Cloud

A Two-level Application Transparent Checkpointing Scheme in Cloud Computing Environment

Download Now Free registration required

Executive Summary

Cloud computing has been widely applied to a wide variety of computing environments, with the traditional distributed computing environment, cloud computing using virtual machines to achieve dynamic resource partitioning. Checkpoint recovery technology is a low-cost method to improve the system availability. This paper analyzes the characteristics of cloud computing, virtualization technology and the checkpoint/recovery technology, a mechanism for integration of virtualization technology and checkpoint/recovery technology has been proposed, this mechanism uses coordinated checkpoint protocols at node level, while uses communication-induced protocols at system level. This scheme is transparent to applications with small performance overhead.

  • Format: PDF
  • Size: 480.08 KB