers the relationship between the various laws.
  • sub-image system the definition of the sub-dimensional, the upgrade law of the sub-dimensional, the relationship law between the sub-dimensions, the sub-optical chord transfer constant between sub-images, the sub-temporal relationship, the sub-time conservation theory, the sub-light string transfer constant, sub- Like the relationship between time and space, the definition of sub-incorporeal, the theory of the combination, the sub-string self-lifting, the spatial expansion of the sub-body, the sub-string change rate and the second-order and third-order phenomena of the sub-renewal law (ie, the sub-reflection law) The law of operation of various sub-image numbers.
  • the sub-computer system structure and model core portion according to the present invention are designed according to the regression characteristics of the sub-points of the matt combination principle.
  • CAIONE CAI ONE
  • CAI ONE is an abstract sub-point that can be identified in the sub-network time and space and can no longer be divided into partial representations as sub-images. It is the abstract body node of a sub-media object, or sub-point, which is different from the pure point of geometry. It includes abstract sub-points of sub-entity media and sub-virtual media, sub-reality caiTone (CAI True One) and sub-virtual caiVone (CAI Virtual One).
  • the natural number of the sub-natural number (CAINAT) is the sub-natural number of the sub-points of the sub-temporal genus Natural.
  • the CAINUM (CAI Number) is the quantitative relationship of the sub-images in sub-space, and the sub-point is the basic operational element of the sub-number in the sub-system.
  • the number of sub-images CAI1NUM (CAI ONE Number) is the mathematical operation rule and logical deduction of sub-images (sub-points) and sub-numbers, collectively referred to as sub-image numbers.
  • CAICOMB Composite
  • the sub-combination law CAICOMB is the variation law of the quantity and relationship of sub-systems combined into sub-systems in the sub-temporal sub-environment.
  • the internal sub-images are combined into partial sub-systems, which are combined with pure mathematics. The law is similar.
  • CAI1 SYS (CAI ONE System) is defined as a sub-combination law in which two or more sub-points are composed of a new system as a sub-image system.
  • the sub-grouping theorem of the sub-image system is a sub-small system in which the sub-systems of the sub-system are successively progressively divided into relatively independent basic sub-images by the entanglement and division method.
  • the numerator 1 represents a relatively independent sub-system, and the denominator is a detailed component of its system that is continuously refined into a basic component.
  • CAI Dimension is based on the sub-combination law in the sub-temporal environment.
  • the sub-images are combined into a new sub-system defined as a sub-dimensional in one dimension.
  • the number of sub-points in the new Asian system is sub-number, and one sub-system composed of sub-atoms is sub-dimensional.
  • sub-dimensional is a sub-system of sub-points of the same nature.
  • CAIALLO (CAI Allotrope) is the upgrading law of the sub-dimension of the sub-image system composed of two groups of sub-images in the sub-temporal space to the sub-dimensional of the new sub-system. It is an intrinsic combined sub-relationship of sub-dimensional expansion of sub-dimensions in sub-space.
  • the inter-sub-dimensional relationship law CAINEXU( exus) is the relationship between the two sub-dimensions when the two sub-dimensions of the sub-system of sub-timetime sub-pixels are combined into a new sub-system.
  • sub-light string constant CAIBEAM Beam
  • the transfer relationship between the sub-images in sub-space and time is defined as the matt string, that is, the relationship between the sub-points.
  • the transfer relationship is constant, the relationship between the sub-images in the sub-space is represented by a constant, which can be expressed as a matte chord constant transfer ( C ).
  • a sub-image From the subspace of the time and space, a sub-image has two different modes of transmission in the sub-system.
  • the direct and indirect modes express the characteristics and sub-renewal laws transmitted between the two sub-points.
  • the sub-circulation period CAI2CYC (Two CYC) is a sub-cycle period in which the two groups of sub-systems interact with each other and interact with each other.
  • sub-space and time The concept of sub-space and time is the life cycle of sub-media survival, and the space-time view is classified by the observer's perspective. The observer perceives the angle of view to subdivide this time scale into infinitesimal. Qon and confluence are infinitely large. Qon, Q is the limit of time in subspace and space is also the limit of space. The Asian media survived in this sub-space in the sub-permittance of sub-survival and sub-life time periods. Subspace is the unified body number (Qon) of the limit space and the limit time.
  • CAICOC (CAI CYC on CYC): is the ultimate conservation from the subspace time interval. The equation is as follows; where TO is the life cycle time scale of the observer's sub-image, and T1 is the amount of the time scale vector at the combined life cycle of the sub-image, whose vector sum is a constant Kun number (Qon) .
  • QC Quality Constant: The relationship between the sub-systems of sub-systems in sub-temporal sub-images. The matt chord is the sub-life cycle of sub-space (CAICYC). The amount of vector ruler does not change.
  • the imaginary number in the sub-image is reasonable, and it is a phenomenon that occurs due to the bidirectional nature of the time vector.
  • Sub-system sub-point sub-light chord relationship The number of sub-systems and the number of sub-points is equal to the sum of the number of matt strings and the number of matt strings.
  • a sub-system consists of a sub-image Equation holds.
  • the subspace is the mutual transmission relationship between the sub-optical strings between the sub-images in sub-space and time, and the spatial relationship between sub-space-time sub-points.
  • Lemma The relationship between the different systems in the sub-system (CAINEXU) is the multiplication between the sub-dimensional and the sub-dimension of the life cycle of the sub-image and its sub-image to form a new sub-system, subspace S.
  • the sub-images of the sub-images in the sub-space of the sub-life cycle change are the same geometric spaces in pure mathematics.
  • the Qon is composed of the entry point 0 of the observation object at the observer's perceptual angle and 0 and the other pole 0 of the subspace-time limit.
  • the other extreme singularity is the spatial point of the time limit of the sub-life permit and the intersection of the other points of the sub-harmony of the observer's perceptual point of entry and the convergence of the sub-point Q, the sub-point Q is the Kun number, sub- Empty number Q.
  • the Yakun number in the subspace concept is the theoretical basis for the rationality of pure mathematical calculus used in sub-mathematics.
  • CAIINFA CAI Inflate
  • CAISYS Asian-African life-period cycle
  • the sub-system is composed of three unit sub-images.
  • the difference between the ultimate gain and the impairment of the sub-system is the sub-optical chord-expanded expansion Qtwo, and its equation is expressed as:
  • CAI QI CAI Quab Interaction
  • CAIQI Sub-independent
  • the sub-system self-sublimation sub-media system is a sub-substance; the sub-substance is under the sub-light combination principle. Self-sublimation and return to the Asian inanimate state, this is the cycle of sub-media life in the sub-temporal environment.
  • Yawu was sublimated into a sub-media under the combination of sub-lights, abbreviated as M.
  • CAIQI * ( C+C ) Energy
  • the macroscopically sub-independent change is the performance of the sub-energy CAIE (CAI Energy) in the sub-environment, which is abbreviated as E.
  • G, B, R are three different color Asian elephants (CAIONE), (G&) G, B sub-image sub-image system, R is used to update the combined G&B sub-image system as a new sub-image system ( CAI1 SYS).
  • CAIQUAR sub-system update law
  • the system relational theorem of three-color (RGB) sub-images is obtained: the relationship between the sub-images composed of the sub-systems of the sub-system consisting of one sub-image (CAISYS) is added to the system composed of two sub-images. The equation is expressed.
  • the substring self-elevation constant equation (RGB) is the self-elevation of the sub-image system composed of three sub-images in sub-space and the relationship between the sub-elements.
  • the equation is:
  • the system relational theorem of the three-color sub-image is defined as the sub-string theorem (RGB) of the sub-system.
  • RGB is the sub-combination law of sub-numbers, the intrinsic relationship between the sub-alliment of the sub-system and the sub-new law.
  • CAIQTRAN CAI Transformation
  • A, B, and C are sub-variation and geometric angle, and sin is the ratio.
  • sub-matrix which is the degree of change of sub-image in sub-system.
  • the sub-reflection of the matt chord occurs between the sub-images on the system consisting of sub-images in the third order of the matt combination principle (RGB-10).
  • the third-order operation rule of the matt combination can be used to calculate the matt The combined reflection law.
  • the third-order equation of the matt combination principle (RGB-10):
  • Cai2net is a planar combination of two-order mathematical models of matt combination
  • net3sys is a three-dimensional combination of matt combination mathematical models.
  • the combination of cai2net's system combination and net3sys's system constitutes the theoretical framework of the sub-computer iYAF4PC and the sub-computer (iYAF4PC) and sub-server (iYAF4Server) models.
  • the second-order matt combination cai2net method sub-media in the sub-network sub-space of the sub-life cycle according to the matt combination principle to form a computer model of the mathematical model of the system, this combination of the sub-network space
  • the sub-media is the starting node of the sub-entity computer
  • the sub-number of each node is the identification number corresponding to each sub-media, that is, the logical identifier of the sub-media.
  • each sub-computer connects to the sub-virtual file operating system on each physical computer through the CAIVOS operating system and assembles into a large virtual file operating environment.
  • each sub-virtual logical data file and sub-interface application file are combined into different sub-systems and sub-virtual computers through secure authentication and matt combination, and each sub-system is combined into grid storage and Distributed computing, etc.
  • the sub-system environment automatically recycles expired junk sub-virtual files and sub-numbers to automatically manage the balance of resources of the sub-environment system composed of sub-media
  • the sub-virtual operating system transparently separates the hardware and sub-systems on the virtual machine.
  • Dependencies between the running real-world operating systems, wrapping game files in sub-media media files, standardizing application files, etc. can be run in the CAIVOS system on the QPC without the need for users to set up and install applications and games.
  • Model 1 in the sub-computer environment, set node 0 as the entity of the computer (sub-solid machine Is a special form of sub-media media), when node 1 is a virtual computer (sub-virtual machine is a special form of sub-media), sub-virtual computer can be accessed through a sub-physical computer, and the characteristics of second-order information transmission through the matt combination principle
  • sub-virtual computer can be accessed through a sub-physical computer, and the characteristics of second-order information transmission through the matt combination principle
  • the sub-virtual media is the information transfer relationship and the information finally merges to the node 1 as the core.
  • the sub-virtual media is the information transfer relationship and the information finally merges to the node 1 as the core.
  • Model 2 in the sub-computer environment, let node 0 be the physical computer environment, node 1, node 2, node 3... be virtual media media, through the matt combination of the second-order principle node 0 sub-entity media The information aggregation of each sub-virtual media is combined into various application environments on the sub-virtual media of node 1.
  • Model 3 in the sub-computer environment, let node 0 be sub-entity media, node 1, node 2, node 3... be sub-virtual media or sub-media media, combined into a system by matt combination principle, this node 1 is a system composed of sub-entity media.
  • Model 4 in a sub-computer environment, the sub-virtual media is logically divided into sub-real operating system media, sub-application media, and sub-data media packages, which are combined into a sub-computer through sub-entity media assembly through the second order of matt combination principle. operating system.
  • the sub-entity media is a sub-card of an entity.
  • This card contains the combined information of each sub-media.
  • the information of each sub-media in different sub-computer entities is combined into a personal sub-virtual computer, that is, in the sub-network environment.
  • the card is combined into a personal sub-virtual computer system.
  • the user combines a sub-card to form a sub-virtual computer that is uniquely moved by the individual on the sub-network, that is, the user uses the sub-card. Continue writing on one Asian computer to another Asian computer.
  • Model 6 in the sub-computer environment, in the network environment, there is no local and remote distinction in the network environment. Only the sub-media is distinguished from the network. The user does not have to care about the computer interacting with it in the sub-computer system environment. The computer is also a local computer, and the user interacts with the Asian computer in a transparent and unified way.
  • Model 7 in the sub-computer environment, each sub-media is combined into a sub-system through sub-interfaces in a sub-environment, and a sub-system and a sub-entity are connected between sub-systems A combination of hardware and software formed by a sub-protocol.
  • the sub-computer system is a sub-computer system with its unique sub-computers that provides users with services through sub-combination of different sub-medias in sub-systems on the sub-network. surroundings.
  • the 3rd-order matt combination net3sys through the net3sys information combination transfer and reflection method, integrates multiple QPC resources to form a cluster server on the network.
  • the sub-computers are combined in the sub-environment to form an abstract logical server for cloud computing, and the three-dimensional combination of sub-optical combination principle computer models.
  • Model 1 in the sub-computer environment, each sub-system is combined into a large sub-system by combining the 2nd and 3rd order of matt combination to provide a virtual machine group to serve as a sub-cloud server, and design matt
  • a matt computer consisting of a processor, matt memory, and matt communication mode, and a high-performance ternary matt computer provides a binary subinterface to run the sub-system.
  • Model 2 in a sub-computer environment, each sub-real computer entity on the sub-network is based on a wireless connection to implement non-hierarchical communication and combination of sub-computer systems.
  • Model 3 In a sub-computer environment, a sub-virtual computer in a sub-computer environment is combined with net3sys into stored information on a distributed sub-network.
  • Model 4 in the sub-computer environment, based on the theory of integration, to generate a sub-environment sub-media self-regulating intelligent system on the sub-network to manage the entire sub-environment.
  • Model 5 the mat3 combination of the net3sys virtualization technology model can help the server to allocate resources more reasonably in two directions.
  • One direction is the typical representative partition, which is to virtualize a physical server into several independent logical servers.
  • a typical representation of a direction is a grid, which virtualizes several decentralized physical servers into one large logical server, dictating the decentralized physical servers like the resources of the same server.
  • the identifiable network combination server is a large server composed of various sub-computers. The sub-virtual computers are distributed in each sub-computer, and the sub-virtual units are combined into sub-servers, and the processing speed is faster than the physical servers. It is a virtual cluster server that combines the resources of multiple QPCs together on the network.
  • Net3ys is a matt combination of the virtual server (abstract server) in space. Transmitter, that is, the performance of the three-dimensional spatial combination mode under the matt combination (RGB-10) model.
  • the principle of matt combination is a regression mathematical model in which the sub-system consisting of sub-images is divided into two and three, and the circle is rounded and the three-in-two is combined into a circle.
  • the mathematical model of this data structure has the characteristics of tree and mesh. It is similar to but different from the traditional geometric triangle and circle combination. It takes the sub-point as the fundamental research object and explains the relationship between its points. And the change law of the sub-system composed of its sub-points is sought, and the geometry of traditional pure mathematics is the basic research object of the line representation. The special form of the point where the line intersects is the change of the geometric line of the reference point.
  • the matt combination principle is based on a computer chip that can be used in binary and 3-integrated 2X3 cycle cycles, new sub-processing chips, sub-networks, sub-intelligent systems, and sub-data structures of sub-computer languages.
  • Figure 5 is a diagram showing an architecture comparison of a computer running a virtual machine and a conventional computer in accordance with the present invention.
  • the left diagram of Figure 5 is the architecture of a traditional computer.
  • the hardware of a conventional computer includes a CPU, a memory, a motherboard, a hard disk, and various peripheral components (not shown).
  • the motherboard of the conventional computer only has a basic input/output system BIOS (an extension is adopted in some computer systems).
  • the firmware interface (EFI) instead of the BIOS), which stores the BIOS program.
  • the computer according to the present invention has a high-speed readable and writable memory firmware installed on the motherboard, and a virtual internal operating system (hereinafter referred to as a Virtual Inner Operation System) is stored in the memory firmware.
  • VIOS virtual internal operating system
  • the virtual internal operating system may be an operating system based on a Linux kernel.
  • QPC the computer according to the present invention is named QPC. It should be understood that the QPC is only one of the names of the computer of the present invention, and other names may be used by the computer of the present invention.
  • VIOS is mainly composed of three parts: system kernel (kernel), virtual driver interface and user management module.
  • system core includes process management, memory management, memory management, hardware device driver, file system driver, network management, and authentication license agreement.
  • the virtual drive interface includes a full virtual drive interface and a semi-virtual drive interface
  • the user management module includes a tool interface for the parent system management and a tool interface for the subsystem management, which will be described in detail later.
