A survey on software checkpointing and mobility techniques in distributed systems
Identifieur interne : 000374 ( Main/Exploration ); précédent : 000373; suivant : 000375A survey on software checkpointing and mobility techniques in distributed systems
Auteurs : Soumaya Marzouk [Tunisie] ; Mohamed Jmaiel [Tunisie]Source :
- Concurrency and Computation: Practice and Experience [ 1532-0626 ] ; 2011-08-10.
English descriptors
- KwdEn :
- Teeft :
- Application entities, Application execution time, Application style, Application type, Appropriate checkpointing, Asynchronous, Checkpoint, Checkpointing, Checkpointing policy, Checkpointing protocol, Checkpointing technique, Checkpointing techniques, Code mobility, Computat, Computer science, Concurrency, Concurrency computat, Copyright, Current data, Decision rules, Design time, Destination host, Dynamic environments, Dynamic selection, Entity code, Execution context, Execution state, Execution time, Exper, Failure frequency, Global checkpoint, Grid, High performance, Ieee, Ieee computer society, Ieee transactions, Implementation details, International conference, International journal, Interruption point, Interruption points, Jmaiel, John wiley sons, Last checkpoint, Latency, Lecture notes, Load balancing, Many works, Marzouk, Message logging, Migration, Migration time, Mobility, Mobility delay, Mobility policy, Mobility technique, Mobility techniques, Mobility type, Mobility types, Mtbf, Next checkpoint, Next checkpoint position, Node, Other hand, Performance degradation, Periodic checkpointing, Pract, Resumption point, Rollback, Runtime, Scenario, Silver spring, Software, Software entity, Software mobility, Stable storage, Strong mobility, Synchronization, Technical report, Uncoordinated, Uncoordinated checkpointing, Useless checkpoints, Weak mobility, Whole application.
Abstract
This paper has two purposes. First, it shows that existing solutions employing checkpointing and mobility in distributed applications, fix, at design time, the types and the techniques of checkpointing and mobility to be employed at runtime. Second, it provides policies allowing the dynamic selection of checkpointing and mobility techniques according to the execution environment. For that, this paper presents checkpointing and mobility techniques to evaluate them in order to identify their advantages and their shortcomings, and then determine the appropriate execution conditions in which a specific mobility technique becomes beneficial. This investigation will allow in assisting adaptation plans' generation and promoting future research in the area of self‐adaptivity of distributed applications. Copyright © 2011 John Wiley & Sons, Ltd.
Url:
DOI: 10.1002/cpe.1696
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000919
- to stream Istex, to step Curation: 000871
- to stream Istex, to step Checkpoint: 000235
- to stream Main, to step Merge: 000374
- to stream Main, to step Curation: 000374
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">A survey on software checkpointing and mobility techniques in distributed systems</title>
<author><name sortKey="Marzouk, Soumaya" sort="Marzouk, Soumaya" uniqKey="Marzouk S" first="Soumaya" last="Marzouk">Soumaya Marzouk</name>
</author>
<author><name sortKey="Jmaiel, Mohamed" sort="Jmaiel, Mohamed" uniqKey="Jmaiel M" first="Mohamed" last="Jmaiel">Mohamed Jmaiel</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:56DDC4288B518BBCC498668905DE776319284927</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1002/cpe.1696</idno>
<idno type="url">https://api.istex.fr/document/56DDC4288B518BBCC498668905DE776319284927/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000919</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000919</idno>
<idno type="wicri:Area/Istex/Curation">000871</idno>
<idno type="wicri:Area/Istex/Checkpoint">000235</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000235</idno>
<idno type="wicri:doubleKey">1532-0626:2011:Marzouk S:a:survey:on</idno>
<idno type="wicri:Area/Main/Merge">000374</idno>
<idno type="wicri:Area/Main/Curation">000374</idno>
<idno type="wicri:Area/Main/Exploration">000374</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">A survey on software checkpointing and mobility techniques in distributed systems</title>
<author><name sortKey="Marzouk, Soumaya" sort="Marzouk, Soumaya" uniqKey="Marzouk S" first="Soumaya" last="Marzouk">Soumaya Marzouk</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>ReDCAD Laboratory, National School of Engineers of Sfax, University of Sfax, BP 1173, 3038 Sfax</wicri:regionArea>
<wicri:noRegion>3038 Sfax</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>ReDCAD Laboratory, National School of Engineers of Sfax, University of Sfax, BP 1173, 3038 Sfax</wicri:regionArea>
<wicri:noRegion>3038 Sfax</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Jmaiel, Mohamed" sort="Jmaiel, Mohamed" uniqKey="Jmaiel M" first="Mohamed" last="Jmaiel">Mohamed Jmaiel</name>
<affiliation wicri:level="1"><country xml:lang="fr">Tunisie</country>
<wicri:regionArea>ReDCAD Laboratory, National School of Engineers of Sfax, University of Sfax, BP 1173, 3038 Sfax</wicri:regionArea>
<wicri:noRegion>3038 Sfax</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Concurrency and Computation: Practice and Experience</title>
