US20080092030A1 - Method and apparatus for template based parallel checkpointing - Google Patents

Method and apparatus for template based parallel checkpointing Download PDF

Info

Publication number
US20080092030A1
US20080092030A1 US11/953,037 US95303707A US2008092030A1 US 20080092030 A1 US20080092030 A1 US 20080092030A1 US 95303707 A US95303707 A US 95303707A US 2008092030 A1 US2008092030 A1 US 2008092030A1
Authority
US
United States
Prior art keywords
checkpoint
nodes
template
node
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/953,037
Inventor
Charles Archer
Todd Inglett
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/953,037 priority Critical patent/US20080092030A1/en
Publication of US20080092030A1 publication Critical patent/US20080092030A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1438Restarting or rejuvenating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents

Definitions

  • This invention generally relates to massively parallel computing systems and development, and more specifically relates to an application checkpointing method and apparatus.
  • Supercomputers continue to be developed to tackle sophisticated computing jobs. These computers are particularly useful to scientists for high performance computing (HPC) applications including life sciences, financial modeling, hydrodynamics, quantum chemistry, molecular dynamics, astronomy and space research and climate modeling. Supercomputer developers have focused on massively parallel computer structures to solve this need for increasingly complex computing needs.
  • One such massively parallel computer being developed by International Business Machines Corporation (IBM) is the Blue Gene system.
  • the Blue Gene system is a scalable system in which the maximum number of compute nodes is 65,536. Each node consists of a single ASIC (application specific integrated circuit) and memory. Each node typically has 512 megabytes of local memory.
  • the full computer would be housed in 64 racks or cabinets with 32 node boards in each. Each node board has 32 processors and the associated memory for each processor.
  • Blue Gene supercomputer's 65,536 computational nodes and 1024 I/O processors are arranged into both a logical tree network and a logical 3-dimensional torus network.
  • Blue Gene can be described as a compute node core with an I/O node surface.
  • Each I/O node handles the input and output function of 64 compute nodes.
  • the I/O nodes have no local storage.
  • the IO nodes are connected to the compute nodes through the tree network and also have functional wide area network capabilities through its built in gigabit ethernet network.
  • checkpointing On a super computer system like Blue Gene, the mean time before failure of any hardware or software component may be measured in hours and the complex computing programs describe above may take several hours to several days to run. If a machine is brought down for maintenance, software upgrades, or because an application crashes there needs to be a way to store the current state of the computer so that execution can resume where it left off when the hardware is able to continue executing.
  • the process of saving the state of a running application is known in the art as “checkpointing.”
  • checkpointing the application saves the state of the application in a recoverable fashion so that the application can continue from the checkpoint location.
  • the traditional way to do checkpointing is to take a memory “snapshot” of the application and save this image to disk. This can be accomplished either by system level checkpointing, or by using application level checkpointing libraries.
  • checkpointing 65,536 compute node processors there is a scalability issue of checkpointing 65,536 compute node processors to persistent storage. Each compute node has 512 megabytes (up to 2 GB) of memory, or in total 32 gigabytes of memory per IO node. In all there are 1024 IO nodes, each potentially handling 32 gigabytes of checkpoint data, for a total of 32 terabytes stored to disk.
  • Checkpointing causes an enormous load on the storage system and interconnect.
  • Prior art techniques to overcome the checkpoint storage problems include incremental checkpointing or difference based checkpointing. Compression of the checkpoint storage but may be combined with these other checkpointing methods.
  • Incremental checkpointing or difference based checkpointing is a method to save only the differences between previous checkpoints.
  • differences are calculated at each of the nodes from a template file or previous checkpoint.
  • Each node saves its difference file through the file system to disk.
  • the difference calculation requires both the template file and the data file to be available to the CPU, and thus the template file must be transferred to each compute node.
  • Each node must then calculate differences from the template file, using significant aggregate CPU and bandwidth.
  • a method and apparatus for parallel rsync-based checkpointing is described for a massively parallel super computer system.
  • Embodiments herein include a parallel variation of the rsync protocol, compression and network broadcast to improve application checkpointing in a massively parallel super computer environment.
  • the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced by a memory dump or previous checkpoint of the application.
  • Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system.
  • Embodiments herein are directed to a checkpoint that represents the entire content of memory, or a specified portion of the memory from all compute nodes in the cluster.
  • the checkpoint contains a set of actual data blocks each of small size with their corresponding checksums. These data blocks represent data from all nodes in the system.
  • the checkpoint contains a list or template of references to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node.
  • the data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.
  • FIG. 1 is a block diagram of a computer system according to the prior art
  • FIG. 2 is a block diagram of a massively parallel computer system according to the prior art
  • FIG. 3 is a block diagram of a computer system according to preferred embodiments.
  • FIG. 4 is a block diagram of a massively parallel computer system according to preferred embodiments.
  • FIG. 5 is a diagram of a checkpoint structure showing check point memory blocks, memory templates and their associated memory images according to a preferred embodiment
  • FIG. 6 is a method flow diagram for checkpointing a massively parallel computer system according to a preferred embodiment.
  • FIG. 7 is a method flow diagram for restoring a massively parallel computer system to a checkpoint according to a preferred embodiment.
  • the present invention relates to an apparatus and method for checkpointing a massively parallel computer system using a parallel variation of the rsync protocol with a rolling checksum algorithm.
  • the rsync Overview Section immediately below is intended to provide an introductory explanation of basic rsync concepts for individuals who need additional background in this area. Those who are skilled in the art may wish to skip this section and begin with the Detailed Description Section instead.
  • rsync Recent developments have been made on a method to save incremental differences of a computer file from one machine to another machine without transmitting an entire memory image from one machine to another. This method is called “rsync”.
  • the rsync software and method is open source. Information about rsync is widely available.
  • the rsync method uses an “rsync algorithm” which provides a very fast method for bringing remote files into synchronization. It does this by sending just the differences in the files across the link, without requiring that both sets of files are present at one of the ends of the link beforehand.
  • the rsync algorithm addresses the problem where the prior methods for creating a set of differences between two files relied on being able to read both files on the same machine.
  • the rsync algorithm can be stated as follows: Given two computers a and b. Computer a has access to a file A and computer b has access to file B, where files A and B are “similar” and there is a relatively slow communications link between a and b.
  • the rsync algorithm consists of the following steps:
  • Embodiments herein include an application of the rsync protocol, compression and network broadcast to improve application checkpointing in a massively parallel super computer environment. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system.
  • FIG. 1 shows a block diagram that represents a prior art computer system 100 such as the Blue Gene computer system.
  • a checkpoint server 110 is connected to the super computer system 120 through one or more communication links 130 .
  • the super computer system 120 executes an application program to solve a problem as described in the background.
  • one of the communication links 130 that connects the checkpoint server 110 to the super computer system 120 is essentially a standard ethernet network connection.
  • the Blue Gene computer system includes several other communication links and networks that connect the computer system that are not particularly pertinent to the present invention.
  • the checkpoint server may encompass multiple entities.
  • each physical checkpoint server may be a checkpoint server for a group of I/O nodes and communicate with the other checkpoint servers.
  • FIG. 2 shows a block diagram that represents the logical tree network 200 of a computer system such as the Blue Gene computer system.
  • the compute nodes in the cluster are organized into a tree hierarchy as shown.
  • the top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer.
  • the checkpoint server is a non-compute node that is the topmost node of the tree hierarchy.
  • the checkpoint server is connected to the I/O nodes of the computer system 100 for the tree network by an interface 210 .
  • Each of the I/O nodes is connected to a first compute node at the compute surface of the computer.
  • Each compute node except for the last level (not shown) may have one or two children nodes 220 in a tree structure.
  • the nodes are shown with a balanced tree with two children each for simplicity.
  • Each I/O node has 64 total compute nodes in the tree (not all are shown).
  • FIG. 3 shows a block diagram that represents a computer system 300 such as the Blue Gene computer system using a checkpoint save/restore mechanism 322 per embodiments described herein.
  • the checkpoint server 310 is connected to the super computer system 320 through one or more communication links 330 .
  • the super computer system 320 executes an application program to solve a problem as described in the background.
  • the described embodiments herein are directed to the Blue Gene architecture but can be implemented on any cluster of compute nodes with a high speed interconnect that can perform broadcast communications.
  • FIG. 4 shows a block diagram that represents the massively parallel computer system 320 arranged in a logical tree network 420 where each I/O node 410 and each compute node 420 incorporates a checkpoint save/restore mechanism 412 according to an embodiment herein.
  • the overall computer system structure is the same as that described above.
  • the compute nodes in the cluster are organized into a tree hierarchy as shown.
  • the top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer.
  • the checkpoint server is a non-compute node that is the topmost node of the tree hierarchy.
  • the checkpoint server is connected to the I/O nodes 210 of the computer system 300 in a tree network.
  • Each of the I/O nodes 410 is connected to a first compute node 410 at the compute surface 420 of the computer.
  • Each compute node except for the last level may have one or two children nodes in a tree structure.
  • the nodes are shown with a balanced tree with two children each for simplicity.
  • Each I/O node has 64 compute nodes in the tree.
  • one of the communication links 330 that connects the checkpoint server 310 to the super computer system 320 is essentially a standard ethernet network connection.
  • the Blue Gene computer system includes several other communication links and networks that connect the computer system that are not particularly pertinent to the present invention.
  • the check point server 310 collects and stores a checkpoint of the super computer system 320 as described below.
  • the checkpoint represents the content of memory of all compute nodes in the cluster. In the specific case of Blue Gene this will be 65,536 nodes each containing 512 megabytes (up to 2 GB) of memory.
  • the checkpoint contains a set of small sized data blocks with their corresponding checksums. These data blocks represent data from all nodes in the system. For each node in the system the checkpoint contains a list of references or a template to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node.
  • the template of references between any pair of nodes will contain much overlap of actual data blocks.
  • the actual pool of data blocks will be significantly smaller in size than the sum total of memory in the cluster.
  • the stored checkpoint represents the entire content of memory, or a specified portion of the memory from all compute nodes in the cluster.
  • Checkpointing the entire memory provides a system checkpoint. A specified portion less than the entire memory may be used to provide an application checkpoint, or a checkpoint of a subset of an application.
  • the checkpoint contains a set of actual data blocks each of small size with their corresponding checksums. These data blocks represent data from all nodes in the system. For each node in the system the checkpoint contains a template of references to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node. Further, the data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.
  • the compute nodes in the cluster are organized into a tree hierarchy as shown but could be organized using other network topologies such as proximity to each other on the network (subnet) or by blade of a switch.
  • the top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer.
  • the storage device includes a check point server 310 as shown in FIG. 4 .
  • the checkpoint server is a non-compute node that is the topmost node of the tree hierarchy.
  • the checkpoint server is connected to the I/O nodes of the computer system 100 for the tree network by an interface 330 . In Blue Gene, this network is an ethernet network.
  • Each of the I/O nodes is connected to a first compute node at the compute surface of the computer.
  • Each compute node except for the last level (not shown) has two children nodes in a tree structure as shown.
  • Each I/O node has 64 compute nodes in the tree.
  • the checkpoint server could be a compute node of the same cluster.
  • the checkpoint server usually begins with a previously written checkpoint. Since the data in all nodes is often the same when processing begins, the first checkpoint is generated as a data image that can be read or computed by the checkpoint server without extensive communication with the compute nodes. In the case of an application this will be the executable program image, or in the case of a partial application data checkpoint it may just assume an image of all zeros.
  • This initial checkpoint is this memory image broken into data blocks and all nodes contain the same list of references to these data blocks. The list of data block checksums for each node form a template to recreate the memory using the stored data blocks.
  • the checkpoint save/restore mechanism described above can be implemented as a system kernel of code residing in each of the I/O nodes and compute nodes.
  • the save restore mechanism performs the procedures described below to save the state of the computer system or a checkpoint on the checkpoint server.
  • FIG. 5 shows a diagram of a checkpoint structure 500 showing check point memory blocks 510 , memory templates 520 and their associated memory images 530 according to a preferred embodiment.
  • the memory blocks 510 are archived on the checkpoint server 310 ( FIG. 3 ). Each memory block 510 is preferably unique.
  • the memory blocks 510 shown in FIG. 5 are given an alphabetic identifier (A through J) for illustration and discussion.
  • Each node in the system has a template 520 that servers to identify which of the memory blocks stored in the checkpoint server 310 make up the memory of the respective node.
  • the template holds a list of pointers or numbers in the order of the memory image that point to the memory blocks 510 .
  • the template can be used to assemble a memory image 530 for the associated node. The process to create the template, the memory archive and to restore the memory image are described further below.
  • the application decides it is time to create a checkpoint. To do this, the application saves the necessary state into its own memory and initiates the checkpoint.
  • One of the nodes in the application notifies the checkpoint server to begin checkpoint.
  • the checkpoint server responds by broadcasting the list of data block checksums to all compute nodes in the cluster.
  • the compute nodes search their own memory image for checksum matches using the rsync protocol rolling checksum algorithm. This is very compute intensive but the nodes are able to perform this step in parallel with each other so a 65,536 node system will finish in the same time as a single node system.
  • each compute node is finished analyzing its own memory image it will produce a template of new data blocks with checksums that didn't exist in the previous checkpoint, and it will produce a template of references to the original data blocks that did exist in the previous checkpoint.
  • each node sends its updated checksum template to its parent node in the hierarchy of nodes.
  • Each node receives the checksum template from all of its children in the hierarchy. If a node has no children it will skip this step. By comparing checksums this node finds common data blocks between all children as well as its own data blocks. Note that all nodes at this level of the hierarchy are executing this step in parallel with each other. Once it has found common blocks by comparing these checksums it informs the children of this fact telling them to replace its reference to such a data block with a reference to a data block on another node (either another child or the parent).
  • the process is repeated by having each node send the complete checksum template to its parent until the top of the hierarchy is reached.
  • the top of the hierarchy will be the checkpoint server.
  • non-compute nodes such as the checkpoint server
  • a non-compute node will perform the same steps except it has no local data checksums to compare against child data checksums. But it can still perform the other steps.
  • the I/O nodes would be non-compute nodes that are part of the hierarchy.
  • the checkpoint server asks for the data for the new unique data blocks that were not part of the original checkpoint image.
  • the compute nodes send this data to the checkpoint server after first compressing the data using standard compute-intensive data compression algorithms. The compression occurs in parallel on the nodes that have the data. Once the data is received and stored the checkpoint operation is complete and the compute nodes are resumed.
  • FIG. 6 shows a method 600 of parallel checkpointing according to embodiments herein.
  • the checkpoint server starts the checkpoint when instructed by the application or otherwise as described above.
  • the checkpoint server first broadcasts the template of data block checksums to all compute nodes in the cluster (step 610 ).
  • the compute nodes search their own memory image for checksum matches using the rsync protocol rolling checksum algorithm (step 620 ).
  • each compute node analyzes its own memory image it produces a template of new data blocks with checksums that didn't exist in the previous checkpoint, and a template of references to the original data blocks that did exist in the previous checkpoint (step 630 ).
  • Each compute node then sends its new data block checksum template to its parent node in the hierarchy of nodes (step 640 ).
  • Nodes receive the checksum template from all of its children in the hierarchy and find common data blocks between all children as well as its own data blocks, informs the children to replace its reference to common data block with a reference to a data block on another node (step 650 ).
  • the checkpoint server will collect those reference templates from the compute nodes and store them in the checkpoint server (step 670 ).
  • the checkpoint server asks for the data for the new unique data blocks that were not part of the original checkpoint image from the compute nodes and stores them (step 680 ). The method of checkpointing is then complete and the application can proceed with normal processing.
  • the compute nodes could maintain a local cache of checksums from a previous checkpoint so the broadcast may be eliminated. Since caching the checksums takes additional storage this may be done on some or all the clusters where storage is available.
  • the final checkpoint image may contain a “history” of checkpoint images. This is implemented by archiving the node reference templates from previous checkpoints. This may actually increase efficiency if nodes return to previous memory state after a period of execution (or if the state moves from one node to another). This also allows the application to be “rolled back” to previous checkpoints for analysis or debug.
  • Storage of the new data blocks can be performed in parallel.
  • the compute nodes might forward the data to the I/O nodes and the I/O nodes will store the data to unique storage servers leveraging 1024 gigabit network lines rather than funneling through a single gigabit ethernet line.
  • the checkpoint server does not need to actually see the data blocks. All it needs are the checksums of the data blocks. So, the data blocks can be stored on auxiliary storage servers tuned for that purpose.
  • the checkpoint server itself may leverage a high speed database to track the references.
  • the checkpoint is not limited to an application image.
  • the checkpoint could be a subset of data to be stored by an application, or the checkpoint could be a memory image for a system crash dump.
  • the pool of data blocks could be common across checkpoints of differing applications. This may be useful if applications share a large amount of common code.
  • the references templates can be optimized by exploiting commonality. They could be divided into “references of references” so that a subset of the template can be shared. For example, the reference template for the memory containing application instructions is unlikely to change between nodes and this subset of the reference template could be shared. If the reference templates are large enough they could be treated as a memory image and the entire algorithm repeated over this memory image.
  • the last stored checkpoint can be used to restore the computer system to the conditions of the stored checkpoint.
  • Restoring a checkpoint uses the stored reference template for each node.
  • the checkpoint server performs the restore as follows. The checkpoint server first sends reference template to each node in the system. Each compute node receives its reference template and prepares to receive broadcast data from the checkpoint server. For each data block referenced by the union of all compute node reference templates, the checkpoint server broadcasts that data block onto the network. For each data block received via broadcast each compute node examines its reference template to see if it refers to this data block.
