Hot and Cold Migrations Last Updated : 10 Aug, 2020 Comments Improve Suggest changes 1 Likes Like Report 1. Cold Migration : A powered down Virtual Machine is carried to separate host or data store. Virtual Machine's power state is OFF and there is no need of common shared storage. There is a lack of CPU check and there is long shortage time. Log files and configuration files are migrated from the source host to the destination host. The first host’s Virtual Machine is shut down and again started on next host. Applications and OS are terminated on Virtual Machines before moving them to physical devices. User is given choice of movement of disks associated from one data store to another one. 2. Hot Migrations : A powered on Virtual Machine is moved from one physical host to another physical host. A source host state is cloned to destination host and then that source host state is discarded. Complete state is shifted to the destination host. Network is moved to destination Virtual Machine. A common shared storage is needed and CPU checks are put into use. Shortage time is very little. Without stoppage of OS or applications, they are shifted from Virtual Machines to physical machines. The physical server is freed for maintenance purposes and workloads (which are among physical servers) are dynamically balanced so as to run at optimized levels. Downtime of clients is easily avoidable. Suspend first host’s Virtual Machine and then clone it across registers of CPU and RAM and again resume some time later on second host. This migration runs when source system is operative. Stage-0: Is Pre-Migration stage having functional Virtual Machine on primary host. Stage-1: Is Reservation stage initializing container on destination host. Stage-2: Is Iterative pre-copy stage where shadow paging is enabled and all dirty pages are cloned in succession rounds. Stage-3: Is Stop and copy where first host’s Virtual Machine is suspended and all remaining Virtual Machine state are synchronized on second host. Stage-4: Is Commitment where there is minimization of Virtual Machine state on first host. Stage-5: Is Activation stage where second host’s Virtual Machine start and establishes connection to all local computers resuming all normal activities. Comment S shubhikagarg1999 Follow 1 Improve S shubhikagarg1999 Follow 1 Improve Article Tags : Computer Networks Cloud-Computing Explore Computer Network BasicsBasics of Computer Networking4 min readTypes of Computer Networks6 min readIntroduction to Internet10 min readNetwork Devices3 min readWhat is OSI Model? - Layers of OSI Model11 min readTCP/IP Model6 min readDifference Between OSI Model and TCP/IP Model2 min readPhysical LayerPhysical Layer in OSI Model3 min readTypes of Network Topology9 min readTransmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)3 min readTransmission Media in Computer Networks7 min readData Link LayerData Link Layer in OSI Model4 min readSwitching | Computer Networks2 min readVirtual LAN (VLAN)3 min readFraming in Data Link Layer3 min readError Control in Data Link Layer3 min readFlow Control4 min readPiggybacking in Computer Networks2 min readNetwork LayerNetwork Layer in OSI Model3 min readIntroduction of Classful IP Addressing7 min readClassless Addressing in IP Addressing7 min readWhat is an IP Address?11 min readIPv4 Datagram Header4 min readDifference Between IPv4 and IPv63 min readPublic and Private IP addresses4 min readIntroduction To Subnetting5 min readWhat is Routing?10 min readNetwork Layer Protocols9 min readTransport LayerTransport Layer in OSI Model4 min readTransport Layer Protocols9 min readTransmission Control Protocol - TCP4 min readUser Datagram Protocol - UDP3 min readSession Layer & Presentation LayerSession Layer in OSI model2 min readPresentation Layer in OSI model2 min readSecure Socket Layer (SSL)4 min readPoint-to-Point Tunneling Protocol - PPTP2 min readMultipurpose Internet Mail Extension (MIME) Protocol3 min readApplication LayerApplication Layer in OSI Model4 min readClient-Server Model3 min readWorld Wide Web (WWW)6 min readIntroduction to Electronic Mail4 min readWhat is a Content Distribution Network and how does it work?4 min readProtocols in Application Layer4 min readAdvanced TopicsWhat is Network Security?7 min readQuality of Service and Multimedia5 min readAuthentication in Computer Network3 min readEncryption, Its Algorithms And Its Future6 min readIntroduction of Firewall in Computer Network3 min readMAC Filtering in Computer Network3 min readWi-Fi Standards Explained2 min readWhat is Bluetooth?6 min readGenerations of wireless communication2 min readCloud Networking4 min readPracticeTop 50 Plus Networking Interview Questions and Answers for 202415+ min readTop 50 TCP/IP Interview Questions and Answers 202515+ min readNetwork Fundamentals Interview Questions - Computer Networks15+ min readLast Minute Notes for Computer Networks14 min readComputer Network - Cheat Sheet15+ min read Like