Fig1:Live migration
The live VM migration is used in the case of Proactive maintains: If an imminent failure is suspected, the potential problem can be resolved before disruption of service occurs[3]. we can replace the system with the new one by the transfer of content in to new VM machine location, The users are unaware about the transfer of the machine . Load balancing [11]: In which work is shared among computers in order to optimize the utilization of available CPU resources. Using the live VM migration concept we can reduce the energy consumption, power usage between the systems.
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 373
Energy consumption [12]: Using Live Vm migration concept we can reduce the energy usage of the system by reducing the number of resources used for performing the operations. The two important performance metrics for live migration is total migration time and down time[2]. Total migration time :Total migration time is defined as the time taken to migrate all the data from the one system to other. Down time :Downtime is the duration of time the services are not available for the users. In the area of live VM migration all the researchers are trying to reduce the down time in to zero and minimal total migration time. In addition to the total migration time and down time ,the total pages transferred, consumption of network bandwidth, migration overhead , security during the time of migration are the other factors influence the effectiveness of live VM migration. The objective of the paper is to propose a novel approach to reduce total migration time and downtime during the live virtual machine migration. This paper is also deals with the reduction of consumption of bandwidth and provides more security at the time of migration. II .RELATED WORK Number of techniques are used for the migration. They broadly divided two categories of migration techniques are Precopy migration and post copy migration. In precopy migration[4] the memory contents are transfer to the destination machine even as the source node is continuously executing on the application. During the time of migration the services are continuously accessed by the users this lead to the memory pages are dirtied and dirtied memory pages are iteratively transfer from the source to the destination. The iterative transfer stopped until it reaches the smallest writable working set (WWS) has been identified, or a preset number of iterations is reached, whichever comes first. This constitutes the end of the memory transfer phase and the beginning of service downtime. The VM is then suspended and its processor state plus any remaining dirty pages are sent to a target node. Finally, the VM is restart and the copy at source is destroyed. One of the advantage of precopy it have reduced total down time ,provide fault management but have the more total migration time. The second broad category of live migration technique is the post copy migration[5].In post copy migration the process are suspend at the destination then the memory content are transfer to the destination machine. Compare to the precopy
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 374
A. Selection In the cloud Data Center it consist of VM manager , it monitor and stores all the details of the VMs that present in the cloud data center.VM manager it continuously monitors the status of the virtual machine by sending the quires to the virtual machines in the list and update the status of the VMs in the list.. All virtual machines are responds to the request by sending the cpu utilization, memory, storage details etc. In the Virtual machine manager it sets some minimum requirement for all the virtual machine .If any VMs status below the threshold it
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 375
As a consequence of Shannon's source coding theorem, the entropy is a measure of the smallest LC.It is worked by based on the creating a binary tree. it can be stored on the regular array .The size depends on the number of symbols. All nodes are leaf nodes, which contain the symbol itself, the weight of the symbol and optionally, a link to a parent node which makes it easy to read the code starting from a leaf node. Internal nodes contain symbol weight, links to two child nodes and the optional link to a parent node. For tree 0 represent the left child 1 represent the right child. Create the priority queue with the alphabet and weight of the letter. Remove the lowest priority letter from the queue. Create a new internal node with these two nodes as children and with probability equal to the sum of the two nodes' probabilities. Create the tree. Then starting from root to the nodes provide Huffman coding to all data. Decompression Decompression[14] is the phase in which the compressed log files are decompressed at the destination. The data is compressed using canonical encoding, the compression model can be precisely reconstructed with just B2b bits of information. D. Stop and Copy When the number of log files generated is too small or it reaches the some predefined condition then we execute the stop and copy phase. In stop and copy phase the VM is suspending at the source and resume at the target. E. Service handling After the successful migration of VM, services that are handled by the source machine are transferred to the target machine. The target machine continuing the task without any disturbance to the users. It advertise the new IP address to the remain device in the network. IV .EVALUATION In this section we evaluate the proposed concept of live migration using compressed log files by using various work load schemes and evaluate the performance metrics for various schemes. Experimental Environment In the Experimental section it consists of one cluster composed of four servers, in which one system act as the storage server. The remaining server act as the client for different workloads for each server ,its configuration include intel core i3 processor, all the systems are connected by the Gigabit LAN. The VMM is KVM and the guest OS
Down time
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 376
[1]
NELSON,M., Lim, and Greg Hutchins Fast transparent migration for virtual machines. In Use nix, Anaheim, Ca(2005),pp 25-25. [2] ] Clarck, C., Fraser, k., Hand, S., Hansen, J., Jule, E., Limpach, C., Pratti, I., And warfield, A. Live migration of virtual machines. In Network System Design and Implementation (2005). [3] tiago c.ferreto,marco A.S Netto, Rodrigo Server consolidation with migration control for virtualized data centers by future generation computer system 27(2011)1027-1034 [4] Clarck, C., Fraser, k., Hand, S., Hansen, J., Jule, E., Limpach, C., Pratti, I., And warfield, A. Live migration of virtual machines. In Network System Design and Implementation (2005). [5] M. R. Hines and K. Gopalan, Post-copy based live VM migration using adaptive pre-paging and dynamic selfballooning, in Proceedings of the ACM/Usenix international conference on Virtual execution environments (VEE09), 2009, pp. 5155 [6] H. Jin, L. Deng, S. Wu, X. Shi, and X. Pan. Live VM migration with adaptive memory compression. In Proceedings of the 2009 IEEE International Conference on Cluster Computing (Cluster 2009), 2009. [7] Ei PhyuZaw improved Live Virtual migration using LRU and spaly tree algorithm International journal of computer science and telecommunications [8] Hai Jin a,n, Wei Gao a, Song Wua,n, Xuanhua Shi a, Xiaoxin Wub, Fan Zhou Optimizing the live migration of virtual machine by CPU scheduling Journal of Network and Computer Applications 34 (2011) 10881096 [9]Haikun Liu,Hai Jin,Xiaofei Liao,Chen Yu,Cheng-Zhong Xu,Live Virtual machine migration via Asynchronous Replication and state Synchronization. IEEE transactions on parallel and distributed systems. [10] Mo Yuanbin , Qiu Yubing ; Liu Jizhong ; Ling Yanxia . A Data Compression Algorithm Based on Adaptive Huffman Code for Wireless Sensor Networks 2011 International Conference on Intelligent Computation Technology and Automation (ICICT), 2829 March 2011 [11] C.Isci ,J Liu, B.Abali, kephart,Kouloheris Improving server utilization using fast virtual machine migration IBM j.RES&DVE November/December 2010,vol 55 [12] Korir Sammy,ren Shengbing,Cheruiyot Wilson Energy efficient security Preserving VM Live Migration IN Data Centers For cloud computing ,IJCSI International Journal Of Computer science Issues, Vol 9,issue 2,No 3, March 2012 [13] Jason Ansel and Kapil Arya, DMTCP: transparent checkpointing for cluster computations and the desktop Computer and Information Science Faculty Publications (2009) [14] Nilkesh patra,Sila siba sankar, Data Reduction By Huffman Coding And Encryption By Insertion Of Shuffled Cyclic Redundancy Code.
Network Bandwidth The live migration is affected by the network bandwidth. Consumption of bandwidth is very low using compressed log file approach .The log files are compressed then only it traverse through the network hence it consumes the low bandwidth. Additionally it provide more security to the transferred data, whatever the log files are transferred to the destination it reaches the same ,compression also provide the security to the data. V CONCLUSION AND FUTURE WORK In this paper we have presented the design, implementation, and evaluation of log compressed approach. The log compression technique is the new concept in the field of live VM migration. The compression applied to the log files are lossless ,the log files at the target machines are reconstructed easily, DMTCP check point is helpful for the reconstruction of the virtual machine from its initial state. Compared to the CR/TR motion the log compressed techniques have the shorter total migration time, downtime and it consumes the less bandwidth to transfer the data. One problem associated with the data compression method it requires more processing time to compress the log files.
VI. REFERENCES
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 377