SlideShare a Scribd company logo
1 of 26
Challenges in Cloud Computing – VM
Migration
Sarmad Makhdoom
2012-03-0019
Kamran Khalil
2012-03-0012
Hafeez ur Rehman
2012-03-0031
Introduction
Cloud Computing
•

Cloud computing is an umbrella term used to refer to Internet based
development and services

•

A number of characteristics define cloud data, applications services and
infrastructure:
▫
▫
▫

Remotely hosted: Services or data are hosted on remote infrastructure.
Ubiquitous: Services or data are available anywhere.
Commodified: The result is a utility computing model similar to traditional
that of traditional utilities, like gas and electricity - you pay for what you
would want!
Virtual Machines
• A virtual machine provides interface identical to underlying bare
hardware
▫ i.e. all devices, interrupts, memory, page tables etc.

• Applications of Virtual Machines
• Virtualization Software
▫
▫
▫
▫

VMWare
ZAP
Xen
QEMU
Virtual Machines in Cloud
▫ Benefits of Virtual Machines







Virtualization help making efficient use of hardware resources
Facilitates a greater degree of abstraction
Easily move from one piece of hardware to another
Replicate them at will
Create more scalable and flexible infrastructure
Snapshots

▫ Cloud computing has taken that degree of efficiency and agility realized
from virtualization
 Pooled resources
 Geographic diversity
 Universal connectivity
Research Problems
Research Problems
• Automated services provisioning

• Virtual machine migration
•
•
•
•
•
•
•

Server consolidation
Energy management
Traffic management and analysis
Data security
Software frameworks
Storage technology and data management
Novel cloud architecture
Motivation
Motivation
• Consider a data center consisting of “n” physical machines (PM) hosting
“m” VMs implementing one customer application each
• Resources(CPU, Network, Memory, I/O) are allocated to each VM to
handle the workload and operate at certain performance level (SLA)
• Each VM sees workload fluctuation from time to time => resource
requirement changes
# of user visit increases
PM Capacity
VM1

VM2

cricinfo

Network Bandwidth
Memory
CPU

mail server

Virtualization Layer
Hardware

Resource
Allocation

VM1
N = 5Gbps
M = 8GB
C = 4 cores

= 10 Gbps
= 16 GB
= 8 cores
VM2
N = 5Gbps
M = 8GB
C = 4 cores
Motivation
• An increase in workload can be handled by allocating more resources to
it, if idle resources are available
• Main Issues:
▫ What if PM does not have (enough or no) idle resources to satisfy VM's
requirement?
 Performance of the application degrades
 SLA violation occurs

• Key Ideas
▫ Replication VMs
▫ Migrating VMs
Virtual Machine Migration
It is impossible or impractical to bring the data (or devices) close to the computation
engines.
Virtual Machine Migration
• Why we need migration?
• When we need to migrate?
• How migration is done?
• Issues in long distance migration (across data centers)
When we need to migrate? [NSDI’ 07]
• Hotspots can cause SLA violations
▫ Burden on some Virtual or Physical Machines are called hotspots

• Hotspot Detection (Sandpiper)
▫ Black-box Monitoring
 CPU (/proc)
 Network (/proc/net/dev)
 Memory (swap)

▫ Gray-box Monitoring
 Gather OS level statistics and application logs

• A hotspot is flagged only if thresholds or SLAs are exceeded for a
sustained time
Wood T et al (2007) Black-box and gray-box strategies for virtual machine migration. In: Proc of NSDI
Gathering
resource usage
statistics
Gathers on that
server
processor, network

Determine:
What virtual servers should migrate
Monitors usage profiles to detect
Where to move them
hotspots.
Construct resource much any resource exceeds a the
How
Hotspot: of a resource to allocate
usage profiles forvirtual servers afterviolation) for a sustain
threshold(or SLA migration
each virtual server period
(Predict PM workload)

and memory swap
statistics
for each VM Implements a
daemon to gather
OS-level statistics
and application logs

Wood T et al (2007) Black-box and gray-box strategies for virtual machine migration. In: Proc of NSDI

14
When we need to migrate? [FGCS’ 12]
• SLA violation detection
▫ Mapping low-level resource metrics to high-level SLAs
▫ Crude data maps to user requirements such as
 CPU speed maps to Response Time
 Occupied memory size maps to number of concurrent clients

▫ Predictive Strategy for detection of possible SLA violations
▫ Detection interval
 Short measurement intervals may degrade performance
 Long measurement intervals may cause ignorance of heavy SLA violations

Towards autonomic detection of SLA violations in Cloud infrastructures, Future Generation Computer Systems, 2012
How migration is done?
• Memory Migration
▫ Pre-copy
 Push phase
 Stop-and-copy phase
 Pull Phase

▫ Pure demand-migration

• File System Migration
▫ In case of distributed file system, there is no need to copy
▫ Alternatively, copy only changed local files to the destination using Virtual
Machine Manager’s API.

