Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA Virtualization Technology for Software Rejuvenation and High Performance Computing V.DharmaPrakash, Dr.C.Kavitha Lecturer – Dept of MCA, Professor – Dept of MCA K.S.Rangasamy College of Technology, Tiruchengode Abstract The phenomenon that the state of software degrades with time is known as software aging. The primary method to fight aging is software rejuvenation. This paper presents new ways of effective software rejuvenation using virtualization for addressing software aging and also for High Performance Computing. This new approach is meant to be the less disruptive as possible for the running service and to get a zero downtime in most of the cases. Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computing (HPC) applications is currently limited despite its potential for both improving resource utilization as well as providing resource guarantees to its users. Keywords: Software aging, Software rejuvenation, Virtualization, High Performance Computing degradation 1. Introduction As business the exhaustion system increasingly dependent on information corruption and and computing technology, continuous accumulation. Aging has not only been availability is a universal concern. It has observed in software used on a mass now been well-established that failures scale but also in specialized software of computer systems are more often due used in high availability and safety to software faults than due to hardware critical applications. The most natural faults. wide-spread procedure to counteract such software phenomenon of “software aging”, one in aging is to apply the well-known which the state of a software system technique of software rejuvenation. It gradually degrades involves eventually leads the with and numerical occasionally stopping data error the performance software application, cleaning its internal degradation, transient failures or even state and/or its environment, and then crushes been restarting it. By removing the accrued reported. The primary causes of this error conditions and freeing up or of to time resources, of operating Recently, becomes are applications, has Copy Right @CSE/IT/ECE/MCA-LVEC-2009 Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA decrementing operating system (OS) environments and it is emerging as a resources, this technique proactively technique prevents performance. unexpected future system outages. to increase system 2. Proposed System: Virtualization technology enables In the proposed system, it can be able a single computer to run multiple to optimize the rejuvenation operation operating without systems Virtualization simultaneously. any additional find hardware. The proposed system is important applications over a wide range totally supported by software and can of areas such as server consolidation, be easily deployed. In the proposed secure computing platforms, supporting system (refer figure.1), on top of multiple OS, kernel debugging and virtualization middleware layer, there development, system migration, etc, are resulting usage. application server. A software load- Virtualization allows abstracting away balancer (VM-LB) will be run on the real hardware configuration of a VM1 that will be responsible for the system. One method of virtualizing the detection of software aging or some hardware computer potential anomaly. We use the active involves using a layer of software, called VM(primary VM) to run the main the Virtual Machine Monitor (VMM), to application server and a standby VM provide the illusion of real hardware for where we instantiate a replica of the multiple virtual machines (VMs). Inside application server that works as a hot- each VM, the operating system (often standby. In hot-standby configuration, called the guest OS ) and applications component state is replicated to the run on the VM’s own virtual resources standby on any change, i.e. the such as virtual CPU, virtual network standby component is always up-to- card, virtual RAM, and virtual disks. A date. In case of a failure, the standby VMM can be hosted directly on the component computer hardware or within a host component and continues to operate operating system. Virtual machines offer based on the current state. The hot- a degree of flexibility that is not possible standby to continuous availability without any obtain technologies requiring in widespread resources on of physical a machines. three virtual machines replaces the configuration service. failed offers Virtualization has proved as a successful interruption tool for management of complex IT- Detector and Anomaly-Detector will Copy Right @CSE/IT/ECE/MCA-LVEC-2009 of per Aging- Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA be used for the detection of software implementation aging or some potential anomaly. technology for HPC. When software aging or some of virtualization 3.1 For software rejuvenation action potential anomaly happens VM-LB The assumptions used in the modeling will trigger a rejuvenation operation. are as follows: In VM1, other necessary software Failure rate and repair rate of the modules will be installed. In order not VM are identical at all states. to lose any in-flight request or session Unstable rate, the speed of data at the time of rejuvenation, first, escaping the healthy condition of we start the standby server; all the VM is identical at all states. are Rejuvenation rate, the frequency migrated from the active server to of rejuvenation is identical at all standby server. When all the ongoing states. new requests and sessions requests are finished in primary The probability of going from server, then the primary VM will be normal state to failure state is rejuvenated. negligible compared to other probabilities. During the rejuvenation process, the system can provide the continuous service except non virtualized scenario. 