SlideShare a Scribd company logo
1 of 42
Download to read offline
live vm migration
Mini Project
April 13, 2017
Motilal Nehru National Institute of Technology Allahabad
0
group members
Group - 17
āˆ™ Shivam Singh
āˆ™ Gaurav Sharma
āˆ™ Amit Kumar Yadav
āˆ™ Naveen Soni
āˆ™ Atul Kumar Singh
1
introduction
virtualization
āˆ™ Virtualization is a framework or methodology of dividing the
resources of a computer into multiple execution environments.
āˆ™ The available resources such as CPU, memory, storage and I/O
devices are dynamically partitioned and shared.
āˆ™ x86 systems virtualization approaches:
āˆ™ A hosted architecture runs the virtualization layer as an
application on top of OS
āˆ™ a hypervisor (bare metal) architecture has a virtualization layer
installed directly on a fresh x86 based system.
3
components of virtualization
1. Hypervisor: It is also termed as virtualization layer, which is a
software layer that manages and hosts the VMā€™s.
āˆ™ Type 1: It is a native or bare metal hypervisor that runs directly on
the host hardware. Thus it has direct access to the hardware
resources and handles allocation of resources to guests as well.
āˆ™ Type 2: It is also called as hosted hypervisor as it is installed and
run on top of a hosting OS. The host OS is responsible for
interfacing with the hardware.
2. Guest: It is a virtualized environment with its own OS and
applications. It runs on top of the hypervisor.
4
techniques of virtualization
Full Virtualization:
āˆ™ Full Virtualization is virtualization in which the guest operating
system is unaware that it is in a virtualized environment, and
therefore hardware is virtualized by the host operating system
so that the guest can issue commands to what it thinks is actual
hardware, but really are just simulated hardware devices
created by the host.
5
techniques of virtualization
Paravirtualization:
āˆ™ Paravirtualization is virtualization in which the guest operating
system (the one being virtualized) is aware that it is a guest and
accordingly has drivers that, instead of issuing hardware
commands, simply issue commands directly to the host
operating system. This also includes memory and thread
management as well, which usually require unavailable
privileged instructions in the processor.
6
techniques of virtualization
Hardware Assisted Virtualization:
āˆ™ Hardware Assisted Virtualization is a type of Full Virtualization
where the microprocessor architecture has special instructions
to aid the virtualization of hardware. These instructions might
allow a virtual context to be setup so that the guest can execute
privileged instructions directly on the processor without
affecting the host.
7
live vm migration
āˆ™ Live VM Migration can be performed based on two basic network
scenarios:
Local Area Network (LAN) and Wide Area Network (WAN).
āˆ™ Live Migration over LAN is easier for two reasons.
1. high- speed low-latency links in the LAN which makes migration
comparatively quicker
2. the VM can retain its IP address (es) after migration since the
hosts share the same IP address space.
8
benifits of live vm migration
āˆ™ Consolidation: Several underutilized small data centers can be
replaced with few larger ones.
āˆ™ Load balancing: It requires the transfer of VMā€™s from an
overloaded host to a light loaded ones.
āˆ™ Scaling: Multiple sites need to be created at different
geographical sites to scale up as the cloud grows.
āˆ™ Disaster recovery and reliability: In times of catastrophe or any
fault occurrence, VMā€™s can be migrated to mirrored sites across
cloud with minimal downtime.
āˆ™ Maintenance: Applications and data can be migrated to another
machine to free up the hardware for maintenance.
9
technologies used
qemu
QEMU (short for Quick Emulator) is a free and open-source hosted
hypervisor that performs hardware virtualization (not to be confused
with hardware-assisted virtualization).
QEMU is a hosted virtual machine monitor: it emulates CPUs through
dynamic binary translation and provides a set of device models,
enabling it to run a variety of unmodiļ¬ed guest operating systems. It
also can be used together with KVM in order to run virtual machines
at near-native speed (requiring hardware virtualization extensions
on x86 machines). QEMU can also do CPU emulation for user-level
processes, allowing applications compiled for one architecture to
run on another.
11
kvm
Kernel-based Virtual Machine (KVM) is a virtualization infrastructure
for the Linux kernel that turns it into a hypervisor. It was merged
into the Linux kernel mainline in kernel version 2.6.20, which was
released on February 5, 2007.KVM requires a processor with hardware
virtualization extensions. KVM has also been ported to FreeBSD and
illumos in the form of loadable kernel modules.
12
libvirt
LIBVIRT is an open source API, daemon and management tool for
managing platform virtualization. It can be used to manage KVM,
Xen, VMware ESX, QEMU and other virtualization technologies. These
APIs are widely used in the orchestration layer of hypervisors in the
development of a cloud-based solution.
Internals : LIBVIRT itself is a C library, but it has bindings in other
languages, notably in Python, Perl, OCaml, Ruby, Java, JavaScript (via
Node.js) and PHP. libvirt for these programming languages is
composed of wrappers around another class/package called
libvirtmod. libvirtmodā€™s implementation is closely associated with its
counterpart in C/C++ in syntax and functionality.
13
virtual machine manager
In computing, the Red Hat Virtual Machine Manager, also known as
virt-manager, is a desktop-driven virtual machine manager with
which users can manage virtual machines (VMs).
Features : Virtual Machine Manager allows users to:
āˆ™ create, edit, start and stop VMs
āˆ™ view and control of each VMā€™s console
āˆ™ see performance and utilization statistics for each VM
āˆ™ view all running VMs and hosts, and their live performance or
resource utilization statistics.
āˆ™ use KVM, Xen or QEMU virtual machines, running either locally
or remotely.
āˆ™ use LXC containers
14
15
process of live migration
design considerations
At a high level we can consider a virtual machine to encapsulate
access to a set of physical resources. Providing live migration of
these VMs in a clustered server environment leads us to focus on
the physical resources used in such environments:
speciļ¬cally on
āˆ™ Memory
āˆ™ Network
āˆ™ Disk
17
migrating memory
When a VM is running a live service it is important that this transfer
occurs in a manner that balances the requirements of minimizing
both downtime and total migration time.
It is easiest to consider the trade-offs between these requirements
by generalizing memory transfer into three phases:
1. Push phase : The source VM continues running while certain
pages are pushed across the network to the new destination. To
ensure consistency, pages modiļ¬ed during this process must be
re-sent.
2. Stop-and-copy phase : The source VM is stopped, pages are
copied across to the destination VM, then the new VM is started.
3. Pull phase : The new VM executes and, if it accesses a page that
has not yet been copied, this page is faulted in (ā€œpulledā€) across
the network from the source VM.
18
precopy vs postcopy
19
local resources
A key challenge in managing the migration of OS instances is what to
do about resources that are associated with the physical machine
that they are migrating away from. While memory can be copied
directly to the new host, connections to local devices such as disks
and network interfaces demand additional consideration.
Two Key problems :
āˆ™ Network resources
āˆ™ Local storage
20
network resources
Requirement:
For network resources,a migrated OS should be able to maintain all
open network connections without relying on forwarding
mechanisms on the original host (which may be shut down following
migration), or on support from mobility or redirection mechanisms
that are not already present.
A migrating VM will include all protocol state (e.g. TCP PCBs), and will
carry its IP address with it.
Solution
For managing migration with respect to network in this environment
is to generate an unsolicited ARP reply from the migrated host,
advertising that the IP has moved to a new location. This will
reconļ¬gure peers to send packets to the new physical address, and
while a very small number of in-ļ¬‚ight packets may be lost, the
migrated domain will be able to continue using open connections
with almost no observable interference.
21
local resources
In the cluster, the migration of storage may be similarly addressed:
Most modern data centers consolidate their storage requirements
using a network-attached storage (NAS) device, in preference to
using local disks in individual servers. NAS has many advantages in
this environment, including simple centralised administration,
widespread vendor support, and reliance on fewer spindles leading
to a reduced failure rate. A further advantage for migration is that it
obviates the need to migrate disk storage, as the NAS is uniformly
accessible from all host machines in the cluster.
22
design
23
how pre-copy works
24
how pre-copy works
āˆ™ To log pages that are dirtied, shadow page tables are inserted
underneath the running OS.
āˆ™ The shadow tables are populated on demand by translating
sections of the guest page tables.
āˆ™ Translation for dirty logging:
āˆ™ All page-table entries (PTEs) are initially read-only mappings in
the shadow tables, regardless of what is permitted by the guest
tables.
āˆ™ If the guest tries to modify a page of memory, the resulting page
fault is trapped .
āˆ™ If write access is permitted by the relevant guest PTE then this
permission is extended to the shadow PTE.
āˆ™ At the same time, appropriate bit in the VMā€™s dirty bitmap is set.
āˆ™ When the bitmap is copied to the control software at the start of
each pre-copying round, the bitmap is cleared and the shadow
page tables are destroyed and recreated as the migratee OS
continues to run.
25
experimental setup
test bed
Our laboratory testbed was setup to test the efļ¬cacy of the KVM live
migration in the same subnet in maintaining the network
connectivity over the network during the VM migration.
KVM actively works to transfer the CPU, memory and network states
of the VM from the source to the destination hosts. A shared storage
medium(NFS) is used to store the VMs disk state.
The testbed was used to evaluate the performance of a video
streaming website hosted in the VMā€™s bridged guest OS. All the
systems run on latest Ubuntu 16.04 LTS OSes with the latest kernel.
27
test bed
28
use of shared storage
The Network File System (NFS) is a client/server application that lets
a computer user view and optionally store and update ļ¬les on a
remote computer as though they were on the userā€™s own computer.
The NFS protocol is one of several distributed ļ¬le system standards
for network-attached storage (NAS).
NFS allows the user or system administrator to mount (designate as
accessible) all or a portion of a ļ¬le system on a server. The portion
of the ļ¬le system that is mounted can be accessed by clients with
whatever privileges are assigned to each ļ¬le (read-only or
read-write). NFS uses Remote Procedure Calls (RPC) to route
requests between clients and servers.
29
edge of nfs over iscsi for vm storage
āˆ™ Simpliļ¬ed operational model
NFS offers a greatly simpliļ¬ed operational model versus
traditional block storage. Resizing LUNs can sometimes be
problematic. Resizing NFS ļ¬lesystems is generally much easier.
āˆ™ Larger datastores
While VMFS LUNs top out just shy of 2 TB in size, NFS has no
such limits ā€“ some arrays go as high as 16 TB.
āˆ™ Advanced functionality via ļ¬lesystems
NFS can offer advanced functionality above what a traditional
block device can offer because the storage device has control of
the ļ¬lesystem.
āˆ™ Open access
VMware is a bit speciļ¬c to VMware environments. NFS, on the
other hand, is a mature cross-platform speciļ¬cation that makes
it much easier to provide access to virtual machines for backup,
replication or other purposes.
30
conclusion
wireshark analysis
32
ping result analysis
33
The Server was migrated while a client was accessing the server
continuously and the network state was analyzed when simple ping
requests were being sent to the server and when live video was being
streamed at the clientā€™s terminal. The video was being streamed
ļ¬‚awlessly and no visible packet loss was detected by the client,
since the percent of packets lost during the process was very low.
Total Migration Time = 18.563 min
Packet Loss = 4%
RTT Average = 1.113 ms
Min = 0.268 ms
Max = 2.396 ms
34
future work
wan-based live vm migration
One of the key challenges in WAN-based live VM migration is
maintaining the network connectivity and preserving open
connections during and after the migration.
When a node (i.e., a VM) transits between different networks, its IP
address changes because the address identiļ¬es the nodeā€™s location
in the network topology, as a result the communication with other
nodes is interrupted until they become aware of the new address.
Approach to achieve WAN-based live VM migration.
āˆ™ Mobile IP or Proxy Mobile IPv6
āˆ™ Some form of tunneling that bridges remote sites over the
Internet.
36
challenges
āˆ™ Network State Migration
Data Centers interconnected over a WAN tend to use different IP
address spaces. Therefore, a VM migrated between hosts over a
WAN in different DCā€™s require a new IP address to be assigned by
the network on the destination host. In addition, the old
connections established with the old VM IP address space
would be discarded.
āˆ™ Disk State Migration
Migration across a LAN generally transfers the memory, CPU and
network states when a shared storage is used. Nonetheless, a
shared storage might not be available always across a WAN
based high latency low speed links.
37
proposed solutions
āˆ™ Network State Migration
1. Mobile IP or Proxy Mobile IPv6
Mobile IPv6 (MIPv6) protocol can be used to support migration of
VMs across WANs. MIPv6 has two advantages.
āˆ™ VM retains its original IP address, hence DNS updates are not needed
to locate services on the VM.
