Optimizing the Migration of Virtual Computers

Slides:



Advertisements
Similar presentations
Virtual Disk based Centralized Management for Enterprise Networks
Advertisements

Remus: High Availability via Asynchronous Virtual Machine Replication
Live migration of Virtual Machines Nour Stefan, SCPD.
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Company name KUAS HPDS Using Remote Memory Paging for Handheld Devices in a Pervasive Computing Environment Arjuna Sathiaseelan.
What You Will Learn Components of a computer’s system software The importance of an operating system Functions of an operating system Types of user interfaces.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
1 Virtual Machine Resource Monitoring and Networking of Virtual Machines Ananth I. Sundararaj Department of Computer Science Northwestern University July.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Memory Management (II)
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Exploiting SCI in the MultiOS management system Ronan Cunniffe Brian Coghlan SCIEurope’ AUG-2000.
1 Distributed Systems: Distributed Process Management – Process Migration.
Offering your Windows Server Class Online. Tony Basilico Community College of Rhode Island
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Gordon: Using Flash Memory to Build Fast, Power-efficient Clusters for Data-intensive Applications A. Caulfield, L. Grupp, S. Swanson, UCSD, ASPLOS’09.
Paper on Best implemented scientific concept for E-Governance Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola By Nitin V. Choudhari, DIO,NIC,Akola.
Basics of Operating Systems March 4, 2001 Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard.
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Design and Implementation of a Single System Image Operating System for High Performance Computing on Clusters Christine MORIN PARIS project-team, IRISA/INRIA.
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
Tanenbaum 8.3 See references
1 The Virtual Reality Virtualization both inside and outside of the cloud Mike Furgal Director – Managed Database Services BravePoint.
Computer Concepts 2013 Chapter 4 Operating Systems and File Management.
Evaluation of Delta Compression Techniques for Efficient Live Migration of Large Virtual Machines Petter Svärd, Benoit Hudzia, Johan Tordsson and Erik.
Paper on Best implemented scientific concept for E-Governance projects Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Virtualization Dr. John P. Abraham Professor. Grid computing Multiple independent computing clusters which act like a “grid” because they are composed.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan Presenter: Youngki, Lee.
The Memory Hierarchy 21/05/2009Lecture 32_CA&O_Engr Umbreen Sabir.
A Measurement Based Memory Performance Evaluation of High Throughput Servers Garba Isa Yau Department of Computer Engineering King Fahd University of Petroleum.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
The Three C’s of Misses 7.5 Compulsory Misses The first time a memory location is accessed, it is always a miss Also known as cold-start misses Only way.
Computer Software Types Three layers of software Operation.
Computer Architecture Lecture 27 Fasih ur Rehman.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Efficient Live Checkpointing Mechanisms for computation and memory-intensive VMs in a data center Kasidit Chanchio Vasabilab Dept of Computer Science,
Chapter 9: Networking with Unix and Linux. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences.
Hands-On Virtual Computing
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
CEG 2400 FALL 2012 Linux/UNIX Network Operating Systems.
BY: SALMAN 1.
Using Virtualization in the Classroom
Computers: Tools for an Information Age
CS161 – Design and Architecture of Computer
CS 704 Advanced Computer Architecture
Chapter 6: Securing the Cloud
Remote Backup Systems.
BY: SALMAN.
CS161 – Design and Architecture of Computer
CS352H: Computer Systems Architecture
Operating System Structure
Slingshot: Deploying Stateful Services in Wireless Hotspots
CSI 400/500 Operating Systems Spring 2009
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
Virtual Machines.
Hands-On Virtualization in the Classroom
Grid Canada Testbed using HEP applications
OS Virtualization.
Haiyan Meng and Douglas Thain
Outline Midterm results summary Distributed file systems – continued
Process Migration Troy Cogburn and Gilbert Podell-Blume
by Mikael Bjerga & Arne Lange
LO3 – Understand Business IT Systems
Virtual Memory: Working Sets
Remote Backup Systems.
Presentation transcript:

Optimizing the Migration of Virtual Computers Constantine P. Sapuntzakis, Ramesh Chandra, Ben Pfaff, Jim Chow, Monica S. Lam, and Mendel Rosenblum Presented by: Seth Darden

Outline Introduction Usages and Requirements Optimizations Experimental Results Summary & Conclusion

Introduction Computer environments are hard to maintain and are hard to move between machines. Capsule for a machine Architecture is defined as the data type encapsulating the complete state of a machine. Goals : to explore the design of a capsule-based system architecture, “The Collective” examine its potential to provide user mobility, recovery, and simpler system management.