  • step S101 the computer is started, and the calculation is entered.
  • Machine BIOS the user can select whether to switch to the VIOS mode (S102) through the computer's BIOS or EFI (Extensible Firmware Interface), here, it is assumed that the BIOS selects.
  • a switching interface for switching the VIOS firmware system is set in the BIOS. If the VIOS option is turned off (OFF) in the BIOS, the computer reads the operating system stored in the hard disk (ie, a conventional operating system such as Windows, Linux ⁇ Unix, etc.) and operates according to the operating system (S103).
  • the BIOS When the VIOS option is selected to be ON in the BIOS, the BIOS reads the VIOS directly from the memory firmware after the computer is booted up, and delivers control to the running VIOS (S104). After entering the VIOS, the VIOS connects to the network by wire or wirelessly, and identifies different computer media by media number (S105). Next, the VIOS combines the computer media into a virtual machine through a virtual drive interface (S106). Finally, power on the virtual machine and run the guest operating system on the virtual machine.
  • the guest operating system can be any existing operating system. In this way, one or more virtual machines can be created on top of the computer of the present invention.
  • another virtual machine can be created according to the above process through the user management part of the VIOS (including the parent operation interface and the sub-operation interface), and another virtual machine is run on the created virtual machine.
  • a sub-operating system Switching between multiple virtual machines is possible through VIOS user management.
  • the user management section according to the present invention will be described later.
  • FIG. 7 is a diagram showing a comparison of a file system of a VIOS and a conventional PC file system according to an embodiment of the present invention.
  • the boot system reads the boot information at zero track and loads the operating system into memory to manage the computer.
  • the QPC works without switching to the VIOS, it is the same as the existing traditional operating system, booting the operating system (such as windows) from the zero track when starting the computer, and distributing the system files from the zero track.
  • the QPC works under the control of the VIOS, it only needs to read the information and security authentication information of the virtual machine from the hard disk.
  • the configuration information of the basic virtual machine of the VIOS, user security information, and the like are stored in the last area of the hard disk.
  • the VIOS reads the virtual machine information from the last area of the hard disk and reads and secures the virtual machine from the virtual file system after reading the security authentication information.
  • the QPC according to the present invention can make traditional operating system files (for example, NTFS under FFS32, FAT32 under Windows, EXT2/EXT3 under Linux).
  • the sub-media file includes a sub-media interface application file and a sub-media data operation file, and logically classifies the sub-media data operation file on the sub-virtual file system into sub-media virtual files (QVFILE) of three file representations, including sub-sub-files.
  • QVFILE sub-media virtual files
  • QOS operating system
  • QAPP virtual application files for sub-applications
  • QDATA virtual data files for sub-data
  • the entity sub-computers combine these logical sub-media virtual files into a sub-virtual computer (QVPC) system.
  • the identification schemes of these sub-logical virtual files are placed in the sub-number as the basis for the combination of the distributed combination virtual machines.
  • Sub-logical virtual file encoding identification class table
  • the 4-digit binary code is used to form the logo.
  • the first coded identifier is 0.
  • the second-order planar network combination type (cai2net) mode that identifies the matt combination 1 identifies the third-order (net3sys) mode.
  • the last three digits of the binary coded identifier are QM, QDATA, QAPP, QAPP+QDATA, QOS, QOS+QDATA, QOS+QAPP QSYS file arrangement.
  • QVPC is a specific implementation of a sub-virtual machine, including a stand-alone virtual machine QAVPC (Alone Virtual Machine) and a distributed virtual machine QSVPC (Scattered Virtual Machine)
  • the combination of sub-numbers, the sub-media on the sub-virtual computer, the combined information of the numbers on the sub-network is stored on a sub-card, on a unified sub-network in different sub-meters
  • the combination state of this sub-virtual computer continues on the computer, and the user is used to continue writing on different computers.
  • the specific identification sub-number of the sub-media in the sub-computer model is the basic part of the sub-media operation.
  • the sub-number (QID) code identification protocol includes the sub-media's specific survival scale quantity (QINUM) on the sub-media's life license, and adds the number identification of the sub-media manufacturer and the sub-media product feature number. protocol.
  • QM is a specific implementation of Sub-Media (CAIM), where QTM and QVM are implementations of the Sub-Media (CAITM) model and Sub-Virtual Media (CAIVM).
  • the number (QID) is the specific implementation of the sub-number (CAI).
  • the sub-media media on each QJPC has only one unique coded real number (TID) that can be identified on the network.
  • the QVM running on each QPC also has only one virtual code (VID) that can be identified on the network.
  • TID and VID are defined as a 64-bit binary serial number, which can be represented by 4 hexadecimal digits of 4 groups, where T, V, X are hexadecimal.
  • the virtual number (VID) and the real number (TID) need to have a different representation in the form of the code (QID). This is achieved by distinguishing between physical media (TM) and virtual media (VM) on the network by first identifying the virtual number (VID) and real number (TID) on the first digit of the binary code (QID).
  • the real number (AID) is the number that uniquely identifies and represents a sub-media (CAIM) object on the network.
  • the entity real number (TAID) is a real number of a 64-bit binary entity object, and the equation is as follows.
  • VAID virtual reality number
  • VAID TTTT:TTTT:TTTT:TTTT:TTTT::VVVV:VVVV:WVV:VVVVV
  • QTPC network-aware physical machine
  • Solution A is a solution that is extended to be compatible with the MAC address of the network card on the existing network, that is, the 48-bit binary that retains the MAC address, including the 24-digit manufacturer's company number and the 24-bit product number. The remaining 16-bit binary number identifies the entity's real number (TAID) scheme.
  • TID real number
  • the solution is to embed a firmware on the computer hardware and motherboard that contains the real number (TAID) of the entity that can be identified on the network, so that the computer can identify its entity on the network during startup and operation.
  • Real number (TAID) device The number (QID) features and the virtual number (VID) and the real number (TID) are distinguished in the encoding mode, and can be recognized on the network whether the computer is a physical machine (TPC) or a virtual machine (VPC). And manage various computers and virtual machines and physical machines on the network, which can better control and manage the flooding of virtual machines on the network, and can identify which virtual media the virtual machine is queried by the AID. . Also in the QID code grid Add sub-survival mode (CAIMOD) and sub-virtual file combination.
  • CAIMOD sub-survival mode
  • Option B is a brand new Entity True Numbering (TAID) scheme that redefines the True Numbered (TAID) 64-bit or 128-bit scheme.
  • TID True Numbering
  • the sub-network address compatible protocol scheme (IPv6Q) is a scheme for expanding the network address of the sub-network address specifically under the Internet protocol compatibility.
  • IPv6Q The sub-network address compatible protocol scheme
  • the sub-time-space model is used to program the sub-life cycle model into the coding scheme. .
  • IPv4 address is a hot issue at present.
  • IPv4 IP version 4
  • IPv6 IP version 6
  • IPv6Q is a method of implementing subnet addresses.
  • An address block in the IPv4 address that was formerly called “Class E” is used as a new IPv6Q address extension.
  • the E class refers to an address block of 240.0.0.0 ⁇ 255.255.255.255, which is equivalent to 280.843 million 5456 IP addresses. Also written as "240.0.0.0/4".
  • the IPv4 address that has not been allocated is only 46 8" address blocks.
  • the E class is equivalent to 16 / 8 address blocks. But before this, the class E address as "alternate address reserved for future use", Assigned to the user. Not included in the above 46 address blocks.
  • IPv4 class E address 3D vector direction to increase the address of the IPv6 scheme.
  • IPv4 class E address and 240 ⁇ 247 as the three-dimensional vector direction identifier, and add three groups of 32-bit network addresses to expand to 128-bit IPv6 network address.
  • 1 ⁇ 4 ⁇ : :IPv4x::IPv4y: :IPv4z F0RR:GGBB::XXXX:XXXX:: YYYY: YY ⁇ :: ⁇ : ⁇ , where each letter or number represents a hexadecimal number.
  • F2 E:+X32:-Y32 :+Z32
  • F3 E:+X32:-Y32:-Z32 :
  • F4 E:+X:+Y32:+Z32
  • F5 E:-X32:+Y32:-Z32
  • F6 E:-X32: -Y32:+Z32
  • F7 E:-X32:-Y32:-Z32
  • Add a network vector address to each extended IPv4 group. The other bits of the E network are reserved.
  • Scheme 2 is a scheme for assigning a specific IP address to the sub-virtual machine and the sub-entity based on the scheme 1, and encoding the scheme into the IPv6Q sub-network address (CAIONET) model protocol.
  • the address space contains the sub-lifecycle scheme of the address space.
  • Solution 3 is based on the second option of the solution to increase the media life cycle IPv6 solution, the sub-life cycle coding into the IFV6Q sub-network address model protocol.
  • Hex Bin CAICYC time unit Hex Bin CAICYC time unit
  • IPv6Q can be used with the current IPv6 draft and the use of IPv4 and its extensions.
  • the fifth of the IPv6Q schemes can also redefine the subnetwork protocol.
  • FIGS. 9 and 10 are diagrams showing an operation interface of a user management section according to the present invention.
  • Fig. 9 shows a structural diagram of a sub-mother operation interface (HMI).
  • HMI sub-mother operation interface
  • QMS User Management
  • HMI Hyundai Operational Interface
  • TMI Sub-Operational Interface
  • the HMI and TMI toolbar menus are interchangeable.
  • the Hyundai Operations Interface (HMI) consists of user settings, system settings, network settings, sub-system settings, command line, and entertainment management.
  • System settings include user groups and new users to set user permissions to sub-systems, and so on.
  • System settings include Subsystem Firmware Upgrade (System Update) > Theme Setting (System Language), Default Sub-VM Auto Start (QVM Auto Start), Sub-File System (QVFS) Formatting and Backup and Recovery, Sub Storage Media Settings (Storage Setting), Time and Date Settings, Display Setting, Sound Setting, Device Setting, Sub Network Status , network protocol mode, network wireless and wired connection, virtual network settings and remote connection settings, sub-coded settings (QID), sub-system information (System Information), QPC shutdown, etc.
  • Network management includes remote control, browsers, messengers, subnet transactions, and sub-grid computing.
  • Entertainment management includes storing photos, music, videos, games on a sub-media storage medium Etc., the sub-media medium runs directly on the sub-mother system.
  • Figure 10 is a diagram showing a sub-subsystem operation interface in accordance with the present invention.
  • the sub-system includes creating sub-sub-media files, configuring sub-media files, setting sub-licensing mode and entitlement, setting sub-network devices and sub-virtual storage devices, sub-media combination sub-virtual machine mode, starting sub-virtual machine system, changing Sub-subsystem configuration, cloning sub-media or sub-virtual machines, stopping, migrating, deleting virtual media or sub-virtual machines, sub-media log reports, etc.
  • QVPC sub-virtual machines
  • the switching mode is operated and managed through the sub-sub-interface (TMI).
  • the sub-sub-operational interface includes a sub-virtual machine and its various settings management to provide environmental and operational services for the sub-real operating system running on the sub-virtual machine.
  • the sub-sub-operation interface takes the form of a menu bar (Top Manage Bar, TMB) that stays on top of the monitor. Show and hide according to the user's choice.
  • the TMB menu consists of a three-part XMI (eXchange Manage Icon) icon menu, a central computer icon menu CMI (Computer Manage Icon) and a right QMI (QPC Manager Icon) icon menu.
  • the XMI icon on the left end of the TMB menu is used to switch between display and hide by mouse click.
  • the mouse leaves the top of the display and the TMB menu disappears.
  • the TMB menu is displayed, and the middle part of the CMI computer is set. The arrangement of the icons.
  • the computer management unit CMI uses different color computer icons to indicate the status of the sub-subcomputer. For example, red indicates the current sub-virtual machine displayed and operated on the current monitor, the local sub-virtual machine is indicated in green, the computer is shut down in gray, the remote computer is represented in blue, and the sub-virtual virtual machine is represented in yellow. (QTVPC).
  • red indicates the current sub-virtual machine displayed and operated on the current monitor
  • the local sub-virtual machine is indicated in green
  • the computer is shut down in gray
  • the remote computer is represented in blue
  • the sub-virtual virtual machine is represented in yellow.
  • QTVPC When the mouse moves to a specific computer icon, the information of the computer is displayed. When the left-click computer icon of a specific color is clicked, the computer corresponding to the computer can be switched. When right-clicking, the pop-up menu can be displayed through the pop-up menu. You can set various configurations of the current sub-virtual machine.
  • the sub-virtual machine is set to the local computer mode (Native Mode) and the remote computer mode (Remote Mode) on the TMB menu in order to be compatible with the traditional computer on the Internet. Operate the remote computer and the local virtual machine. In remote mode, you can access and operate the sub-authentic operating system running on the sub-virtual machine through traditional computer remote communication methods such as RDP protocol of Windows and remote protocol of XDMCP protocol of Unix/Linux. CAITOS).
  • a matt computer, a sub-intelligence system, a sub-computer language, and a sub-cloud computing implementation will be described below with reference to FIG.
  • germanium-tellurium compound nanowires In today's material technology, the fabrication process of germanium-tellurium compound nanowires (GeTe/Ge2Sb2Te5) is not very complicated.
  • N-GST N-doped Ge2Sb2Te5
  • doped N exists in the form of GeN, which not only limits the growth of Ge2Sb2Te5 (GST) grains but also increases the crystallization temperature and phase transition temperature of GST.
  • the storage unit is used to create a ternary memory device.
  • the ternary storage device can greatly increase the storage density, which means that more data can be stored in a smaller space, and the virtual machine is popularized and the space of the hard disk is required.
  • a three-dimensional optical processing chip (T-CPU) and a ternary memory (T-Storage) are used to create a new type of matt computer by transmitting information and logic operations using the characteristics of the transmitted light of the polarized light of the light.
  • the matt computer converts the binary to a binary sub-interface on the VIOS, and the traditional binary operating system runs normally on the matt computer.
  • the matt computer solution it is possible to solve the high-performance future ternary-based optical computer and the binary operating system (CATITOS) used today by the sub-operating system to convert to the ternary
  • the matt computer runs normally on a matt computer with a variety of current operating systems. Based on the hardware of the matt computer, the data structure characteristics of the matt number of the matt combination principle and the logical calculation between them are used to design the corresponding sub-computer language.
  • the sub-space of Qon using the subspace concept in sub-computer numerical processing The relationship between the upper Asian elephants is defined in the way of storing the data in a regression storage unit.
  • the data computing sub-image system is connected to the group computing method to process the floating-point operations and the limit values are processed by Q, so there is no binary calculation.
  • the "divide by zero" interrupt and overflow problem occurs when the machine is divided by zero.
  • the second-order and third-order regression characteristics of the matt combination principle provide sub-virtual machines and sub-medias in each sub-computer on the sub-network to jointly integrate a virtual large-scale system to calculate the computational processing of super-large computations.
  • the sub-media on the sub-network is combined into a sub-network memory, and each sub-system is combined into a sub-network knowledge base.
  • the sub-cloud computing ( ne t3compute) is the implementation of the combined model of the third-order net3sys of the matt combination principle. In a super large amount of calculation, assuming that it consists of 840 calculations, there are 611 sub-virtual machines available on the sub-network.
  • the sub-systems with the sub-system of the sub-system are connected to each sub-system by means of ⁇ -transition.
  • the basic sub-images of the sub-small system are divided into relatively independent sub-systems.
  • the numerator 1 represents a relatively independent sub-system.
  • the denominator continuously refines the specific components under its system into the basic components.
  • CAISYS sub-system
  • the sub-system consists of such a basic combination to form a larger sub-system in the sub-environment.
  • the sub-computer system environment model of iYAF theory is designed to maintain a sub-environment that can be independently adjusted by manual adjustment.
  • the characteristics of sub-alliance self-replication and sublimation in the sub-system are based on the sub-group theorem from the sub-image system. I am repairing the communication and combination between sub-medias, and the sub-string system is used to control the sub-points.
  • the number of combinations of quantities, the sub-cycle cycle comes from the continuous loop between the systems to generate new sub-coding and continuous recovery sub-coding, through the substring self-elevation constant equation to the group between the sub-points Merger sublimation and return.
  • the sub-systems of the sub-system are recombined into new sub-systems, and the sub-medias of the sub-system are recombined into new sub-systems.
  • processing with natural flat #f A sub-intelligent system that controls and intelligently manages the entire sub-network environment.
  • the invention provides a computer architecture based on virtual machine technology and an implementation manner thereof, which can provide a computer with security and high performance.
  • a user can arbitrarily create, use, and delete a virtual machine on a physical computer according to his or her own desire, and can acquire a required computer media resource from a network for creating a computer, and combine it with other computers into a large computer system to realize Cluster computing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Description

