• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liang Yi, Wang Lei, Fan Jianping, Fang Juan. Research on the Shared Memory-Based Checkpointing for Cluster Services[J]. Journal of Computer Research and Development, 2010, 47(4): 571-580.
Citation: Liang Yi, Wang Lei, Fan Jianping, Fang Juan. Research on the Shared Memory-Based Checkpointing for Cluster Services[J]. Journal of Computer Research and Development, 2010, 47(4): 571-580.

Research on the Shared Memory-Based Checkpointing for Cluster Services

More Information
  • Published Date: April 14, 2010
  • To overcome the defects of the relative low performance cost ratio caused by the secondary storage-based checkpointing for cluster services, a shared memory-based checkpointing mechanism for cluster services is presented in this paper. Idea of the proposed checkpointing mechanism is to make the checkpointing based on the shared memory, so as to reduce the checkpointing and recovery latency compared with the secondary storage-based checkpointing. To lower the risk of the non-persistent storage with the shared memory, in the shared memory-based checkpointing mechanism, all checkpoint servers in the cluster are organized as a single-directed circle. For each cluster service, the checkpoint data is stored both on the local checkpoint server and its predecessor in the single-directed checkpoint circle. The checkpoint management protocol is designed for the dual-stored checkpoint data to ensure the checkpointing update consistency. A group membership protocol is presented to guarantee all members in the single-directed checkpoint circle having the consistent group view, so as to backup the checkpoint data correctly. The experiment results show that the shared memory-based checkpointing mechanism achieves lower checkpointing and recovery latency. The group membership protocol needs only one-round communication to achieve the group view consistency among all checkpoint servers, hence costing low communication overhead.
  • Related Articles

    [1]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [2]Chen Bo, Lu Youyou, Cai Tao, Chen Youmin, Tu Yaofeng, Shu Jiwu. A Consistency Mechanism for Distributed Persistent Memory File System[J]. Journal of Computer Research and Development, 2020, 57(3): 660-667. DOI: 10.7544/issn1000-1239.2020.20190074
    [3]Xiao Renzhi, Feng Dan, Hu Yuchong, Zhang Xiaoyi, Cheng Liangfeng. A Survey of Data Consistency Research for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(1): 85-101. DOI: 10.7544/issn1000-1239.2020.20190062
    [4]Liu Qiao, Zhong Yun, Liu Yao, Wu Zufeng, Qin Zhiguang. Consistent Collective Entity Linking Algorithm[J]. Journal of Computer Research and Development, 2016, 53(8): 1696-1708. DOI: 10.7544/issn1000-1239.2016.20160192
    [5]Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
    [6]Wang Mei, Liao Shizhong. Three-Step Bayesian Combination of SVM on Regularization Path[J]. Journal of Computer Research and Development, 2013, 50(9): 1855-1864.
    [7]Sun Xuejiao and Liu Jinglei. On the Satisfiability and Consistency for CP-nets[J]. Journal of Computer Research and Development, 2012, 49(4): 754-762.
    [8]Luo Jia, Chang Huiyou, Yi Yang. Resource Assignment Algorithm Under Multi-Agent for P2P MMOG[J]. Journal of Computer Research and Development, 2010, 47(12).
    [9]Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861.
    [10]Guo Jianhui and Zhao Chunxia. A Novel Algorithm of Simultaneous Localization and Map Building (SLAM) with Particle Filter[J]. Journal of Computer Research and Development, 2008, 45(5): 853-860.

Catalog

    Article views (815) PDF downloads (433) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return