Analyzing Virtual Machine Live Migration in Application Data Context
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 5
Abstract
Virtualization plays a very vital role in the big cloud federation. Live and Real-time virtual machine migration is always a challenging task in virtualized environment, different approaches, techniques and models have already been presented and implemented by many re- searchers. The aim of this work is to investigate various parameters of Real-time and live data migration of virtual machines in stateful and data context at the application level. The migration of one virtual machine to another requires some time depending on the network bandwidth, guest availability, hardware limitation overcomes, resource allocation, server reallocation, hypervisor compatibility and many more. To enhance and ensure the performance and optimization of the time this work presents the some analysis in the form of different time stacks in multiple piece of data stored in the virtual machines. To optimize the migration time virtual machine checkpoints are used in order to achieve the better results by using the xen hypervisor memory technique which dynamically allows the migration of the configured memory while the allocated memory could be discarded for a while. By this the bad memory remains un-migrated only the good memory consisting the used data would be migrated by means of Real-time.
Authors and Affiliations
Mutiullah Shaikh, Asadullah Shaikh, Muhammad Memon, Farah Deeba
A Congestion Avoidance Approach in Jumbo Frame-enabled IP Network
Jumbo frame is as an approach that allows for higher utilization of larger packet sizes on a domain-wise basis, decreasing the number of packets processed by core routers while not having any adverse impact on the...
Hospital Queue Control System using Quick Response Code (QR Code) as Verification of Patient’s Arrival
Hospital is an organization that primarily provides services in the form of examination, treatment, medical treatment and other diagnostic measures required by each patient in the limits of the technology and the means p...
Learner Cognitive Behavior and Influencing Factors in Web-based Learning Environment
In educational institutions, to improve student learning outcome and performance, the information and communication technology has enabled us to embark web-based learning approaches. The traditional web-based learning en...
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we shoul...
Hybrid Non-Reference QoE Prediction Model for 3D Video Streaming Over Wireless Networks
With the rapid growth in mobile device users, and increasing demand for video applications, the traffic from 2D/3D video services is expected to account the largest proportion of internet traffics. User’s perceived quali...