透過您的圖書館登入
IP:18.225.11.98
  • 學位論文

虛擬主機動態分配策略之研究

Study of the Virtual Machine Dynamic Allocation Strategy.

指導教授 : 黃仁竑
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在現今資料中心的管理中,為了更有效管理各項資源,其發展越來越趨向高密度、自動化和節能的方向前進。但也在資料中心的管理上引發一些議題。IAAS服務提供者在規劃資料中心時以符合QoS及客戶的SLA(Service Level Agreement)方式規劃,並保證滿足使用者需求。當資料中心完成規劃後,在VM上執行的各式各樣不同應用程式,由於運作模式及時間的不一致造成資料中心CPU資源的浪費。而管理者因為沒有適合的方法或工具來協助管理,因而浪費許多寶貴CPU資源,而且這資源的損失也將隨著時間而增加。在此我們將提供三個解決方案在這議題裡:1) 提供CPU資源自動收集、分析數據和分發虛擬機的輕量監視程式。2)根據收集資訊提供分析結果。3)提供一個重新分配VM的演算法。實際實驗我們發現在相同環境設備的資料中心裡,透過我們所提供三個方案自動化重新分配VM將使得原先資料中心可以容納服務更多的VM或進而關閉不需提供服務的伺服器以節省電源消耗。

關鍵字

雲端 虛擬機 動態配置 分佈

並列摘要


In today's data center management, in order to more effectively manage the resources, their development is a growing tendency of high-density, automation, and energy-saving direction forward. But it also leads to some issues of management in the data center. The IAAS service providers planned the data center to meet the QoS and customer SLA (Service Level Agreement), and to ensure that meet users' needs. When the data center completed the planning, implementation of a variety of different applications on the VM, due to the mode of operation and time inconsistency caused the waste of CPU resources in data center. However, because no suitable method or tool to assist administrator in the management. Thus not only wasting a lot of valuable CPU resources, but this loss of resources will also increase over time. In this thesis, we will provide three solutions in this issue: 1) Supported lightweight program with collection of CPU resources automatically, analysis data and distribution of VMs. 2) Supported analysis results based on the collection of information. 3) Supported new algorithm to re-arrange VMs. The Actual experiments, we found that in the same environment of our data center equipments, it was by way of our three solutions which re-arrange VMs automatically. It make the original data center increasing can accommodate to service the VMs, or then shut down the server without providing services to save power consumption.

參考文獻


[2] Xen home page. http://www.xen.org
[4] K. Nance, M. Bishop and B. Hay, "Virtual Machine Introspection: Observation or Interference?", IEEE computer society, Security & Privacy, v.6 n.5, 2008.
[5] B. Payne, M. Carbone, and W. Lee, "Secure and flexible monitoring of virtual machines", IEEE Computer Society, 2007, pp. 385-397.
[6] B. Hay , K. Nance, "Forensics examination of volatile system data using virtual introspection", ACM SIGOPS Operating Systems Review, v.42 n.3, April 2008.
[10] Standard Performance Evaluation Corporation, http://www.spec.org

延伸閱讀