0% found this document useful (0 votes)
19 views19 pages

Wa0000.

This document covers Unit 2 of a Cloud Computing syllabus, focusing on Virtual Machines (VM) provisioning and migration services. It details the lifecycle of VMs, the steps involved in provisioning, various migration techniques, and examples of live migration using tools like ConVirt and Xen. Additionally, it discusses cloud provisioning types and frameworks for context provisioning in cloud environments.

Uploaded by

adityayevates
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views19 pages

Wa0000.

This document covers Unit 2 of a Cloud Computing syllabus, focusing on Virtual Machines (VM) provisioning and migration services. It details the lifecycle of VMs, the steps involved in provisioning, various migration techniques, and examples of live migration using tools like ConVirt and Xen. Additionally, it discusses cloud provisioning types and frameworks for context provisioning in cloud environments.

Uploaded by

adityayevates
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

lOMoARcPSD|53594808

UNIT-2-CC - Cloud Computing Unit no. 2 As per the Solapur


University Syllabus.
Computer Science and Engineering (University of Solapur)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Aditya Yevate (adityayevates@gmail.com)
lOMoARcPSD|53594808

UNIT – II
Unit 2: Virtual Machines Provisioning and Migration Services
Virtual Machines Provisioning and Manageability, Virtual Machine Migration Services,
VM Provisioning and Migration in Action, Provisioning in the Cloud Context.

2.1 VIRTUAL MACHINES PROVISIONING AND MANAGEABILITY


The typical life cycle of VM and its major possible states of operation, which
make the management and automation of VMs in virtual and cloud environments
easier than in traditional computing environments.
As shown in the diagram below the cycle starts by a request delivered to the IT
department, stating the requirement for creating a new server for a particular
service. This request is being processed by the IT administration to start seeing
the servers’ resource pool, matching these resources with the requirements, and
starting the provision of the needed virtual machine. Once it is provisioned and
started, it is ready to provide the required service according to an SLA, or a time
period after which the virtual is being released; and free resources, in this case,
won’t be needed.

Fig.1 Life cycle of VM

Prof. Taur A.R.


(CSE Dept.) 1

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

VM Provisioning Process:
Typical life cycle of VM and its major possible states of operation, which make
the management and automation of VMs in virtual and cloud environments easier
Process & Steps to Provision VM. Here, we describe the common and normal
steps of provisioning a virtual server:

1. Firstly, you need to select a server from a pool of available servers


(physical servers with enough capacity) along with the appropriate
OS template you need to provision the virtual machine.

2. Secondly, you need to load the appropriate software (operating


system you selected in the previous step, device drivers, middleware,
and the needed applications for the service required).
3. Thirdly, you need to customize and configure the machine (e.g., IP
address, Gateway) to configure an associated network and storage
resources.

4. Finally, the virtual server is ready to start with its newly loaded
software. Typically, these are the tasks required or being performed
by an IT or a data center’s specialist to provision a particular virtual
machine.

Virtual machines can be provisioned by manually installing an operating system, by using a


preconfigured VM template, by cloning an existing VM, or by importing a physical server
or a virtual server from another hosting platform. Physical servers can also be virtualized
and provisioned using P2V (physical to virtual) tools and techniques(e.g.,virt-p2v).

After creating a virtual machine by virtualizing a physical server, or by


building a new virtual server in the virtual environment, a template can be
created out of it. Most virtualization management vendors (VMware, XenServer,
etc.) provide the data center’s administration with the ability to do such tasks in
an easy way.

Provisioning from a template is an invaluable feature, because it reduces the time

Prof. Taur A.R.


(CSE Dept.) 2

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

required to create a new virtual machine. Administrators can create different


templates for different purposes. For example, you can create a Windows 2003
Server template for the finance department, or a Red Hat Linux template for the
engineering department.

