2008
DOI: 10.1145/1341312.1341341
|View full text |Cite
|
Sign up to set email alerts
|

Virtual machine time travel using continuous data protection and checkpointing

Abstract: Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve virtual machine availability, to enable forensics on past VM states, and to recover from operator errors. We present an approach to virtual machine time travel which combines Continuous Data Protection (CDP) storage support with live-migration-based virtual machine checkpointing. In particular, we present a novel approach for CDP which enabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…Also relevant is recent work on Octet, a JVM which provides a mechanism for performing low overhead deterministic replay with concurrent programs [9]. Checkpoint (snapshot) extraction is another topic that has been studied in a number of contexts including faultrecovery [50] and process migration [18,37,44]. The idea of piggybacking on the GC to perform a task (at low cost) has also been used for efficient heap invariant checking [46].…”
Section: Related Workmentioning
confidence: 99%
“…Also relevant is recent work on Octet, a JVM which provides a mechanism for performing low overhead deterministic replay with concurrent programs [9]. Checkpoint (snapshot) extraction is another topic that has been studied in a number of contexts including faultrecovery [50] and process migration [18,37,44]. The idea of piggybacking on the GC to perform a task (at low cost) has also been used for efficient heap invariant checking [46].…”
Section: Related Workmentioning
confidence: 99%
“…Parallax [27] developed by Warfield et al is a storage subsystem for Xen to be used in cluster Xen Virtual Machines. The solution proposed by the authors makes coupled checkpoints of both memory and disk using a Copy-on-Write mechanism (CoW) to maintain the remote images.…”
Section: Related Workmentioning
confidence: 99%
“…Let G(t) [27], [28] denote the expected (average) amount of execution time required to perform t units of useful computation. (Useful computation excludes the time spent on checkpointing and migration of jobs.)…”
Section: Checkpointing Overhead Ratiomentioning
confidence: 99%
“…A few techniques have been developed in contexts other than High Performance Computing leveraging the concept of virtualization. These target the debugging of embedded systems [24], distribute systems [25], or entire operating systems using time-travel techniques [26,27]. All of them target virtual machines (such as Xen [28] or IBM Hypervisor [29]) where the entire operating system is virtualized.…”
Section: Related Workmentioning
confidence: 99%