3.2 For High Performance Computing Most virtualization strategies fall into one of four major categories: 3.2.1. Full Virtualization: Also sometimes called hardware emulation. In this case an unmodified operating system is run using a hypervisor to trap and Figure 1 3. System Model : In this section, first safely determining virtualization instructions on-the-fly. Because trapping technology can improve the software the privileged instructions can lead to rejuvenation significant performance penalties, novel how action and then translate/ execute privileged strategies are used to aggregate multiple Copy Right @CSE/IT/ECE/MCA-LVEC-2009 Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA instructions and translate them together. securely isolate multiple instances of an Other enhancements, such as binary operating system within a single host translation, improve machine. The guest operating system performance by reducing the need to instances are often referred to as virtual translate these instructions in the future. private servers (VPS). The advantage to 3.2.2. Paravirtualization: operating system-level virtualization lies can virtualization, further Like full paravirtualization also mainly in performance. No hypervisor / uses a hypervisor, and also uses the term instruction trapping is necessary. This virtual machine to refer to its virtualized typically results in system performance operating systems. However, unlike full of near-native speeds. The primary virtualization, paravirtualization requires disadvantage is that all VPS instances changes to the virtualized operating share a single kernel. Thus, if the kernel system. to crashes or is compromised, all VPS coordinate with the hypervisor, reducing instances are compromised. However, the use of the privileged instructions that the advantage to having a single kernel are typically responsible for the major instance is that fewer resources are performance consumed due to the operating system This allows the penalties VM in full virtualization. The advantage is that overhead of multiple kernels. paravirtualized virtual machines typically 3.2.4. Native Virtualization: Native outperform virtual virtualization leverages hardware support machines. The disadvantage, however, is for virtualization within a processor itself the need to modify the paravirtualized to aid in the virtualization effort. It virtual machine / operating system to be allows multiple unmodified operating hypervisor-aware. This has implications systems to run alongside one another, for operating systems without available provided that all operating systems are source code. capable of running on the host processor fully virtualized System-level directly. That is, native virtualization Virtualization: The most intrusive form does not emulate a processor. This is of virtualization is operating system level unlike the full virtualization technique virtualization. para where it is possible to run an operating virtualization and full virtualization, system on a fictional processor, though operating virtualization typically with poor performance. In x86, does not rely on a hypervisor. Instead, 64 series processors, both Intel and the operating system is modified to AMD support virtualization through the 3.2.3. Operating Unlike system-level both Copy Right @CSE/IT/ECE/MCA-LVEC-2009 Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA Intel-VT and AMD-V virtualization extensions. x86, 64 processors with Since the type-I comparable to that of virtualization relatively native execution. In contrast, type-II recent, but are fast becoming widespread. virtualization incurs additional overhead Virtualization creates an abstraction of due to the layering of the VMM on top the hardware and executes one or several of the host OS when servicing resource virtual machines (VMs) on top of this requests from VMs. The type-II layering virtualized hardware; in some instances, makes its approach more suitable for the the virtual machine may also directly development access the hardware for performance performance purposes. Virtualization solutions are exchange for greater diagnostic and today based on the concept of a Virtual development capabilities. Today, several Machine Monitor (VMM), also called a system-level virtualization solutions are hypervisor. The VMM is responsible for available, for instance Xen (type-I), the hardware virtualization and execution QEMU of VMs on top of the virtualized workstation & server (type-II). However, hardware. The VMM is typically a small these solutions are not suitable for HPC operating system that does not include because they were not designed to meet hardware drivers. To access physical the specialized needs of HPC. For resources, the VMM is typically coupled instance, Xen has become a rather with a standard operating system, which massive provides device/hardware access. There unneeded features for HPC, e.g., a are employed, network communication bus; QEMU and formalized by Goldberg in the 1970’s VMWare do not support direct access to as: (i) type-I virtualization where the high-performance VMM and VM run directly on the Virtualization solution for HPC requires physical only a small set of system services, such two support are approaches hardware, and (ii) type-II phase, may where be (type-II), micro-kernel migration, some reduced or that network in VMWare includes solutions. virtualization where the VMM and VM as suspend/resume, and run on a host operating system. checkpoint / restart of VMs. In addition, the solution should afford developers Host OS VM VM M M VMM Hardware Type I VM VM M M VMM Host OS Hardware efficient access to resources, a VM adapted scheduling policy, and be lightweight in order to: (a) minimize the system footprint, and (b) guarantee Type@CSE/IT/ECE/MCA-LVEC-2009 II Copy Right Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA performance prediction and isolation for available for the virtual