基于虚拟化技术的计算机***及虚拟机创建方法 技术领域
本发明涉及计算机领域, 更具体地说, 涉及一种基于虚拟化技术 的计算机***及虛拟机创建方法。 背景技术
在工作和生活中, 在个人 PC使用过程中, 常常遇到类似问题: 一台计算机上安装一个操作***风险很大, 常常被病毒骚扰, 如果系 统崩溃无法修复, 则只能重新安装***, 而安装操作***是一个耗费 时间和精力的过程。 企业人员外出或家里通过 VPN (虚拟专用网络) 来连接企业内部网络的时候, 因 VPN安全设计, 其计算机只能连接 公司的网络, 不能同时连接互联网。 另外, 当个人用户使用下载工具 从网上下载共享的音乐、 电影和小游戏等时, 操作***很容易被病毒 和恶意代码感染, 在这样感染的操作***之上, 网上交易等很容易被 黑客盗取个人的银行账户和私人隐私。
在一台计算机运行一个例如 Windows的操作***时, 如果需要 运行 Linux等第二操作***, 则只能重新启动计算机并切换操作*** 来运行第二操作***。 这造成用户的不便。 为了方便地在两个或者多 个操作***之间切换,在软件测试工作当中经常使用 VMware、 Virtual PC、 Virtual Box, Xen、 KVM、 HPVM等虛拟技术来解决上述部分问 题。 通过虛拟技术, 可以在一台计算机上运行多台虚拟机, 并在每台 虚拟机上运行不同的操作***,并且可以方便地在各台虚拟机之间切 换来实现多个操作***之间的切换。 然而, 目前的虚拟技术侧重应用 于服务器等高端平台资源的领域,一 在软件开发和测试和数据网络 中心当中使用, 还没有将虚拟化技术应用和普及于个人计算机平台 上。 可以预见, 如果将虚拟机技术应用到个人计算机上, 将产生以下 优点: 例如, 在虚拟机上安装 VPN, 则可以登录公司的内部网络并 远程操作公司的计算机和网络设备,同时在其它虚拟机上也能正常连 接到 Internet上用下载工具来下载音乐和电影。 如果下载音乐和电影 的虛拟机感染了病毒或恶意代码则直接删除这个虚拟机,不影响其它 虚拟机和宿主机。 在此基础上, 还延展了使用范围, 例如, 第一个虛 拟机连接指定网站, 进行购物和网上交易; 第二个虚拟机安装教学软 件并设置安全级别来过滤了***的连接,给孩子有一个干净的学 习计算机的绿色空间, 并集群虚拟机的云计算等。
综上所述, 虚拟化技术在个人计算机上应用中有种种优势, 现阶 段还没有完全开发和应用。 发明内容
本发明提出一种基于虚拟化技术的计算机***及虚拟机创建方 法。 所述计算机***的特征在于: 其计算机的硬件包括一特定存储器 固件 ,该特定存储器固件中具有除存储在计算机的硬盘中的第一操作 ***之外的第二操作***, 当通过计算机的 BIOS或 EFI选择进入第 二操作***时, 从所述特定存储器固件读取第二操作***, 将计算机 的控制权交付给第二操作***;所述第二操作***的特征在于当启动 时, 通过媒体对象的编号识别网络中或本地的媒体, 通过各种媒体接 口在第二操作***的文件***上将媒体组合成虛拟机。
本发明提出了一种在计算机上创建虚拟机的方法,所述计算机的 硬件的主板上安装有除了硬盘之外的特定存储器固件,在该特定存储 器固件中存放有与存储在硬盘中的第一操作***不同的第二操作系 统, 所述方法包括: 当通过计算机的 BIOS或 EFI选择进入第二操作 ***时, 从所述特定存储器固件读取第二操作***, 将计算机的控制 权交付给第二操作***;第二操作***控制计算机无线或有线地连接 网络, 通过媒体对象的编号识别网络中或本地的媒体; 第二操作*** 通过各种媒体接口在第二操作***的文件***上将媒体组合成虚拟 机; 启动所述虛拟机, 并在虛拟机中运行子操作***。 附图说明
通过下面结合附图对实施例的详细描述, 本发明的上述和 /或其 他方面将会变得清楚和更容易理解, 其中:
图 1是根据本发明的计算机***的架构及其理论的整体框图; 图 2是根据本发明的网络中的媒体生命许可的示意图; 图 3是解释根据本发明的在网络中组合媒体的原理的示意图; 图 4是图 3中的媒体组合原理的两种组合模型的示意图; 图 5 示出根据本发明的运行虚拟机的计算机与传统计算机的结 构比较图;
图 6 是在根据本发明实施例的在基于虚拟机技术计算机***上 创建虚拟机的方法的流程图;
图 7是示出根据本发明实施例的 VIOS的文件***与传统的 PC 文件***的对比的图;
图 8 是示出根据本发明的独立式虚拟机和分布式虛拟机的组合 方式的示图;
图 9是示出根据本发明实施例的基于虚拟机的操作***的用户 管理部分的操作界面的结构的示意图;
图 10是示出根据本发明实施例的基于虚拟机的操作***的用户 管理部分的另一操作界面的示意图;
图 11是示出根据本发明的计算机、 智能***、 计算机语言和云 计算实现方案的图。 具体实施方式
下面将参照附图来详细描述本发明的实施例的各个方面。为了与 传统计算机相区别,为根据本发明的计算机***定义了一些概念以更 好地理解本发明的理念。将在以下详细描述本发明的计算机***所采 用的计算机架构和理论。以下的说明中定义的术语将仅作为示例性的 描述而不是限制本发明的范围。
图 1是示出根据本发明的计算机***的整体架构的图。为了与传 统计算机***区别, 根据本发明的计算机***被称为亚计算机***。 相应地,为了将根据本发明的亚计算机***中的各种概念和术语与传 统意义中的相应概念和术语进行区别,在各个术语之前增加 "亚"字。 下面将参照图 1描述其中的各个部分。
亚媒体、 亚媒体接口以及亚网络
计算机认证身份媒体 (Computer Authentication Identity Media, CAIM), .以下简称为亚媒体, 包括亚实体媒体和亚虚拟媒体。 亚实体 媒体包括各种实体设备, 如网络服务器、 计算机、 交换机、 路由器、 网络存储设备、 网络打印机等。 亚虛拟媒体包括各种虚拟设备, 如虛 拟计算机、 虛拟硬盘、 虛拟交换机、 虚拟光驱、 虛拟处理器等。 亚媒 体在网络空间里唯一能区别于其它亚媒体的个体对象是亚编号 (CAI), 它是指亚媒体的个体对象名称的编码形式, 亚虚拟媒体个体 对象的编号称为亚虚拟编号。在亚***环境中亚媒体的个体对象编号 称为真实编号 (AID)。 将在以后详细描述根据本发明实施例的亚媒体 编号的方法。
亚媒体通过亚媒体应用接口(CAIMAI)组合成计算机***, 所述 CAIMAI是网絡上可识别的标准化的通用应用接口,用于提供一个超 越不同亚媒体之间相互通信的应用接口协议。 CAIMAI可分为: 亚实 体媒体接口, 是亚实体媒体的标准化接口; 亚虛拟媒体接口, 是亚虚 拟媒体的标准化接口。以标准化的 CAIMAI为基础,将网络上不同的 亚媒体来装配和组合成亚计算机***。
亚媒体所生存的网络空间定义为亚网络 (CAINET)。 亚媒体在亚 网络空间上生存而所处的具体的网络位置定义为亚网络地址。亚媒体 之间通讯协议包含亚网络上的所有亚媒体之间(即, 亚虚拟媒体和亚 实体媒体 )之间通信的相互信任的安全网络通信规则的集合, 包含网 络通信时信息必须采用的格式和格式的意义,亚媒体之间通信所规定 的信息格式的语法, 亚媒体之间通信的语义、 亚媒体之间通信时的事 件处理的先后顺序的时序等。
亚网络结构和互联网结构在组织结构上有所区别是亚计算机 (CAIPC)上没有服务器和个人计算机之间的物理特征的区分, 只有亚 媒体的组合和亚***之间计算机处理性能和信息传递服务的逻辑分 工上有所区别。亚计算机上的亚操作***在亚网络上通过亚光組合原 理(将在以后详细描述)在亚***之间信息传递和反射(双向传递) 的服务方式組合成一个集群的亚服务器并给其它亚计算机提供服务。 网络地址空间的特点是扁平式结构的一种均匀分布在地球表面上的 大气层相似的亚网络地址分布方式。将亚媒体分配到这个亚网络空间 上的网络地址协议。 一种网絡地址矢量拓朴空间的分布式协议, 定义 为亚网络地址协议 ( CAIW ET )。
亚网络上的亚媒体之间的主要的通信方式是以无线网络为主有 线网络为辅的扁平式网络矢量结构,区别于现行的互联网的有线网络 为骨干网无线网络为信息热点的多层次网络拓朴结构特性。亚媒体在 亚网络空间环境中以亚媒体生存许可协议来存在。
下面参照图 2解释亚媒体在亚网络空间中的亚生存许可。
每个亚媒体在这个亚环境中以特定的生存表现方式和生命周期 来完成它的创生, 生存和死亡的过程的协议定义为亚生存许可
(CAILIC)„
亚生存表现方式 ( Mode ) 下的亚媒体生存空间方式有不同特征 和形态。 个体的 ILIC (private License), 共享的 SLIC(Shareware)、 免 费的 WLIC (freeware)、 可移动的 QLIC (Carry)、 不可移动的 XLIC(fiXed) 可克隆的 CLIC(Clone)、 不可克隆的 OLIC(Only)、 整体
Figure imgf000007_0001
每个亚媒体有它自己独有的亚生命周期(Cycle ), 每个亚媒体以 这种生存周期为时间单位来完成其生成和成长和灭亡的过程。亚生存 周期上时间标尺的定义方式是以观察者感觉视角为切入点来分类。秒 和分钟为分界点, 一个是微观方向来细分的方式分类, 一个是生活习 惯宏观的方向往合的方式分类。 分类原则是古往今来, 及"合宏观, 分微观 "方式分类, 时间周期的分和合的分类的亚时空就像铜币的两 个面, 阳面是观察者常态下时间观念来引申的分钟为时间单位, 起始 点不断的往合的方式来組合成小时, 天, 周, 月, 年, 曱子或世纪至 无止的空无的时空间; 阴面是以秒为单位往终止点不断的分的方式构 成亳秒, 微妙, 纳秒, 皮秒, 飞秒, 亚思秒至中止及静止; 阳面的无 止时空间和阴面的静止是相互连接在一起, 合成中止即是无止, 无止 就是终止的时间和空间的极点为光阴的时空统一,这是亚媒体的亚时 空概念, 亚时空环境下的时空极限的合二为一的极点光阴定义为昆
(Qon)。 计算机实体和虚体结合-亚计算机
亚计算机 (CAIPC)是亚媒体的特殊形式, 包括亚实体机和亚虛拟 机, 虛拟机只有在实体机之上才能运行。
实体机 TPC(Tme PC)是由不同的实体媒体组合成一台计算机。它 是虚拟媒体和虚拟机生存的容器,也叫宿主机。虚拟机 VPC(Virtual PC) 是一种应用软件, 在这个虛拟机上, 可以安装 Windows、 Linux等真 实的操作***, 为客户提供服务, 也叫客户机。 宿主机和客户机之间 是母子关系, 子机只有在母机之上才能运行。 合而成一台实体的计算机,它是亚虛拟媒体和亚虛拟计算机生存的基 础, 是容纳亚虛拟媒体并其合成亚虛拟计算机***的容器, 亚实体计 算机是亚实体媒体的特殊形式。 亚虛拟计算机是一种应用软件, 其特 别之处在于,它是由亚网络上可识别的亚媒体来组合成一台虚拟的计 算机***, 亚虛拟计算机是亚虚拟媒体的特殊形式。 在亚网络时空间 环境上的亚计算机中,亚文件***提供亚虛拟媒体以亚媒体文件形式 寄存在这个容器里。亚媒体在亚计算机中以文件方式存储在亚文件系 统上, 并通过这些亚媒体文件组合成亚虛拟机。 亚媒体文件逻辑上可 分为亚媒体应用接口文件和亚媒体数据操作文件。亚计算机上的亚操 作***在亚网络时空环境里若干个亚媒体組合成亚虛拟机***,可以 根据亚光组合原理 (RGB-10)的 2阶和 3阶混合的模型计算机(将在以 后描述) 来并行运行计算机***和汇集成云计算和逻辑虚拟亚服务 计算机操作***-亚操作***
亚母操作*** CAIVOS (Computer Authentication Identity Virtual Operation System)是物理机上安装的 , 是可以运行虚拟机的亚操作系 统, 是 CAIPC模型的实现形式 QPC ( QPC仅是此处定义的根据本发 明的计算机的名称之一, 本发明的计算机的名称不限于此)上内嵌运 行的亚操作***, 英文筒称为 VIOS(Virtual Inner Operation System)。 亚子***是亚虛拟机上运行的真实操作***, 是在 VI0S上的亚虛拟 机中运行的操作***, 如 Red Hat Linux, Windows等。 亚操作*** 在亚实体计算机和亚虚拟计算机之间起到承上其下作用。它在亚计算 机上提供并负责管理网络通信和亚网络媒体资源共享和管理,是区别 于亚子***上运行的为实际应用服务的客户操作***。 VIOS是亚虚 拟机生成和运行的母体环境,提供亚网络上可识别标准化的亚媒体应 用接口, 必须与硬件紧密结合起来才能充分发挥硬件和虛拟机的性 能。 亚操作***由***核心、 亚接口、 用户交互操作界面组成。
