Live migration of direct-access devices
نویسندگان
چکیده
منابع مشابه
Live Migration of Virtual Block Devices
Today’s computing environments do not provide support for seamless user mobility. We argue that the support for user mobility between various computing environments can be improved by using live migration of virtual machines and present our initial steps in this direction. We are addressing efficient live migration of persistent storage without leaving residual depencies between migration sites...
متن کاملA Versioning Approach to VM Live Migration
In the context of virtual machines live migration, two strategies called “pre-copy” and “post-copy” have already been presented; but each of these strategies works well only in some circumstances. In this paper, we have a brief presentation of QAVNS and then introduce a new approach which is based on the concept of "informational object", assigning QAVNS-scheme-revision number, and observing th...
متن کاملReduction of Storage Fragmentation on Direct Access Devices
A technique is described for partially reorganizing the contents of disk storage so as to reduce the level of fragmentation. The method entails choosing that fraction of the contents which is estimated to have the greatest impact on the free space distribution, followed by the relocation of these data to more favorable locations, subject to the system integrity requirements .
متن کاملPlastic migration from implanted central venous access devices.
BACKGROUND This is the first reported study of histologically confirmed migration from intravenous access devices in children. METHODS The capsules from around intravenous access devices were examined by light microscopy to determine the extent of the foreign body response; energy dispersive x ray analysis was performed to document the elemental content of the foreign material. RESULTS A fi...
متن کاملProtection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory management units (IOMMUs) and recently proposed software-based methods can be used to reduce the overhead of I/O virtualization by providing untrusted guest operating systems with safe, direct access to I/O devices. This...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGOPS Operating Systems Review
سال: 2009
ISSN: 0163-5980
DOI: 10.1145/1618525.1618536