Abstract
Virtual machines can have many different deployment scenarios and therefore may require generation of multiple VM images. OS Farm is a service that aims to provide VM images that are tailored and generated on the fly. In order to optimize generation of images, a layered copy-on-write image structure is used, and an image cache ensures that identical images are not regenerated.
Images can be several hundreds of megabytes large and thus can congest the network and delay their transfer. Content-Based Transfer is a technique which transfers only the difference between the source image and existing target client image data. We present an implementation which achieves an observed bandwidth close to the theoretical maximum and a significant reduction in network congestion.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
About EGEE, http://public.eu-egee.org/intro/
Worldwide LHC Computing Grid, http://lcg.web.cern.ch/LCG/
European Organization for Nuclear Research, http://public.web.cern.ch/public/
Scientific Linux CERN, http://linux.web.cern.ch/linux/
Debian home page, http://www.debian.org/
Ubuntu home page, http://www.ubuntu.com/
CentOS home page, http://www.centos.org/
Fedora home page, http://fedoraproject.org/
RPM home page, http://www.rpm.org/
Yum home page, http://linux.duke.edu/projects/yum/
Saputzakis, C., et al.: Virtual Appliances for Deploying and Maintaining Software. In: Proceedings of LISA 2003 (2003)
Wikipedia article on AJAX, http://en.wikipedia.org/wiki/AJAX
LVM2 Resource Page, http://sources.redhat.com/lvm2/
Bovet, D.P., Cesati, M.: Understanding the Linux Kernel, pp. 574–607. O’Reilly, Sebastopol (2003)
Tolia, N., et al.: Using Content Addressing to Transfer Virtual Machine State (2002), http://www.intel-research.net/Publications/Pittsburgh/050520030704_127.pdf
Tolia, N., et al.: Opportunistic Use of Content Addressable Storage for Distributed File Systems. In: Proceedings of USENIX 2003 (2003)
Nath, P., et al.: Design Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual Machines. In: Proceedings of USENIX 2006 (2006)
Mikle, O.: Practical Attacks on Digital Signatures Using MD5 Message Digest, Cryptology ePrint Archive: Report 2004/356 (2004)
rPath home page, http://www.rpath.com/
Bradshaw, R., et al.: A Scalable Approach To Deploying And Managing Appliances. In: TeraGrid 2007, Madison, WI (June 2007)
Rsync home page, http://samba.anu.edu.au/rsync/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bjerke, H.K.F., Shiyachki, D., Unterkircher, A., Habib, I. (2009). Tools and Techniques for Managing Virtual Machine Images. In: César, E., et al. Euro-Par 2008 Workshops - Parallel Processing. Euro-Par 2008. Lecture Notes in Computer Science, vol 5415. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00955-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-00955-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00954-9
Online ISBN: 978-3-642-00955-6
eBook Packages: Computer ScienceComputer Science (R0)