亚操作***的***核心里包括:进程管理、 内存管理、外存管理、 硬件设备驱动、 亚文件***驱动、 亚网络管理协议、 亚组合协议、 亚 生命许可协议和其他核心部分组成。
亚接口里包括:标准化的实体媒体接口(即, 实体应用驱动接口) 和虛拟媒体接口 (即, 标准化的全虚拟驱动和半虚拟驱动等接口)。 亚接口以亚接口应用文件形式在亚操作***上存在。
用户交互界面里包含亚母***的管理用户交互界面 HMI (Hypervisor Manager Interface)和亚子***应用的用户交互界面 TMI(Top Manager Interface)。 HMI 和 TMI通过管理工具条 HMB (Hypervisor Manager Bar)和 TMB (Top Manager Bar)来实现用户交互 菜单, HMB和 TMB可以相互切换。
HMI是管理 QPC的用户管理界面, 其中包括用户管理、 ***设 置、 网络应用、 亚虚拟机管理、 命令行交互操作和娱乐管理等部分, HMI是 VIOS的内部管理交互界面, 通过 HMI用户才能关闭这台实 体亚计算机。
TMI是 QPC里的各个亚虚拟机的用户管理界面, 其中包括各个 本地的亚虚拟机上运行的亚子***和远程的计算机操作统一的亚计 算机用户应用管理界面,用户可以在 VIOS上的 TMI来快速切换不同 的虚拟机之上运行的亚子操作***,也可以在 TMI来强行关机在 QPC 上运行的亚虚拟机。
亚协议是使用亚光组合原理的一种协议,是亚网络上可识别节点 的组合协议,各可识别节点遵守这个基本协议来组合变化成不同的亚 ***组合。
下面将参照图 3和图 4介绍亚光组合原理 (RGB-10)以及亚光组合 原理的 2阶和 3阶模型。
亚光组合原理 (RGJB-10)是亚计算机*** (iYAF4PC)模型设计的理 论基础,以这个亚象数学理论为依据和逻辑运算组合方式来组合亚计 算机***模型。 亚光組合原理是一个亚象数学 (CAI1 UM)基础之上, 以亚象 (CAIONE)为研究对象, 亚数来进行逻辑运算处理的新概念的 亚数学领域。 它是以亚时空 (CAIXNET)概念为其公设依据, 并以亚组 合律为研究亚象的基 规律并定义和推理各个规律之间的关系。其中 包括亚象***、 亚维的定义、 亚维的升级律、 亚维之间的关系律、 亚 象间亚光弦传递常量、 亚时空关系、 亚时间守恒定理、 亚光弦传递恒 量、 亚象时空关系式、 亚无体的定义、 合其道理论、 亚弦自升量、 亚 体的空间膨胀现象、 亚弦变化率和亚更新律的 2阶和 3阶现象(即亚 反射律)等各种亚象数的运算规律。根据亚光组合原理的亚点的回归 特点来设计了根据本发明的亚计算机***结构和模型核心部分。
在亚光组合原理 (RGB-10)的理论来解释亚计算机模型的定义的 亚媒体、 亚接口、 亚空间、 亚许可的亚模式和亚周期、 亚***的之间 的关系和它们之间的运算规律和运算等式。
阐述了亚时空的理念和亚无体概念和它和亚物质之间的关系式, 并以此为基础建立 iYAF的理论并以此来解释亚时空当中的亚媒体的 演化的整个生存过程及亚时空当中的亚象的亚本体论和亚时空状态 下的亚媒体变化现象。
点 (Dot):几何学上不可以在分割成部分, 纯数学的点和亚点有所 区别的。 亚象 CAIONE(CAI ONE)是亚网络时空里可识别的有生命的不可 以再分割成部分表示的抽象的亚点定义为亚象。它是亚媒体对象的抽 象体节点, 或称亚点, 跟几何学的纯点有区别。 它包括亚实体媒体和 亚虛拟媒体的抽象的亚点, 亚实象 caiTone(CAI True One)和亚虛象 caiVone(CAI Virtual One)。
亚自然数 (CAINAT)是亚时空里亚象自然 (Natural)的集合而成的 亚点的自然数定义为亚自然数。
亚数 CAINUM(CAI Number)是亚时空里的亚象的数量关系, 亚 点是亚***中的亚数的基本运算元素。
亚象数 CAI1NUM(CAI ONE Number)是亚象 (亚点)和亚数的数学 运算规则和逻辑演绎, 统称为亚象数。
亚象数的定律 CAIRULE(CAI1NUM Rule)是亚象数的基本运算 规律, 定义为亚象数定律。
亚组合律 CAICOMB(Combine)是亚时空上亚环境里的亚点组合 成亚***的量和关系的变化规律,亚环境下内部的亚象之间结合成部 分亚***, 与纯数学上的结合律相似。
亚组合律 CAICOMB等式: a + (a + a) =〉(a + a) + a
亚象*** CAI1 SYS(CAI ONE System)的定义是亚组合律当中两 个以上的亚点组成为新***为亚象***。
亚象*** (CAI 1SYS)等式: a + b => c
亚象***连分组定理是亚大***用辗转相除法来将第一层、第二 层、第三层等各个亚***连续递进分割成相对独立的基本亚象组合的 亚小***,渐进连续分化至基本小***组成的亚象的方法。 其中分子 1表示一个相对的独立的亚***, 分母为其***下的具体組成部分不 断细化成基本的组成部分。
S0=1/(1/S0)=1/(1/(S1+(1/(S2+(1/S3+. · ·)))))
亚维 CAIDIME(CAI Dimension)是根据亚时空环境下的亚组合 律, 亚象在一维上组合成一个新亚***定义为亚维。 新亚***中亚点 的个数为亚数, 亚象组成的一个亚***为亚一维。 亚一维在亚时空中 的形式表现中没有直线和曲线概念,跟纯数学上几何学的直线和曲线 有区别, 亚一维和亚象、 亚***之间有内在联系, 区别是亚一维是相 同性质的亚点的亚***。
亚维 (CAIDIME)等式: a + a + a = c
亚维***自升律 CAIALLO(CAI Allotrope)是亚时空间里两组亚 象组成的亚象***的亚数以幂数形式升级为新亚***的亚维的升级 规律。它是亚时空上的亚象组成的亚一维升级成亚二维的内在组合亚 数关系。
亚维***自升律 (CAIALLO): (b + b) = bA2= bA2
亚光线亚象之间矢量升级维合关系定理: BA + ΒΑ= ΒΑΛ2
(a + a + a + a) = (a + a) + (a + a) = bA2 =bA2
这是亚象数的组合律和亚维升律之间的内在关系。亚数的组合律 与亚维升律关系而得出亚象的自我复制 (克隆), 亚象在亚环境里以亚 生存许可的亚生存模式而升华成,亚象在一维升维成二维的***组合 形式。
亚维间关系律 CAINEXU( exus)是亚时空中亚象纽成的亚*** 的两组亚维 (Dimension)之间相互组合成新的亚***时,亚维之间相乘 的关系规律。
定义亚维***之间关系律 (CAINEXU)等式: b * c = d
亚光弦恒量定义 CAIBEAM(Beam)是亚时空当中亚象之间的传 递关系定义为亚光弦, 即亚点之间关系。 设其传递关系为恒量时, 亚 时空当中亚象之间的由常量来传递关系, 可表示为亚光弦常量传递 ( C )。
亚光弦常量传递定义 (CAIBEAM ): QA = C
由亚时空 ^既念, 一个亚象在亚***中同时有两个不同传递方式, 直接方式和间接方式表现两个亚点之间传递的特性和亚更新律。
亚循环周期 CAI2CYC(Two CYC)是两组亚***之间相互彼此为 对方而存在的***之间,相互彼此循环交互而产生的数量关系定义为 亚循环周期。
例子: 60周期 (甲子)、 12周期 (3X4)、 30周期 (5X6)、 6合面( 2X3 )、 10进制 (5X2): 其中, 12周期示例如下 (A,B,C)和(1 , 2, 3 , 4 )组成的两组系 统 : A1=1,B2=2,C3=3,A4:=4,B1=5,C2=63A3=75B4=8,C1=9,A2=10,B3=11,C4 =12
10进制 ( A,B,C,D,E )和 ( 1 , 2 )组成的两个***的周期进制: Al=l , B2=2,C1=3,D2=4,E1=5,A2=6,B1=7,C2=8,D1=9,E2=10 亚时空关系式定义 CAIYNET(CYC NET)是亚象在亚时空概念当 中亚生命周期的极限的分和合共同结合成一个亚点, 定义为一个昆 象。 这个亚象的亚数定义为亚昆数或亚空数 (Qon), 设 Q定义为一个 亚昆数常量来标识。
亚时空关系式定义(CAIYNET ): Limit (CYC) = Limit (NET) -
Qon
亚时空概念当中亚时间是亚媒体生存的生命周期,以观察者感觉 视角来分类的时空观。观察者感觉视角把这个时间标尺细分为无限小 为 Qon和来汇合而无限大为 Qon, Q是亚时空当中时间的极限也是空 间的极限点。亚媒体以亚生存方式和亚生命时间周期的亚许可在这个 亚时空当中生存。 亚时空是极限空间和极限时间的统一体昆数 (Qon)。
亚空间时间守恒定理 CAICOC ( CAI CYC on CYC ): 从亚时空关 间是极限守恒。 等式如下; 其中 TO是观察者对一个亚象的分的生命 周期时间标尺, T1 是亚象的合的生命周期时的时间标尺向量的量, 其矢量和是不变的昆数(Qon )。
T0 + T1 = Qon
亚光线亚象之间恒向恒量定理 QC(Qon Constant): 亚时空中亚象 组成的亚***内亚象之间的关系向量亚光弦是因亚时空的亚生命周 期 (CAICYC)的汉向矢量的标尺量而不变的。
亚光线亚象之间向量恒量定理(QC ) 的关系式的亚光弦常量:
QC = QA= !QA= C 及 QA--QA
亚空间当中亚点的关系是: SA=T0*C, SA=T1 *C; QA=-QA; BA=-QA时 T0*C + T1*C = (T1*C)A2; (Τ1)Λ(1/2) = (-T0)Al/2; 令 TO为 1 时:
T0=(-1)A2及 i = (-l)Al/2;
亚象数当中虚数是合理的,它是因时间矢量双向性的原因而出现 的现象。
亚象的亚光弦的双向性和亚象***组合等式推导出以下关系式: SUM(CAISYS)+SUM(CAIONE)=SUM(CAIBEAM)+2*CAIBEA
M
亚***亚点亚光弦关系式中亚小***的个数和亚点的个数等于 亚光弦个数之和加 2亚光弦数,当一个亚象来组成的一个亚***的时 候该等式成立。
亚空间是亚时空当中亚象之间的亚光弦相互传递关系为亚时空 亚点之间空间关系。
引理:亚维***之间关系律 (CAINEXU)中不同维间是相乘关系及 亚象和其亚象的生命周期的亚维之间相乘而构成新的亚***,亚空间 S。
亚时空亚点之间关系定义等式: T * C = S
设亚光弦的标量是恒定时,以亚象的周期变化而亚空间有相应变 化。
亚象在亚生命周期变化的亚空间上的表现是纯数学上的几何空 间相同。
Qon是观察者感知角度上的观察事物的切入点 0及实数上的 0和 亚时空极限的另一个极点 0来组成。 亚象数理论来解释, 在几何学上 的 Q=0是亚时空当中观察者感知上的 Q的表现。 其另一个极限奇点 是亚生命许可的时间极限的空间点及观察者感知切入点出发而分和 合的另一个分和合的极限的交会及汇集极亚点 Q, 亚点 Q是昆数, 亚空数 Q。
亚时空概念上的亚昆数是纯数学上的微积分在亚象数学上使用 的合理性的理论基础依据。
亚时空当中亚象数上一除以零 (1/0)是合理的。 在纯数学中的 Q = 1/0 = null, Q = inf...是不合理的。
lQ=l/0是昆数的基本单位, 昆象在亚生命许可 (CAILIC)的生存 方式
Figure imgf000015_0001
Q/Q=0/0=0A0=1
亚自我膨胀现象定理 CAIINFA(CAI Inflate): 亚象在亚时空里其 亚生命许可周期当中在亚象***里 (CAISYS)亚自我复制并亚更新组 合时的新***的膨胀现象。
(1)亚***的单位自我复制的极限增益等式为:
Qout = Lim(l+l/n)An
(2)亚***的单位自我回收的极限减损等式为:
Qin = Lim(l-l/n)An
(3)其亚***的极限减损增益的中和等式为:
