Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2016, Article ID 9315493, 11 pages
http://dx.doi.org/10.1155/2016/9315493
Research Article

Optimizing Checkpoint Restart with Data Deduplication

College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China

Received 1 March 2016; Accepted 5 May 2016

Academic Editor: Laurence T. Yang

Copyright © 2016 Zhengyu Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield, “Remus: high availability via asynchronous virtual machine replication,” in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 161–174, San Francisco, Calif, USA, 2008.
  3. M. Rosenblum and T. Garfinkel, “Virtual machine monitors: current technology and future trends,” Computer, vol. 38, no. 5, pp. 39–47, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson, “A survey of rollback-recovery protocols in message-passing systems,” ACM Computing Surveys, vol. 34, no. 3, pp. 375–408, 2002. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Agarwal, R. Garg, M. S. Gupta, and J. E. Moreira, “Adaptive incremental checkpointing for massively parallel systems,” in Proceedings of the 18th Annual International Conference on Supercomputing, pp. 277–286, ACM, July 2004. View at Scopus
  6. N. Naksinehaboon, Y. Liu, C. Leangsuksun, R. Nassar, M. Paun, and S. L. Scott, “Reliability-aware approach: an incremental checkpoint/restart model in HPC environments,” in Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGRID '08), pp. 783–788, IEEE, Lyon, France, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. K. B. Ferreira, R. Riesen, P. Bridges, D. Arnold, and R. Brightwell, “Accelerating incremental checkpointing for extreme-scale computing,” Future Generation Computer Systems, vol. 30, no. 1, pp. 66–77, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. J. S. Plank, Y. Chen, K. Li, M. Beck, and G. Kingsley, “Memory exclusion: optimizing the performance of checkpointing systems,” Software—Practice and Experience, vol. 29, no. 2, pp. 125–142, 1999. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Ibtesham, D. Arnold, K. B. Ferreira, and P. G. Bridges, “On the viability of checkpoint compression for extreme scale fault tolerance,” in Euro-Par 2011: Parallel Processing Workshops, pp. 302–311, Springer, 2012. View at Google Scholar
  10. X. Lin, G. Lu, F. Douglis, P. Shilane, and G. Wallace, “Migratory compression: coarse-grained data reordering to improve compressibility,” in Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14), pp. 257–271, USENIX Association, 2014.
  11. M. Lillibridge, K. Eshghi, and D. Bhagwat, “Improving restore speed for backup systems that use inline chunk-based deduplication,” in Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST '13), pp. 183–198, San Jose, Calif, USA, February 2013.
  12. B. Zhu, K. Li, and R. H. Patterson, “Avoiding the disk bottleneck in the data domain deduplication file system,” in Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST '08), article 18, USENIX Association, 2008.
  13. L. Valiant, Center for Research in Computing Technology, Harvard University, Cambridge, Mass, USA, 1994.
  14. N. Mandagere, P. Zhou, M. A. Smith, and S. Uttamchandani, “Demystifying data deduplication,” in Proceedings of the ACM/IFIP/USENIX Middleware'08 Conference Companion, pp. 12–17, ACM, Leuven, Belgium, 2008.
  15. K. Srinivasan, T. Bisson, G. R. Goodson, and K. Voruganti, “iDedup: latency-aware, inline data deduplication for primary storage,” in Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST '12), vol. 12, pp. 1–14, San Jose, Calif, USA, February 2012.
  16. B. Agarwal, A. Akella, A. Anand et al., “Endre: an end-system redundancy elimination service for enterprises,” in Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI '10), pp. 419–432, 2010.
  17. M. Litzkow and M. Solomon, Supporting Checkpointing and Process Migration Outside the Unix Kernel, 1992.
  18. J. Duell, The Design and Implementation of Berkeley Lab's Linux Checkpoint/Restart, Lawrence Berkeley National Laboratory, Berkeley, Calif, USA, 2005.
  19. J. Ansel, K. Arya, and G. Cooperman, “DMTCP: transparent checkpointing for cluster computations and the desktop,” in Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium (IPDPS '09), pp. 1–12, IEEE, Rome, Italy, May 2009. View at Publisher · View at Google Scholar · View at Scopus