1
Hardware Virtualization Layer Front-end VM Mid-end VM Back-end VM Multi-Tier App Desktop VM Global site Regional site 1 Virtualized Distributed Cloud Hosting Various Applications Cloud computing is a popular paradigm for hosting online applications. Virtualization techniques are widely used to host applications ranging from Multi-tier web applications to desktop VMs. A Hypothetical Distributed Cloud Cloud Platforms have become more distributed in recent years. The hypothetical distributed cloud is expected to evolve as above with a few large global sites and numerous smaller regional sites. To utilize this infrastructure, we have to automatically place different applications to different locations based on their dynamic needs. Desktop VM Desktop VM Desktop VM Desktop VM Desktop VM Desktop VM Desktop Desktop Desktop Desktop VM Cloud Cloud Cloud We place each VM in an initial cloud location based on the immediate request. We treat each desktop VM as a black box and infer their location sensitivities based on their network activities. Periodically, we make intelligent decisions to dynamically adjust the mapping between desktop VMs and cloud locations depending on application needs and environment demand. Placing Desktop VMs in Distributed Cloud 3 4036.2 km, RTT = 96.15 ms 3633.9 km, RTT = 84.03 ms 558.4 km, RTT = 14.37 ms Experiment setup: Thin clients connect from Massachusetts, and three desktop VMs running different applications reside separately in Amazon EC2 sites of Virginia and Oregon. Desktop VM2 Desktop VM3 Desktop VM1 VA Virginia Oregon Massachusetts VNC VNC VNC 5 Hosting virtualized desktop VMs in remote servers or clouds is gaining popularity for either enterprises or third-party provider. Users are using remote desktop protocol, e.g., Windows RDP and VNC to access such VMs and use various applications. However, not all desktop VMs are latency or location sensitive. The location-sensitive rank is determined by the applications running inside. And applications that are characterized as high interactivity or refresh rate contribute to higher rank. Desktop VM Remote Desktop Protocol Virtual Desktop gains popularity 2 VMShadow:Optimizing The Performance of Virtual Desktops in Distributed Clouds Tian Guo, Vijay Gopalakrishnan, K. K. Ramakrishnan, Prashant Shenoy, Arun Venkataramani, Seungjoon Lee University of Massachusetts Amherst, AT&T Labs - Research Cloud Manager Proxy Desktop Apps OS WAN Live Migrator Nested Hypervisor Fingerprinting Engine Greedy Shadow Algorithm Greedy Shadow Algorithm: Uses cost-benefit metrics to judiciously move highly location-sensitive VMs at the least cost. WAN Live Migrator: Uses WAN-specific optimizations to migrate VMs' disk and memory state. Connection Migration Proxy: Transparently migrates active TCP connections to ensure seamless connectivity despite IP changes. VMShadow Design Goal Uses black-box VM fingerprinting technique to infer the location sensitivity of VMs. Fingerprinting Engine: 4 VNC Response Time in Sec VM1: Watching Internet Streaming Oregon Start Migration Finish Migration Virginia Start Migration Finish Migration VM3: Using Local Word Editor Start Migration Finish Migration Time (Sec) Time (Sec) Oregon VM2: Watching Local Video Time (Sec) In this case study, we demonstrate VMShadow’s ability to discriminate between location sensitive and insensitive desktop VMs and to trigger appropriate WAN migrations to improve VNC response time in an artificially constrained cloud environment. Decisions are made to migrate VM1 and VM2 to VA, to be closer to user. When VA is resource constrained, low-ranked VM3’s resources are reclaimed by migrating it back to OR, after which VM1 and VM2 are migrated to VA. Case Study 6

VMShadow Optimizing The Performance of Virtual Desktops in ...tian/publications/vm... · Cloud computing is a popular paradigm for hosting online applications. Virtualization techniques

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VMShadow Optimizing The Performance of Virtual Desktops in ...tian/publications/vm... · Cloud computing is a popular paradigm for hosting online applications. Virtualization techniques

Hardware

Virtualization Layer

Front-endVM

Mid-endVM

Back-endVM

Multi-Tier AppDesktop

VM

Global siteRegional site

1

Virtualized Distributed Cloud Hosting Various ApplicationsCloud computing is a popular paradigm for hosting online applications.Virtualization techniques are widely used to host applications ranging from Multi-tier web applications to desktop VMs.

A Hypothetical Distributed CloudCloud Platforms have become more distributed in recent years. The hypothetical distributed cloud is expected to evolve as above with a few large global sites and numerous smaller regional sites.To utilize this infrastructure, we have to automatically place different applications to different locations based on their dynamic needs.

DesktopVMDesktopVMDesktopVMDesktopVMDesktopVM

DesktopVM

DesktopVMDesktopVMDesktopVMDesktopVMDesktopVM

DesktopVM

Cloud

Cloud

Cloud

We place each VM in an initial cloud location based on the immediate request. We treat each desktop VM as a black box and infer their location sensitivities based on their network activities.

Periodically, we make intelligent decisions to dynamically adjust the mapping between desktop VMs and cloud locations depending on application needs and environment demand.

Placing Desktop VMs in Distributed Cloud

3

4036.2 km, RTT = 96.15 ms

3633.9 km, RTT = 84.03 ms

558

.4 k

m, R

TT =

14.

37 m

s

Experiment setup: Thin clients connect from Massachusetts, and three desktop VMs running different applications reside separately in Amazon EC2 sites of Virginia and Oregon.

Desktop VM2

Desktop VM3Desktop VM1

VA

VirginiaOregon

Massachusetts

VNCVNC

VNC

5

Hosting virtualized desktop VMs in remote servers or clouds is gaining popularity for either enterprises or third-party provider.

Users are using remote desktop protocol, e.g., Windows RDP and VNC to access such VMs and use various applications.

However, not all desktop VMs are latency or location sensitive. The location-sensitive rank is determined by the applications running inside. And applications that are characterized as high interactivity or refresh rate contribute to higher rank.

Desktop VM

Remote Desktop Protocol

Virtual Desktop gains popularity

2

VMShadow:Optimizing The Performance of Virtual Desktops in Distributed Clouds

Tian Guo, Vijay Gopalakrishnan, K. K. Ramakrishnan, Prashant Shenoy, Arun Venkataramani, Seungjoon LeeUniversity of Massachusetts Amherst, AT&T Labs - Research

Cloud Manager Proxy

Desktop Apps

OS

WAN Live Migrator

NestedHypervisor

Fingerprinting Engine

Greedy ShadowAlgorithm

Greedy Shadow Algorithm:Uses cost-benefit metrics to judiciously move highlylocation-sensitive VMs at the least cost.

WAN Live Migrator:Uses WAN-specific optimizations to migrate VMs' disk and memory state.

Connection Migration Proxy:Transparently migrates active TCP connections to ensure seamless connectivity despite IP changes.

VMShadow Design Goal

Uses black-box VM fingerprintingtechnique to infer the location sensitivity of VMs.

Fingerprinting Engine:

4

VNC

Resp

onse

Tim

e in

Sec

VM1: Watching Internet Streaming

Oregon

Start Migration Finish Migration

Time (Sec)

VirginiaStart Migration Finish Migration

VM3: Using Local Word Editor

Start MigrationFinish Migration

Time (Sec) Time (Sec)

Oregon

VM2: Watching Local Video

Time (Sec)

In this case study, we demonstrate VMShadow’s ability to discriminate between location sensitive and insensitive desktop VMs and to trigger appropriate WAN migrations to improve VNC response time in an artificially constrained cloud environment.

Decisions are made to migrate VM1 and VM2 to VA, to be closer to user. When VA is resource constrained, low-ranked VM3’s resources are reclaimed by migrating it back to OR, after which VM1 and VM2 are migrated to VA.

Case Study

6