Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Microsoft cracks live migration problem

Sep 16, 2011 | ITNews.com

With the next release of Windows Server operating system, Microsoft has conquered one of the thorniest problems in virtualization: moving an operational virtual machine (VM) across a wide area network (WAN).

Microsoft unveiled this new feature at the Microsoft BUILD conference, being held this week in Anaheim, California. It will be available in Microsoft's Hyper-V version 3 hypervisor, included in Microsoft's next server operating system, Windows Server 8.

The capability, while viable in only a handful of use cases, nonetheless shows Microsoft's growing expertise in virtualization, analysts said.

With live migration, a working VM is moved from one computer to another without any disruption of the services offered by applications within the VM.

Most server virtualization software providers, including Microsoft, have long offered live migration within a local network. A far harder problem has been to offer the ability to move a live VM across different subnets, or separate WAN sub-networks. Network latencies and network addressing complexities have made this task a challenging one.

At the BUILD conference, Microsoft program manager Ross Ortega explained how the new technology worked. Essentially, each virtual machine gets two IP (Internet Protocol) addresses.

One address is the home address for the VM itself, which it uses to communicate with the rest of the network or, if accessed publicly, the Internet. The second IP address will be available for the local data center.

"The trick is to keep these mappings between the two address spaces," said Bill Laing, Microsoft corporate vice president for the server and cloud division, in a subsequent interview.

Microsoft is not alone in offering this capability. VMware, in its VXLAN offering, also offers the ability. This solution, however, requires Cisco networking gear using the Overlay Transport Virtualization (OTV) technology.

Long-distance live migration has been a research topic in the virtualization community for several years, though it is useful only in a limited number of situations, said Chris Wolf, a Gartner research vice president covering virtualization.

Replicating a VM memory state over long distances can take a considerable amount of time, Wolf noted. It could be handy for emergency situations, such as when a data center is threatened by an upcoming flood or hurricane, and its contents must be moved to another facility. But, given the sizes of most data center-run systems, it is likely that only a handful of VMs would be moved in time.

During another presentation at BUILD, Brian Dewey, Microsoft group program manager for Hyper-V noted one way around this problem. Administrators could also save VMs on thumb drives or optical disks, and then ship them to the new location, where the VMs could then be incrementally updated with the latest changes.

Another possible application of the technology would be in permanently migrating systems from one data center to the next without incurring any downtime, Wolf said. Such work would be necessary in data center consolidation projects, for instance.

Beyond the practical uses, the new capability carries symbolic importance for the company as well, Wolf said. It shows Microsoft is knowledgeable enough with this emerging technology to stay on the frontier of its developments.

The technology "marks a point where Microsoft will ship the first real formidable challenger to VMware vSphere," Wolf said.

At BUILD, Microsoft touted a number of other new features to make Hyper-V and Windows Server more competitive with VMware as well. The company debuted the ability to do live migration of the VM's virtual hard disk. Scalability was also touted: the new software will able to support up to 32 virtual processors for each VM, and each VM can now appropriate 512 GB of memory. A new virtual file system, VHDX, can be used to create virtual storage disks up to 16 TB in size.

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/