<title level="j" type="abbrev">Concurrency Computat.: Pract. Exper.</title>
<idno type="ISSN">1532-0626</idno>
<idno type="eISSN">1532-0634</idno>
<imprint><publisher>John Wiley & Sons, Ltd.</publisher>
<pubPlace>Chichester, UK</pubPlace>
<date type="published" when="2011-08-10">2011-08-10</date>
<biblScope unit="volume">23</biblScope>
<biblScope unit="issue">11</biblScope>
<biblScope unit="page" from="1196">1196</biblScope>
<biblScope unit="page" to="1212">1212</biblScope>
</imprint>
<idno type="ISSN">1532-0626</idno>
</series>
<idno type="istex">56DDC4288B518BBCC498668905DE776319284927</idno>
<idno type="DOI">10.1002/cpe.1696</idno>
<idno type="ArticleID">CPE1696</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">1532-0626</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>autonomous systems</term>
<term>checkpoint/rollback</term>
<term>decision phase</term>
<term>distributed applications</term>
<term>strong mobility</term>
</keywords>
<keywords scheme="Teeft" xml:lang="en"><term>Application entities</term>
<term>Application execution time</term>
<term>Application style</term>
<term>Application type</term>
<term>Appropriate checkpointing</term>
<term>Asynchronous</term>
<term>Checkpoint</term>
<term>Checkpointing</term>
<term>Checkpointing policy</term>
<term>Checkpointing protocol</term>
<term>Checkpointing technique</term>
<term>Checkpointing techniques</term>
<term>Code mobility</term>
<term>Computat</term>
<term>Computer science</term>
<term>Concurrency</term>
<term>Concurrency computat</term>
<term>Copyright</term>
<term>Current data</term>
<term>Decision rules</term>
<term>Design time</term>
<term>Destination host</term>
<term>Dynamic environments</term>
<term>Dynamic selection</term>
<term>Entity code</term>
<term>Execution context</term>
<term>Execution state</term>
<term>Execution time</term>
<term>Exper</term>
<term>Failure frequency</term>
<term>Global checkpoint</term>
<term>Grid</term>
<term>High performance</term>
<term>Ieee</term>
<term>Ieee computer society</term>
<term>Ieee transactions</term>
<term>Implementation details</term>
<term>International conference</term>
<term>International journal</term>
<term>Interruption point</term>
<term>Interruption points</term>
<term>Jmaiel</term>
<term>John wiley sons</term>
<term>Last checkpoint</term>
<term>Latency</term>
<term>Lecture notes</term>
<term>Load balancing</term>
<term>Many works</term>
<term>Marzouk</term>
<term>Message logging</term>
<term>Migration</term>
<term>Migration time</term>
<term>Mobility</term>
<term>Mobility delay</term>
<term>Mobility policy</term>
<term>Mobility technique</term>
<term>Mobility techniques</term>
<term>Mobility type</term>
<term>Mobility types</term>
<term>Mtbf</term>
<term>Next checkpoint</term>
<term>Next checkpoint position</term>
<term>Node</term>
<term>Other hand</term>
<term>Performance degradation</term>
<term>Periodic checkpointing</term>
<term>Pract</term>
<term>Resumption point</term>
<term>Rollback</term>
<term>Runtime</term>
<term>Scenario</term>
<term>Silver spring</term>
<term>Software</term>
<term>Software entity</term>
<term>Software mobility</term>
<term>Stable storage</term>
<term>Strong mobility</term>
<term>Synchronization</term>
<term>Technical report</term>
<term>Uncoordinated</term>
<term>Uncoordinated checkpointing</term>
<term>Useless checkpoints</term>
<term>Weak mobility</term>
<term>Whole application</term>
</keywords>
</textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">This paper has two purposes. First, it shows that existing solutions employing checkpointing and mobility in distributed applications, fix, at design time, the types and the techniques of checkpointing and mobility to be employed at runtime. Second, it provides policies allowing the dynamic selection of checkpointing and mobility techniques according to the execution environment. For that, this paper presents checkpointing and mobility techniques to evaluate them in order to identify their advantages and their shortcomings, and then determine the appropriate execution conditions in which a specific mobility technique becomes beneficial. This investigation will allow in assisting adaptation plans' generation and promoting future research in the area of self‐adaptivity of distributed applications. Copyright © 2011 John Wiley & Sons, Ltd.</div>
</front>
</TEI>
<affiliations><list><country><li>Tunisie</li>
</country>
</list>
<tree><country name="Tunisie"><noRegion><name sortKey="Marzouk, Soumaya" sort="Marzouk, Soumaya" uniqKey="Marzouk S" first="Soumaya" last="Marzouk">Soumaya Marzouk</name>
</noRegion>
<name sortKey="Jmaiel, Mohamed" sort="Jmaiel, Mohamed" uniqKey="Jmaiel M" first="Mohamed" last="Jmaiel">Mohamed Jmaiel</name>
<name sortKey="Marzouk, Soumaya" sort="Marzouk, Soumaya" uniqKey="Marzouk S" first="Soumaya" last="Marzouk">Soumaya Marzouk</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Sarre/explor/MusicSarreV3/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000374 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000374 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Sarre |area= MusicSarreV3 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:56DDC4288B518BBCC498668905DE776319284927 |texte= A survey on software checkpointing and mobility techniques in distributed systems }}
This area was generated with Dilib version V0.6.33. |