āˆ™ MIPv6 provides the ability to use route optimization that reduces
propagation delay of packets to and from the VM.
The main problem with this approach is that it requires the VM to
have modiļ¬ed protocol stack.
2. VXLAN
VXLAN is an IP multicast application and it uses IP multicast to
isolate network trafļ¬c. VXLAN controller is a management layer of
VXLAN and manages VTEPs. VXLAN controller conļ¬gures a mapping
between the VXLAN VNI and the IP multicast group. And it also
conļ¬gures VTEP to join the IP multicast group when the VM is
moved to the VTEP.
38
vxlan approach
āˆ™ Open vSwitch
Open vSwitch is software based virtual switch that resides
within the hypervisor or the management domain (e.g., Dom0 in
Xen). The Open vSwitch provides the connectivity between the
virtual machines and the physical interfaces.
39
vxlan approach
40
Thank You
41

More Related Content

What's hot

Network Virtualization
Network VirtualizationNetwork Virtualization
Network VirtualizationKingston Smiler
Ā 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationKingston Smiler
Ā 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
Ā 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
Ā 
Hyper-converged infrastructure
Hyper-converged infrastructureHyper-converged infrastructure
Hyper-converged infrastructureIgor Malts
Ā 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
Ā 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
Ā 
Virtual Machine
Virtual MachineVirtual Machine
Virtual MachineMehul Boghra
Ā 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101Gaurav Marwaha
Ā 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
Ā 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
Ā 
2 vm provisioning
2 vm provisioning2 vm provisioning
2 vm provisioningROSHNI PRADHAN
Ā 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualizationhktripathy
Ā 
Paravirtualization
ParavirtualizationParavirtualization
ParavirtualizationShahbaz Sidhu
Ā 

What's hot (20)

Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
Ā 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
Ā 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Ā 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Ā 
Firewall
FirewallFirewall
Firewall
Ā 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ā 
Hyper-converged infrastructure
Hyper-converged infrastructureHyper-converged infrastructure
Hyper-converged infrastructure
Ā 
Big Data Analytics Lab File
Big Data Analytics Lab FileBig Data Analytics Lab File
Big Data Analytics Lab File
Ā 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
Ā 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
Ā 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
Ā 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Ā 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
Ā 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
Ā 
Mobile agents
Mobile agentsMobile agents
Mobile agents
Ā 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
Ā 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
Ā 
2 vm provisioning
2 vm provisioning2 vm provisioning
2 vm provisioning
Ā 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
Ā 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
Ā 

Similar to Live VM Migration

Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
Ā 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
Ā 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2Krishna Kumar Singh
Ā 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
Ā 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfkhan593595
Ā 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
Ā 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptxsebghataslamzai
Ā 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptxkalavathisugan
Ā 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptxBinod Rimal
Ā 
IaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfIaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfDharavathRamesh2
Ā 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
Ā 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloudHuzefa Husain
Ā 
Parth virt
Parth virtParth virt
Parth virtParth Monga
Ā 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxAmirZaman21
Ā 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
Ā 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)Casey Bisson
Ā 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
Ā 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
Ā 

Similar to Live VM Migration (20)

Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
Ā 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
Ā 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
Ā 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
Ā 
CloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdfCloudComputing_UNIT 2.pdf
CloudComputing_UNIT 2.pdf
Ā 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
Ā 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
Ā 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptx
Ā 
Virtualization unit 3.pptx
Virtualization unit 3.pptxVirtualization unit 3.pptx
Virtualization unit 3.pptx
Ā 
IaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdfIaaS - Virtualization_Cambridge.pdf
IaaS - Virtualization_Cambridge.pdf
Ā 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
Ā 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloud
Ā 
Parth virt
Parth virtParth virt
Parth virt
Ā 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptx
Ā 
Virtualization
VirtualizationVirtualization
Virtualization
Ā 
Cloud
CloudCloud
Cloud
Ā 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
Ā 
1 (3).pptx
1 (3).pptx1 (3).pptx
1 (3).pptx
Ā 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Ā 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
Ā 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
Ā 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Ā 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
Ā 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Ā 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
Ā 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Ā 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Ā 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Ā 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Ā 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Ā 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Ā 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Ā 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Ā 

Live VM Migration

  • 1. live vm migration Mini Project April 13, 2017 Motilal Nehru National Institute of Technology Allahabad 0
  • 2. group members Group - 17 āˆ™ Shivam Singh āˆ™ Gaurav Sharma āˆ™ Amit Kumar Yadav āˆ™ Naveen Soni āˆ™ Atul Kumar Singh 1
  • 4. virtualization āˆ™ Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution environments. āˆ™ The available resources such as CPU, memory, storage and I/O devices are dynamically partitioned and shared. āˆ™ x86 systems virtualization approaches: āˆ™ A hosted architecture runs the virtualization layer as an application on top of OS āˆ™ a hypervisor (bare metal) architecture has a virtualization layer installed directly on a fresh x86 based system. 3
  • 5. components of virtualization 1. Hypervisor: It is also termed as virtualization layer, which is a software layer that manages and hosts the VMā€™s. āˆ™ Type 1: It is a native or bare metal hypervisor that runs directly on the host hardware. Thus it has direct access to the hardware resources and handles allocation of resources to guests as well. āˆ™ Type 2: It is also called as hosted hypervisor as it is installed and run on top of a hosting OS. The host OS is responsible for interfacing with the hardware. 2. Guest: It is a virtualized environment with its own OS and applications. It runs on top of the hypervisor. 4
  • 6. techniques of virtualization Full Virtualization: āˆ™ Full Virtualization is virtualization in which the guest operating system is unaware that it is in a virtualized environment, and therefore hardware is virtualized by the host operating system so that the guest can issue commands to what it thinks is actual hardware, but really are just simulated hardware devices created by the host. 5
  • 7. techniques of virtualization Paravirtualization: āˆ™ Paravirtualization is virtualization in which the guest operating system (the one being virtualized) is aware that it is a guest and accordingly has drivers that, instead of issuing hardware commands, simply issue commands directly to the host operating system. This also includes memory and thread management as well, which usually require unavailable privileged instructions in the processor. 6
  • 8. techniques of virtualization Hardware Assisted Virtualization: āˆ™ Hardware Assisted Virtualization is a type of Full Virtualization where the microprocessor architecture has special instructions to aid the virtualization of hardware. These instructions might allow a virtual context to be setup so that the guest can execute privileged instructions directly on the processor without affecting the host. 7
  • 9. live vm migration āˆ™ Live VM Migration can be performed based on two basic network scenarios: Local Area Network (LAN) and Wide Area Network (WAN). āˆ™ Live Migration over LAN is easier for two reasons. 1. high- speed low-latency links in the LAN which makes migration comparatively quicker 2. the VM can retain its IP address (es) after migration since the hosts share the same IP address space. 8
  • 10. benifits of live vm migration āˆ™ Consolidation: Several underutilized small data centers can be replaced with few larger ones. āˆ™ Load balancing: It requires the transfer of VMā€™s from an overloaded host to a light loaded ones. āˆ™ Scaling: Multiple sites need to be created at different geographical sites to scale up as the cloud grows. āˆ™ Disaster recovery and reliability: In times of catastrophe or any fault occurrence, VMā€™s can be migrated to mirrored sites across cloud with minimal downtime. āˆ™ Maintenance: Applications and data can be migrated to another machine to free up the hardware for maintenance. 9
  • 12. qemu QEMU (short for Quick Emulator) is a free and open-source hosted hypervisor that performs hardware virtualization (not to be confused with hardware-assisted virtualization). QEMU is a hosted virtual machine monitor: it emulates CPUs through dynamic binary translation and provides a set of device models, enabling it to run a variety of unmodiļ¬ed guest operating systems. It also can be used together with KVM in order to run virtual machines at near-native speed (requiring hardware virtualization extensions on x86 machines). QEMU can also do CPU emulation for user-level processes, allowing applications compiled for one architecture to run on another. 11