server while running VMs. other can not do this. Based on usage criteria, we can vi)Security:- classify the problems as follows : techniques increases security by allowing i) Multi OS:- Some virtualization system administrators to cleanly separate technology only support a type of OS services on different virtual servers, (Linux, Windows, etc.) while others are some of them more generic and can run Linux on protections with Windows, Windows on Linux, etc. additional security model that can make MultiOS virtualization systems include a virtual server more robust than a real VMware and Xen. one. ii) Kernel Development/Debugging :- Hypervisor for High Performance Computing Some users need to develop the kernel. This criteria will define if,yes or no, those tasks can be achieved with the iii) OS Installation Process :- Some users need to reproduce the complete installation of a system (Install CD, Network Boot, Hard disk partitioning, consumption:- This criteria will define how much resources a virtual computer need to use in order to be fully virtualization functional. For technique, offers additional rules/roles and The core of a virtualization solution for HPC is a HPC Hypervisor. Current server consolidation market. Because of this context and because of the lack of hardware current support VMMs footprint. etc.). Resources virtualization VMM has been initially designed for the chosen virtualization technique. iv) All each the approximative resource consumption of a fully functional virtual server has been v) Dynamical allocation of resources:Some users needs to dynamically change the resources used by a virtual computer. Some virtualization programs allow the user to change live the resources have virtualization, huge important system system footprint is created by two different factors: (i) the VMM is always coupled to a HostOS which is a full operating system, (ii) for virtualization purpose the VMM store a large dataset in memory. VMM Memory system-level estimated. This for Footprint virtualization Typical solutions typically have a “view” of the virtual machine memory space. This view is used to translate the memory access from the virtual machine to the physical memory. This memory footprint has a direct impact on modern execution Copy Right @CSE/IT/ECE/MCA-LVEC-2009 Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA platform which are most of the time the VMM itself. The system footprint is composed of multicore processors with actually shared cache. Typically if the core non- HostOS. In order to achieve high shared cache is smaller than the VMM performance computing, the HostOS memory footprint, and if the application footprint has to be minimized in order to is memory constrained, cache misses and limit the interference with the application flushes generated by the VMM execution execution. This effort is similar to the will the standard OS tuning effort for HPC application execution (generating a lot of platforms, which includes eviction of cache misses and flushes). In order to unnecessary daemons and services. Each address this issue, two approaches are OS has its own advantages and targeted possible: scientific applications. Flexibility in OS (i) assign the VMM to a specific core deployment and decrease its memory footprint to applications need to be able to run on the make it fit in the none-shared memory OS associated to the core where the VMM is Virtualization technology is capable of running, (ii) include some hardware providing support to store part of the VM’s application “memory map” directly on the hardware. deployment, and customized system System environments interfere directly Footprint of with the Tuple mostly composed is they needed were by as these designed testbeds for for. OS and development for the and applications by VMM/HostOS : The VMM needs to be allowing the interchanging of the OS and coupled to an HostOS which is needed its to host the hardware drivers. Everytime component on demand. an application running inside a virtual 4. Conclusion Runtime Environment (RTE) machine wants to access the hardware We conclude that virtualization can (e.g. for network communications), it has be helpful for software rejuvenation and to go be default through the HostOS . fail-over in the occurrence of application The system footprint of a system-level failures virtualization solution is therefore not virtualization only composed of the system footprint of performance computing. Thandar Thein, Sung-Do Chi, and Jong Sou Park “Improving Fault Tolerance by Virtualization and Software Rejuvenation”- IEEE Transactions on software aging and solution for high Conference on Modelling & Simulation pp 855 – References 1. and Second Asia International 860, 2008 2. Geoffroy Vall´ee , Thomas Naughton , Christian Engelmann , Hong Ong and Stephen L. Scott “System-Level Virtualization for High Performance Computing” - IEEE Transactions Copy Right @CSE/IT/ECE/MCA-LVEC-2009 Proceedings of the International Conference , “Computational Systems and Communication Technology” Jan.,9,2009 - by Lord Venkateshwaraa Engineering College, Kanchipuram Dt.PIN-631 605,INDIA on 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing pp 636 – 643, 2008. 3. J. P. Walters, Vipin Chaudhary, and Minsuk Cha , Salvatore Guercio Jr. and Steve Gallo “A Comparison of Virtualization Technologies for HPC ” - International IEEE Transactions Conference on on 22nd Advanced Information Networking and Applications pp 861 – 868, 2008. 4. Benoˆıt des Ligneris “Virtualization of Linux based computers ” Proceedings of the 19th International Symposium on High Performance Computing Systems and Applications . 5. M. Grottke, Lei Li, K. Vaidyanathan and K.S. Trivedi, “Analysis of SoftwareAging in a Web Server”, IEEE Transactions on Reliability, Vol. 5, No. 3, September 2006. 6. Virtual Machines: Online Available: http://www.vmware.com Copy Right @CSE/IT/ECE/MCA-LVEC-2009