SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
High Availability via
Asynchronous Virtual
Machine Replication
Review by Mário Almeida (EMDC)

Summary
High availability requires the usage of redundancy techniques that are capable of maintaining
and switching to backups in case of failure. Commercial high availability systems generally use
specialized hardware and/or customized software to achieve this purpose.

This paper describes a system called Remus. It provides OS and application agnostic high
availability on commodity hardware. It performs virtualization to migrate running VMs between
physical hosts, and extends the technique to replicate snapshots of an entire running OS
instance at very high frequencies between a pair of physical machines. It discretizes the system
into a serie of replicated snapshots.

Any transmitted network packets is not released until the system state that produced it has been
replicated. It allows a single host to execute speculatively and then checkpoint and replicate
its state asynchronously. System state is not made externally visible until the checkpoint is
committed.

Remus ensures that regardless of the moment at which the primary fails, no externally visible
state is ever lost. It aims to make mission-critical availability accessible to mid- and low-end
systems.

Remus goals:
  ● Generality - High availability should be provided as a low-level service, with common
     mechanisms that apply regardless of the application being protected or the hardware on
     which it runs.

   ●   Transparency - High availability should not require that OS or application code be
       modified to support facilities such as failure detection or state recovery.
●   Seamless failure recovery - No externally visible state should ever be lost in the case
       of single-host failure. Failure recovery should be fast. Established TCP connections
       should not be lost or reset.

Remus runs paired servers in an active-passive configuration. Speculative execution decouples
external output from synchronization points. Synchronization with the replicated server is
performed asynchronously. The basic stages of operation in Remus are the following:




Some characteristics:

   ●   VM-based whole-system replication.

   ●   Speculative execution - Replication may be achieved either by copying the state of a
       system. The state of the replica is synchronized with the primary only when the output of
       the primary has become externally visible. It buffers output until a more convenient time,
       performing computation speculatively ahead of synchronization points.

   ●   Asynchronous replication - due to buffering output at the primary server. The primary
       host can resume execution when its machine state has been captured, without waiting
       for an ack.

Remus failure model provides the following properties:

   ●   The fail-stop failure of any single host is tolerable.
●   Should both the primary and backup hosts fail concurrently, the protected system’s data
       will be left in a crash-consistent state.

   ●   No output will be made externally visible until the associated system state has been
       committed to the replica.

It uses a simple failure detector integrated in the checkpointing stream. A timeout of the backup
responding to commit requests will result in the primary assuming that the backup has crashed
and disabling protection. Similarly, a timeout of new checkpoints being transmitted from the
primary will result in the backup assuming that the primary has crashed and resuming execution
from the most recent checkpoint.

Remus also has pipelined checkpoints since it uses an epoch-based system in which execution
of the active VM is bounded by brief pauses in execution in which changed state is atomically
captured, and external output is released when that state has been propagated to the backup.


Lesson
High availability is possible through virtual machine replication using existing software and
running on commodity hardware. Remus performs frequent global checkpoints to replicate the
state of a single speculatively executing virtual machine.


Critique
It comes with the price of introducing a small performance overhead due to the network
buffering required to ensure consistent replication.

Mais conteúdo relacionado

Destaque (11)

1phase induction motors
1phase induction motors1phase induction motors
1phase induction motors
 
Electric drives
Electric drivesElectric drives
Electric drives
 
Op amp(operational amplifier)
Op amp(operational amplifier)Op amp(operational amplifier)
Op amp(operational amplifier)
 
Illumination Lighting
Illumination LightingIllumination Lighting
Illumination Lighting
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
8051 MICROCONTROLLER
8051 MICROCONTROLLER 8051 MICROCONTROLLER
8051 MICROCONTROLLER
 
Electric drives
Electric drivesElectric drives
Electric drives
 
Circuit breaker
Circuit breakerCircuit breaker
Circuit breaker
 
Power Supply Project
Power Supply ProjectPower Supply Project
Power Supply Project
 
Induction motor
Induction motorInduction motor
Induction motor
 
Electric traction
Electric tractionElectric traction
Electric traction
 

Mais de Mário Almeida

Flume impact of reliability on scalability
Flume impact of reliability on scalabilityFlume impact of reliability on scalability
Flume impact of reliability on scalability
Mário Almeida
 
Flume-based Independent News Aggregator
Flume-based Independent News AggregatorFlume-based Independent News Aggregator
Flume-based Independent News Aggregator
Mário Almeida
 

