Downloads: 144 | Views: 307
Comparative Studies | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.3 / 10
Comparative Study of Virtual Machine Migration Techniques and Challenges in Post Copy Live Virtual Machine Migration
Rajwinder Singh, Dr. K. S. Kahlon, Sarabjit Singh
Abstract: Cloud computing is the emerging service provider used to manage computing resources like networks, storage, servers, applications and services which requires optimum effort of management [1]. Virtualization in cloud computing is gaining more importance today due to lack of proper utilization of resources, improper load balancing of processing nodes, lesser isolation of applications, extent of tolerating the faults in virtual machines, to increase the portability of nodes and to rise the efficiency of cost of the physical server. So, migration is one of the most important features of virtual machines technology [2]. Virtual machine migration is the migration of virtual machine from one physical host to another [1]. It is mainly done via two approaches pre copy migration and post copy migration. Pre copy migration first transfers the memory and then transfers the execution while post copy migration first transfers the execution and then transfers the memory [7]. The main motive of this paper is to provide the better understanding of post copy virtual machine migration technique research challenges by comparing existing general & network aware virtual machine migration techniques in cloud computing.
Keywords: Cloud Computing, virtual machine migration, pre copy, post copy, hypervisor
Edition: Volume 5 Issue 3, March 2016
Pages: 117 - 1211
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 723
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera