By Topic

Application-transparent checkpointing in Mach 3.O/UX

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
M. Russinovich ; Dept. of Comput. & Inf. Sci., Oregon Univ., Eugene, OR, USA ; Z. Segall

Checkpointing is perhaps the most explored of software based recovery techniques, yet it has typically been developed only for special purpose or research oriented operating systems. The paper presents virtual memory checkpointing algorithms that have been designed for concurrent Unix applications using a hard disk as the stable storage medium. These algorithms can serve as the checkpointing support required on each node of a distributed computation made up of concurrent processes running on each node. Snapshot algorithm execution, during which the application is suspended, typically is less than 10 seconds. Checkpoint commit execution, during which system performance is degraded as a checkpoint is written to disk, is less than 45 seconds. The checkpoint dedicated disk storage requirement for the implemented system is less than 10 MB. The implementation is based on the Mach 3.O/UX version of Unix 4.3BSD and uses Mach 3.0's external pager facility to back memory

Published in:

System Sciences, 1995. Proceedings of the Twenty-Eighth Hawaii International Conference on  (Volume:1 )

Date of Conference:

3-6 Jan 1995