Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Spotlight

Tyler Technologies

Tyler Technologies is proud to be an equal opportunity employer. All qualified applicants will receive consideration without regard to race, creed, gender/sex, marital status, sexual orientation, citizenship status, color, religion, national origin, age, disability, veteran status, or any other status protected under local, state or federal laws.

OTHER WHITEPAPERS
news image

Virtualization Management with SUSE Manager

whitePaper | November 10, 2019

Virtualization is the means by which IT administrators create virtual resources, such as hardware platforms, storage devices, network resources and more. There are quite a few tools that enable the creation of virtual resources (such as Xen and KVM), but what about the management of those tools? That’s where SUSE Manager comes in. The current iteration of SUSE Manager enables an admin to work with VMs via the following feature set.

Read More
news image

VMware TCO Comparison Calculator

whitePaper | March 11, 2020

Definitions and Objectives In evaluating the cost of a virtualization and private cloud solution, it is essential to use a metric that not only accounts for the cost to acquire the software and the physical infrastructure it requires, but also includes the time and effort needed to operate the solution. Because centralized management is a fundamental component of any virtualization and private cloud deployment, hardware and software costs associated with related management products.

Read More
news image

Independent DeltaV™ Domain Controller

whitePaper | October 3, 2022

Active Directory was introduced by Microsoft with the release of the Windows 2000 Server Operating System (O/S). DeltaV systems work in conjunction with specific Active Directory features to provide a more secure and manageable production environment. Windows domains provide centralized user accounts and groups, and combined with Windows forests you also get administration, redundancy, and scalability as part of the computers network environment. This whitepaper provides details about the Independent DeltaV Domain Controller (IDDC) functionality introduced in DeltaV version 14.LTS. This whitepaper assumes that you understand the concept of Windows domains and forests.

Read More
news image

Wi-Fi 6E and Future-Proofing Wireless Infrastructure

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

Zone-ECU Virtualization Solution Platform

whitePaper | May 26, 2022

The high complexity of future vehicle systems will need to move away from today’s distributed automotive E/E architecture towards a more centralized E/E structure based on less but much more powerful ECUs, instead of many individual control entities

Read More
news image

Achieving pervasive security above and below the OS

whitePaper | October 3, 2022

Keeping business data secure is a challenging task, complicated by the proliferation of endpoints operating outside of the organizational network and the constant evolution of threat vectors

Read More

Spotlight

Tyler Technologies

Tyler Technologies is proud to be an equal opportunity employer. All qualified applicants will receive consideration without regard to race, creed, gender/sex, marital status, sexual orientation, citizenship status, color, religion, national origin, age, disability, veteran status, or any other status protected under local, state or federal laws.

Events