1999
DOI: 10.1002/(sici)1097-024x(199902)29:2<125::aid-spe224>3.0.co;2-7
|View full text |Cite
|
Sign up to set email alerts
|

Memory exclusion: optimizing the performance of checkpointing systems

Abstract: Checkpointing systems are a convenient way for users to make their programs fault-tolerant by intermittently saving program state to disk and restoring that state following a failure. The main concern with checkpointing is the overhead that it adds to running time of the program. This paper describes memory exclusion, an important class of optimizations that reduce the overhead of checkpointing. Some forms of memory exclusion are well-known in the checkpointing community. Others are relatively new. In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(48 citation statements)
references
References 26 publications
(43 reference statements)
0
48
0
Order By: Relevance
“…The second set of strategies reduce commit latencies by reducing checkpoint sizes. These strategies include memory exclusion [19] and incremental checkpointing [20]- [22]. In Section V, we discuss the potential interplay between these optimizations and checkpoint compression.…”
Section: A Checkpoint Optimizationsmentioning
confidence: 99%
“…The second set of strategies reduce commit latencies by reducing checkpoint sizes. These strategies include memory exclusion [19] and incremental checkpointing [20]- [22]. In Section V, we discuss the potential interplay between these optimizations and checkpoint compression.…”
Section: A Checkpoint Optimizationsmentioning
confidence: 99%
“…Hardware checkpointing resources are also rarely exposed to software, and are even less often configurable in terms of their checkpointing granularity, limiting their wider applicability. Finally, checkpoints have limited application visibility and are often overly aggressive in saving more state than is required by the application [9,27].…”
Section: Introductionmentioning
confidence: 99%
“…The other major direction is to reduce checkpoint overhead, especially the disk I/O time. Latency hiding and memory exclusion are two key techniques [16]. The studies in this category include copy-on-write [9], diskless checkpointing [17], and incremental checkpointing [5,20] There also exist several optimization techniques that utilize memory paging mechanisms to achieve fast process execution.…”
Section: Related Workmentioning
confidence: 99%
“…The effectiveness of FREM requires that the process only access a relatively small portion of its address space within a given time window after a checkpoint. This assumption is justified by two facts in practice: (1) many applications demonstrate good temporal locality in data accesses, and (2) applications using dynamic memory allocation may have a large amount of unused or dead data in their checkpoint image files [16].…”
Section: Main Ideamentioning
confidence: 99%