Storing and Migrating Capsules Methods used to increase transfer of capsules and reduce the startup times: 1. Save all the updates made to disk on a separate disk, using copy-on-Write (COW). 2. Reduce the memory state of the machine by flushing non-essential data to disk. 3. Disk pages are fetched on demand as the capsule runs, taking full advantage of the operating system’s ability to tolerate disk fetch latencies. 4. Collision-resistant hashes are used to avoid sending pages of memory or disk data that already exist at the destination.

Usages and Requirements The Collective system uses serialization and mobility of capsules to bestow: User Mobility Backup Software Management Hardware Management.

Usages and Requirements (cont.) User Mobility Capsules can be taken anywhere by the user, since it is not attached to a specific machine. Most of the state of a user’s active capsule is already present at both home and the other location (e.g. at work, lab, classroom) Only the differences in state has to be transferred during migration User has the ability to commence the capsule migration anytime desired. Drawback: The system may not work well with data-intensive applications (e.g. animation development or video editing)

Usages and Requirements (cont.) Backups A user has the ability to save snapshots of their capsules as backups. System Management Capsules can decrease the load of having to manage software and hardware. By creating an inactive capsule, it will be possible to distribute to multiple machines (similar to a disk image) Drawback: moving the first capsule to a machine over the network can be costly.

Optimization The optimization methods were designed to exploit the snapshot concept and the machines in a Collective system. Ballooning Ballooning minimizes the size of the compressed memory state Reduces the start-up time of capsules. Capsule Hierarchies Capsules in the Collective system are rarely created from scratch, but are mostly derived from other capsules.

Balloon is filled with “0”’s Ballooning balloon balloon balloon Inflate deflate processes Balloon is filled with “0”’s

Capsule Hierarchies An example capsule hierarchy. VT Capsule Disk Math Dept. Latest Disk CS Dept. Latest Disk Seth’s capsule snapshot Latest Disk Mario’s capsule Latest Disk Grace’s capsule Latest Disk Math Dept. Updated capsule Latest Disk Student2 capsule Latest Disk Lee’s capsule Latest Disk

Capsule Hierarchies (cont.) A capsule disk and the chain of COW disks that comprise it.

Demand Paging of Capsule Disks Capsule disk are read page-by-page on demand, rather than being pre-fetched. Starting a capsule on a machine is done as follows: 1. The memory image and all the bitmaps of the COW disks are transferred if they are not available locally. 2. The capsule is extended with a new, local latest COW disk. 3. For each remote COW disk, the corresponding shadow COW disk is created if it does not already exist.

Hash Cache Protocol Typical HCP session (a) Session initiation (b) Hash cache hit (c) Hash cache miss

Experimental Results Configuration system based on: System: VMware GSX Server 2.0.1 OS: Red Hat Linux 7.3 (kernel 2.4.18-12) Our Experiment Configuration: System: 2.4 GHz Pentium 4 machine RAM: 1 GB memory Separate computer (to simulate a 384 kbps symmetric DSL link w/ 20ms roundtrip delay) OS: FreeBSD Dummynet shaper

Experimental Results (cont.) Capsule Snapshots Simulations of the migration of a user between work and home machines using a series of snapshots to determine the average completion times. The Winstone benchmark exercises popular applications: Microsoft Office, WinZip, Norton, and Netscape To produce the Winstone snapshots, complete images were taken of the machine state every minute during execution.

Capsule Snapshots gzip: Size range from 2-22 MB Transfer time: 8mins hash + gzip: Compresses disk to about 10-30% of raw size hash + gzip: Memory images range from 6-17 MB Transfer time (DSL): 6mins

Summary & Conclusion Moves a computer state over a slow DSL link in minutes rather than hours. Capsules can be taken anywhere by the user, since it is not attached to a specific machine. User has the ability to commence the capsule migration anytime desired. Even though it is costly to migrate a capsule to another computer, it saves time and effort