S. Venkatesha, S. Sadhu, S. Kintali, and S. Barbara, "Survey of virtual machine migration techniques" - Memory, 2009
How migration is done?
• Network Migration
▫ If both source and destination are on same LAN switch
 an unsolicited ARP reply from the migrating host is provided

▫ Alternatively, on a switched network
 the migrating OS can keep its original Ethernet MAC address, relying on the
network switch to detect its move to a new port

• Device Migration
▫ Three type of device support
 Emulation
 Virtualization
 Non-migratable

S. Venkatesha, S. Sadhu, S. Kintali, and S. Barbara, "Survey of virtual machine migration techniques" - Memory, 2009
Migration: A Performance Evaluation
• Testbed specification
▫
▫
▫
▫
▫

6 Servers (1 head node, 5 VM hosts)
Intel Xeon (2.33 GHz Quad-core with 2x6MB L2 Cache)
4GB memory and 7200rpm hard drive
64-bit Ubuntu Linux 8.04 Server Edition
Apache 2.2.8 and MySQL 5.2.4-2

• Workload
▫ Olio as a Web 2.0 application (http://incubator.apache.org/olio/)
▫ Faban Load generator (http://faban.sunsource.net)

• Experiments
▫ 10 minute and 20 minute benchmark runs with 600 concurrent users
Cost of virtual machine live migration in clouds: A performance evaluation, International Conference on Cloud Computing, 2009
Migration: A Performance Evaluation

Cost of virtual machine live migration in clouds: A performance evaluation, International Conference on Cloud Computing, 2009
Migration across data centers
• Need for VM mobility across data centers
▫
▫
▫
▫

Data center maintenance without downtime
Disaster avoidance
Data center migration/expansion
Workload balancing across multiple sites

• Issues
▫
▫
▫
▫

RTT is 1,000 times greater than sub-networks, ‘word wide wait’
Trust to a remote execution environment
Interoperability at the level of Web Services, Java etc
Migration across multiple domains are vulnerable to security exploits
Related Work: Migration over MAN/WAN
[FGCS’06]
• Introduced an intermediate traffic controller to facilitate migration
which consists of:
▫ VM Traffic Controller
 Provisioning of network resources and the re-provisioning of the IP tunnel to
ensure seamless layer

▫ AAA (Authentication, Authorization and Accounting)
 Pre-allocation of extra VM-resources required for migration

▫ DRAC (Dynamic Resource Allocation Controller)
 Exposes a service-oriented API for coupling with applications

▫ Preservation of TCP and higher-level sessions
 Dynamically configured IP tunnels allow client connectivity

“Seamless Live Migration of Virtual Machines over the MAN/WAN”, Elsevier Future Generation Computer Systems 2006
Related Work: HP Cluster Extension and
Microsoft Hyper-V™
• HP Cluster Extension (CLX) provides flawless mirroring capabilities for
disaster recovery
• VM data is already replicated in single data center cluster
▫ Modifications to spread it across multi-site:
 Multi-site Disaster Recovery solution is implemented
 CLX enables Hyper-V Live Migration across sites

(VMware, Hyper-V, HP-VM and AMD-V)
Our limitation is non-availability of peer referenced or published
material of these architectures to discuss their techniques in detail
Proposed Solution
• Security
▫ Layer 2 Link Encryption (IEEE 802.1AE) may be used to help ensure privacy
and confidentially
▫ Token based security - Authorization message sequence to thwart resource
theft

• 1,000 times rise in RTT doesn’t matter much because
▫ All states will be transferred before the switch
▫ Downtime will be based on the time required in redirection
 Which is only 5-10 times than the intra-LAN setup
Conclusion
Conclusion
• Virtual machine migration provide significant benefits in cloud
computing
• State of the art work is already done on resource monitoring, live VM
migration over the LAN and MAN/WAN
• Downtime is 60ms to 3s which they assume is negligible
• Small transient spikes does not trigger needless migrations, if threshold
or SLAs are exceeded for sustained time
• A slowdown is expected due to cache warm-up at the destination after
migration
• Hybrid approach has been suggested to harness the benefits of all
technqiues
Challenges in Cloud Computing – VM Migration

More Related Content

What's hot

Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
Case study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneCase study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneAkash Badone
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Serverwebhostingguy
 
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityDistributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityRenato Lucindo
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaAmar Myana
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE AND JSP PROCESSING
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE  AND JSP PROCESSINGINTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE  AND JSP PROCESSING
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE AND JSP PROCESSINGAaqib Hussain
 
Snooping protocols 3
Snooping protocols 3Snooping protocols 3
Snooping protocols 3Yasir Khan
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 

What's hot (20)

Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
MANET
MANETMANET
MANET
 
Case study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneCase study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash Badone
 
Configuring the Apache Web Server
Configuring the Apache Web ServerConfiguring the Apache Web Server
Configuring the Apache Web Server
 
Distributed Systems: scalability and high availability
Distributed Systems: scalability and high availabilityDistributed Systems: scalability and high availability
Distributed Systems: scalability and high availability
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Hadoop Ecosystem
Hadoop EcosystemHadoop Ecosystem
Hadoop Ecosystem
 
Coda file system tahir
Coda file system   tahirCoda file system   tahir
Coda file system tahir
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE AND JSP PROCESSING
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE  AND JSP PROCESSINGINTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE  AND JSP PROCESSING
INTRODUCTION TO JSP,JSP LIFE CYCLE, ANATOMY OF JSP PAGE AND JSP PROCESSING
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Hive(ppt)
Hive(ppt)Hive(ppt)
Hive(ppt)
 
Snooping protocols 3
Snooping protocols 3Snooping protocols 3
Snooping protocols 3
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 

Similar to Challenges in Cloud Computing – VM Migration

Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesAlexander Penev
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...SaikiranReddy Sama
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingchrismik
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEIRJET Journal
 
Virtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A SurveyVirtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A Surveyijsrd.com
 
Caching for Microservices Architectures: Session I
Caching for Microservices Architectures: Session ICaching for Microservices Architectures: Session I
Caching for Microservices Architectures: Session IVMware Tanzu
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Virtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric VanderburgVirtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric VanderburgEric Vanderburg
 
Cloud computing and its job opportunities
Cloud computing and its job opportunities Cloud computing and its job opportunities
Cloud computing and its job opportunities Ramya SK
 
Optimising Service Deployment and Infrastructure Resource Configuration
Optimising Service Deployment and Infrastructure Resource ConfigurationOptimising Service Deployment and Infrastructure Resource Configuration
Optimising Service Deployment and Infrastructure Resource ConfigurationRECAP Project
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform霈萱 蔡
 
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds CapacityCloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds CapacityAvere Systems
 
Big Data on Cloud Native Platform
Big Data on Cloud Native PlatformBig Data on Cloud Native Platform
Big Data on Cloud Native PlatformSunil Govindan
 
Big Data on Cloud Native Platform
Big Data on Cloud Native PlatformBig Data on Cloud Native Platform
Big Data on Cloud Native PlatformSunil Govindan
 

Similar to Challenges in Cloud Computing – VM Migration (20)

Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
 
Virtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A SurveyVirtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A Survey
 
Caching for Microservices Architectures: Session I
Caching for Microservices Architectures: Session ICaching for Microservices Architectures: Session I
Caching for Microservices Architectures: Session I
 
Cloud computing_Final
Cloud computing_FinalCloud computing_Final
Cloud computing_Final
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Virtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric VanderburgVirtualization for competitive advantage - Eric Vanderburg
Virtualization for competitive advantage - Eric Vanderburg
 
Could the “C” in HPC stand for Cloud?
Could the “C” in HPC stand for Cloud?Could the “C” in HPC stand for Cloud?
Could the “C” in HPC stand for Cloud?
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Cloud computing and its job opportunities
Cloud computing and its job opportunities Cloud computing and its job opportunities
Cloud computing and its job opportunities
 
Optimising Service Deployment and Infrastructure Resource Configuration
Optimising Service Deployment and Infrastructure Resource ConfigurationOptimising Service Deployment and Infrastructure Resource Configuration
Optimising Service Deployment and Infrastructure Resource Configuration
 
Fog Computing Platform
Fog Computing PlatformFog Computing Platform
Fog Computing Platform
 
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds CapacityCloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
Cloud Bursting 101: What to do When Cloud Computing Demand Exceeds Capacity
 
Big Data on Cloud Native Platform
Big Data on Cloud Native PlatformBig Data on Cloud Native Platform
Big Data on Cloud Native Platform
 
