A Survey of Virtual Machine Migration Optimal Resource Management and Challenges
A Survey of Virtual Machine Migration Optimal Resource Management and Challenges
Dr. A. P. J. Abdul Kalam University Associate Professor Dr. A. P. J. Abdul Kalam University
Indore, Madhya Pradesh, India Dr. A. P. J. Abdul Kalam University Indore, Madhya Pradesh, India.
[email protected] Indore, Madhya Pradesh, India. [email protected]
[email protected]
450
979-8-3503-9826-7/22/$31.00 ©2022 IEEE
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
and service providers distribute these resources among end place during the initial phase of virtual machine migrations.
users to optimize their use and to maximize their profits. Cloud computing task-based scheduling algorithms have
Furthermore, these resources have high processing speeds now incorporated particle swarm optimization methods for
and large storage capacities. Various cloud computing task- based system load balancing, as proposed by [2014]
environments are available including Google App Engine [6]. It transferred excess workload from overburdened
[2], Microsoft Azure [3], Amazon EC2 [4], IBM Smart virtual machines instead of transferring the entire machine.
Cloud [5], etc. In cloud computing, these environments are A proposed agent-based method for commodity load
provided in the form of hardware, software, storage, balancing was published in 2015[7], titled "Agent-based
platform, infrastructure, databases, and much more. On- load balancing in Cloud data centers".
demand resources can be supplied by cloud computing by
using a pay- per-use [6] model. This is accomplished The queuing theory was used to illustrate how virtual
through the delivery of hardware and software services over machines interacted, thus decreasing migration. The
the internet. Queuing Theory Based Bandwidth Allocation Algorithm for
Live Virtual Machine Migration, 2015[8]. Performance of a
Cloud service providers now manage warehouse-sized virtual computer was improved as a result of the approach.
data centers due to the increased demand for cloud [2009]
resources. A large amount of electricity is used by the Cloud [6] suggests a strategy for optimizing energy consumption in
Data Center (CDC), which is home to thousands of cloud computing environments by moving workloads and
computing servers connected by fast connections. Servers distributing tasks among virtual machines. As part of the
typically have idle times of around 30%, and only 10% to workload, virtual machines must be moved. A Bee colony
15% of their total capacity is actually used to satisfy approach for task load balancing in a cloud computing
resource demands, making it impossible to deliver services environment is described in [2015] [7], in which virtual
at the levels promised. Increases in operational expenses and computers in queues are assigned tasks that have the highest
energy use are astounding when resources are under- or priority. The algorithm improves the customer experience
over-provisioned. According to estimates, CDC's operating (QOS).
expenditures would account for 75% of infrastructure and
power use in 2014, while IT would only account for 25% It was shown that it is necessary to use a distinct
[10, 11]. More than 200,000 houses could have been statistical distribution to represent CPU, memory, and total
continually powered by the 260 million Watts of electricity amount of instructions to facilitate the simulation of
used by Google data centers in 2013.Switching idle mode resource usage in cloud computing [2015] [10]. The model
servers to sleep or off mode depending on resource demands explained the necessity to employ a distinct statistical
is one of the basic fixes for these problems. Energy is distribution to represent CPU, memory, and total amount of
effectively conserved in this way. instructions in cloud computing. The hybrid meta-heuristic
method was proposed to schedule VMs with load balancing
II. RELATED WORK in cloud computing. [2014] [11] A hybrid meta-heuristic
approach incorporated both particle swarm optimization and
Based on anticipated future requests from virtual ant colony optimization. To speed up virtual machine
machines, an evaluation of resource allocation status is migration and reduce computation time, the PSO operator
updated; however, the results are unreliable in anticipating was added to the ACO algorithm. Data center migration
dynamic demands and practical needs. It evaluates the using network-aware load balancing [2014][12]. An
power topology of the data center and takes into account approach to multi-resource load balancing that is network-
intricate power models in order to implement this strategy. aware and achieves consistent performance.
[11]. By [2018] [3], a dynamic virtual machine
consolidation technique for cloud data centers was created. A bin packing technique that dynamically links and
The deployment and migration of virtual machines were disconnects virtual machines based on the speed of the
proposed to use Space Aware Best Fit Decreasing (SABFD). displayed resource has been successfully used to perform
Energy-aware dynamic VM consolidation for green cloud dynamic load balancing in the cloud. [2016] [13]. Migration
computing will become even more alluring with the option of cloud data centers using network-aware, self-adaptive
of VM selection. The process of allocating resources with a virtual machines [2016]. Artificial intelligence with a
low energy consumption will become more attractive in reinforcement learning foundation for network-aware virtual
cloud computing environments [2009] [2]. It was suggested machines. This is partially due to the tendency of cloud data
that an estimation module be incorporated to estimate the centers to overlook energy efficiency and VM allocation.
system's impending load, followed by two schedulers to For multidimensional variable-sized virtual machine
handle anticipated and unexpected loads. Column generation allocation and migration at cloud data centers, Exact [2017]
is used by the scheduler when optimizing integer [17] has developed a revolutionary method. A large cloud
linear/quadratic programming. data center cannot use it because its processing is time-
Cloud computing load balancing and scheduling consuming. [2010][16] describes a scheduling strategy
technique utilizing live migration. Ant colonies will be based on evolutionary algorithms for load-balancing virtual
optimized using live migration. State monitoring will take machines
451
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
in a cloud computing environment. This method, which 3) Workload characteristics: The effect that active
comes after schedule optimization, eliminates load processes in the migrated VM are having on migration
inequality and excessive migration expenses. speed. The programmes may, for instance, be heavily CPU-,
network-, or i/o-intensive. They will fight each other for the
III. OPTIMAL RESOURCE MANAGEMENT relevant resources using the migration strategy.
As shown in Figure 3, virtual resource management
collects performance data from physical servers, virtual 4) Host performance: The migration procedures
machines running different operating systems, and frequently rely on the resources of the source and
virtualized software and manages it centrally. By comparing destination servers, thus these servers are also crucial for
performance data for virtual machines with data for the real migration performance.
server, judgments can be made about the server's resources
and help optimize it. 5) Co-placed VMs: This option specifies the total
number of virtual machines that are co-located on the source
• It shows CPU, memory, and disc consumption and destination servers, as well as the total amount of
information for the physical server. This allows hardware that these machines used. Performance now only
monitoring of CPU, memory, and disc benefits from resource isolation, not virtualization. Running
consumption. on the same server, the performance of the other VMs would
suffer (along with the migration manner).
• For each guest's reports, the performance data of
the virtual machine is layered. This enables each 6) Migration example: Distinctive migration
guest's consumption of the CPU, RAM, and storage behaviors will result from various migration ideologies. A
to be viewed. notable quantity of advantages and overheads are also
introduced by special optimization approaches, similar to
this.
2) Migration bandwidth: This is the amount of B. Using thresholds to consolidate resources dynamically
bandwidth used to move data between servers at the source
and the destination. When compared to WAN environments, 1) Bin packing to allocate resources statically: Recent
the migration bandwidth in LAN contexts is much higher. studies show that a significant amount of the power required
by cloud computing systems is consumed by physical
machines (PM). Efficiency resource allocation, also known
as static resource allocation, is the process of allocating
VMs
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
452
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
453
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
possible to attack secured VMs or the hypervisor itself by infrastructure must be constantly monitored. For the
working together with two or more compromised VMs. resource utilization of the virtual machines, a trend must be
found and projected over time. The server administrator can
Controlling VM Sprawl: Virtualization led to both utilize this data to understand the current pattern and
the uncontrolled proliferation of VMs and the excessive estimate how many resources will be required to handle the
resource allocation because of the speed with which storage expected rise in demand.
space could be quickly assigned to virtual machines (VMs)
(Fig.5). By not making the most of all the VMs that are
available, a conventional virtual infrastructure wastes
resources. As a result, VM sprawl has come to be seen as
virtualization's biggest flaw. Regular virtual infrastructure
monitoring is important to identify inactive VMs, ones with
over- or under-provisioned resources, and ones that haven't
even been powered on since they were established. This will
help minimize VM sprawl. By getting rid of these
extraneous VMs or optimizing the resources assigned to
them, virtual sprawl can be considerably minimized.
Ineffective hardware acquisitions are also avoided via
resource management.
Figure.6: VM Capacity planning
Attacks on Virtualization Features: Virtual 1. Low Bandwidth across WAN: Because of the size
networking and VM migration are the most frequently of the images, transferring a live virtual computer
targeted characteristics of virtualization, despite the fact that across a low bandwidth, high latency WAN is
there are many other functions that might be misused. A impractical.
given VM could become completely susceptible to active
manipulation attacks and passive sniffing attacks as a result 2. Network error: In post copy, a VM will redirect to
of insecure VM migration. the source host while attempting to fetch pages that
haven't yet been transferred at the destination host,
Challenges with Compliance and System resulting in a network error since the VM is stalled
Management: When working with virtualized systems, (Fig.7).
compliance auditing and enforcement, as well as routine
system management, offer complex issues. Because of VM 3. Programs that make use of memory are called
sprawl and even inactive VMs, it will be challenging to memory-intensive programmes. This technique is
receive accurate results from vulnerability assessments, used to lessen the post copy migration approach's
patching/updates, and audits. overhead, and it performs better than reusing
memory concepts.
Capacity Planning: Virtual infrastructure, also
known as capacity planning, serves as the foundation for the 4. Live migration is used to control the transfer of
data centers that power today's businesses. As a business CPU and memory state between virtual distributed
grows, it must develop the infrastructure that underpins it. shared memory (VDSM) systems, which are
Without proper planning, the server management team groups of host machines.
would have trouble scaling the infrastructure to achieve
business goals (Fig.6). As part of capacity planning,
the virtual
454
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
REFERENCES
455
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
456
Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on March 24,2023 at 10:34:05 UTC from IEEE Xplore.
Restrictions apply.