SlideShare une entreprise Scribd logo
1  sur  17
Virtual Machine
Migration & Hypervisors
Basics first ?
 Virtualization is the creation of a virtual (rather than actual)
version of something, such as an operating system, a server, a
storage device or network resources.
 When the VM is temporarily stopped, snapshotted, moved, and
then resumed on the new host, this is known as Migration.
 A Snapshot is the state of a virtual machine, and generally its
storage devices, at an exact point in time. A snapshot enables
the virtual machine's state at the time of the snapshot to be
restored later, effectively undoing any changes that occurred
afterwards. This capability is useful as a backup technique, for
example, prior to performing a risky operation.
VM Migration
 VM Migration refers to the process of moving a
running virtual machine or application between
different physical machines without disconnecting
the client or application. Memory, storage, and
network connectivity of the virtual machine are
transferred from the original guest machine to the
destination.
 In simpler words, moving a virtual machine from one
host to another.
Why is it needed ?
 Load Balancing.
Move VMs to a less busy host.
Make Use Of Newly Added Capacity.
 Maintenance.
Move VMs off a host before It is shut down.
 Recovery From Host Failure.
Restart VM on a different host.
VM Migration Types
 COLD Migration
Shut down VM on Host 1, restart on Host 2
 WARM Migration
Suspend VM on host 1, copy across RAM and CPU
registers, continue on host 2 (some seconds later)
 LIVE Migration
Copy across RAM while VM continues to run – Mark
"dirty" (changed) RAM pages & re-copy.
VM Memory Migration Techniques
 Two techniques for moving the virtual machine's memory state from
the source to the destination are pre-copy memory migration and
post-copy memory migration.
 The memory migration in general can be classified into three phases:
1. Push phase
The source VM continues running while certain pages are pushed across
the network to the new destination. To ensure consistency, the pages
modified during the transmission process must be re-sent.
2. Stop-and-copy phase
The source VM is stopped, pages are copied across to the destination VM,
and then the new VM is started.
3. Pull phase
The new VM starts its execution, and if it accesses a page that has not yet
been copied, this page is faulted in, across the network from the source
VM.
Pre-copy Memory Migration
 Warm-up phase
In pre-copy memory migration, the Hypervisor typically copies all the
memory pages from source to destination while the VM is still running on
the source. If some memory pages change (become 'dirty') during this
process, they will be re-copied
 Stop-and-copy phase
After the warm-up phase, the VM will be stopped on the original host,
the remaining dirty pages will be copied to the destination, and the VM
will be resumed on the destination host. The time between stopping the
VM on the original host and resuming it on destination is called "down-
time", and ranges from a few milliseconds to seconds according to the
size of memory and applications running on the VM.
How it Happens ?
 The approach behind pre-copy is to transfer the
memory to the destination over a series of iterations.
Post-copy Memory Migration
 Post-copy VM migration is initiated by suspending the VM at the source.
With the VM suspended, a minimal subset of the execution state of the
VM (CPU state, registers and, optionally, non- pageable memory) is
transferred to the target. The VM is then resumed at the target.
 Concurrently, the source actively pushes the remaining memory pages of
the VM to the target - an activity known as pre-paging. At the target, if
the VM tries to access a page that has not yet been transferred, it
generates a page-fault.
 These faults, known as network faults, are trapped at the target and
redirected to the source, which responds with the faulted page.
 Post-copy sends each page exactly once over the network. In contrast,
pre-copy can transfer the same page multiple times if the page is dirtied
repeatedly at the source during migration. On the other hand, pre-copy
retains an up-to-date state of the VM at the source during migration,
whereas with post-copy, the VM's state is distributed over both source and
destination. If the destination fails during migration, pre-copy can
recover the VM, whereas post-copy cannot.
How it happens ?
 In contrary to pre-copy, post-copy transfers the VCPU and
devices state on the destination in the first step and starts
the execution on destination in the second.
Hypervisors
 A Hypervisor or virtual machine monitor (VMM) is a piece of
computer software, firmware or hardware that creates and
runs virtual machines. A computer on which a hypervisor is
running one or more virtual machines is defined as a host
machine. Each virtual machine is called a guest machine.
 In virtualization technology, hypervisor is a software program
that manages multiple operating systems (or multiple
instances of the same operating system) on a single computer
system. The hypervisor manages the
system's processor, memory, and other resources to allocate
what each operating system requires. Hypervisors are designed
for a particular processor architecture and may also be
called virtualization managers.
Hypervisor Types
 "Formal Requirements for Virtualizable Third
Generation Architectures" Gerald J.
Popek and Robert P. Goldberg classified two types
of hypervisor.
 Type – 1 : Native or Bare – Metal Hypervisors.
 Type – 2 : Hosted Hypervisors.
Type – 1 Hypervisors
 These hypervisors run directly on the host's
hardware to control the hardware and to manage
guest operating systems. For this reason, they are
sometimes called bare metal hypervisors. A guest
operating system runs as a process on the host.
 The Type 1 hypervisor is often referred to as a
hardware virtualization engine.
 Examples include VMware ESXi Server, Microsoft
Hyper-V, Citrix/Xen Server.
Type – 1 : In brief
 It works directly on the hardware of the host and can monitor
operating systems that run above the hypervisor.
 It is completely independent from the Operating System.
 The hypervisor is small as its main task is sharing and
managing hardware resources between different operating
systems.
 A major advantage is that any problems in one virtual
machine or guest operating system do not affect the other
guest operating systems running on the hypervisor.
Type – 2 Hypervisors
 These hypervisors run on a conventional operating
system just as other computer programs do. Type-2
hypervisors abstract guest operating systems from
the host operating system.
 Type 2 hypervisors support guest virtual machines
by coordinating calls for CPU, memory, disk,
network and other resources through the physical
host's operating system. This makes it easy for an
end user to run a virtual machine on a personal
computing device.
 Examples of this type of hypervisor include VMware
Fusion, Oracle VM, Parallels and VMware
Workstation.
Type – 2 : In brief
 In this case, the hypervisor is installed on an operating
system and then supports other operating systems above it.
 It is completely dependent on host Operating System for its
operations
 While having a base operating system allows better
specification of policies, any problems in the base operating
system affects the entire system as well even if the
hypervisor running above the base OS is secure.
Arun Shukla
arun.shukla2694@gmail.com
Thanks All !
Happy Learning.

Contenu connexe

Tendances

Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docxkumari36
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 
File replication
File replicationFile replication
File replicationKlawal13
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionNeelamani Samal
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 

Tendances (20)

Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
6.distributed shared memory
6.distributed shared memory6.distributed shared memory
6.distributed shared memory
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Middleware
MiddlewareMiddleware
Middleware
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
File replication
File replicationFile replication
File replication
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusion
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 

En vedette

Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloudChetna Purohit
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
Cloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and ControlsCloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and Controlslylcheng88
 
Operating system tutorial
Operating system tutorialOperating system tutorial
Operating system tutorialGanesh Raja
 
Virtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A SurveyVirtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A Surveyijsrd.com
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualizationrjain51
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualizationHwanju Kim
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and managementHwanju Kim
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft ComputingTameem Ahmad
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short PresentationBarcamp Cork
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingAhmed Mekkawy
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima PanditPurnima Pandit
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 

En vedette (20)

Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Cloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and ControlsCloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and Controls
 
Memory ballooning
Memory ballooningMemory ballooning
Memory ballooning
 
Operating system tutorial
Operating system tutorialOperating system tutorial
Operating system tutorial
 
tutorial presentation
tutorial presentationtutorial presentation
tutorial presentation
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Virtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A SurveyVirtual Machine Migration Techniques in Cloud Environment: A Survey
Virtual Machine Migration Techniques in Cloud Environment: A Survey
 
No sql databases
No sql databasesNo sql databases
No sql databases
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualization
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and management
 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Virtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud ComptingVirtualization Techniques & Cloud Compting
Virtualization Techniques & Cloud Compting
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
 
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic)  : Dr. Purnima PanditSoft computing (ANN and Fuzzy Logic)  : Dr. Purnima Pandit
Soft computing (ANN and Fuzzy Logic) : Dr. Purnima Pandit
 
Cpu scheduling
Cpu schedulingCpu scheduling
Cpu scheduling
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Soft computing
Soft computingSoft computing
Soft computing
 

Similaire à Virtual Machine Migration & Hypervisors

A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2Krishna Kumar Singh
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
Lecture 11 (Virtualization and Load Balancer).pptx
Lecture 11 (Virtualization and Load Balancer).pptxLecture 11 (Virtualization and Load Balancer).pptx
Lecture 11 (Virtualization and Load Balancer).pptxShvnhRthOr
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfKowsalyaJayakumar2
 
Virtual Machine Maanager
Virtual Machine MaanagerVirtual Machine Maanager
Virtual Machine MaanagerGaurav Bhardwaj
 
Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)kamrankausar
 
cloud concepts and technologies
cloud concepts and technologiescloud concepts and technologies
cloud concepts and technologiesKalai Selvi
 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxAmirZaman21
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization iParth Patel
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containersSelvaraj Kesavan
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
 
Intro to virtualization
Intro to virtualizationIntro to virtualization
Intro to virtualizationKalpna Saharan
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdfPrachiKurhade3
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud ComputingPyingkodi Maran
 

Similaire à Virtual Machine Migration & Hypervisors (20)

Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
 
Unit 2
Unit 2Unit 2
Unit 2
 
A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2A510840101 24982 23_2020_lecture_2
A510840101 24982 23_2020_lecture_2
 
Parth virt
Parth virtParth virt
Parth virt
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Lecture 11 (Virtualization and Load Balancer).pptx
Lecture 11 (Virtualization and Load Balancer).pptxLecture 11 (Virtualization and Load Balancer).pptx
Lecture 11 (Virtualization and Load Balancer).pptx
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
virtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdfvirtual-machine-150316004018-conversion-gate01.pdf
virtual-machine-150316004018-conversion-gate01.pdf
 
Virtual Machine Maanager
Virtual Machine MaanagerVirtual Machine Maanager
Virtual Machine Maanager
 
Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)
 
cloud concepts and technologies
cloud concepts and technologiescloud concepts and technologies
cloud concepts and technologies
 
CH14-Virtual Machines.pptx
CH14-Virtual Machines.pptxCH14-Virtual Machines.pptx
CH14-Virtual Machines.pptx
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization i
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
Chapter 3.4.pptx
Chapter 3.4.pptxChapter 3.4.pptx
Chapter 3.4.pptx
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Intro to virtualization
Intro to virtualizationIntro to virtualization
Intro to virtualization
 
Unit 3 Virtualization.pdf
Unit 3 Virtualization.pdfUnit 3 Virtualization.pdf
Unit 3 Virtualization.pdf
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 

Dernier

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 

Dernier (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 

Virtual Machine Migration & Hypervisors

  • 2. Basics first ?  Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.  When the VM is temporarily stopped, snapshotted, moved, and then resumed on the new host, this is known as Migration.  A Snapshot is the state of a virtual machine, and generally its storage devices, at an exact point in time. A snapshot enables the virtual machine's state at the time of the snapshot to be restored later, effectively undoing any changes that occurred afterwards. This capability is useful as a backup technique, for example, prior to performing a risky operation.
  • 3. VM Migration  VM Migration refers to the process of moving a running virtual machine or application between different physical machines without disconnecting the client or application. Memory, storage, and network connectivity of the virtual machine are transferred from the original guest machine to the destination.  In simpler words, moving a virtual machine from one host to another.
  • 4. Why is it needed ?  Load Balancing. Move VMs to a less busy host. Make Use Of Newly Added Capacity.  Maintenance. Move VMs off a host before It is shut down.  Recovery From Host Failure. Restart VM on a different host.
  • 5. VM Migration Types  COLD Migration Shut down VM on Host 1, restart on Host 2  WARM Migration Suspend VM on host 1, copy across RAM and CPU registers, continue on host 2 (some seconds later)  LIVE Migration Copy across RAM while VM continues to run – Mark "dirty" (changed) RAM pages & re-copy.
  • 6. VM Memory Migration Techniques  Two techniques for moving the virtual machine's memory state from the source to the destination are pre-copy memory migration and post-copy memory migration.  The memory migration in general can be classified into three phases: 1. Push phase The source VM continues running while certain pages are pushed across the network to the new destination. To ensure consistency, the pages modified during the transmission process must be re-sent. 2. Stop-and-copy phase The source VM is stopped, pages are copied across to the destination VM, and then the new VM is started. 3. Pull phase The new VM starts its execution, and if it accesses a page that has not yet been copied, this page is faulted in, across the network from the source VM.
  • 7. Pre-copy Memory Migration  Warm-up phase In pre-copy memory migration, the Hypervisor typically copies all the memory pages from source to destination while the VM is still running on the source. If some memory pages change (become 'dirty') during this process, they will be re-copied  Stop-and-copy phase After the warm-up phase, the VM will be stopped on the original host, the remaining dirty pages will be copied to the destination, and the VM will be resumed on the destination host. The time between stopping the VM on the original host and resuming it on destination is called "down- time", and ranges from a few milliseconds to seconds according to the size of memory and applications running on the VM.
  • 8. How it Happens ?  The approach behind pre-copy is to transfer the memory to the destination over a series of iterations.
  • 9. Post-copy Memory Migration  Post-copy VM migration is initiated by suspending the VM at the source. With the VM suspended, a minimal subset of the execution state of the VM (CPU state, registers and, optionally, non- pageable memory) is transferred to the target. The VM is then resumed at the target.  Concurrently, the source actively pushes the remaining memory pages of the VM to the target - an activity known as pre-paging. At the target, if the VM tries to access a page that has not yet been transferred, it generates a page-fault.  These faults, known as network faults, are trapped at the target and redirected to the source, which responds with the faulted page.  Post-copy sends each page exactly once over the network. In contrast, pre-copy can transfer the same page multiple times if the page is dirtied repeatedly at the source during migration. On the other hand, pre-copy retains an up-to-date state of the VM at the source during migration, whereas with post-copy, the VM's state is distributed over both source and destination. If the destination fails during migration, pre-copy can recover the VM, whereas post-copy cannot.
  • 10. How it happens ?  In contrary to pre-copy, post-copy transfers the VCPU and devices state on the destination in the first step and starts the execution on destination in the second.
  • 11. Hypervisors  A Hypervisor or virtual machine monitor (VMM) is a piece of computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor is running one or more virtual machines is defined as a host machine. Each virtual machine is called a guest machine.  In virtualization technology, hypervisor is a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system. The hypervisor manages the system's processor, memory, and other resources to allocate what each operating system requires. Hypervisors are designed for a particular processor architecture and may also be called virtualization managers.
  • 12. Hypervisor Types  "Formal Requirements for Virtualizable Third Generation Architectures" Gerald J. Popek and Robert P. Goldberg classified two types of hypervisor.  Type – 1 : Native or Bare – Metal Hypervisors.  Type – 2 : Hosted Hypervisors.
  • 13. Type – 1 Hypervisors  These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called bare metal hypervisors. A guest operating system runs as a process on the host.  The Type 1 hypervisor is often referred to as a hardware virtualization engine.  Examples include VMware ESXi Server, Microsoft Hyper-V, Citrix/Xen Server.
  • 14. Type – 1 : In brief  It works directly on the hardware of the host and can monitor operating systems that run above the hypervisor.  It is completely independent from the Operating System.  The hypervisor is small as its main task is sharing and managing hardware resources between different operating systems.  A major advantage is that any problems in one virtual machine or guest operating system do not affect the other guest operating systems running on the hypervisor.
  • 15. Type – 2 Hypervisors  These hypervisors run on a conventional operating system just as other computer programs do. Type-2 hypervisors abstract guest operating systems from the host operating system.  Type 2 hypervisors support guest virtual machines by coordinating calls for CPU, memory, disk, network and other resources through the physical host's operating system. This makes it easy for an end user to run a virtual machine on a personal computing device.  Examples of this type of hypervisor include VMware Fusion, Oracle VM, Parallels and VMware Workstation.
  • 16. Type – 2 : In brief  In this case, the hypervisor is installed on an operating system and then supports other operating systems above it.  It is completely dependent on host Operating System for its operations  While having a base operating system allows better specification of policies, any problems in the base operating system affects the entire system as well even if the hypervisor running above the base OS is secure.