Big Data on Cloud Native Platform
Big Data on Cloud Native PlatformBig Data on Cloud Native Platform
Big Data on Cloud Native Platform
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Challenges in Cloud Computing – VM Migration

  • 1. Challenges in Cloud Computing – VM Migration Sarmad Makhdoom 2012-03-0019 Kamran Khalil 2012-03-0012 Hafeez ur Rehman 2012-03-0031
  • 3. Cloud Computing • Cloud computing is an umbrella term used to refer to Internet based development and services • A number of characteristics define cloud data, applications services and infrastructure: ▫ ▫ ▫ Remotely hosted: Services or data are hosted on remote infrastructure. Ubiquitous: Services or data are available anywhere. Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
  • 4. Virtual Machines • A virtual machine provides interface identical to underlying bare hardware ▫ i.e. all devices, interrupts, memory, page tables etc. • Applications of Virtual Machines • Virtualization Software ▫ ▫ ▫ ▫ VMWare ZAP Xen QEMU
  • 5. Virtual Machines in Cloud ▫ Benefits of Virtual Machines       Virtualization help making efficient use of hardware resources Facilitates a greater degree of abstraction Easily move from one piece of hardware to another Replicate them at will Create more scalable and flexible infrastructure Snapshots ▫ Cloud computing has taken that degree of efficiency and agility realized from virtualization  Pooled resources  Geographic diversity  Universal connectivity
  • 7. Research Problems • Automated services provisioning • Virtual machine migration • • • • • • • Server consolidation Energy management Traffic management and analysis Data security Software frameworks Storage technology and data management Novel cloud architecture
  • 9. Motivation • Consider a data center consisting of “n” physical machines (PM) hosting “m” VMs implementing one customer application each • Resources(CPU, Network, Memory, I/O) are allocated to each VM to handle the workload and operate at certain performance level (SLA) • Each VM sees workload fluctuation from time to time => resource requirement changes # of user visit increases PM Capacity VM1 VM2 cricinfo Network Bandwidth Memory CPU mail server Virtualization Layer Hardware Resource Allocation VM1 N = 5Gbps M = 8GB C = 4 cores = 10 Gbps = 16 GB = 8 cores VM2 N = 5Gbps M = 8GB C = 4 cores
  • 10. Motivation • An increase in workload can be handled by allocating more resources to it, if idle resources are available • Main Issues: ▫ What if PM does not have (enough or no) idle resources to satisfy VM's requirement?  Performance of the application degrades  SLA violation occurs • Key Ideas ▫ Replication VMs ▫ Migrating VMs
  • 11. Virtual Machine Migration It is impossible or impractical to bring the data (or devices) close to the computation engines.
  • 12. Virtual Machine Migration • Why we need migration? • When we need to migrate? • How migration is done? • Issues in long distance migration (across data centers)
  • 13. When we need to migrate? [NSDI’ 07] • Hotspots can cause SLA violations ▫ Burden on some Virtual or Physical Machines are called hotspots • Hotspot Detection (Sandpiper) ▫ Black-box Monitoring  CPU (/proc)  Network (/proc/net/dev)  Memory (swap) ▫ Gray-box Monitoring  Gather OS level statistics and application logs • A hotspot is flagged only if thresholds or SLAs are exceeded for a sustained time Wood T et al (2007) Black-box and gray-box strategies for virtual machine migration. In: Proc of NSDI
  • 14. Gathering resource usage statistics Gathers on that server processor, network Determine: What virtual servers should migrate Monitors usage profiles to detect Where to move them hotspots. Construct resource much any resource exceeds a the How Hotspot: of a resource to allocate usage profiles forvirtual servers afterviolation) for a sustain threshold(or SLA migration each virtual server period (Predict PM workload) and memory swap statistics for each VM Implements a daemon to gather OS-level statistics and application logs Wood T et al (2007) Black-box and gray-box strategies for virtual machine migration. In: Proc of NSDI 14
  • 15. When we need to migrate? [FGCS’ 12] • SLA violation detection ▫ Mapping low-level resource metrics to high-level SLAs ▫ Crude data maps to user requirements such as  CPU speed maps to Response Time  Occupied memory size maps to number of concurrent clients ▫ Predictive Strategy for detection of possible SLA violations ▫ Detection interval  Short measurement intervals may degrade performance  Long measurement intervals may cause ignorance of heavy SLA violations Towards autonomic detection of SLA violations in Cloud infrastructures, Future Generation Computer Systems, 2012
  • 16. How migration is done? • Memory Migration ▫ Pre-copy  Push phase  Stop-and-copy phase  Pull Phase ▫ Pure demand-migration • File System Migration ▫ In case of distributed file system, there is no need to copy ▫ Alternatively, copy only changed local files to the destination using Virtual Machine Manager’s API. S. Venkatesha, S. Sadhu, S. Kintali, and S. Barbara, "Survey of virtual machine migration techniques" - Memory, 2009
  • 17. How migration is done? • Network Migration ▫ If both source and destination are on same LAN switch  an unsolicited ARP reply from the migrating host is provided ▫ Alternatively, on a switched network  the migrating OS can keep its original Ethernet MAC address, relying on the network switch to detect its move to a new port • Device Migration ▫ Three type of device support  Emulation  Virtualization  Non-migratable S. Venkatesha, S. Sadhu, S. Kintali, and S. Barbara, "Survey of virtual machine migration techniques" - Memory, 2009
  • 18. Migration: A Performance Evaluation • Testbed specification ▫ ▫ ▫ ▫ ▫ 6 Servers (1 head node, 5 VM hosts) Intel Xeon (2.33 GHz Quad-core with 2x6MB L2 Cache) 4GB memory and 7200rpm hard drive 64-bit Ubuntu Linux 8.04 Server Edition Apache 2.2.8 and MySQL 5.2.4-2 • Workload ▫ Olio as a Web 2.0 application (http://incubator.apache.org/olio/) ▫ Faban Load generator (http://faban.sunsource.net) • Experiments ▫ 10 minute and 20 minute benchmark runs with 600 concurrent users Cost of virtual machine live migration in clouds: A performance evaluation, International Conference on Cloud Computing, 2009
  • 19. Migration: A Performance Evaluation Cost of virtual machine live migration in clouds: A performance evaluation, International Conference on Cloud Computing, 2009
  • 20. Migration across data centers • Need for VM mobility across data centers ▫ ▫ ▫ ▫ Data center maintenance without downtime Disaster avoidance Data center migration/expansion Workload balancing across multiple sites • Issues ▫ ▫ ▫ ▫ RTT is 1,000 times greater than sub-networks, ‘word wide wait’ Trust to a remote execution environment Interoperability at the level of Web Services, Java etc Migration across multiple domains are vulnerable to security exploits
  • 21. Related Work: Migration over MAN/WAN [FGCS’06] • Introduced an intermediate traffic controller to facilitate migration which consists of: ▫ VM Traffic Controller  Provisioning of network resources and the re-provisioning of the IP tunnel to ensure seamless layer ▫ AAA (Authentication, Authorization and Accounting)  Pre-allocation of extra VM-resources required for migration ▫ DRAC (Dynamic Resource Allocation Controller)  Exposes a service-oriented API for coupling with applications ▫ Preservation of TCP and higher-level sessions  Dynamically configured IP tunnels allow client connectivity “Seamless Live Migration of Virtual Machines over the MAN/WAN”, Elsevier Future Generation Computer Systems 2006
  • 22. Related Work: HP Cluster Extension and Microsoft Hyper-V™ • HP Cluster Extension (CLX) provides flawless mirroring capabilities for disaster recovery • VM data is already replicated in single data center cluster ▫ Modifications to spread it across multi-site:  Multi-site Disaster Recovery solution is implemented  CLX enables Hyper-V Live Migration across sites (VMware, Hyper-V, HP-VM and AMD-V) Our limitation is non-availability of peer referenced or published material of these architectures to discuss their techniques in detail
  • 23. Proposed Solution • Security ▫ Layer 2 Link Encryption (IEEE 802.1AE) may be used to help ensure privacy and confidentially ▫ Token based security - Authorization message sequence to thwart resource theft • 1,000 times rise in RTT doesn’t matter much because ▫ All states will be transferred before the switch ▫ Downtime will be based on the time required in redirection  Which is only 5-10 times than the intra-LAN setup
  • 25. Conclusion • Virtual machine migration provide significant benefits in cloud computing • State of the art work is already done on resource monitoring, live VM migration over the LAN and MAN/WAN • Downtime is 60ms to 3s which they assume is negligible • Small transient spikes does not trigger needless migrations, if threshold or SLAs are exceeded for sustained time • A slowdown is expected due to cache warm-up at the destination after migration • Hybrid approach has been suggested to harness the benefits of all technqiues

Editor's Notes

  1. Applications of VMUse different OS’Software testing