wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux Virtual Machine Process Scheduling

profile
Krishi Nagda
Aug 15, 2024
0 Likes
0 Discussions
66 Reads

In the Linux VServer virtual machine (VM) facility, the allocation of processor time to multiple VMs is managed using a Token Bucket Filter (TBF). This system ensures that each VM receives a fair share of processing resources, particularly in environments with single or multicore processors.


Fraction of Processor Allocation

Processor Allocation Formula: The ratio of token generation rate (R) to the time interval (T) determines the fraction of a single processor's capacity allocated to a VM: 

R/T = Fraction of processor allocation


Linux VServer Token Bucket Scheme

For example, in a system with four cores, if a VM is intended to use the equivalent of one full core, R is set to 1, and T is set to 4.  

Overall System Limitation: The total fraction of processor time allocated to all VMs should not exceed the available processing power. If there are N VMs, the sum of their allocations must satisfy


Setting Parameters: S and M 

  • S (bucket capacity) and M (minimum threshold) are parameters that regulate how a VM behaves after utilizing its burst time. 
  • Burst Time (B) and Hold Time (H): After using the processor for a specified burst time B, the VM incurs a hold time H where it cannot resume operation until enough tokens accumulate. 
  • The desired values of S and M can be calculated using the following formula:

M=W*H*R/T

S=W×B×(1−R/T) 

  • W represents the scheduler's frequency (decisions per second).


Example Calculation:

  • For a VM limited to 1/2 of the processor time, allowed to run for 30 seconds with a 5-second hold time, and with the scheduler running at 1,000 Hz: 

M=1,000×5×0.5=2,500 tokens 

S=1,000×30×(1−0.5)=15,000 tokens


Significance

These formulas and parameters allow for precise control over how much processor time a VM can use and how long it must wait before resuming after depleting its allocated tokens. This ensures fair resource distribution and prevents any VM from monopolizing the CPU. 


Conclusion 

The TBF mechanism in Linux VServer is critical for managing processor allocation in environments with multiple VMs. By carefully configuring the parameters R, T, S, and M, system administrators can control VM behavior during bursts of activity, ensuring that all VMs receive their fair share of CPU time without overwhelming the system. 


Comments ()


Sign in

Read Next

USES OF WHATSAPP

Blog banner

USPS mail

Blog banner

How return on investment is defined in IT services

Blog banner

A Weekend at Oak Tree Hotel: The Best Hotel Experience in Arcadia, Florida

Blog banner

Big Data Architecture

Blog banner

Virtual Memory

Blog banner

"Life as a Part-time Student"

Blog banner

MODERN OPERATING SYSTEM

Blog banner

SNAPCHAT

Blog banner

Trends that began during the pandemic

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

undefined

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Python as a tool for Data science task & project

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Virtual Machine

Blog banner

Paid Email

Blog banner

Windows Operating System

Blog banner

Network Security Risks

Blog banner

Evolution of operating systems

Blog banner

Creating Digitally Signed Document

Blog banner

Cache memory

Blog banner

Service Design Principles

Blog banner

Deadlock

Blog banner

Indian Culture and Tradition

Blog banner

Amazon

Blog banner

Shoulders

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

OS Assignment 1

Blog banner

File management

Blog banner

'Positivity in life'

Blog banner

Supervised and Unsupervised Learning

Blog banner

PODIO

Blog banner

Fitness

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Mumbai famous street food

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Data Lake

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Oracle Corporation

Blog banner

Security Issues and Countermeasures

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner