SlideShare a Scribd company logo
1 of 24
Experiments and analysis on Hypervisor-Based Fault Tolerance in Virtualized Environments P. Baglietto, M. Maresca,  M. Stecca CIPI - Computer Platform Research Center University of Genoa and Padua, Italy Munich, 11th October 2011 5th GI/ITG KuVS Fachgespräch on NG SDPs
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction (2/3) ,[object Object],Hypervisor Managed at Hypervisor level Hardware Against hardware failures Hardware Hardware VM VM The FT property refers to VMs VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM ,[object Object],[object Object],[object Object],VM VM = Not Protected = Protected VM VM VM VM VM VM VM VM VM VM VM VM VM VM
Introduction (3/3) ,[object Object],Common idea behind the “CloudPhone” (Intel) and the “Virtual Smartphone over IP” projects (NTT)    mobile devices should be supported by Server-Side platforms to compensate their limited on-board resources (e.g., CPU, memory, storage, battery energy, etc.)  Source: Mitsutaka Itoh et al., "Virtual Smartphone over IP", NTT Technical Review. Vol. 8 No. 7 July 2010.
The FT in the VMware system ,[object Object],[object Object],[object Object],[object Object],[object Object],* This is the difference respect of “VMware High Availability” Logging Link Hypervisor Hardware Hardware Hardware Hypervisor Hardware Hardware Hardware VM*  VM* VM VM VM VM VM VM VM VM VM VM*
Experiments Hardware Setup  Physical Hosts:  IBM Blade Center HS22 (2 Intel E5530 processors at 2,4 GHz, 32GB RAM) Hypervisor:  ESX (VMware vSphere) Guest OS:  Red Hat Enterprise Linux 5.4 64 bit  Sniffers:  both the Traffic Injector Sniffer TI_Sniffer and the Logging Sniffer Log_Sniffer run Wireshark (promiscuous mode)
Experiment #1 (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #1 (2/3) Original TCP SYN message captured by TI_Sniffer Original TCP SYN message captured by TI_Sniffer “ Forwarded” TCP SYN message captured by Log_Sniffer
Experiment #1 (3/3) ,[object Object],where ACK = “Real” ACK ACK* = Forwarded ACK (VM1    VM2) ACK** = “Log” ACK (VM2    VM1)
Experiment #2 (1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #2 (2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The transition from HOST_1 to HOST_2 happened  transparently C
Experiment #2 (3/4) ,[object Object],BUT…  What happened behind the scenes?
Experiment #2 (4/4) ,[object Object],[object Object]
Experiment #3 (1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #3 (2/2) ,[object Object],[object Object]
Experiment #4 (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #4 (2/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Experiment #4 (3/3) ,[object Object],[object Object]
Case Study (1/3) ,[object Object],[object Object]
Case Study (2/3) ,[object Object],[object Object],[object Object],[object Object]
Case Study (3/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],Latency Avg (µs) Throughput (Events/sec) Log. Traffic (KB/sec) FT On 82 15948870 761 FT Off 60 16187340 Not Applicable
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q&A ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Data Replication in Distributed System
Data Replication in  Distributed SystemData Replication in  Distributed System
Data Replication in Distributed SystemEhsan Hessami
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical ClocksDilum Bandara
 
Chapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationChapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationWayne Jones Jnr
 
Linux System Monitoring
Linux System Monitoring Linux System Monitoring
Linux System Monitoring PriyaTeli
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Andrea Tino
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K SinhaJawwad Rafiq
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2JOLLUSUDARSHANREDDY
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
resource management
  resource management  resource management
resource managementAshish Kumar
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed SystemsArsnet
 

What's hot (20)

Distributed System
Distributed SystemDistributed System
Distributed System
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Data Replication in Distributed System
Data Replication in  Distributed SystemData Replication in  Distributed System
Data Replication in Distributed System
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
 
Chapter 18 - Distributed Coordination
Chapter 18 - Distributed CoordinationChapter 18 - Distributed Coordination
Chapter 18 - Distributed Coordination
 
Linux System Monitoring
Linux System Monitoring Linux System Monitoring
Linux System Monitoring
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K Sinha
 
FlexSC
FlexSCFlexSC
FlexSC
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
 
6.Distributed Operating Systems
6.Distributed Operating Systems6.Distributed Operating Systems
6.Distributed Operating Systems
 
Chapter05 new
Chapter05 newChapter05 new
Chapter05 new
 
Distributed Operating System_2
Distributed Operating System_2Distributed Operating System_2
Distributed Operating System_2
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
resource management
  resource management  resource management
resource management
 