Mais de Mário Almeida (15)

Empirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application SchedulingEmpirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application Scheduling
 
Android reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skypeAndroid reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skype
 
Spark
SparkSpark
Spark
 
High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)
 
Flume impact of reliability on scalability
Flume impact of reliability on scalabilityFlume impact of reliability on scalability
Flume impact of reliability on scalability
 
Dimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache SimulationsDimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache Simulations
 
Self-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File SystemsSelf-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File Systems
 
Smith waterman algorithm parallelization
Smith waterman algorithm parallelizationSmith waterman algorithm parallelization
Smith waterman algorithm parallelization
 
Man-In-The-Browser attacks
Man-In-The-Browser attacksMan-In-The-Browser attacks
Man-In-The-Browser attacks
 
Flume-based Independent News Aggregator
Flume-based Independent News AggregatorFlume-based Independent News Aggregator
Flume-based Independent News Aggregator
 
Exploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed SystemsExploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed Systems
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing Networks
 
Instrumenting parsecs raytrace
Instrumenting parsecs raytraceInstrumenting parsecs raytrace
Instrumenting parsecs raytrace
 
Architecting a cloud scale identity fabric
Architecting a cloud scale identity fabricArchitecting a cloud scale identity fabric
Architecting a cloud scale identity fabric
 
SOAP vs REST
SOAP vs RESTSOAP vs REST
SOAP vs REST
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

High availability via asynchronous virtual machine replication

  • 1. High Availability via Asynchronous Virtual Machine Replication Review by Mário Almeida (EMDC) Summary High availability requires the usage of redundancy techniques that are capable of maintaining and switching to backups in case of failure. Commercial high availability systems generally use specialized hardware and/or customized software to achieve this purpose. This paper describes a system called Remus. It provides OS and application agnostic high availability on commodity hardware. It performs virtualization to migrate running VMs between physical hosts, and extends the technique to replicate snapshots of an entire running OS instance at very high frequencies between a pair of physical machines. It discretizes the system into a serie of replicated snapshots. Any transmitted network packets is not released until the system state that produced it has been replicated. It allows a single host to execute speculatively and then checkpoint and replicate its state asynchronously. System state is not made externally visible until the checkpoint is committed. Remus ensures that regardless of the moment at which the primary fails, no externally visible state is ever lost. It aims to make mission-critical availability accessible to mid- and low-end systems. Remus goals: ● Generality - High availability should be provided as a low-level service, with common mechanisms that apply regardless of the application being protected or the hardware on which it runs. ● Transparency - High availability should not require that OS or application code be modified to support facilities such as failure detection or state recovery.
  • 2. Seamless failure recovery - No externally visible state should ever be lost in the case of single-host failure. Failure recovery should be fast. Established TCP connections should not be lost or reset. Remus runs paired servers in an active-passive configuration. Speculative execution decouples external output from synchronization points. Synchronization with the replicated server is performed asynchronously. The basic stages of operation in Remus are the following: Some characteristics: ● VM-based whole-system replication. ● Speculative execution - Replication may be achieved either by copying the state of a system. The state of the replica is synchronized with the primary only when the output of the primary has become externally visible. It buffers output until a more convenient time, performing computation speculatively ahead of synchronization points. ● Asynchronous replication - due to buffering output at the primary server. The primary host can resume execution when its machine state has been captured, without waiting for an ack. Remus failure model provides the following properties: ● The fail-stop failure of any single host is tolerable.
  • 3. Should both the primary and backup hosts fail concurrently, the protected system’s data will be left in a crash-consistent state. ● No output will be made externally visible until the associated system state has been committed to the replica. It uses a simple failure detector integrated in the checkpointing stream. A timeout of the backup responding to commit requests will result in the primary assuming that the backup has crashed and disabling protection. Similarly, a timeout of new checkpoints being transmitted from the primary will result in the backup assuming that the primary has crashed and resuming execution from the most recent checkpoint. Remus also has pipelined checkpoints since it uses an epoch-based system in which execution of the active VM is bounded by brief pauses in execution in which changed state is atomically captured, and external output is released when that state has been propagated to the backup. Lesson High availability is possible through virtual machine replication using existing software and running on commodity hardware. Remus performs frequent global checkpoints to replicate the state of a single speculatively executing virtual machine. Critique It comes with the price of introducing a small performance overhead due to the network buffering required to ensure consistent replication.