Computer Science ›› 2014, Vol. 41 ›› Issue (5): 46-49.doi: 10.11896/j.issn.1002-137X.2014.05.010

Previous Articles     Next Articles

Rollback Recovery Algorithm for Virtual Machine Based on Quasi-synchronous Checkpointing

ZHANG Zhan,ZUO De-cheng,HUANG You-fu and HE Hui   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Considering the characteristic of the virtual machines based on cloud platform,a Quasi-synchronous checkpointing with selective message logging algorithm for virtual machine (for short,VM_QSC) was presented.The algorithm keeps the inherent optimized checkpoint interval of the VM nodes,selectively stores stable optimistic message log,and maintains the consistency of the whole VM systems by hypervisor on the physical machines.Performance evaluation and simulation result show that in contrast with the traditional communication induced checkpointing and coordinated checkpointing,VM_QSC maintains the autonomy checkpointing,and saves communication and storage cost.It adapts for the cloud platform to manage the virtual resource and migrate the virtual machine.

[1] Elnozahy E N,Alvisi L,Wang Y M,et al.A Survey of Rollback-Recovery Protocols in Message-Passing Systems[J].ACM Computing Surveys,2002,34(3):375-408
[2] Walters,Paul J,Chaudhary,et al.A fault-tolerant strategy for virtualized[J].HPC clusters Journal of Supercomputing,2009,50(3):209-239
[3] Ong H,Sarago N,Chanchio K,et al.VCCP:A Transparent,Coordinated Checkpointing System for Virtualization-based Cluster Computing[C]∥Proceedings of IEEE Int.Conf.Cluster Comput.2009
[4] Kangarlou A,Xu D,Ruth P,et al.Taking Snapshots of Virtual Networked Environments[C]∥Proceedings of Int.Workshop Virtualization Technology Distrib.Computer.2007
[5] Scarpazza D P,Mullaney P,Villa O,et al.Transparent System-level Migration of PGAS Applications using Xen on InfiniBand[C]∥Proceedings of IEEE Int.Conf.Cluster Computer.2007:74-83
[6] Vallee G,et al.Checkpoint/Restart of Virtual Machines Based on Xen[C]∥Proceedings of the High Availability and Perfor-mance Computing Workshop.2006
[7] Acharya A,Badrinath B R.Checkpointing distributed application on mobile computers[C]∥Proc.of the 3rd Int’l Conf on Parallel and Distributed Information System.1994:73-80
[8] Baldoni J R,Fand Quag-lia,Cliciani B.A VP-accordant checkpointing Protocol preventing useless checkpoints[C]∥Proc.of the Symposium on Reliable Distributed Systems.1998:61-67
[9] Tsai Ji-chiang.Systematic Comparisons of RDT communication-Induced checkpointing protocols[C]∥Proceedings of Pacific Rim International Symposium on Dependable Computing.2004:66-75
[10] 罗元盛,闵应骅,张大方.一种基于索引的准同步检查点协议[J].计算机学报,2005,8(10):1620-1625
[11] Tsai Ji-chiang.Applying the fully-informed checkpointing protocol to the lazy indexing strategy[J].Journal of Information Science and Engineering,2007,23(5):1611-1621
[12] Manivannan D,Singhal M.A Low-overhead Recovery Technique Using Quasi-synchronous Checkpointing [C]∥Proceedings of the 16th International Conference on Distributed Computing Systems.1996:100-107
[13] Baldoni R,Quaglia F,Fornara P.An index-based checkpointing algorithm for autonomous distributed systems[J].IEEE Tran-sactions on Parallel and Distributed Systems,1999,10(2) :181-192
[14] Lamport L.Time,clocks and the ordering of events in a distributed systems[J].Comm.ACM,1978,21(7):558-565
[15] Mandal,Sarathi P,Mukhopadhyaya,et al.Performance analysis of different checkpointing and recovery schemes using stochastic model[J].Journal of Parallel and Distributed Computing,2006,66(1):99-107

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!