skip to main content
10.1145/1555336.1555347acmconferencesArticle/Chapter ViewAbstractPublication PagesicacConference Proceedingsconference-collections
research-article

Toward dependency-aware live virtual machine migration

Published:15 June 2009Publication History

ABSTRACT

The most powerful characteristic of any machine virtualization technology is its ability to adapt to both its underlying infrastructure and the applications it supports. Possibly the most dynamic feature of machine virtualization is the ability to migrate live virtual machines between physical hosts in order to optimize performance or avoid catastrophic events. Unfortunately, the need for live migration increases during times when resources are most scarce. For example, load-balancing is only necessary when load is significantly unbalanced and impending downtime often causes many virtual machines to seek new hosts simultaneously. It is imperative that live migration mechanisms be as fast and efficient as possible in order for virtualization to provide dynamic load balancing, zero-downtime scheduled maintenance, and automatic failover during unscheduled downtime.

This paper proposes a novel dependency-aware approach to live virtual machine migration and presents the results of the initial investigation into its ability to reduce migration latency and overhead. The approach uses a tainting mechanism originally developed as an intrusion detection mechanism. Dependency information is used to distinguish processes that create direct or indirect external dependencies during live migration. It is shown that the live migration process can be significantly streamlined by selectively applying a more efficient protocol when migrating processes that do not create external dependencies during migration.

References

  1. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In ACM SOSP, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Chase, D. Irwin, L. Grit, J. Moore, and S. Sprenkle. Dynamic Virtual Clusters in a Grid Site Manager. In IEEE HPDC, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Clark, K. Fraser, S. Hand, J. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of Virtual Machines. In USENIX NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Figueiredo, P. Dinda, and J. Fortes. A Case for Grid Computing on Virtual Machines. In IEEE ICDCS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Tal Garfinkel and Mendel Rosenblum. A virtual machine introspection based architecture for intrusion detection. In In Proc. Network and Distributed Systems Security Symposium, pages 191--206, 2003.Google ScholarGoogle Scholar
  6. Xuxian Jiang, Florian Buchholz, AAron Walters, Dongyan Xu, Yi-Min Wang, and Eugene H. Spafford. Tracing worm break-in and contaminations via process coloring: A provenance-preserving approach. IEEE Transactions on Parallel and Distributed Systems, 19(7), July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Katarzyna Keahey, Karl Doering, and Ian T. Foster. From sandbox to playground: Dynamic virtual environments in the grid. In GRID, pages 34--42, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Osman, D. Subhraveti, G. Su, and J. Nieh. The design and implementation of zap: A system for migrating computing environments, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bryan D. Payne, Martim D. Carbone, and Wenke Lee. Secure and flexible monitoring of virtual machines. In Proceedings of the 2007 Annual Computer Security Applications Conference, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. Ruth, X. Jiang, D. Xu, and S. Goasguen. Virtual Distributed Environments in a Shared Infrastructure. IEEE Computer, 38(5):63--69, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, and Sebastien Goasguen. Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure. In Proceedings of The 3rd IEEE International Conference on Autonomic Computing, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. VMware. http://www.vmware.com.Google ScholarGoogle Scholar
  13. Chris Wright, Crispin Cowan, and James Morris. Linux security modules: General security support for the linux kernel. In In Proceedings of the 11th USENIX Security Symposium, pages 17--31, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Toward dependency-aware live virtual machine migration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      VTDC '09: Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing
      June 2009
      82 pages
      ISBN:9781605585802
      DOI:10.1145/1555336
      • General Chair:
      • Kate Keahey,
      • Program Chair:
      • Renato Figueiredo

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate5of10submissions,50%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader