跳到主要內容

簡易檢索 / 詳目顯示

研究生: 修璃翠
Ratri Abdatush Sholihah
論文名稱: 虛擬化計算平台上虛擬機層的高可用性
High Availability for Virtual Machine Layer on Virtualized Computing Platform
指導教授: 王尉任
Wei-Jen Wang
梁德容
Deron Liang
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2020
畢業學年度: 108
語文別: 英文
論文頁數: 44
中文關鍵詞: 高可用性虚拟机操作保护
外文關鍵詞: high availability, virtual machine operation, protection
相關次數: 點閱:8下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 服務器虛擬化的作用對於許多企業使其應用程序在虛擬機上運行變得很重
    要。因此,高可用性概念對於通過減少停機時間來保持系統可用性至關重要。
    在我們之前的研究中,高可用性服務系統( HASS)通過檢測和恢復為系統提供
    保護。但是,在實際環境中,用戶需要執行虛擬機操作,這會影響檢測過程。
    為了應對這種情況,本研究實施了一種新的檢測機制,該機制收集有關虛擬機
    操作的信息,並將其與 HASS 檢測機制結合在一起。檢測過程將使用該信息來動
    態更改虛擬機的保護。結果,新的檢測機制將獲得有關虛擬機操作和故障的正
    確信息。因此,系統可以對虛擬機進行正確的檢測和恢復。


    The role of server virtualization becomes important for many enterprises to put their
    application running on virtual machines. As a consequence, the high availability concept is
    more critical to keep the system available by reducing the downtime. In our previous research,
    we developed a system called High Availability Service System (HASS) provides protection to
    the system through detection and recovery. However, in the real environment users need to do
    virtual machine operation that will affect the detection process. To handle this condition, this
    study implements a new detection mechanism that collects the information about virtual
    machine operation and combines it with the HASS detection mechanism. The information will
    be used by the detection process to dynamically change the protection of virtual machines. As
    a result, the new detection mechanism gets the correct information about the virtual machine
    operation and the failure. So, the system can do the right detection and recovery for virtual
    machines.

    虛擬化計算平台上虛擬機層的高可用性.............................................................................................. i High Availability for Virtual Machine Layer on Virtualized Computing Platform................................ ii Authorization for Thesis/ Dissertation ................................................................................................... iii Application for Embargo of Thesis/ Dissertation................................................................................... iv Advisor’s Recommendation for Postgraduate Students.......................................................................... v Verification Letter from the Oral Examination Committee for Master’s Students................................ vi 摘要........................................................................................................................................................ vi Abstract ................................................................................................................................................. vii ACKNOWLEDGMENT...................................................................................................................... viii TABLE OF CONTENTS....................................................................................................................... ix LIST OF FIGURES................................................................................................................................ xi LIST OF TABLES ................................................................................................................................ xii CHAPTER I INTRODUCTION ............................................................................................................ 1 1-1 Background ............................................................................................................................. 1 1-2 Motivation............................................................................................................................... 2 1-3 Research Objective.................................................................................................................. 2 1-4 Research Contribution............................................................................................................. 3 1-5 Thesis Structure....................................................................................................................... 3 CHAPTER II THEORY AND RELATED WORKS............................................................................. 4 2-1 Cloud Computing.................................................................................................................... 4 2-2 Server Virtualization ............................................................................................................... 4 2-3 High-availability...................................................................................................................... 4 2-4 OpenStack ............................................................................................................................... 5 2-5 Virtual Machine Operation...................................................................................................... 5 2-6 Libvirt...................................................................................................................................... 5 2-7 High Availability Service System (HASS) ............................................................................. 7 2-8 Related Works......................................................................................................................... 8 2-8-1 Citrix Hypervisor 8.2....................................................................................................... 9 2-8-2 IBM VM Recovery Manager HA Version 1.3.0 for Power Systems............................. 9 2-8-3 Oracle VM v3.4............................................................................................................... 9 2-8-4 OpenStack HA 0.0.1.dev812......................................................................................... 10 2-8-5 vSphere 4.0.................................................................................................................... 10 CHAPTER III DESIGN AND IMPLEMENTATION.......................................................................... 11 3-1 Design ................................................................................................................................... 11 3-1-1 HASS Overview............................................................................................................ 11 3-1-2 HAVM Delete ............................................................................................................... 14 3-1-3 HAVM Shutdown ......................................................................................................... 15 3-1-4 HAVM Start .................................................................................................................. 16 3-1-5 HAVM Reboot .............................................................................................................. 17 3-1-6 HAVM Live Migration ................................................................................................. 18 3-2 Implementation...................................................................................................................... 19 3-2-1 Function _check_instance_state.................................................................................... 19 3-2-2 Function _detect_and_recover ...................................................................................... 22 CHAPTER IV RESEARCH EXPERIMENT ....................................................................................... 24 4-1 Experiment Architecture ....................................................................................................... 24 4-2 Experiment Setup .................................................................................................................. 25 4-3 Experiment Design................................................................................................................ 25 4-4 Experiment Results ............................................................................................................... 26 CHAPTER V CONCLUSION AND FUTURE WORKS .................................................................... 28 5-1 Conclusion............................................................................................................................. 28 5-2 Future Works......................................................................................................................... 29 REFERENCES...................................................................................................................................... 30

    [1] S. N. T. Chiueh and S. Brook, “A survey on virtualization technologies,” Rpe Report,
    pp. 1-42, 2005.
    [2] P. Li, “Selecting and using virtualization solutions: our experiences with VMware and
    VirtualBox,” Journal of Computing Sciences in Colleges (JCSC), vol. 25, no. 3, pp.
    11–17, 2010.
    [3] R. Buyya, J. Broberg, and A. Goscinski., Cloud Computing: Principles and Paradigms.
    John Wiley & Sons, 2011.
    [4] W. Wang, H. Huang, S. Chuang, S. Chen, C. H. Kao and D. Liang, "Virtual machines
    of high availability using hardware-assisted failure detection," 2015 International
    Carnahan Conference on Security Technology (ICCST), pp. 1-6, 2015, doi:
    10.1109/CCST.2015.7389668.
    [5] C. Cheng, Z. Su, C. Chen, S. Chen and W. Wang, "Supporting software-defined HA
    clusters on OpenStack platform," 2017 International Conference on Applied System
    Innovation (ICASI), pp. 268-271, 2017, doi: 10.1109/ICASI.2017.7988403.
    [6] Y. Lee, M. Ho, A. Suharsono, Y. Pan, W. Wang and D. Liang, "NCU-HA: A
    Lightweight HA System for Kernel-Based Virtual Machine," 2017 International
    Conference on Platform Technology and Service (PlatCon), pp. 1-6, 2017, doi:
    10.1109/PlatCon.2017.7883718.
    [7] N. Hidehiko, "Virtual machine system, restarting method of virtual machine and
    system", U.S. Patent, no. 8307363, 2012.
    [8] O.M.A. Gadir, "High-Availability Cluster Virtual Server Systems," U.S. Patent
    6,944,785, issued September 13, 2005.
    [9] I. P. Egwutuoha, D. Levy, B. Selic, and S. Chen, “A survey of fault tolerance
    mechanisms and checkpoint/restart implementations for high performance computing
    systems,” J. Supercomput., vol. 65, no. 3, pp. 1302–1326, Sep. 2013.
    [10] C.-L. Fang, D. Liang, F. Lin, and C.-C. Lin, “Fault Tolerant Web Services,” J. Syst.
    Archit., vol. 53, no. 1, pp. 21–38, Jan. 2007.
    [11] K. Jackson and C. Bunch, OpenStack Cloud Computing Cookbook - Second Edition, 2
    edition ed., Birmingham, UK: Packt Publishing, 2013.
    [12] Bennett, S., Anderson, A.V., Jeyasingh, S., Kagi, A., Neiger, G., Uhlig, R., Zou, X. and
    Kozuch, M.A., Intel Corp, 2006. Control over faults occurring during the operation of
    guest software in the virtual-machine architecture. U.S. Patent 7,124,327.
    [13] Uhlig, R., Anderson, A.V., Bennett, S., Cota-Robles, E., Jeyasingh, S., Kagi, A. and
    Neiger, G., Intel Corp, 2006. Handling faults associated with operation of guest
    software in the virtual-machine architecture. U.S. Patent 6,996,748.
    [14] Neiger, G., Chou, S., Cota-Robles, E., Jeyasingh, S., Kagi, A., Kozuch, M. and Uhlig,
    R., Intel Corp, 2010. Processor mode for limiting the operation of guest software
    running on a virtual machine supported by a virtual machine monitor. U.S. Patent
    7,818,808.
    [15] P. M. Chen and B. D. Noble, "When virtual is better than real [operating system
    relocation to virtual machines]," Proceedings Eighth Workshop on Hot Topics in
    Operating Systems, Elmau, Germany, 2001, pp. 133-138, doi:
    10.1109/HOTOS.2001.990073.
    [16] R. Buyya, J. Broberg, and A. M., Cloud Computing. John Wiley & Sons, 2010.
    [17] D. C., Cloud Computing. Morgan Kaufmann, 2017.
    [18] Lascu, O., Bodily, S., Esser, M.K., Herrera, M., Pothier, P., Prelec, D., Quintero, D.,
    Raymond, K., Sebesteny, V. and Socoliuc, A., 2005. Implementing High Availability
    Cluster Multi-Processing (HACMP) Cookbook. IBM.
    [19] E. Marcus and H. Stern, Blueprints for High Availability. John Wiley & Sons, 2003.
    [20] S. van, Pro Linux High Availability Clustering. Apress, 2014.
    [21] K. Pepple, Deploying OpenStack. "O’Reilly Media, Inc.", 2011.
    [22] W. Bentley, OpenStack Administration with Ansible 2. Packt Publishing Ltd, 2016.
    [23] V. K., Openstack in Action. Manning Publications Company, 2015.
    [24] S. Adkins, J. Belamaric, V. Giersch, J. E., and D. Makogon, OpenStack Cloud
    Application Development. John Wiley & Sons, 2015.
    [25] T. Fifield, OpenStack Operations Guide. "O’Reilly Media, Inc.", 2014.
    [26] W. David, Foundations of Libvirt Development. Apress, 2019.
    [27] "Citrix Hypervisor 8.2 Product Documentation," Nov. 26, 2019. Accessed on: Apr. 6,
    2020. [Online]. Available: https://docs.citrix.com/en-us/citrix-hypervisor/highavailability.html
    [28] "IBM VM Recovery Manager HA for Power Systems Version 1.3.0 Deployment
    Guide," 2018-2019. Accessed on: Apr. 6, 2020. [Online]. Available:
    https://www.ibm.com/support/knowledgecenter/SSHQN6_1.3/base/ha_pdf.pdf
    [29] "Oracle VM Concept Guide for Release 3.4," May, 2020. Accessed on: Apr. 6, 2020.
    [Online]. Available: https://docs.oracle.com/en/virtualization/oraclevm/3.4/concepts/E64081.pdf
    [30] "OpenStack High Availability Guide," Nov. 27, 2018. Accessed on: Apr. 6, 2020.
    [Online]. Available: https://docs.openstack.org/ha-guide/index.html
    [31] "vSphere Availability Guide ESX 4.0 ESXi 4.0 vCenter Server 4.0," 2009-2011.
    Accessed on: Apr. 6, 2020. [Online]. Available:
    https://www.vmware.com/pdf/vsphere4/r40/vsp_40_availability.pdf

    QR CODE
    :::