  • 13. kvm Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel that turns it into a hypervisor. It was merged into the Linux kernel mainline in kernel version 2.6.20, which was released on February 5, 2007.KVM requires a processor with hardware virtualization extensions. KVM has also been ported to FreeBSD and illumos in the form of loadable kernel modules. 12
  • 14. libvirt LIBVIRT is an open source API, daemon and management tool for managing platform virtualization. It can be used to manage KVM, Xen, VMware ESX, QEMU and other virtualization technologies. These APIs are widely used in the orchestration layer of hypervisors in the development of a cloud-based solution. Internals : LIBVIRT itself is a C library, but it has bindings in other languages, notably in Python, Perl, OCaml, Ruby, Java, JavaScript (via Node.js) and PHP. libvirt for these programming languages is composed of wrappers around another class/package called libvirtmod. libvirtmodā€™s implementation is closely associated with its counterpart in C/C++ in syntax and functionality. 13
  • 15. virtual machine manager In computing, the Red Hat Virtual Machine Manager, also known as virt-manager, is a desktop-driven virtual machine manager with which users can manage virtual machines (VMs). Features : Virtual Machine Manager allows users to: āˆ™ create, edit, start and stop VMs āˆ™ view and control of each VMā€™s console āˆ™ see performance and utilization statistics for each VM āˆ™ view all running VMs and hosts, and their live performance or resource utilization statistics. āˆ™ use KVM, Xen or QEMU virtual machines, running either locally or remotely. āˆ™ use LXC containers 14
  • 16. 15
  • 17. process of live migration
  • 18. design considerations At a high level we can consider a virtual machine to encapsulate access to a set of physical resources. Providing live migration of these VMs in a clustered server environment leads us to focus on the physical resources used in such environments: speciļ¬cally on āˆ™ Memory āˆ™ Network āˆ™ Disk 17
  • 19. migrating memory When a VM is running a live service it is important that this transfer occurs in a manner that balances the requirements of minimizing both downtime and total migration time. It is easiest to consider the trade-offs between these requirements by generalizing memory transfer into three phases: 1. Push phase : The source VM continues running while certain pages are pushed across the network to the new destination. To ensure consistency, pages modiļ¬ed during this process must be re-sent. 2. Stop-and-copy phase : The source VM is stopped, pages are copied across to the destination VM, then the new VM is started. 3. Pull phase : The new VM executes and, if it accesses a page that has not yet been copied, this page is faulted in (ā€œpulledā€) across the network from the source VM. 18
  • 21. local resources A key challenge in managing the migration of OS instances is what to do about resources that are associated with the physical machine that they are migrating away from. While memory can be copied directly to the new host, connections to local devices such as disks and network interfaces demand additional consideration. Two Key problems : āˆ™ Network resources āˆ™ Local storage 20
  • 22. network resources Requirement: For network resources,a migrated OS should be able to maintain all open network connections without relying on forwarding mechanisms on the original host (which may be shut down following migration), or on support from mobility or redirection mechanisms that are not already present. A migrating VM will include all protocol state (e.g. TCP PCBs), and will carry its IP address with it. Solution For managing migration with respect to network in this environment is to generate an unsolicited ARP reply from the migrated host, advertising that the IP has moved to a new location. This will reconļ¬gure peers to send packets to the new physical address, and while a very small number of in-ļ¬‚ight packets may be lost, the migrated domain will be able to continue using open connections with almost no observable interference. 21
  • 23. local resources In the cluster, the migration of storage may be similarly addressed: Most modern data centers consolidate their storage requirements using a network-attached storage (NAS) device, in preference to using local disks in individual servers. NAS has many advantages in this environment, including simple centralised administration, widespread vendor support, and reliance on fewer spindles leading to a reduced failure rate. A further advantage for migration is that it obviates the need to migrate disk storage, as the NAS is uniformly accessible from all host machines in the cluster. 22
  • 26. how pre-copy works āˆ™ To log pages that are dirtied, shadow page tables are inserted underneath the running OS. āˆ™ The shadow tables are populated on demand by translating sections of the guest page tables. āˆ™ Translation for dirty logging: āˆ™ All page-table entries (PTEs) are initially read-only mappings in the shadow tables, regardless of what is permitted by the guest tables. āˆ™ If the guest tries to modify a page of memory, the resulting page fault is trapped . āˆ™ If write access is permitted by the relevant guest PTE then this permission is extended to the shadow PTE. āˆ™ At the same time, appropriate bit in the VMā€™s dirty bitmap is set. āˆ™ When the bitmap is copied to the control software at the start of each pre-copying round, the bitmap is cleared and the shadow page tables are destroyed and recreated as the migratee OS continues to run. 25