Fig.2 Virtual Machine provisioning process

This enables the administrator to quickly provision a correctly configured virtual server on
demand. This ease and flexibility bring with them the problem of virtual machine’s sprawl,
where virtual machines are provisioned so rapidly that documenting and managing the
virtual machine’s life cycle become a challenge.

2.2 VIRTUAL MACHINE MIGRATION SERVICES


Migration service, in the context of virtual machines, is the process of moving a
virtual machine from one host server or storage location to another; there are
different techniques of VM migration, hot/life migration, cold/regular migration,
and live storage migration of a virtual machine. In this process, all key machine
components, such as CPU, storage disks, networking, and memory, are
completely virtualized, thereby facilitating the entire state of a virtual machine to
be captured by a set of easily moved data files. Here are some of the migration’s
techniques that most virtualization tools provide as a feature.

Migrations Techniques

1) Live Migration and High Availability.


Live migration (which is also called hot or real-time migration) can be
defined as the movement of a virtual machine from one physical host to
another while being powered on.

Prof. Taur A.R.


(CSE Dept.) 3

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

When it is properly carried out, this process takes place without any noticeable effect
from the end user’s point of view (a matter of milliseconds). One of the most significant
advantages of live migration is the fact that it facilitates proactive maintenance in case
of failure, because the potential problem can be resolved before the disruption of
service occurs. Live migration can also be used for load balancing in which work is
shared among computers in order to optimize the utilization of available CPU
resources.

2) Live Migration Anatomy, Xen Hypervisor Algorithm.

In this section we will explain live migration’s mechanism and how memory and
virtual machine states are being transferred, through the network, from one host A to
another host B, the Xen hypervisor is an example for this mechanism. The logical steps
that are executed when migrating an OS are summarized in the diagram below In this
research, the migration process has been viewed as a transactional interaction between
the two hosts involved

Fig. 3 Live Migration Timeline

Prof. Taur A.R.


(CSE Dept.) 4

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

Stage-0: Pre-Migration. An active virtual machine exists on the physical host A.

Stage-1: Reservation. A request is issued to migrate an OS from host A to host B (a


precondition is that the necessary resources exist on B and a VM container of that size)

Stage-2: Pre-Copy Phase:- At this stage, the VM continuously run, and its memory is
copied page wise from the source to the target host. It starts with transferring all active
memory pages.

Fig. 4 Timeline for Post-copy and Pre-copy

Prof. Taur A.R.


(CSE Dept.) 5

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

Fig. 5 Pre-copy Migration Technique

Stage-3: Stop-and-Copy: - In this, the VM will be stopped in source and the remaining dirty
pages will be copied to the destination and VM will be resumed in destination. Running OS
instance at A is suspended, and its network traffic is redirected to B. As described in fig.3,
CPU state and remaining inconsistent memory pages are then transferred. At the end of this
stage, there is a consistent suspended copy of the VM at both A and B. The copy at A is
considered primary and is resumed in case of failure.

Stage-4: Commitment. Host B indicates to A that is has successfully received a consistent


OS image. Host A acknowledges this message as a commitment of migration transaction.

Stage-5: Activation. The migrated VM on B is now activated. Post-migration code runs to


reattach the device’s drivers to the new machine and advertise moved IP addresses.

This approach to failure management ensures that at least on host has a consistent VM
image at all times during migration:

a) Original host remains stable until migration commits and that the VM may be suspended

Prof. Taur A.R.


(CSE Dept.) 6

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

and resumed on that host with no risk of failure.

b) A migration request essentially attempts to move the VM to a new host and on any sort of
failure; execution is resumed locally, aborting the migration.

3) Live Storage Migration of Virtual Machine.

This kind of migration constitutes moving the virtual disks or configuration file of a
running virtual machine to a new data store without any interruption in the availability
of the virtual machine’s service.

4) Migration of Virtual Machines to Alternate Platforms

One of the nicest advantages of having facility in data center’s technologies is to have
the ability to migrate virtual machines from one platform to another. There are a
number of ways for achieving this, such as depending on the source and target
virtualization’s platforms and on the vendor’s tools that manage this facility—for
example, the VMware converter that handles migrations between ESX hosts; the
VMware server; and the VMware workstation. The VMware converter can also import
from other virtualization platforms, such as Microsoft virtual server machines.

5) Live Migration Vendor Implementations Example

There are lots of VM management and provisioning tools that provide the live
migration of VM facility, two of which are VMware VMotion and Citrix XenServer
―XenMotion‖.

VMware VMotion: a) Automatically optimize and allocate an entire pool of resources


for maximum hardware utilization, flexibility, and availability. b) Perform hardware’s
maintenance without scheduled downtime along with migrating virtual machines away
from failing or underperforming servers.

Citrix XenServer ―XenMotion‖: Based on Xen live migrate utility, it provides the IT
Administrator the facility to move a running VM from one XenServer to another in the
same pool without interrupting the service (hypothetically zero – downtime server
maintenance), making it a highly available service and also good feature to balance
workloads on the virtualized environments.

6) Live migration effect on a running web server


Prof. Taur A.R.
(CSE Dept.) 7

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

- A highly loaded server can be migrated with both controlled impact on live services
and a short downtime

i) The working set of the server is rather small

ii) A relatively easy case of live migration

- Migration on an Apache 1.3 web server, this served static content at high rate.

- Web server VM with 800 MB memory size, which serves 512 KB file to 100
customers.

- Initial Start achieve throughput approx. 870 Mbit/ sec.

- At this stage algorithm applied.

2.3 VM Provisioning and Migration in Action

In this topic we see some business with a real example of how we can manage the life cycle,
provision, and migrate a virtual machine by the help of one of the open source frameworks
used to manage virtualized infrastructure.

1) Example for Live Migration of VM Using ConVirt:-

Here, we will use ConVirt (open source framework for the management of open source
virtualization like Xen and KVM known previously as XenMan).

Deployment Scenario: ConVirt deployment consists of at least one ConVirt


workstation, where ConVirt is installed and ran, which provides the main console for
managing the VM life cycle, managing images, provisioning new VMs, monitoring
machine resources, and so on.

There are two essential deployment scenarios for ConVirt:

1. Basic configuration in which the Xen or KVM virtualization platform is on the local
machine, where ConVirt is already installed.

2. An advanced configuration in which the Xen or KVM is on one or more remote


servers. The scenario in use here is the advanced one. In data centers, it is very common
to install centralized management software (ConVirt here) on a dedicated machine for
use in managing remote servers in the data center.

Prof. Taur A.R.


(CSE Dept.) 8

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

In our example, we will use this dedicated machine where ConVirt is installed and used
to manage a pool of remote servers (two machines). In order to use advanced features
of ConVirt (e.g., live migration), you should set up a shared storage for the server pool
in use on which the disks of the provisioned virtual machines are stored.

Fig. 6: ConVirt deployment Scenario

2) Example for Live Migration of VM Using Xen:-

Xen as a VMM or hypervisor, allows multiple commodity OS to share x86 hardware in a


safe and orderly fashion. The following example explains how to perform live migration of
a VM between two Xen-enabled host machines. Domain 0 (or Dom0) performs tasks to
create, terminate, or migrate to another host. Xen uses a send/recv model to transfer states
across VMs.

Xen supports live migration. It is a useful feature and natural extension to virtualization
platforms that allows for the transfer of a VM from one physical machine to another with
little or no downtime of the services hosted by the VM. Live migration transfers the working
state and memory of a VM across a network when it is running. Xen also supports VM
migration by using a mechanism called Remote Direct Memory Access (RDMA).

RDMA speeds up VM migration by avoiding TCP/IP stack processing overhead. RDMA


implements a different transfer protocol whose origin and destination VM buffers must be
registered before any transfer operations occur, reducing it to a ―one-sided‖ interface. Data
communication over RDMA does not need to involve the CPU, caches, or context switches.

Prof. Taur A.R.


(CSE Dept.) 9

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

This allows migration to be carried out with minimal impact on guest operating systems and
hosted applications. Fig.7 shows the a compression scheme for VM migration.

Fig. 7: Live migration of VM from the Dom0 domain to a Xen-enabled target host

The structure of this live migration system is presented in Dom0. Migration daemons
running in the management VMs are responsible for performing migration. Shadow page
tables in the VMM layer trace modifications to the memory page in migrated VMs during
the precopy phase.

2.4 Provisioning in the Cloud Context

Cloud provisioning is the allocation of a cloud provider's resources and services to a


customer.

Cloud provisioning is a key feature of the cloud computing model, relating to how a
customer access cloud services and resources from a cloud provider.

The growing of this cloud computing technology of cloud services that customers can
provision includes infrastructure as a service (IaaS), software as a service (SaaS) and
platform as a service (PaaS) in public or private cloud environments.

Types of Cloud Provisioning:

1) Network Provisioning: Network Provisioning in the telecom industry is a means of


referring to the provisions of telecommunications services to a client.

Prof. Taur A.R.


(CSE Dept.) 10

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

2) Server Provisioning: Datacenter’s physical infrastructure, installation, configuration


of the software, and linking it to middleware, networks, and storage.

3) User Provisioning: It is a method of identity management that helps us in keeping a


check on the access and privileges of authorization. Provisioning is featured by the
artifacts such as equipment, suppliers, etc.

4) Service Provisioning: It requires setting up a service and handling its related data.

A FRAMEWORK FOR CLOUD-BASED CONTEXT PROVISIONING:-

In every business with a delivery/consumption model, brokers emerge to mediate between


consumers and providers. This could be the case for context delivery. Fig. 1 depicts our
framework for context information provisioning. The main components of the framework
are: Context-aware Web services (context consumers), Context Brokers, and Cloud-based
Context Services. Multiple context brokers may be deployed, one for each local domain for
instance. A discovery service will allow context-aware consumers to bind to the right
context broker.

Fig. 8: Framework for Cloud-based Context Provisioning


Prof. Taur A.R.
(CSE Dept.) 11

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

1) Context Brokers:

A context broker is a mediator service that decouples context consumers from context
services. It is in charge of handling subscriptions of context consumers in which they
express their interest to receive context information, and registration of context services.
Context services may then publish their newly acquired context information to the context
broker, which notifies context consumers about that newly acquired context information.
Context brokers can also be deployed on the cloud.

2) Context services:

Typically residing in different clouds, deliver context information to context consumers with
various quality-of-context and quality-of-service (QoS). Therefore, the Context Broker is in
charge of selecting appropriate context services to deliver context information to which a
context consumer has subscribed. Context information may be delivered to the same
consumer by several context services.

3) Context-aware Web services (CAWS):

Context-aware Web services (CAWS) are the consumers of context information obtained
from the cloud-based context services. A CAWS is a Web service that can understand
situational context and can adapt its behavior according the changing circumstances as
context data may change rapidly. It produces dynamic results according to the 5 WH
questions: who, where, when, what, and why it was invoked. A CAWS can be responsive to
various situational circumstances, such as:

 The identity of the client who invoked the service, whether it is a person, or another
Web service.

 The location of the client.

 The time at which the client invokes the service.

 The activity that the client is carrying out at the time it invokes the service.

 The preferences that the client may have defined prior to invoking the service.

 The security and privacy policies associated with the client of this service.

 The device (laptop, PDA, smartphone, etc.) that the client is using to invoke the
Prof. Taur A.R.
(CSE Dept.) 12

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

service.

Cloud provisioning tools and software:

1) AWS CloudFormation

2) Microsoft Azure Resource Manager

3) Google Cloud Deployment Manager

4) IBM Cloud Orchestrator

5) CloudBolt

6) Snow Commander

7) Morpheus Data

8) Flexera

9) CloudSphere

10) Scalr

11) Eucalyptus

12) Open-Nebula

Eucalyptus:

 Eucalyptus is a system for implementing on-premise private and hybrid clouds using
the hardware and software’s infrastructure, which is in place without modification.

 The current interface to Eucalyptus is compatible with Amazon’s EC2, S3, and EBS
interfaces, but the infrastructure is designed to support multiple client-side
interfaces.

 Eucalyptus is implemented using commonly available Linux tools and basic Web
service’s technologies.

 Eucalyptus adds capabilities, such as end-user customization, self service


provisioning, and legacy application support to data center’s virtualization’s
features, making the IT customer’s service easier.

 Eucalyptus aims at fostering the research in models for service’s provisioning,


scheduling, SLA formulation, and hypervisors’ portability.
Prof. Taur A.R.
(CSE Dept.) 13

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

Open-Nebula:

 OpenNebula is a virtual infrastructure manager that orchestrates storage, network,


and virtualization technologies to enable the dynamic placement of multi-tier
services on distributed infrastructures, combining both data center’s resources and
remote cloud’s resources according to allocation’s policies.
 OpenNebula provides internal cloud administration and user’s interfaces for the full
management of the cloud’s platform.
 OpenNebula is an open and flexible tool that fits into existing data center’s
environments to build any type of cloud deployment.
 OpenNebula can be primarily used as a virtualization tool to manage your virtual
infrastructure, which is usually referred to as private cloud.
 OpenNebula supports a hybrid cloud to combine local infrastructure with public
cloud-based infrastructure, enabling highly scalable hosting environments.
 OpenNebula also supports public clouds by providing cloud’s interfaces to expose
its functionality for virtual machine, storage, and network management.
 OpenNebula is an open-source alternative to these commercial tools for the dynamic
management of VMs on distributed resources. This tool is supporting several
research lines in advance reservation of capacity, probabilistic admission control,
placement optimization, resource models for the efficient management of groups of
virtual machines, elasticity support, and so on.

Prof. Taur A.R.


(CSE Dept.) 14

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

MCQ Questions:

1) ____________ provides virtual machines, virtual storage, virtual infrastructure and


other hardware assets. (University QP-2018)
a) IaaS b) SaaS c) PaaS d) All of the mentioned
2) Which of the following is Type 2 VM ? (University QP-2018)
a) VirtualLogix VLX b) VMware ESX c) Xen d) LynxSecure
3) Which of the following provide system resource access to virtual machines?
(University QP-2018)
a) VMM b) VMC c) VNM d) All of the mentioned
4) Which of the following is virtual machine conversion cloud ? (University QP-2018)
a) BMC cloud computing initiative b) Amazon cloud watch c) Abi cloud d) None
5) An operating system running on a type ____________ VM is a full
virtualization. (University QP-2018)
a) 1 b) 2 c) 3 d) All of the mentioned
6) Which of the following type of virtualization is also characteristic of cloud
computing? (University QP-2017)
a)Storage b) Application c) CPU d) All of the mentioned
7) What is the requirement of virtualization platform in implementing cloud?
(University QP-2017)
a) Manage the service level policies b) Cloud Operating System
c) virtualization platform helps to keep the backend level and user level concepts different
from each other
d) All of the above
8) Which resources are typically provided by an Infrastructure as a service cloud
computing delivery model? (University QP-2017)
a) Application b) Virtual machines
c) Virtual Private network d) middleware software stack
9) ------------ allows multiple operating system instances to run as guest on the same
server. (University QP-2017/ 2016)
a) Server b) Hypervisor c) Network d) Data
10) What is the role of virtualization in cloud computing? (University QP-2016)
a) It removes operating system inefficiencies

Prof. Taur A.R.


(CSE Dept.) 15

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

b) It improves the performance of web applications


c) It optimizes the utilization of computing resources
d) It adds the extra load to the underlying physical infrastructure and has no role in cloud
computing
11) Which statement is true about a bare metal hypervisor? (University QP-2016)
a) It can be only hosted on an existing operating system
b) It requires a separate licence for the native operating system
c) It has minimum functionality to support only one type of operating system
d) It runs directly on server hardware to provide virtual machines with timesharing
resources
12) --------------- is a server environment that does not physically exist but is created on
another server. (University QP-2016)
a) Physical machine b) Logical machine c) Guest machine d) Virtual machine
13) What is most commonly used for managing the resources for every virtual system?
a) Load balancer b) Hypervisor c) Router d) Cloud
14) Which is not a benefit of virtualization?
a) Flexible and efficient allocation of resources
b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability
d) Run on single operating system
15) It helps a user to have remote access to an application from a server.
a) Application virtualization b) Network virtualization
c) Desktop virtualization d) Storage virtualization
16) Virtualization allows sharing the resources of hardware across multiple a
environments
a) True b) False
17) A virtual machine running on a server of a particular make cannot be relocated to
be the server of another make
a) True b) False
18) Which of the following is Type 1 Hypervisor ?
a) wind river simics b) virtual server 2005 r2 c) kvm d) lynxsecure
19) In ------------- the virtual machine simulates hardware, so it can be independent of
the underlying system hardware.
a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Prof. Taur A.R.


(CSE Dept.) 16

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

20) In a ------------ scheme, the VM is installed as a Type 1 Hypervisordirectly onto the


hardware.
a) paravirtualization b) full virtualization c) emulation d) none of the mentioned
21) ---------- where a VM can be moved from one physical machine to another even as it
continues to execute.
a) load balancing b) migration c) live migration d) server consolidation
22) Which of the following is a hypervisor?
a) Linux b) VMWare ESXi c) .net d) None of these

23) VMM is also known as a-


a) Hypervisor b) Supervisor c) Monitor d) None of these
24) Storage virtualization is also named as-
a) Cold Storage b) Cloud Storage c) Disk Storage d) None of these
25) The best example of network virtualization is shown by-
a) MS AZUR b) LINUX c) VMM d) None of these
26) On what is cloud computing-based.
a) Modulation b) Hybridization c) Virtualization d) Multiplexing

Descriptive Questions

Q. 1) What is virtualization? Explain virtualization techniques in detail. (University QP-


2016) --- 10 Marks
Q. 2) What is virtualization? Explain virtualization techniques. (University QP-2017) --4
Marks
Q. 3) Explain server virtualization & its techniques in detail. (University QP-2017) --- 10
Marks
Q. 4) Explain VM Migration techniques. (University QP-2017) --- 4 Marks
Q. 5) What is virtualization? Explain reasons to use virtualization. (University QP-2017) ---
10 Marks
Q. 6) What is virtualization in cloud ? Discuss various virtualization techniques. (University
QP-2018) --- 8 Marks
Q. 7) What is virtualization and what are its benefits?
Q. 8) What are the characteristics of virtualized environments?

Prof. Taur A.R.


(CSE Dept.) 17

Downloaded by Aditya Yevate (adityayevates@gmail.com)


lOMoARcPSD|53594808

Q.9) Discuss classification or taxonomy of virtualization at different levels.


Q.10) Discuss the machine reference model of execution virtualization.
Q.11) What are hardware virtualization techniques?
Q.12) List and discuss different types of virtualization.
Q.13) What are the benefits of virtualization in the context of cloud computing?
Q.14) What are the disadvantages of virtualization?
Q.15) What is Xen? Discuss its elements for virtualization.
Q. 16) Discuss the reference model of full virtualization.
Q. 17) Discuss the architecture of Hyper-V. Discuss its use in cloud computing.

Prof. Taur A.R.


(CSE Dept.) 18

Downloaded by Aditya Yevate (adityayevates@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy