期刊文献+

一种基于准同步检查点的虚拟机卷回恢复算法

Rollback Recovery Algorithm for Virtual Machine Based on Quasi-synchronous Checkpointing
下载PDF
导出
摘要 针对典型的云平台下虚拟化系统的特点,提出了一种结合选择性日志的准同步检查点算法VM_QSC:保持不同虚拟机节点固有的优化检查点周期,通过物理节点Hypervisor选择性地进行虚拟机的消息日志的稳定存储,在全局监控节点维护虚拟机一致线信息,保持全局的一致性。与传统的准同步检查点和同步检查点相比,该算法维持了虚拟机检查点设置的自主性,并显著降低了虚拟化系统的容错开销,可以有效应用于云计算环境下的虚拟资源管理和动态迁移。 Considering the characteristic of the virtual machines based on cloud platform,a Quasi-synchronous checkpointing with selective message logging algorithm for virtual machine (for short,VM_QSC) was presented.The algorithm keeps the inherent optimized checkpoint interval of the VM nodes,selectively stores stable optimistic message log,and maintains the consistency of the whole VM systems by hypervisor on the physical machines.Performance evaluation and simulation result show that in contrast with the traditional communication induced checkpointing and coordinated checkpointing,VM_QSC maintains the autonomy checkpointing,and saves communication and storage cost.It adapts for the cloud platform to manage the virtual resource and migrate the virtual machine
出处 《计算机科学》 CSCD 北大核心 2014年第5期46-49,共4页 Computer Science
基金 国家"八六三"高技术研究发展计划重大项目课题(2013AA01A205) 国家自然科学基金青年项目(61003047) 中央高校基本科研业务费专项资金(HIT.NSRIF.2014)资助
关键词 准同步检查点 选择性日志 卷回恢复 虚拟机 云计算 Quasi-synchronous checkpointing Selective message logging Rollback recovery Virtual machine Cloud computing
  • 相关文献

参考文献15

  • 1Elnozahy E N,Alvisi L,Wang Y M,et al.A Survey of RollbackRecovery Protocols in Message-Passing Systems[J].ACM Computing Surveys,2002,34(3):375-408.
  • 2Walters,Paul J,Chaudhary,et al.A fault-tolerant strategy for virtualized[J].HPC clusters Journal of Supercomputing,2009,50(3):209-239.
  • 3Ong H,Sarago N,Chanchio K,et al.VCCP:A Transparent,Coordinated Checkpointing System for Virtualization-based Cluster Computing[C]//Proceedings of IEEE Int.Conf.Cluster Comput.2009.
  • 4Kangarlou A,Xu D,Ruth P,et al.Taking Snapshots of Virtual Networked Environments[C]// Proceedings of Int.Workshop Virtualization Technology Distrib.Computer.2007.
  • 5Scarpazza D P,Mullaney P,Villa O,et al.Transparent Systemlevel Migration of PGAS Applications using Xen on InfiniBand[C]//Proceedings of IEEE Int.Conf.Cluster Computer.2007:74-83.
  • 6Vallee G,et al.Checkpoint/Restart of Virtual Machines Based on Xen[C]// Proceedings of the High Availability and Performance Computing Workshop.2006.
  • 7Acharya A,Badrinath B R.Checkpointing distributed application on mobile computers[C]//Proc.of the 3rd Int'l Conf on Parallel and Distributed Information System.1994:73-80.
  • 8Baldoni J R,Fand Quag-lia,Cliciani B.A VP-accordant checkpointing Protocol preventing useless checkpoints[C]//Proc.of the Symposium on Reliable Distributed Systerns.1998:61-67.
  • 9Tsai Ji-chiang.Systematic Comparisons of RDT communicationInduced checkpointing protocols[C]// Proceedings of Pacific Rim International Symposium on Dependable Computing.2004:66-75.
  • 10罗元盛,闵应骅,张大方.一种基于索引的准同步检查点协议[J].计算机学报,2005,28(10):1620-1625. 被引量:3

二级参考文献11

  • 1Elnozahy E.N., Alvisi L., Wang Y.M., Johnson D.B.. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 2002, 34(3): 375~408.
  • 2Baldoni R., Quaglia F., Fornara P.. An index-based checkpointing algorithm for autonomous distributed systems. IEEE Transactions on Parallel and Distributed Systems, 1999, 10(2): 181~192.
  • 3Vieira G.M.D., Garcia I.C., Buzato L.E.. Systematic analysis of index-based checkpointing algorithms using simulation. In: Proceedings of IX Brazilian Symposium on Fault-Tolerant Computing, 2001.
  • 4Manivannan D., Singhal M.. A low overhead recovery technique using quasi-synchronous checkpointing. In: Proceedings of the 16th IEEE International Conference on Distributed Computing System, 1996, 100~107.
  • 5Briatico D., Ciufoletti A., Simoncini L.. A distributed domino-effect free recovery algorithm. In: Proceedings of the 4th IEEE Symposium on Reliability in Distributed Software and Database System, 1984, 207~215.
  • 6Plank James S., Thomason Michael G.. Processor allocation and checkpoint interval selection in cluster computing systems. Journal of Parallel and Distributed Computing, 2001, 61(11): 1570~1590.
  • 7Tsai J., Lin J.W.. On characteristics of DEF communication-induced checkpointing protocols. In: Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing, 2002, 29~36.
  • 8Holzmann G.J.. The model checker SPIN. IEEE Transactions on Software Engineering, 1997, 23(5): 279~295.
  • 9Tsai Jichiang. Systematic Comparisons of RDT communication-Induced checkpointing crotocols. In: Proceedings of Pacific Rim International Symposium on Dependable Computing, 2004, 66~75.
  • 10Briatico D., Ciuffoletti A., Simoncini L.. A distributed domino-effect free recovery algorithm. In: Proceedings of IEEE 4th Symposium on Reliability in Distributed Software and Database Systems, 1984, 207~215.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部