  • 28. test bed Our laboratory testbed was setup to test the efļ¬cacy of the KVM live migration in the same subnet in maintaining the network connectivity over the network during the VM migration. KVM actively works to transfer the CPU, memory and network states of the VM from the source to the destination hosts. A shared storage medium(NFS) is used to store the VMs disk state. The testbed was used to evaluate the performance of a video streaming website hosted in the VMā€™s bridged guest OS. All the systems run on latest Ubuntu 16.04 LTS OSes with the latest kernel. 27
  • 30. use of shared storage The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update ļ¬les on a remote computer as though they were on the userā€™s own computer. The NFS protocol is one of several distributed ļ¬le system standards for network-attached storage (NAS). NFS allows the user or system administrator to mount (designate as accessible) all or a portion of a ļ¬le system on a server. The portion of the ļ¬le system that is mounted can be accessed by clients with whatever privileges are assigned to each ļ¬le (read-only or read-write). NFS uses Remote Procedure Calls (RPC) to route requests between clients and servers. 29
  • 31. edge of nfs over iscsi for vm storage āˆ™ Simpliļ¬ed operational model NFS offers a greatly simpliļ¬ed operational model versus traditional block storage. Resizing LUNs can sometimes be problematic. Resizing NFS ļ¬lesystems is generally much easier. āˆ™ Larger datastores While VMFS LUNs top out just shy of 2 TB in size, NFS has no such limits ā€“ some arrays go as high as 16 TB. āˆ™ Advanced functionality via ļ¬lesystems NFS can offer advanced functionality above what a traditional block device can offer because the storage device has control of the ļ¬lesystem. āˆ™ Open access VMware is a bit speciļ¬c to VMware environments. NFS, on the other hand, is a mature cross-platform speciļ¬cation that makes it much easier to provide access to virtual machines for backup, replication or other purposes. 30
  • 35. The Server was migrated while a client was accessing the server continuously and the network state was analyzed when simple ping requests were being sent to the server and when live video was being streamed at the clientā€™s terminal. The video was being streamed ļ¬‚awlessly and no visible packet loss was detected by the client, since the percent of packets lost during the process was very low. Total Migration Time = 18.563 min Packet Loss = 4% RTT Average = 1.113 ms Min = 0.268 ms Max = 2.396 ms 34
  • 37. wan-based live vm migration One of the key challenges in WAN-based live VM migration is maintaining the network connectivity and preserving open connections during and after the migration. When a node (i.e., a VM) transits between different networks, its IP address changes because the address identiļ¬es the nodeā€™s location in the network topology, as a result the communication with other nodes is interrupted until they become aware of the new address. Approach to achieve WAN-based live VM migration. āˆ™ Mobile IP or Proxy Mobile IPv6 āˆ™ Some form of tunneling that bridges remote sites over the Internet. 36
  • 38. challenges āˆ™ Network State Migration Data Centers interconnected over a WAN tend to use different IP address spaces. Therefore, a VM migrated between hosts over a WAN in different DCā€™s require a new IP address to be assigned by the network on the destination host. In addition, the old connections established with the old VM IP address space would be discarded. āˆ™ Disk State Migration Migration across a LAN generally transfers the memory, CPU and network states when a shared storage is used. Nonetheless, a shared storage might not be available always across a WAN based high latency low speed links. 37
  • 39. proposed solutions āˆ™ Network State Migration 1. Mobile IP or Proxy Mobile IPv6 Mobile IPv6 (MIPv6) protocol can be used to support migration of VMs across WANs. MIPv6 has two advantages. āˆ™ VM retains its original IP address, hence DNS updates are not needed to locate services on the VM. āˆ™ MIPv6 provides the ability to use route optimization that reduces propagation delay of packets to and from the VM. The main problem with this approach is that it requires the VM to have modiļ¬ed protocol stack. 2. VXLAN VXLAN is an IP multicast application and it uses IP multicast to isolate network trafļ¬c. VXLAN controller is a management layer of VXLAN and manages VTEPs. VXLAN controller conļ¬gures a mapping between the VXLAN VNI and the IP multicast group. And it also conļ¬gures VTEP to join the IP multicast group when the VM is moved to the VTEP. 38
  • 40. vxlan approach āˆ™ Open vSwitch Open vSwitch is software based virtual switch that resides within the hypervisor or the management domain (e.g., Dom0 in Xen). The Open vSwitch provides the connectivity between the virtual machines and the physical interfaces. 39