期刊文献+

穿戴计算机的内核级检查点优化策略研究

Optimization of kernel-level checkpoint mechanism for wearable computer systems
下载PDF
导出
摘要 为提高穿戴计算机的可靠性和可用性,提出了适用于穿戴计算机操作系统内核级检查点机制的优化检查点间隔的策略——适应穿戴计算机瞬时故障发生规律的步进式检查点(SP-CKPT)策略和基于内存数据量监测的内存监控门限法(MMTC)。前者针对可穿戴计算机故障频率的特点,动态地步进式调整检查点间隔,使检查点位置'逼近'系统失效的位置,有效减少计算损失;后者通过对系统内存数据量的监测,采用门限法控制检查点设置的时机,使系统尽可能在用内存资源最少的时间点来进行检查点的设置,减少检查点信息的存储量。这两种策略分别从时间和空间的角度优化检查点间隔。仿真结果表明,这两种策略结合,能够提高系统可靠性和可用性,减少无故障运行和卷回恢复阶段的开销。 To improve the reliability and availability of wearable computer, the paper presents the strategies for optimization of kernel-level checkpoint mechanism for wearable computer systems the technologies of the step-checkpointing (SP- CKFF) and the memory monitoring and threshold-control(MMTC). According to the characteristics of software or hard-ware environment-dependent system, SP-CKPT modulates the checkpoint intervals on-line. When failures occur frequently, checkpoint interval is set to the minimum length, then increased exponentially, in order to promptly normalize the checkpoint interval. MMTC adjusts the checkpointing interval by predicting the amount of data to be saved to implement the kernel-level memory-exclusion. SP-CKPT and MMTC respectively optimize the checkpoint interval from the aspect of time and space. The simulation results show the two schemes can effectively improve the performance of wearable computers and reduce the cost both in failure-free mn and rollback recovery.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2008年第5期492-497,共6页 Chinese High Technology Letters
基金 863计划重大专项(No.2006AA01A103) 国家'十一五'预研重点项目(513160301)资助项目
关键词 穿戴计算机 检查点间隔 内核级检查点 步进式检查点(SP-CKPT) 内存监控门 限法(MMTC) wearable computer, checkpoint interval, kernel-level checkpoint, step-checkpointing (SP-CKPT), memory monitoring and threshold-control (MMTC)
  • 相关文献

参考文献13

  • 1Edward O Thorp. The invention of the first wearable computer. In: the 2nd International Symposium on Wearable Computer. Pittsburgh Pennsylvania, USA, 1998, 19(2) : 75-80
  • 2Elnozahy E N, Alvisi L, Wang Y M, et al. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 2002, 34(3) : 375-408
  • 3Wang Y M, Huang Y, Vo K P, et al. Checkpoints and its applications. In: Proceedings of the 25th International Symposium on Fault-Tolerant Computing, Pasadena, CA, USA, 1995.22-31
  • 4Arabe J, Beguelin A, Lowekamp B, et al. Dome: Parallel Programming in a Heterogeneous Multi-User Environment: [Technical Report]. Pitlshurgh: Carnegie Mellon University, 1995
  • 5Plank J S, Beck M, Kingsley G, et al. Libckpt: transparent eheekpointing under unix. In: Usenix Winter 1995 Technical Conference, New Orleans, USA, 1995. 213-223
  • 6Stellner G. CoCheck: checkpointing and process migration for MPI. In: Proceedings of the 10th International Parallel Processing Symposium, Honolulu, HI, USA, 1996. 36-45
  • 7Elnozahy E N, Zwaenepoel W. Manetho: transparent rollback-recovery with low overhead. IEEE Trans on Computers, 1992, 41(5) :526-531
  • 8Hua Zhong, Jason Nieh. CRAK: linux checkpoint/restart as a kernel module: [Technical Report]. USA: Clumbia University, 2001
  • 9Young J W. A first order approximation to the optimum checkpoint interval. Comm ACM , 1974,17(9) .530-531
  • 10Vaidya N H. Impact of checkpoint latency on overhead ratio of a checkpointing scheme. IEEE Transactions on Computers, 1997,46(8) :942-947

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部