Distributed System
Distributed System Distributed System
Distributed System
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 

Viewers also liked

IEEE ICIN 2011
IEEE ICIN 2011IEEE ICIN 2011
IEEE ICIN 2011steccami
 
The Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian GehThe Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian Gehjimmystrein
 
Organisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceOrganisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceEJohnFawcett
 
Working in Korea
Working in KoreaWorking in Korea
Working in KoreaPaul Kim
 
Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Regina M Maxwell
 
Trip to kasargod travalogue
Trip to kasargod travalogueTrip to kasargod travalogue
Trip to kasargod travalogueKiran Thomas
 
REVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOREVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOMARIAETM
 
ชีววิทยา1
ชีววิทยา1ชีววิทยา1
ชีววิทยา1Darika Kanhala
 
Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...bdobler2
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scalasteccami
 
Andes Victory - welcome to a different perspective
Andes Victory -  welcome to a different perspectiveAndes Victory -  welcome to a different perspective
Andes Victory - welcome to a different perspectiveandesvictory
 

Viewers also liked (17)

IEEE ICIN 2011
IEEE ICIN 2011IEEE ICIN 2011
IEEE ICIN 2011
 
The Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian GehThe Apparent Complete Response- Ian Geh
The Apparent Complete Response- Ian Geh
 
K14 strategi perubahan pendidikan
K14 strategi perubahan pendidikanK14 strategi perubahan pendidikan
K14 strategi perubahan pendidikan
 
Organisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilienceOrganisational and cultural factors that promote resilience
Organisational and cultural factors that promote resilience
 
Working in Korea
Working in KoreaWorking in Korea
Working in Korea
 
Food
FoodFood
Food
 
Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015Biotech Bulletin -Fall 2015
Biotech Bulletin -Fall 2015
 
Trip to kasargod travalogue
Trip to kasargod travalogueTrip to kasargod travalogue
Trip to kasargod travalogue
 
REVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIOREVISTA PEDAGOGIA 3ER MILENIO
REVISTA PEDAGOGIA 3ER MILENIO
 
Utilidades
UtilidadesUtilidades
Utilidades
 
ชีววิทยา1
ชีววิทยา1ชีววิทยา1
ชีววิทยา1
 
Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...Finding, Evaluating, Understanding, and Using Information: Information Litera...
Finding, Evaluating, Understanding, and Using Information: Information Litera...
 
111
111111
111
 
Geo photo
Geo photoGeo photo
Geo photo
 
Limpeza
LimpezaLimpeza
Limpeza
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scala
 
Andes Victory - welcome to a different perspective
Andes Victory -  welcome to a different perspectiveAndes Victory -  welcome to a different perspective
Andes Victory - welcome to a different perspective
 

Similar to 5th KuVS Meeting

Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
RTOS implementation
RTOS implementationRTOS implementation
RTOS implementationRajan Kumar
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05Rajesh Gupta
 
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...ijceronline
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project PresentationAndrew McGarry
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middlewaresanjoysanyal
 
Open Source Software Tools for Synchrophasor Applications
Open Source Software Tools for  Synchrophasor ApplicationsOpen Source Software Tools for  Synchrophasor Applications
Open Source Software Tools for Synchrophasor ApplicationsLuigi Vanfretti
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...eSAT Journals
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersIRJET Journal
 
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialPowering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialBenjamin Cabé
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Peter R. Egli
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 

Similar to 5th KuVS Meeting (20)

Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
RTOS implementation
RTOS implementationRTOS implementation
RTOS implementation
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05
 
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
Efficient Resource Allocation to Virtual Machine in Cloud Computing Using an ...
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 
NTP Project Presentation
NTP Project PresentationNTP Project Presentation
NTP Project Presentation
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 
13 tm adv
13 tm adv13 tm adv
13 tm adv
 
Open Source Software Tools for Synchrophasor Applications
Open Source Software Tools for  Synchrophasor ApplicationsOpen Source Software Tools for  Synchrophasor Applications
Open Source Software Tools for Synchrophasor Applications
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorialPowering your next IoT application with MQTT - JavaOne 2014 tutorial
Powering your next IoT application with MQTT - JavaOne 2014 tutorial
 
Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)Sun RPC (Remote Procedure Call)
Sun RPC (Remote Procedure Call)
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 

More from steccami

Programmazione Dinamica.pdf
Programmazione Dinamica.pdfProgrammazione Dinamica.pdf
Programmazione Dinamica.pdfsteccami
 
From hadoop to spark
From hadoop to sparkFrom hadoop to spark
From hadoop to sparksteccami
 
