Exploiting neigborhood similarity for virtual machine migration over wide-area network

Hsu Fang Lai, Yu-Sung Wu*, Yu Jui Cheng

*Corresponding author for this work

    Research output: Contribution to conferencePaperpeer-review

    8 Scopus citations

    Abstract

    Conventional virtual machine (VM) migration focuses on transferring a VM's memory and CPU states across host machines. The VM's disk image has to remain accessible to both the source and destination host machines through shared storage during the migration. As a result, conventional virtual machine migration is limited to host machines on the same local area network (LAN) since sharing storage across wide-area network (WAN) is inefficient. As data centers are being constructed around the globe, we envision the need for VM migration across data center boundaries. We thus propose a system aiming to achieve efficient VM migration over wide area network. The system exploits similarity in the storage data of neighboring VMs by first indexing the VM storage images and then using the index to locate storage data blocks from neighboring VMs, as opposed to pulling all data from the remote source VM across WAN. The experiment result shows that the system can achieve an average 66% reduction in the amount of data transmission and an average 59% reduction in the total migration time.

    Original languageEnglish
    Pages149-158
    Number of pages10
    DOIs
    StatePublished - 9 Sep 2013
    Event7th International Conference on Software Security and Reliability, SERE 2013 - Gaithersburg, MD, United States
    Duration: 18 Jun 201320 Jun 2013

    Conference

    Conference7th International Conference on Software Security and Reliability, SERE 2013
    Country/TerritoryUnited States
    CityGaithersburg, MD
    Period18/06/1320/06/13

    Keywords

    • Datacenter
    • Live migration
    • Storage de-duplication
    • Virtualization
    • Wide-area network

    Fingerprint

    Dive into the research topics of 'Exploiting neigborhood similarity for virtual machine migration over wide-area network'. Together they form a unique fingerprint.

    Cite this