Qone = Qout + Qin = Lim(l+l/n)An + Lim(l-l/n)An
亚***的单位自我复制变化的极限常量:
Qout = 2.7182...
Qin = 0.3678...
Qone = 3.0861...
(4)令亚***为 3个单位亚象来组成,亚***的极限增益和减损两 者之间的差为亚光弦结合观测膨胀 Qtwo, 其等式表示为:。
Qsys = CAIONE(l) + CAIONE(l) + CAIONE(l) - 3
Qsys=( 1 + cos2 O) )+( 1 + sin2 (x) )=3
Qtwo = Qone一 Qsys = 0.0861...
亚无体 CAIQI(CAI Quab Interaction)定义: 亚无体 (CAIQI)是亚 媒体的初始状态也是回归状态。亚象在亚时空环境下以亚组合律用亚 光弦来将各个亚象组合成一个亚象***,亚维***自升律自我升华亚 媒体***为亚物质;亚物质在亚光组合原理下自我升华而回归到亚无 体状态, 这是亚时空环境下的亚媒体生命的循环。 引理: 亚维***自 升律 (b + b) = bA2 = bA2 => C + C =CA2 ; 亚维间关系率 CAINEXU(CAI Nexus); T0+T1=Q, 亚环境下分布的亚无体而亚光組 合下亚象的升华成新的亚媒体***, 等式如下:
CAIQI * ( C+C ) => CAIM *CA2;
亚无在亚光组合下亚象组合升华成亚媒体, 简写成 M。
CAIQI * ( C+C ) => Energy; 宏观上亚无体的变化是亚能量 CAIE (CAI Energy )在亚环境下流动转化的表现, 简写成 E。
CAIQI * (C+C) => M * CA2 => E => CAIQI (CO) + CAIQI (CI); 合其道 i YAF(intemal Yon Associate Foundation): 亚象在亚环境下 亚无体以亚光组合方式自升化成亚媒体(实体和虛体)成亚物质(亚系 统); 亚物质在自升化转化成亚能量 (CAIE)回归到亚无体。 这是亚象 在亚环境下,亚生命许可范围之内通过亚光組合原理 (RGB-10)来通过 亚光弦来组合其亚象自我不断的升华而生成亚媒体并生成亚物质;亚 物质不断亚自我升华和转化亚能量回归还原亚无体;亚象的亚光组合 下的亚无体的循环自升化和回归的亚媒体的生命许可的不同的亚模 式和不同的亚周期变化下的亚物质的整个生命过程;在亚环境的亚时 空当中没有四维时间概念。亚象在亚环境下以亚光组合原理组合成一 个超大的亚***环境,亚自我膨胀现象定理和极限自我增益和减损的 方式自然地智能控制亚象的亚环境生态平衡。
iYAF - (1+1/η)Λη * (1-1/η)Λη= Qout * Qin=(l-(Q+Q))An = 1 亚***更新律 CAIQUAR (CAI Quarter): 亚编号数的新陈代谢的 更新规律,亚象的亚光组合律 (RGB- 10), 其中 &表示 G到 B的矢量的 关系。
定义: G、 B、 R是 3个不同色的亚象 (CAIONE), (G& ) G, B亚象組成的亚象***, R用于更新组合 G&B的亚象***为新的亚 象*** (CAI1 SYS)。
亚***更新律 (CAIQUAR)等式是亚光組合 (RGB-10)的 2阶等式:
R * (G&B) = (R&B) + (G&R);
由该等式得到 GB、 RB、 GR的向量值。
从亚***更新律 (CAIQUAR)等式里推导出亚光弦的亚象之间自 然顺序矢量组合定理: QA + QB = BA; R * GB - RB + GR; b + b = bA2 = b 。
推理: (RG + RG) + (GR + GR) = (GB + GB) => RGA2 + G A2 = GBA2 => RGA2+GRA2=GBA2。
得出三色(RGB )亚象的***关系式定理: 2个亚象组成的*** 当中增加 1 个亚象所组成的亚***的各个亚*** (CAISYS)组成的各 亚象之间的关系的等式表示。
RGA2 + GRA2 = GBA2 => gA2+bA2=rA2;
亚弦自升恒量等式 (RGB)是亚时空上的 3个亚象组成的亚象*** 的自升化而各亚象之间的关系, 其等式为:
RBA2 + GRA2 = GBA2;
RGB和几何的勾股定理有区别的 RGB里没有距离概念。
引理: 亚时空亚点之间关系定义等式: T * C = S; a=Tl*C(RG), b=T2*C(G ), c =T3*C(GB); 把亚象在亚时空当中设为常量 C亚光弦 的时候的亚线时; a, b, c之间的关系在纯数学上的(《2 + b2 = c- )成立。
三色光亚象的***关系式定理定义为亚***的亚弦定理 (RGB), RGB 是亚数的亚组合规律、 亚维***自升律和亚更新律之间的内在 关系式。
亚弦***变化度 CAIQTRAN(CAI Transformation), 三个亚点构 成的单位圆***当中, 亚光线合和其***直径之间比率。 其等式为:
Q3on=sin(A)+sin(B)+sin(C)=sin(A)+sin(B)+sin(A+B)=sin(A)+sin( B)+sin[Pi-(A+B)],
其中 A、 B、 C为亚变化度及几何上的角度, sin为比率, 亚数理 上没有几何学上的角概念, 是亚象在亚***当中的变化度。
亚反射律 CAIREFL(CAI Reflect): a # b = b # a是亚空间里亚*** 之间的反射规律。
亚光组合原理 (RGB-10)的 3 阶的时候亚象组成的***上的亚象 之间出现亚光弦的亚反射 (CAIREFL)现象, 亚光组合的 3阶运算规则 可推算出亚光组合的反射规律。 亚光组合原理 (RGB-10)的 3阶等式:
(R&G&B)*Y = R&G + G&B + Y&G + R&Y + Y&B + G&Y 亚光组合 (RGB-10)的 2 阶中亚象之间矢量组合定理的亚光弦的 单向特性,亚光组合 (RGB-10)的 3阶中亚光弦在亚***之间的亚反射 律 (CAIREFL)现象, 即亚***之间信息传递的反射(交互)现象。
cai2net是亚光组合的 2 阶数学模型的平面归合一组合方式, net3sys是亚光组合的 3 阶数学模型的立体归合一组合方式。 cai2net 的***组合方式和 net3sys的***之间通信組合方式来构成亚计算机 iYAF4PC 的理论框架和亚计算机 (iYAF4PC)和亚服务器 ( iYAF4Server )模型。
2阶的亚光组合 cai2net方式:亚媒体在亚生命周期的亚网络空间 里按亚光组合原理来结合成一个***体的数学模型的计算机组合方 式,这种组合方式下亚网络空间里的各个亚媒体在亚实体计算机为起 始节点, 各个节点的亚编号是各个亚媒体所对应的标识号, 即亚媒体 的逻辑标识。
从亚光组合的二阶原理可以引出以下特点的计算机模型。
通过亚网络或互联网之上建立一个无层次式虛拟网络,在这个虚 拟网络上各个亚计算机通过 CAIVOS操作***来连接各个实体计算 机上的亚虚拟文件操作***连接和汇集成一个大的虚拟文件操作环 境的容器,在这个亚环境里各个亚虛拟逻辑数据文件和亚接口应用文 件通过安全的认证方式和亚光组合方式来结合成不同的亚***和亚 虛拟计算机, 各个亚***结合成网格存储和分布式计算等, 亚***环 境自动回收已经过期的垃圾亚虚拟文件和亚编号来自动的管理亚媒 体组成的亚环境***的资源的平衡,亚虚拟操作***透明了硬件和亚 子***的虛拟机上上运行的亚真操作***之间的依赖关系,在亚媒体 介质文件里包装游戏文件, 标准化应用程序文件等在 QPC 上的 CAIVOS ***里装配就能运行而无需用户来设置和安装应用程序和 游戏等过程, QPC 上各种游戏和商业应用程序等由游戏和软件厂家 通过标准化的亚接口来设计而成。 用户使用 QPC时就像使用家电的 游戏机中放入不同的介质就能播放不同的音乐,影视和游戏。在 QPC 的 RGB-10的 2阶组合装配方式来取代传统计算机上应用程序在计算 机上的安装和配置所用的时间和给一般用户带来的不便。
模型 1 , 在亚计算机环境中,设节点 0为实体的计算机 (亚实体机 是亚实体媒体的特殊形式), 节点 1 为虚拟计算机时 (亚虚拟机是亚 媒体的特殊形式), 可以通过亚实体计算机来访问亚虛拟计算机, 通 过亚光组合原理 2阶的信息传递的特点来从亚实体来访问亚虛体,通 过亚实体计算机来组成亚虛拟计算机并且访问这个亚虚拟计算机,各 个亚虚拟媒体之间是信息传递的关系并信息最后合流到节点 1 为核 心而组成的虚拟计算机上。
模型 2, 在亚计算机环境中, 设节点 0为实体的计算机环境, 节 点 1 , 节点 2, 节点 3...为虚拟的媒体介 , 通过亚光组合的 2阶原 理节点 0亚实体媒体来把各个亚虛拟媒体的信息汇聚在节点 1的亚虛 拟媒体上组合成各种应用程序环境。
模型 3 , 在亚计算机环境中, 设节点 0为亚实体媒体, 节点 1, 节点 2, 节点 3...为亚虛拟媒体或亚实体媒体, 通过亚光组合原理来 組合成一个***, 这个节点 1是亚实体媒体组合而成的一个***。
模型 4, 在亚计算机环境中, 亚虛拟媒体逻辑上分成亚真实操作 ***媒体、 亚应用***媒体、 亚数据媒体包, 通过亚光组合原理的 2 阶在通过亚实体媒体装配组合成一个亚计算机应用***。
模型 5 ,在亚计算机环境中,亚实体媒体为一个实体的一张亚卡。 这张卡里包含了各个亚媒体的组合信息,通过亚光组合原理的 2阶在 不同的亚计算机实体环境下各个亚媒体的信息组合成个人的亚虚拟 计算机,即在亚网絡环境下通过亚卡来组合成个人唯一的亚虚拟计算 机***,亚环境下用户通过一张亚卡来在不同的亚计算机上组合成亚 网络上个人唯一的移动的一台亚虛拟计算机,即用户使用亚卡从一台 亚计算机到另一台亚计算机上继续写作。
模型 6, 在亚计算机环境中, 各个用户交互***在网络环境下, 没有本地和远程的区分, 网络上只有亚媒体的远近的区分, 用户在亚 计算机***环境下不必关心与其交互的计算机是远程计算机还是本 地的计算机, 用户是以一种透明的统一方式与亚计算机交互交流信 自
模型 7, 在亚计算机环境中, 各个亚媒体在亚环境下通过亚接口 来通过方式来组合成一个亚***,亚***一个亚虚体和亚实体之间通 过亚协议来构成的硬件和软件的结合体。
亚计算机***是通过亚光组合原理方式来通过亚网络上在亚操 作***环境下不同的亚媒体来组合成亚***来为用户提供服务的一 台具有其独具特点的亚计算机的亚计算机***环境。
3阶的亚光组合 net3sys, 通过 net3sys信息组合传递和反射方式 来多个 QPC的资源整合在一起来在网络上组合成的集群服务器。 亚 计算机在亚环境上环环相扣组合成抽象的逻辑服务器来进行云计算, 亚光组合原理计算机模型下三维空间组合方式。
模型 1, 在亚计算机环境中, 各个亚***以亚光组合 2阶和 3阶 的组合方式来組合成一个大的亚***来提供服务的虛拟机群体来制 作成亚风云服务器, 并设计亚光处理器、 亚光存储器、 亚光通信方式 构成的亚光计算机,高性能的 3进制的亚光计算机上提供 2进制的亚 接口来运行亚子***。
模型 2, 在亚计算机环境中, 在亚网络上各个亚真计算机实体以 无线的连接方式为主来实现非层次形式的相互之间通信和组合的亚 计算机***。
模型 3 , 在亚计算机环境中, 亚计算机环境中亚虛拟计算机用 net3sys组合成分布式亚网络上的存贮信息。
模型 4, 在亚计算机环境中, 根据合其道理论来在亚网络上生成 一个亚环境下亚媒体的自调控智能***来管理整个亚环境。
模型 5 , 亚光组合的 net3sys虚拟化技术模型可以通过两个方向 来帮助服务器更加合理地分配资源, 一种方向就是典型代表分区, 就 是把一个物理的服务器虛拟成若干个独立的逻辑服务器,另一个方向 的典型代表就是网格,就是把若干个分散的物理服务器虛拟为一个大 的逻辑服务器,像使用同一台服务器的资源一样支配分散的物理服务 器。可识别网络组合服务器是由各个亚计算机组合成的一个大型服务 器, 亚虚拟计算机散布在各个亚计算机里, 亚虚拟机组汇合成亚服务 器而其运算处理速度胜过实体服务器。 它是多个 QPC的资源整合在 一起在网络上组合成的虚拟的集群服务器。 net3ys是空间上环环相扣 组合成的虚拟的服务器(抽象的服务器)的亚光组合 3阶模型逻辑服 务器, 即亚光组合 (RGB-10)模型下三维空间組合方式的表现。
亚光组合原理 (RGB- 10)是亚象组成的亚***的一分二成三而循 环成圆, 三合二成一圆组合的回归数学模型。 这种的数据结构的数学 模型有树形和网状的特点,跟传统的几何三角及圓组合方式相似但有 区别, 它以亚点为根本研究对象, 并阐释其各点之间的变化关系并寻 求其亚点组成的亚***的变化规律,而传统纯数学的几何学是以线的 表现形式为基本研究对象,线所交叉的点的特殊形式为参考点的几何 线的变化。 亚光组合原理基础上计算机芯片, 可以运用 2进制和 3进 制整合的 2X3循环周期的, 新型亚处理芯片、 亚网络、 亚智能***、 亚数据结构的亚计算机语言。
下面将介绍基于上述的亚计算机***模型的亚计算机***。
参照图 5, 图 5是示出根据本发明的运行虛拟机的计算机与传统 计算机的架构比较图。 图 5的左图是传统计算机的架构。 如图所示, 传统计算机具有的硬件包括 CPU、 内存、 主板、 硬盘以及各种*** 部件(未示出), 传统计算机的主板上仅具有基本输入输出*** BIOS (在某些计算机***中采用扩展固件接口(EFI)而不是 BIOS )的芯片, 其中存储的是 BIOS程序。而根据本发明的计算机在 BIOS(或者 EFI ) 之外, 其主板之上还安装有一高速可读写存储器固件, 在该存储器固 件中存放的是虚拟内置操作***( Virtual Inner Operation System, 以 下简称为 VIOS )。 例如, 所述虚拟内置操作***可以是基于 Linux内 核的操作***。 为了与传统个人计算机区别, 将根据本发明的计算机 命名为 QPC。 应理解, QPC仅仅是本发明的计算机的名称之一, 本 发明的计算机也可以使用其他名称。 VIOS主要由三大部分组成: 系 统核心 (kernel)、虛拟驱动接口和用户管理模块, 其中, ***核心包括 进程管理、 内存管理、 存储器管理、 硬件设备驱动、 文件***驱动、 网络管理、认证许可协议和其他部分, 虚拟驱动接口包括全虚拟驱动 接口和半虛拟驱动接口,用户管理模块包括母***管理的工具界面和 子***管理的工具界面, 将在以后详细描述。
图 6是在根据本发明实施例的在基于虚拟机技术计算机***上 创建虛拟机的方法的流程图。 在步骤 S101, 启动计算机, 进入计算 机 BIOS。此时,用户可通过计算机的 BIOS或 EFI (可扩展固件接口) 选择是否切换到 VIOS模式 (S102), 这里, 假定是通过 BIOS进行选 择。在 BIOS里设置了用于切换 VIOS固件***的切换界面。如果 BIOS 里选择 VIOS选项为关闭 (OFF), 则计算机读取存储在硬盘中的操作 ***(即, 传统的操作***, 如 Windows、 Linux ^ Unix等)并根据 操作***进行工作 (S103)。 当在 BIOS里选择 VIOS选项为打开 (ON) 时, 计算机开机启动后 BIOS直接从存储器固件读取 VIOS, 将控制 权交付给运行的 VIOS(S104)。 进入 VIOS之后, VIOS通过有线或无 线的方式连接网络, 并通过媒体编号来识别不同的计算机媒体 (S105)。 接下来, VIOS 通过虚拟驱动接口将计算机媒体组合成虛拟 机 (S106)。 最后, 启动虛拟机, 在虚拟机上运行子操作***。 所述子 操作***可以是现有的任何操作***。 通过这种方式, 可以在本发明 的计算机之上创建一个或多个虛拟机。 例如, 在才艮据上述方法创建了 一个虚拟机之后 , 可通过 VIOS的用户管理部分(包括母操作界面和 子操作界面)来按照上述流程创建另一个虚拟机, 并在创建的虚拟机 上运行另一子操作***。 可通过 VIOS的用户管理来在多个虚拟机之 间进行切换。 将在以后描述根据本发明的用户管理部分。
图 7是示出根据本发明实施例的 VIOS的文件***与传统的 PC 文件***的对比的图。
在传统 PC中, 引导***是在零磁道处读取引导信息并装入操作 ***到内存里管理计算机。 而当 QPC在没有切换到 VIOS下工作时, 与现有的传统操作***相同,在启动计算机时从零磁道引导操作*** (例如 windows ), 并从零磁道开始分配***文件。
然而, 当 QPC在 VIOS的控制下工作时, 仅需要从硬盘里读取 虛^机的信息和安全认证信息。 为了不破坏传统操作***的引导信 息, VIOS的基本虛拟机的配置信息、 用户安全信息等被存放在硬盘 的最后区域。 这样, 在 VIOS下启动计算机时, VIOS从硬盘的最后 区域里读取虛拟机的信息,并读取安全认证信息之后从虚拟文件*** 里运行和管理虛拟机。 如此, 根据本发明的 QPC可以使传统的操作 ***文件(例如, windows下的 NTFS、 FAT32, linux下的 EXT2/EXT3 等文件格式的文件)与 VIOS的系統文件在硬盘上共存而不相互影响。 下面将参照图 8 解释根据本发明定义的逻辑虚拟文件方案以及 亚媒体的兼容传统计算机亚编号编码设置方案。
亚媒体文件中包括亚媒体接口应用文件和亚媒体数据操作文件, 将亚虚拟文件***上的亚媒体数据操作文件逻辑上分类成 3种文件 表现形式的亚媒体虚拟文件 (QVFILE), 包括亚子操作*** (QOS)的虛 拟文件、 亚应用程序(QAPP)的虚拟应用文件、 亚数据 (QDATA)的虛 拟数据文件。实体亚计算机在把这些逻辑亚媒体虚拟文件组合成亚虛 拟计算机 (QVPC)***。
这些亚逻辑虛拟文件的标识方案放置在亚编号里,作为分布组合 虛拟机的组合方式依据。
亚逻辑虛拟文件编码标识类表:
Figure imgf000023_0001
其中, 以 4位 2进制编码来组成标识。 首位编码标识是 0标识亚 光组合的 2阶平面网络组合类型 (cai2net)方式 1标识 3阶的 (net3sys) 方式。后 3位 2进制编码标识是 QM、 QDATA、 QAPP, QAPP+QDATA, QOS、 QOS+QDATA, QOS+QAPP QSYS的文件排列方式来编码。
QVPC是亚虛拟机的具体实现, 其中包括独立式虛拟机 QAVPC ( Alone Virtual Machine )和分布式虛拟机 QSVPC (Scattered Virtual Machine)
亚编号的组合方式, 亚虛拟计算机上的各个亚媒体, 在亚网络上 的编号的组合信息存贮在一张亚卡上,统一的亚网络上在不同的亚计 算机上继续保持这个亚虚拟计算机的组合状态,为用户使用亚卡来继 续不同计算机上写作。
这些编码标识在组合亚分布式虚拟计算机时,在亚网络上识别亚 媒体的特性并以亚光組合方式来组合成一个亚分布式虚拟计算机,如 图 8所示。
亚计算机模型里的亚媒体的具体的标识亚编号是亚媒体的操作 当中基础部分。 亚编号 (QID)编码标识协议包括, 亚媒体的生命许可 上的亚媒体的具体的存活的尺度量 (QINUM)标识进去,并加入这个亚 媒体生产厂家和亚媒体的产品特性标号等编号的标识协议。 QM是亚 媒体 (CAIM)的具体实现, 其中的 QTM和 QVM是亚实媒体 (CAITM) 模型和亚虛拟媒体 (CAIVM ) 的实现。
由上可以定义为具体的虚拟媒体的表示方法,虛拟媒体真实编号 是亚虚拟媒体的网络上的真实编码 AID=F(TID,VID), 也是虚拟媒体 在网络上的唯一编码表示方式。 编号 (QID)为亚编号 (CAI)的具体的实 现方式。 每台 QJPC上亚实体媒体只有一个网络上可以识別的唯一编 码实编号 (TID)。 每个 QPC上运行的 QVM也只有一个网络上可以识 别的唯一编码的是虚编号 (VID )。
TID和 VID定义为 64位长度的二进制序列号来组成, 这样可以 用 4个每组 4个的 16进制数字来表示, 其中 T、 V、 X、 为 16进制 数。
TID=2A64=TTTT: TTTT: TTTT: TTTT
VID=2A64= WW: WW: WW: WW
为了区分虚体和实体而虚编号 (VID)和实编号 (TID ) 在编码 ( QID )形式上需要有一个区别表示。 其实现方式是在 64 为二进制 编码 (QID)上的首位标识为区分虚编号 (VID)和实编号 (TID ) 的方式 来区分网络上的实体媒体 (TM)和虚拟媒体 (VM)。
可以有两种选择方案首位的值为 0时标识为实体和首位的值为 1 时标识为实体的两种方案。
(曱方案): 一种方案是首位二进制表示为 0时表示虛体, 即虛编 号。
QID(0)=1时候是标示虚体 (VM)对象的虚编号 VID; QID(0)=0时 候是标示实体 (TM)对象的实编号 TID。
(乙方案): 另一种方案是二进制第一位是 1是表示虛编号。
QID(0)=0时候是标示虛体 (VM)对象的虚编号 VID; QID(0)=1时 候是标示实体 (TM)对象的实编号 TID。
真实编号 (AID)是网络上唯一识别和表示亚媒体 (CAIM)对象的 编号。 实体真实编号 (TAID)是 64位的二进制的实体对象的实编号的 来表示,等式如下。
AID=TAID=TID=2A64
TAID= TID=2A64=TTTT: ΤΤΤΤ: ΤΤΤΤ: ΤΤΤΤ
虚体真实编号 (VAID)是实编号和虚编号来组合成的 128位的编 码编号来表示, 等式如下。
AID=VAID=TID:: VID=2A 128
VAID=TTTT:TTTT:TTTT:TTTT::VVVV:VVVV:WVV:VVVV 为了实现网络上能识别实体机 (QTPC), 需要在实体计算机上特 别设置一个能在网络上能识别这个实体机的网络装置,以下提出两种 方案。 '
甲方案: 方案甲是为了兼容现有的网络上的网卡的 MAC地址而 扩充的方案, 即保留 MAC地址的 48位二进制其中包括 24位的制造 厂商的公司编号和 24位的产品编号的基础之上,剩余的 16位二进制 数来标识实体的真实编号 (TAID)的方案。
方案曱的方式是在计算机硬件及主板上嵌入一个固件,其中含有 能在网络上能识别的实体的真实编号 (TAID) ,使计算机在启动和运行 过程中能在网络上识别出它的实体的真实编号 (TAID)的装置。 编号 (QID)的特点及在编码方式上区分了虚拟编号 (VID)和真实编号 (TID), 并能在网络上能识别到这台计算机是实体机 (TPC)还是虚拟机 (VPC)来控制和管理网络上的各种计算机及虚拟机和实体机, 这样可 以更好的控制和管理虛拟机在网络上的泛滥,并能识别虛拟机由 AID 里查询到这个虛拟媒体具体在哪个实体媒体上。 另外在 QID编码格 式上加入亚生存方式 (CAIMOD)和亚虚拟文件组合方式。
乙方案: 方案乙是一个全新的实体的真实编号 (TAID)的方案, 重 新定义真实编号 (TAID)的 64位或 128位的方案。
下面将描述才 据本发明的亚网络地址协议方案。
亚网络地址兼容协议方案 (IPv6Q)是亚网络地址的具体在互联网 协议兼容下扩充网络地址的方案,在亚网络地址编码方案里用亚时空 的模型来把亚生存周期模型编入到这个编码方案。
IPv4地址不足是当前一个热点的问题。 业界解决 IPv4地址不足 主要有两种方法: 一是非兼容方式的升位, 这就是采用全新的 IP地 址协议, 如 IPv6; 另一方法是采用兼容方式的路径, NAT技术就是 这种方式的典型代表, 并且已经在市场上获得了大规模的实际应用。
IPv4地址空间最终会不够 , 因为平均地球上每个人均的 IPv4地 址正好不足一个( IPv4地址空间为 232 =4294967296, 以地址人口 60 亿计算, 平均每人 IPv4地址数量为 0.716个), 虚拟化技术的发展 IP 地址的需求量将大增。
号码的升位中有三个要素会与升位的兼容性有关, 分别是: 号码 位长、 编号规则和号码分配。 传统的 IP, 即 IPv4 ( IP version 4 )定义 IP地址的长度为 32位, Internet上每个主机都分配了一个(或多个) 32位的 IP地址。 因为虛拟化技术的发展和成熟, 支设现有的实体计 算机的安装了多个虛拟机运行, 需求量是现有的 IP地址数量的基础 上的几倍, 虚拟化到虚拟媒体的时候需求量可能是几何数增长, 这需 要 IP地址扩充及使用 IPv6的方式来解决, 虛拟化技术而引起的 IP 地址不足的冲击。
IPv6Q是亚网絡地址的实现的一种方法。 IPv4地址中过去称为 "E 类" 的地址块作为新的 IPv6Q 地址扩充的使用方案。 E 类是指 240.0.0.0 ~ 255.255.255.255的地址块,相当于 2亿 6843万 5456个 IP 地址。 也写作 "240.0.0.0/4"。 截至目前, 尚未分配的 IPv4地址仅为 46个 8" 地址块。 E类相当于 16个 /8地址块。 但是在此之前, E 类地址作为 "为未来利用预留的备用地址", 并未向用户分配。 不算 在上述 46个地址块之中。 IPv6Q的方案之一, IPv4的 E类地址三维矢量方向来增加地址的 IPv6的方案。使用 IPv4的 E类地址并 240 ~ 247作为三维矢量方向标 识位,并增加 3组 32位的网络地址扩充至 128位的 IPv6的网络地址。 将 其 表 示 为 1Ρν4Ε: :IPv4x::IPv4y: :IPv4z=F0RR:GGBB::XXXX:XXXX:: YYYY: YY ΥΥ::ΖΖΖΖ:ΖΖΖΖ, 其中每个字母或数字表示一个 16进制数。 这个方 案中当头字节为 F0 ~ F7 时, 各表示如下 F0=E:+X32:+Y32:+Z32, F1=E:+X32:+Y32:-Z325 F2=E:+X32:-Y32:+Z32, F3=E:+X32:-Y32:-Z32: F4=E:+X:+Y32:+Z32, F5=E:-X32:+Y32:-Z32, F6=E:-X32:-Y32:+Z32, F7=E:-X32:-Y32:-Z32的各个扩展 IPv4组当中增加网络矢量地址。 E 网的其他位保留。
IPv6Q的方案之二, IPv4的 E类地址扩充的虛拟 IP地址和实体 IP地址分配的 IPv6的方案。 方案二是方案一的基础上为分别为亚虚 拟机和亚实体分配具体的 IP地址的方案, 编码编入到 IPv6Q的亚网 络地址 (CAIONET)模型协议的方案。 从 F0到 FF的真实 IPv6地址 ( T-IPv6Q )和 F8~FF的虚拟 IPv6地址 (V-IPv6Q)地址的方案。
Figure imgf000027_0001
IPv6Q的方案之三, 地址空间里包含地址空间的亚生命周期的方 案。
方案三是方案之二的基础之上增加媒体生命周期的 IPv6方案, 把亚生命周期编码编入到 IFV6Q的亚网络地址模型的协议的方案。 Hex Bin CAICYC时间单位 Hex Bin CAICYC时间单位
0 0000 Zs 0秒 8 1000 Min 60秒
1 0001 As 10八(-18)秒 9 1001 H 60分钟
2 0010 Fs 10 -15)秒 A 1010 D 24小时
3 0011 Ps 10Λ(-12)秒 B 1011 W 7天
4 0100 Ns 10Λ(-9)秒 C 1100 Mon 30天
5 0101 Us 10Λ(-6)秒 D 1101 Y 12个月
6 0110 Ms 10Λ(-3)秒 E 1110 C 60年
7 0111 S 1秒 F mi Qon 无穷大
IPv6Q的方案之四, 可使用现行的 IPv6草案和 IPv4及它的扩充 方案的使用方案。
IPv6Q的方案之五, 也可重新定义亚网络协议。
图 9和图 10是示出根据本发明的用户管理部分的操作界面的示 意图。 其中, 图 9示出亚母操作界面 (HMI)的结构图。
用户管理 (QMS)里包括亚母操作界面 (HMI)和亚子操作界面 (TMI) 来组成, HMI和 TMI的工具条菜单之间是相互可以切换的。 亚母操 作界面 (HMI)里包括用户设置、 ***设置、 网络设置、 亚子***设置、 命令行、 娱乐管理等部分组成。
用户设置包括用户组和新用户设置用户对亚子***的权限等。 ***设置包括亚***固件升级 (System Update) >主题设置 (Theme Setting) ***语言设置(System Language)、 默认亚虚拟机自动启动 (QVM Auto Start)、 亚文件*** (QVFS)的格式化与备份和恢复、 亚存 储媒体设置 (Storage Setting)、时间日期的设置、显示输出设置 (Display Setting)、 音频输出设置(Sound Setting)、 亚媒体外设设置(Device Setting), 亚网络设置里包括亚网络状态、 网络协议方式、 网络无线和 有线的连接方式、 虛拟网络设置和远程连接设置、 亚编号编码设置 (QID)、 亚***信息 (System Information)、 QPC的关机等。
网络管理包括远程控制、 浏览器、 信使、 亚网交易、 亚网格风云 计算。
娱乐管理包括在亚媒体存储介质上存储照片, 音乐, 视频, 游戏 等, 亚媒体介质直接运行在亚母***上。
图 10是示出根据本发明的亚子***操作界面的示图。
亚子***里包括创建亚子媒体文件, 配置亚媒体文件, 设置亚许 可模式和动力保障, 设置亚网络设备和亚虛拟存储设备, 亚媒体组合 亚虛拟机方式, 启动亚子虚拟机***, 更改亚子***的配置, 克隆亚 媒体或亚虚拟机, 停止、 迁移、 删除虚拟媒体或亚虛拟机, 亚媒体日 志报告等功能部分, 这些亚虚拟机 (QVPC)上运行的亚真实操作*** 界面以切换方式通过亚子界面 (TMI)来操作和管理。
亚子操作界面 (TMI)里包括亚子虚拟机和它的各种设置管理来并 为亚子虛拟机上运行的亚真实操作***提供环境和操作服务。
亚子操作界面的形式是一个菜单栏 (Top Manage Bar, TMB),它停 留在监视器的顶部。 根据用户的选择而显示和隐藏。 通过 TMB菜单 由三部分组成左端的 XMI(eXchange Manage Icon)图标菜单, 中间的 计算机图标列菜单 CMI(Computer Manage Icon)和右端的 QMI(QPC Manager Icon)图标菜单组成。
TMB 菜单上的左端的 XMI 图标来通过鼠标点击切换显示和隐 藏, 在隐藏模式下鼠标离开显示器顶端 TMB菜单就消失, 当鼠标移 动到显示器顶端的时候就显示 TMB菜单,设置中间部分的 CMI上计 算机图标的排列方式。
TMB菜单上的中键部分计算机管理茱单 CMI中, 用不同的颜色 计算机图标来表示亚子计算机的状态。 例如, 红色表示当前监视器上 显示和操作的当前亚子虚拟机, 用绿色表示本地的亚子虚拟机, 用灰 色表示关机的计算机, 用蓝色表示远程计算机, 用黄色来表示亚真子 虛拟机 (QTVPC)。 当鼠标移动到特定的计算机图标上时, 显示该台计 算机的信息, 当左键点击特定颜色的计算机图标时, 可以切换到与之 对应的计算机, 右键点击时, 可以显示弹出菜单, 通过弹出菜单可以 设置当前亚子虚拟机的各种配置, 通过右端的 TMB菜单上的右端的 QMI图标点击来亚子操作界面转换到亚母操作界面 HMB菜单的切换 按钮, 鼠标右击 QMI图标弹出菜单, 从 QMI弹出菜单上关闭 QPC 和设置显示网络模式等操作。 亚真子虚拟机当中没有远程和本地的区分,亚^ -子虚拟机是为了 兼容于互联网上的传统计算机而在 TMB菜单上设置了本地计算机模 式 (Native Mode)和远程计算机模式 (Remote Mode)来操作远程计算机 和本地虚拟机, 远程模式下可以通过 Windows 的 RDP协议方式、 Unix/Linux的 XDMCP协议的远程协议方式等传统计算机远程通信方 式访问和操作亚子虚拟机上运行的亚真子操作*** (CAITOS)。
下面将参照图 11来描述亚光计算机、 亚智能***、 亚计算机语 言、 亚风云计算实现方案。
现今材料技术上锗-碲化合物纳米线 (GeTe/Ge2Sb2Te5)制造过程 并不十分复杂, 通过反应溅射的方法, 制备 N 掺杂的 Ge2Sb2Te5(N-GST)薄膜用作相变存储器的存储介质。 研究表明, 掺 杂的 N以 GeN的形式存在, 不仅束縛了 Ge2Sb2Te5 (GST)晶粒的长 大也提高了 GST的晶化温度和相变温度。利用 N-GST薄膜的非晶态、 晶态面心立方相和晶态六方相的电阻率差异,能够在同一存储单元中 存储三个状态, 实现相变存储器的多态存储功能, 并这种存储单元来 制作 3 进制存储器设备, 三进制的存储设备可以大幅度提高存储密 度, 意味着可以在更小的空间内储存更多的数据信息, 也满足虚拟机 的普及和硬盘空间的需求。以光的偏振光的 3进制信息传递的特性传 递信息和逻辑运算, 制作 3进制光学处理芯片(T-CPU)和 3进制存储 器 (T-Storage)来制作新型的亚光计算机, 这个亚光计算机作为亚母计 算机, 在 VIOS上将 3进制转换成 2进制的亚接口, 亚光计算机上正 常运行传统的 2进制操作***。 通过上述亚光计算机方案, 可以解决 高性能的未来 3进制为基 的光计算机和现今使用的 2进制为基础的 真实操作*** (CAITOS)之间用亚操作***来转化为由 3 进制的亚光 计算机上正常运行 2进制的现行的各种操作***的亚光计算机。在亚 光计算机的硬件基础上亚光组合原理的亚象数上的数据结构特点和 它们之间的逻辑计算来设计相应的亚计算机语言,亚计算机数值处理 当中使用亚时空概念的 Qon 的亚时空上亚象之间关系定义方式来把 数据存储在一个回归存储单元里,数据计算亚象***连分组计算方式 来处理浮点运算并极限值由 Q来处理, 所以不会出现 1进制的计算 机一样被除零的错误时后就会产生 "除零" 的中断和溢出问题。
亚光组合原理的 2阶和 3阶的回归特点来在亚网络上的各个亚计 算机提供亚虛拟机和亚媒体来共同集成一个虚拟的大***来亚风云 计算出超大运算量的计算处理,亚网络上的亚媒体组合成亚网络存储 器, 各个亚***组合成亚网络知识库。
亚风云计算 (net3compute)是亚光组合原理的 3阶 net3sys的组合 模型的实现方式。 在一个超大计算量, 假设由 840个计算量来组成, 在亚网络上的可用的亚虚拟机有 611个,用亚象***连分组定理的亚 大***用辗转相除的方式来各个亚***连续分割成相对独立的亚小 ***的基本亚象来分化, 其中分子 1表示一个相对独立的亚***, 分 母为其***下的具体组成部分不断细化成基本的組成部分,亚象*** 连 分 组 定 理 来 把 840 个 超 大 计 算 量 840/611=>1+1/(2+1/(1+1/(2+(1/76))))的连续***分层式计算方式来把 大计算量分派给亚环境下的各个亚虚拟机组成的亚***上运行亚风 云计算。 这种计算方式可以提高超大计算量的精确度, 其中分子 1是 各亚虛拟机组成亚***。
每个亚***的组合规则是由亚***亚点亚光弦关系式: SUM(CAISYS)+SUM(CAIONE)=SUM(CAIBEAM)+2*CAIBEAM 来 组合和通讯, 假设一个亚大*** (CAISYS)由 8 个亚虚拟计算机来组 成 6个亚小*** (CAI1 SYS)时候各个亚计算机之间从关系式里得出亚 虛拟计算机之间至少 12个相互之间的通讯才能组合成 6个亚小***, 其中缺少一个通讯而成 11个相互通讯时不可能组合成 6个亚小*** 来构成一个亚大***,亚***由这样的基本組合方式来在亚环境里构 成更大的亚***。
亚光组合原理基础上的 iYAF理论的亚计算机***环境模型来设 计一个可以独立于人工调整的亚智能***来维护亚环境。亚环境下亚 象在亚维***自升律自我复制和升华的特性用亚象***连分组定理 来自我修复各个亚媒体之间的通讯和组合,亚弦***变化度来控制亚 点之间的量的组合数量,亚循环周期来***之间不断的循环生成新的 亚编码和不断的回收亚编码,通过亚弦自升恒量等式来各亚点之间组 合并升华和回归。 亚***的各个亚某体重新组合成新的亚***, 亚系 统的各个亚媒体重新组合成新的亚***,整个亚***作为一个单位系 统的亚环境的时候, 其中, 以自然平 #f处理方式控制和智能管理整个 亚网络环境的亚智能***。
本发明提出了一种基于虛拟机技术的计算机架构及其实现方式, 可提供一种安全和高性能的计算机。根据本发明, 用户可按照自己的 意愿在实体计算机上任意创建、使用和删除虚拟机, 可从网络上获取 需要的计算机媒体资源用于创建计算机,并与其他计算机组合成大的 计算机***来实现集群运算。

Claims

权 利 要 求
1、 一种在计算机上创建虛拟机的方法, 所述计算机的硬件主板 上安装有一存储器固件 ,在该存储器固件中存放有与存储在硬盘中的 第一操作***不同的第二操作***, 所述方法包括:
当通过计算机的 BIOS或 EFI选择进入第二操作***时, 从所述 存储器固件读取第二操作***,将计算机的控制权交付给第二操作系 统;
第二操作***控制通过有线或无线连接网络,通过媒体的编号识 别网络中或本地的媒体;
第二操作***通过媒体接口在第二操作***的文件***上将媒 体组合成虛拟机;
启动所述虛拟机, 并在虚拟机上运行子操作***。
2、 如权利要求 1所述的方法, 其中, 第二操作***从硬盘的最 后区域里读取虛拟机的信息,并读取安全认证信息之后从虛拟文件系 统里运行和管理虚拟机。
3、 如权利要求 1所述的方法, 其中, 第二搡作***将虛拟文件 ***上的文件逻辑上分类成 3种文件表现形式的媒体虚拟文件 ,包括 子操作***的虛拟文件、应用程序的虛拟应用文件、数据的虛拟数据 文件。
4、 如权利要求 1所述的方法, 其中, 在计算机***中的所述存 储器固件中具有计算机的真实编号,计算机上的虛拟媒体具有虚拟编 号,在网络上通过真实编号和虚拟编号来识别计算机是实体计算机还 是虛拟机。
5、 如权利要求 1所述的方法, 其中, 通过子操作***管理界面 来管理在第二操作***上运行的子操作***,子操作***管理界面与 第二操作***的管理界面互相切换。
6、 如权利要求 1所述的方法, 其中, 使用 IPv4的 E类地址三维 矢量方向来增加网络中的可分配地址,并分别为虚拟机和实体计算机 分配具体的 IP地址。
7、 如权利要求 1所述的方法, 其中, 地址空间里包含地址空间 的生命周期, 媒体在所述媒体的生命周期内通过网络结合成虛拟机。
8、 如权利要求 1所述的方法, 其中, 通过网络将多个计算机组 合成集群服务器。
9、 一种基于虛拟机的计算机, 其特征在于:
其计算机的硬件包括一特定存储器固件,该特定存储器固件中具 有除存储在计算机的硬盘中的第一操作***之外的第二操作***, 当 通过计算机的 BIOS或 EFI选择进入第二操作***时, 从所述特定存 储器固件读取第二操作***, 将计算机的控制权交付给第二操作系 统;
所述第二操作***的特征在于当启动时,通过媒体对象的编号识 别网络中或本地的媒体,通过各种媒体接口在第二操作***的文件系 统上将媒体组合成虚拟机。
10、 如权利要求 9所述的计算机, 其中, 第二操作***从硬盘的 最后区域里读取虛拟机的信息,并读取安全认证信息之后从虚拟文件 ***里运行和管理虚拟机。
11、 如权利要求 9所述的计算机, 其中, 第二操作***将虚拟文 件***上的文件逻辑上分类成 3种文件表现形式的媒体虚拟文件,包 括子操作***的虛拟文件、应用程序的虚拟应用文件、数据的虚拟数 据文件。
12、 如权利要求 9所述的计算机, 其中, 在计算机***中的所述 存储器固件中具有计算机的真实编号,计算机上的虛拟媒、体具有虚拟 编号,在网络上通过真实编号和虛拟编号来识别计算机是实体机还是 虚拟机。
13、 如权利要求 9所述的计算机, 其中, 通过子操作***管理界 面来管理在第二操作***上运行的子操作***,子操作***管理界面 与第二操作***的管理界面互相切换。
14、 如权利要求 9所述的计算机, 其中, 使用 IPv4的 E类地址 三维矢量方向来增加网络中的可分配地址,并分别为虛拟机和实体计 算机分配具体的 IP地址。
15、 如权利要求 9所述的计算机, 其中, 计算机的地址空间包含 地址空间的生命周期,媒体在所述媒体的生命周期内通过网络结合并 在计算机上生成虚拟机。
16、 如权利要求 9所述的计算机, 其中, 所述计算机通过网絡与 多个计算机组合成集群服务器。
PCT/CN2008/001730 2008-10-14 2008-10-14 基于虚拟化技术的计算机***及虚拟机创建方法 WO2009149588A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2008/001730 WO2009149588A1 (zh) 2008-10-14 2008-10-14 基于虚拟化技术的计算机***及虚拟机创建方法
CN200880131559.0A CN102177503B (zh) 2008-10-14 2008-10-14 基于虚拟化技术的计算机***及虚拟机创建方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2008/001730 WO2009149588A1 (zh) 2008-10-14 2008-10-14 基于虚拟化技术的计算机***及虚拟机创建方法

Publications (1)

Publication Number Publication Date
WO2009149588A1 true WO2009149588A1 (zh) 2009-12-17

Family

ID=41416338

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/001730 WO2009149588A1 (zh) 2008-10-14 2008-10-14 基于虚拟化技术的计算机***及虚拟机创建方法

Country Status (2)

Country Link
CN (1) CN102177503B (zh)
WO (1) WO2009149588A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609638A (zh) * 2011-12-22 2012-07-25 中国航天科工集团第二研究院七〇六所 基于UEFI运行时服务的Xen虚拟机架构及其实现方法
CN109144543A (zh) * 2018-08-09 2019-01-04 郑州云海信息技术有限公司 一种基于EFI环境的验证VMware***BIOS兼容性的方法
WO2020015702A1 (zh) * 2018-07-20 2020-01-23 中兴通讯股份有限公司 教学模板管理方法、设备以及计算机可读存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9529689B2 (en) * 2009-11-30 2016-12-27 Red Hat, Inc. Monitoring cloud computing environments
CN107256171B (zh) * 2017-06-19 2021-02-23 苏州浪潮智能科技有限公司 一种基于bios的多***安装和切换方法及***
CN109032773A (zh) * 2018-06-16 2018-12-18 武汉商启网络信息有限公司 一种云主机自助安装操作***应用管理***

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1448017A (zh) * 2000-07-05 2003-10-08 恩斯特&扬有限责任合伙公司 提供计算机服务的方法和设备
US20050160151A1 (en) * 2003-12-17 2005-07-21 International Business Machines Corporation Method and system for machine memory power and availability management in a processing system supporting multiple virtual machines
CN101000566A (zh) * 2006-01-12 2007-07-18 三星电子株式会社 操作***切换设备和操作***切换方法
CN101211272A (zh) * 2006-12-29 2008-07-02 英特尔公司 动态虚拟机生成
US20080244525A1 (en) * 2007-03-29 2008-10-02 Microsoft Corporation Test Automation Using Virtual Machines

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1448017A (zh) * 2000-07-05 2003-10-08 恩斯特&扬有限责任合伙公司 提供计算机服务的方法和设备
US20050160151A1 (en) * 2003-12-17 2005-07-21 International Business Machines Corporation Method and system for machine memory power and availability management in a processing system supporting multiple virtual machines
CN101000566A (zh) * 2006-01-12 2007-07-18 三星电子株式会社 操作***切换设备和操作***切换方法
CN101211272A (zh) * 2006-12-29 2008-07-02 英特尔公司 动态虚拟机生成
US20080244525A1 (en) * 2007-03-29 2008-10-02 Microsoft Corporation Test Automation Using Virtual Machines

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609638A (zh) * 2011-12-22 2012-07-25 中国航天科工集团第二研究院七〇六所 基于UEFI运行时服务的Xen虚拟机架构及其实现方法
WO2020015702A1 (zh) * 2018-07-20 2020-01-23 中兴通讯股份有限公司 教学模板管理方法、设备以及计算机可读存储介质
CN109144543A (zh) * 2018-08-09 2019-01-04 郑州云海信息技术有限公司 一种基于EFI环境的验证VMware***BIOS兼容性的方法

Also Published As

Publication number Publication date
CN102177503B (zh) 2014-07-02
CN102177503A (zh) 2011-09-07

Similar Documents

Publication Publication Date Title
US11500670B2 (en) Computing service with configurable virtualization control levels and accelerated launches
US20230012930A1 (en) Architecture for managing i/o and storage for a virtualization environment using executable containers and virtual machines
US11218364B2 (en) Network-accessible computing service for micro virtual machines
Zhang et al. Cloud computing: state-of-the-art and research challenges
Banikazemi et al. Meridian: an SDN platform for cloud network services
US9135050B2 (en) Extensible network configuration management
CN111444020A (zh) 一种超融合计算***架构及融合服务平台
US20200106669A1 (en) Computing node clusters supporting network segmentation
US20070061441A1 (en) Para-virtualized computer system with I/0 server partitions that map physical host hardware for access by guest partitions
US20080163171A1 (en) Virtual resource templates
AU2004280976A1 (en) Computer system para-virtualization using a hypervisor that is implemented in a partition of the host system
CN104052789A (zh) 用于虚拟联网***的负载平衡
CN102088367A (zh) 虚拟化环境下快速部署方法
WO2009149588A1 (zh) 基于虚拟化技术的计算机***及虚拟机创建方法
US10212045B2 (en) Method and system for testing and analyzing management servers
CN103765372A (zh) 配置用于输入/输出操作的对象存储***
CN103685441B (zh) 一种基于龙芯终端的远程桌面控制***
US10225142B2 (en) Method and system for communication between a management-server and remote host systems
Khajehei Role of virtualization in cloud computing
Kelbley et al. Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Van Hensbergen et al. A unified execution model for cloud computing
Yunxia et al. Research of enterprise private cloud computing platform based on openstack
Zhang et al. An automatic deployment mechanism on cloud computing platform
CN114138898A (zh) Smg-vme-afs可迭代分布式存储***
Higgins et al. Autonomous discovery and management in virtual container clusters

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200880131559.0

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08874580

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08874580

Country of ref document: EP

Kind code of ref document: A1