Abstract
One of the low-level services Grids can benefit from is checkpointing. Unfortunately, the checkpointing technology imposes many common problems that are still open. The example of such often-encountered problems is recovering the identifiers of some checkpointed resources. This paper describes the idea of low-level virtualization of such identifiers. The mechanism allows overcoming the semantically imposed limitations.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Plank, J.S., Beck, M., Kingsley, G., Libckpt, K.L.: Transparent Checkpointing Under UNIX. In: Conference Proceedings, Usenix Winter 1995. Technical Conference, January 1995, pp. 213–223 (1995)
Zhong, H., Nieh, J.: CRACK: Linux Checkpointing / Restart As a Kernel Module. Technical Raport CUCS-014-01. Department of Computer Science. Columbia University (November 2002)
Pinheiro, E.: Truly-Transparent Checkpointing of Parallel Applications. Federal University of Rio de Janeiro UFRJ, http://www.research.rutgers.edu/edpin/epckpt/paper_html/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jankowski, G., Mikolajczak, R., Januszewski, R., Meyer, N., Stroinski, M. (2004). Resources Virtualization in Fault-Tolerance and Migration Issues. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science - ICCS 2004. ICCS 2004. Lecture Notes in Computer Science, vol 3036. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24685-5_63
Download citation
DOI: https://doi.org/10.1007/978-3-540-24685-5_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22114-2
Online ISBN: 978-3-540-24685-5
eBook Packages: Springer Book Archive