• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Yihan, Huang Gang, Zhang Ying, Xiong Yingfei. A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(1): 138-154. DOI: 10.7544/issn1000-1239.2016.20150608
Citation: Wu Yihan, Huang Gang, Zhang Ying, Xiong Yingfei. A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(1): 138-154. DOI: 10.7544/issn1000-1239.2016.20150608

A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing

More Information
  • Published Date: December 31, 2015
  • There are many different kinds of cloud computing platforms, such as CloudStack, OpenStack, Eucalyptus, and so on, which differentiate from each other in management abilities and management styles. Even in a particular cloud platform, there are also different kinds of virtualization technologies, such as Xen, KVM, VMware, etc. Recent years, with the rapid development of private cloud and hybrid cloud, the heterogeneity degree of infrastructure is aggravated. Fault tolerance (FT) mechanisms are usually supported by the management ability and management style of the infrastructure. As a result, a fault-tolerant mechanism needs to be repeatedly implemented on different platforms. Meanwhile, this directly causes the obvious growing difficulty and increasing amount of time consumption in FT mechanism. In order to reach the goal of achieving FT mechanism among different platforms, we propose a model-based, cross-platform FT mechanism development approach in this paper. To validate the effectiveness and practicability of model-based development approach, we implemente seven fault tolerance mechanisms in CloudStack and OpenStack. A series of experiments show that failover is implemented effectively by these FT mechanisms, and the reliability and availability of the FT target are improved. With high reusability (over 90%) of the code, the FT mechanisms in this thesis can function cross different platforms. Analysis of the questionnaire survey conducted among developers show that our approach can improve the development experience and development efficiency.
  • Related Articles

    [1]He Xianmin, Li Maoxi, He Yanqing. Siamese BERT-Networks Based Classification Mapping of Scientific and Technological Literature[J]. Journal of Computer Research and Development, 2021, 58(8): 1751-1760. DOI: 10.7544/issn1000-1239.2021.20210323
    [2]Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    [3]Zhou Quanbiao, Zhang Xingjun, Liang Ningjing, Huo Wenjie, Dong Xiaoshe. FTL Address Mapping Method Based on Mapping Entry Inter-Reference Recency[J]. Journal of Computer Research and Development, 2018, 55(5): 1065-1077. DOI: 10.7544/issn1000-1239.2018.20170254
    [4]Wang Yizhuo, Zuo Qi, Ji Weixing, Wang Xiaojun, Shi Feng. Memory-Aware Incremental Mapping of Applications to MPSoC[J]. Journal of Computer Research and Development, 2015, 52(5): 1198-1209. DOI: 10.7544/issn1000-1239.2015.20131960
    [5]Zhu Hong, Ding Shifei, Xu Xinzheng. An AP Clustering Algorithm of Fine-Grain Parallelism Based on Improved Attribute Reduction[J]. Journal of Computer Research and Development, 2012, 49(12): 2638-2644.
    [6]Zuo Yayao, Tang Yong, Shu Zhongmei. Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping[J]. Journal of Computer Research and Development, 2012, 49(11): 2320-2327.
    [7]Zhu Sifeng, Liu Fang, Chai Zhengyi, Qi Yutao. Immune-Computing-Based Location Planning of Base Station and Relay Station in IEEE 802.16j Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1649-1654.
    [8]Li Xiaoling, Guo Changguo, Li Xiaoyong, Wang Huaimin. A Constraint Optimization Based Mapping Method for Virtual Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1601-1610.
    [9]Cao Chunjie, Yang Chao, Ma Jianfeng, Zhu Jianming. An Authentication Protocol for Station Roaming in WLAN Mesh[J]. Journal of Computer Research and Development, 2009, 46(7): 1102-1109.
    [10]Yang Renzhong, Hou Zifeng, Li Jingxia. A Resource Reservation Scheme for PCF Handoff Station in WLAN[J]. Journal of Computer Research and Development, 2005, 42(11): 1962-1968.

Catalog

    Article views (1825) PDF downloads (1153) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return