A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems
碩士 === 國立臺灣科技大學 === 電子工程系 === 92 === Abstract In a lot of scientific fields, including physics, aeronautics and astronautics, atmosphere and image processing, and particularly in one of most popular topics — biotechnology, they often need a lot of computation power. For the moment, many r...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/48182700863398880468 |
id |
ndltd-TW-092NTUST428002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092NTUST4280022015-10-13T13:28:04Z http://ndltd.ncl.edu.tw/handle/48182700863398880468 A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems 在分散式系統中運用雙層式儲存架構的檢查點設置機制 陳鴻龍 碩士 國立臺灣科技大學 電子工程系 92 Abstract In a lot of scientific fields, including physics, aeronautics and astronautics, atmosphere and image processing, and particularly in one of most popular topics — biotechnology, they often need a lot of computation power. For the moment, many researchers employ PVM in a parallel computing environment to satisfy their requirements of computation power. However, those application programs need a long time to finish their jobs in distributed environments. If they encounter an accident like power failure, then the result will be reduced to ashes. We can employ the checkpointing skill to avoid this situation. The main purpose of checkpointing is to provide rollback and recovery (also called fault-tolerance). It records all the status of the executing program at some instants, called checkpoints. After the computer reboots, the program can be restarted from the last checkpoint. In addition, it also can be utilized in the task migrations. In the past, checkpoints are stored in the disk or other hosts in the network. In these two methods, ether is the disk access speed too slow to achieve high performance, or the cost is expensive. We employ the SRAM card and FLASH memory whose capacity and speed are significantly improved recently. SRAM card and FLASH memory are formed the two-level storage structure to achieve I/O and computation overlapping, resulting in improving the system performance. Our scheme possesses the following advantages: (1) Consistent checkpoint is guaranteed, resulting in no problem of domino effect. (2) It only needs to maintain two checkpoints. (3) Its implementation is easy and fast. The implementation results show that our method is effective for checkpointing. 陳省隆 2003 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 電子工程系 === 92 === Abstract
In a lot of scientific fields, including physics, aeronautics and astronautics, atmosphere and image processing, and particularly in one of most popular topics — biotechnology, they often need a lot of computation power. For the moment, many researchers employ PVM in a parallel computing environment to satisfy their requirements of computation power. However, those application programs need a long time to finish their jobs in distributed environments. If they encounter an accident like power failure, then the result will be reduced to ashes. We can employ the checkpointing skill to avoid this situation.
The main purpose of checkpointing is to provide rollback and recovery (also called fault-tolerance). It records all the status of the executing program at some instants, called checkpoints. After the computer reboots, the program can be restarted from the last checkpoint. In addition, it also can be utilized in the task migrations. In the past, checkpoints are stored in the disk or other hosts in the network. In these two methods, ether is the disk access speed too slow to achieve high performance, or the cost is expensive.
We employ the SRAM card and FLASH memory whose capacity and speed are significantly improved recently. SRAM card and FLASH memory are formed the two-level storage structure to achieve I/O and computation overlapping, resulting in improving the system performance. Our scheme possesses the following advantages: (1) Consistent checkpoint is guaranteed, resulting in no problem of domino effect. (2) It only needs to maintain two checkpoints. (3) Its implementation is easy and fast. The implementation results show that our method is effective for checkpointing.
|
author2 |
陳省隆 |
author_facet |
陳省隆 陳鴻龍 |
author |
陳鴻龍 |
spellingShingle |
陳鴻龍 A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
author_sort |
陳鴻龍 |
title |
A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
title_short |
A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
title_full |
A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
title_fullStr |
A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
title_full_unstemmed |
A Checkpointing Scheme Employing Two-Level Storage Structure for Distributed Systems |
title_sort |
checkpointing scheme employing two-level storage structure for distributed systems |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/48182700863398880468 |
work_keys_str_mv |
AT chénhónglóng acheckpointingschemeemployingtwolevelstoragestructurefordistributedsystems AT chénhónglóng zàifēnsànshìxìtǒngzhōngyùnyòngshuāngcéngshìchǔcúnjiàgòudejiǎnchádiǎnshèzhìjīzhì AT chénhónglóng checkpointingschemeemployingtwolevelstoragestructurefordistributedsystems |
_version_ |
1717736515894771712 |