Industry4.0
Industry4.0Industry4.0
Industry4.0steccami
 
Internet Exchange Point
Internet Exchange PointInternet Exchange Point
Internet Exchange Pointsteccami
 
Storia del Teorema dei 4 colori
Storia del Teorema dei 4 coloriStoria del Teorema dei 4 colori
Storia del Teorema dei 4 coloristeccami
 
Contact tracing
Contact tracingContact tracing
Contact tracingsteccami
 
Introduzione al Machine Learning
Introduzione al Machine LearningIntroduzione al Machine Learning
Introduzione al Machine Learningsteccami
 
Sap forum 2015 Milan
Sap forum 2015 MilanSap forum 2015 Milan
Sap forum 2015 Milansteccami
 
SpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSISpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSIsteccami
 
Smart City application
Smart City applicationSmart City application
Smart City applicationsteccami
 
iCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3SiCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3Ssteccami
 
Cloud Google App Engine Paas
Cloud   Google App Engine PaasCloud   Google App Engine Paas
Cloud Google App Engine Paassteccami
 
Cloud Amazon IaaS aws
Cloud  Amazon IaaS awsCloud  Amazon IaaS aws
Cloud Amazon IaaS awssteccami
 
Introduzione Cloud Computing
Introduzione Cloud ComputingIntroduzione Cloud Computing
Introduzione Cloud Computingsteccami
 
Mashup2010
Mashup2010Mashup2010
Mashup2010steccami
 
Cloud 2010
Cloud 2010Cloud 2010
Cloud 2010steccami
 

More from steccami (20)

Programmazione Dinamica.pdf
Programmazione Dinamica.pdfProgrammazione Dinamica.pdf
Programmazione Dinamica.pdf
 
From hadoop to spark
From hadoop to sparkFrom hadoop to spark
From hadoop to spark
 
Industry4.0
Industry4.0Industry4.0
Industry4.0
 
Internet Exchange Point
Internet Exchange PointInternet Exchange Point
Internet Exchange Point
 
Storia del Teorema dei 4 colori
Storia del Teorema dei 4 coloriStoria del Teorema dei 4 colori
Storia del Teorema dei 4 colori
 
Contact tracing
Contact tracingContact tracing
Contact tracing
 
Introduzione al Machine Learning
Introduzione al Machine LearningIntroduzione al Machine Learning
Introduzione al Machine Learning
 
Sap forum 2015 Milan
Sap forum 2015 MilanSap forum 2015 Milan
Sap forum 2015 Milan
 
SpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSISpreadSheetSpace seminar at ICSI
SpreadSheetSpace seminar at ICSI
 
Smart City application
Smart City applicationSmart City application
Smart City application
 
iCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3SiCore Smart Transportation use case CRF M3S
iCore Smart Transportation use case CRF M3S
 
Icin2013
Icin2013Icin2013
Icin2013
 
Icin2012
Icin2012Icin2012
Icin2012
 
Cloud Google App Engine Paas
Cloud   Google App Engine PaasCloud   Google App Engine Paas
Cloud Google App Engine Paas
 
Cloud Amazon IaaS aws
Cloud  Amazon IaaS awsCloud  Amazon IaaS aws
Cloud Amazon IaaS aws
 
Introduzione Cloud Computing
Introduzione Cloud ComputingIntroduzione Cloud Computing
Introduzione Cloud Computing
 
Mashup2010
Mashup2010Mashup2010
Mashup2010
 
Webx 2010
Webx 2010Webx 2010
Webx 2010
 
iiwas2009
iiwas2009iiwas2009
iiwas2009
 
Cloud 2010
Cloud 2010Cloud 2010
Cloud 2010
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

5th KuVS Meeting

  • 1. Experiments and analysis on Hypervisor-Based Fault Tolerance in Virtualized Environments P. Baglietto, M. Maresca, M. Stecca CIPI - Computer Platform Research Center University of Genoa and Padua, Italy Munich, 11th October 2011 5th GI/ITG KuVS Fachgespräch on NG SDPs
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Experiments Hardware Setup Physical Hosts: IBM Blade Center HS22 (2 Intel E5530 processors at 2,4 GHz, 32GB RAM) Hypervisor: ESX (VMware vSphere) Guest OS: Red Hat Enterprise Linux 5.4 64 bit Sniffers: both the Traffic Injector Sniffer TI_Sniffer and the Logging Sniffer Log_Sniffer run Wireshark (promiscuous mode)
  • 8.
  • 9. Experiment #1 (2/3) Original TCP SYN message captured by TI_Sniffer Original TCP SYN message captured by TI_Sniffer “ Forwarded” TCP SYN message captured by Log_Sniffer
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.