  • the compute node copies the data block contents into place in memory.
  • the checkpoint server broadcasts a start message. This message implies that the restore is complete and the compute nodes should begin processing to their saved location which is part of the restored memory image.
  • FIG. 7 shows a method 700 of a parallel checkpoint restore according to embodiments herein.
  • the checkpoint server starts the checkpoint restore when instructed by the application or otherwise as described above.
  • the checkpoint server first sends the reference template of the data blocks to each compute node (step 710 ).
  • the checkpoint server then broadcasts the reference template of data block checksums to all compute nodes in the cluster (step 720 ).
  • the compute nodes copy data from the broadcast for checksum that matches its own reference template (step 730 ).
  • the checkpoint server then broadcasts a message to start the application from the point of the now restored checkpoint (step 740 ).
  • embodiments provide a method and apparatus for parallel rsync-based checkpoint for a massively parallel super computer system.
  • Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system to solve the prior art problem of network bandwidth and CPU time needed to checkpoint the progress of the software application.
  • the present invention leverages off of the prior art that used checksum algorithms like rsync to copy a computer file from one machine to another.
  • the preferred embodiments describe a method and apparatus for making a template checkpoint of the computer memory in a massively parallel computer system using a checksum algorithm such as rsync applied in a parallel fashion.

Abstract

A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel checksum algorithm such as rsync. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This patent application is a divisional of a patent application with the same title, U.S. ser. No. 11/106,010 filed on Apr. 14, 2005, which is incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • This invention generally relates to massively parallel computing systems and development, and more specifically relates to an application checkpointing method and apparatus.
  • 2. Background Art
  • Supercomputers continue to be developed to tackle sophisticated computing jobs. These computers are particularly useful to scientists for high performance computing (HPC) applications including life sciences, financial modeling, hydrodynamics, quantum chemistry, molecular dynamics, astronomy and space research and climate modeling. Supercomputer developers have focused on massively parallel computer structures to solve this need for increasingly complex computing needs. One such massively parallel computer being developed by International Business Machines Corporation (IBM) is the Blue Gene system. The Blue Gene system is a scalable system in which the maximum number of compute nodes is 65,536. Each node consists of a single ASIC (application specific integrated circuit) and memory. Each node typically has 512 megabytes of local memory. The full computer would be housed in 64 racks or cabinets with 32 node boards in each. Each node board has 32 processors and the associated memory for each processor.
  • The Blue Gene supercomputer's 65,536 computational nodes and 1024 I/O processors are arranged into both a logical tree network and a logical 3-dimensional torus network. ! Blue Gene can be described as a compute node core with an I/O node surface. Each I/O node handles the input and output function of 64 compute nodes. The I/O nodes have no local storage. The IO nodes are connected to the compute nodes through the tree network and also have functional wide area network capabilities through its built in gigabit ethernet network.
  • On a super computer system like Blue Gene, the mean time before failure of any hardware or software component may be measured in hours and the complex computing programs describe above may take several hours to several days to run. If a machine is brought down for maintenance, software upgrades, or because an application crashes there needs to be a way to store the current state of the computer so that execution can resume where it left off when the hardware is able to continue executing. The process of saving the state of a running application is known in the art as “checkpointing.” Thus, checkpointing the application saves the state of the application in a recoverable fashion so that the application can continue from the checkpoint location. The traditional way to do checkpointing is to take a memory “snapshot” of the application and save this image to disk. This can be accomplished either by system level checkpointing, or by using application level checkpointing libraries.
  • On Blue Gene, there is a scalability issue of checkpointing 65,536 compute node processors to persistent storage. Each compute node has 512 megabytes (up to 2 GB) of memory, or in total 32 gigabytes of memory per IO node. In all there are 1024 IO nodes, each potentially handling 32 gigabytes of checkpoint data, for a total of 32 terabytes stored to disk. Checkpointing causes an incredible load on the storage system and interconnect. Prior art techniques to overcome the checkpoint storage problems include incremental checkpointing or difference based checkpointing. Compression of the checkpoint storage but may be combined with these other checkpointing methods.
  • Incremental checkpointing or difference based checkpointing is a method to save only the differences between previous checkpoints. In this method, differences are calculated at each of the nodes from a template file or previous checkpoint. Each node saves its difference file through the file system to disk. Typically, the difference calculation requires both the template file and the data file to be available to the CPU, and thus the template file must be transferred to each compute node. Each node must then calculate differences from the template file, using significant aggregate CPU and bandwidth.
  • Without a way to checkpoint massively parallel computer system that does not require the template file and the data file available to the CPU the super computers will need to continue to use a burdensome amount of network bandwidth and CPU time to checkpoint the progress of the software application.
  • DISCLOSURE OF INVENTION
  • According to the preferred embodiments, a method and apparatus for parallel rsync-based checkpointing is described for a massively parallel super computer system. Embodiments herein include a parallel variation of the rsync protocol, compression and network broadcast to improve application checkpointing in a massively parallel super computer environment. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced by a memory dump or previous checkpoint of the application. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system.
  • The disclosed embodiments are directed to the Blue Gene architecture but can be implemented on any cluster with a high speed interconnect that can perform broadcast communication. Embodiments herein are directed to a checkpoint that represents the entire content of memory, or a specified portion of the memory from all compute nodes in the cluster. The checkpoint contains a set of actual data blocks each of small size with their corresponding checksums. These data blocks represent data from all nodes in the system. For each node in the system the checkpoint contains a list or template of references to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.
  • The foregoing and other features and advantages of the invention will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The preferred embodiments of the present invention will hereinafter be described in conjunction with the appended drawings, where like designations denote like elements, and:
  • FIG. 1 is a block diagram of a computer system according to the prior art;
  • FIG. 2 is a block diagram of a massively parallel computer system according to the prior art;
  • FIG. 3 is a block diagram of a computer system according to preferred embodiments;
  • FIG. 4 is a block diagram of a massively parallel computer system according to preferred embodiments;
  • FIG. 5 is a diagram of a checkpoint structure showing check point memory blocks, memory templates and their associated memory images according to a preferred embodiment;
  • FIG. 6 is a method flow diagram for checkpointing a massively parallel computer system according to a preferred embodiment; and
  • FIG. 7 is a method flow diagram for restoring a massively parallel computer system to a checkpoint according to a preferred embodiment.
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • The present invention relates to an apparatus and method for checkpointing a massively parallel computer system using a parallel variation of the rsync protocol with a rolling checksum algorithm. The rsync Overview Section immediately below is intended to provide an introductory explanation of basic rsync concepts for individuals who need additional background in this area. Those who are skilled in the art may wish to skip this section and begin with the Detailed Description Section instead.
  • rsync Overview
  • Recent developments have been made on a method to save incremental differences of a computer file from one machine to another machine without transmitting an entire memory image from one machine to another. This method is called “rsync”. The rsync software and method is open source. Information about rsync is widely available. The rsync method uses an “rsync algorithm” which provides a very fast method for bringing remote files into synchronization. It does this by sending just the differences in the files across the link, without requiring that both sets of files are present at one of the ends of the link beforehand. The rsync algorithm addresses the problem where the prior methods for creating a set of differences between two files relied on being able to read both files on the same machine.
  • The rsync algorithm can be stated as follows: Given two computers a and b. Computer a has access to a file A and computer b has access to file B, where files A and B are “similar” and there is a relatively slow communications link between a and b. The rsync algorithm consists of the following steps:
      • 1. Computer b splits the file B into a series of non-overlapping fixed-sized blocks of size S bytes. The last block may be shorter than S bytes.
      • 2. For each of these blocks b calculates two checksums: a weak “rolling” 32-bit checksum (described below) and a strong 128-bit MD4 checksum.
      • 3. b sends these checksums to a.
      • 4. a searches through A to find all blocks of length S bytes (at any offset, not just multiples of S) that have the same weak and strong checksum as one of the blocks of B. This can be done in a single pass very quickly using a special property of the rolling checksum described below.
      • 5. a sends b a sequence of instructions for constructing a copy of A. Each instruction is either a reference to a block of B, or literal data. Literal data is sent only for those sections of A which did not match any of the blocks of B.
      • 6. Computer b writes an updated file by interpreting the instructions received in step 5. The result is an identical copy of file A.
  • The end result is that B gets a copy of A, but only the pieces of A that are not found in B (plus a small amount of data for checksums and block indexes) are sent over the link. The algorithm also only requires one round trip, which minimizes the impact of the link latency. An important aspect of the algorithm is the rolling checksum and the associated multi-alternate search mechanism which allows the all-offsets checksum search to proceed very quickly. Further details of the rolling checksum and search mechanism are widely available on the internet and are not described in detail herein.
  • DETAILED DESCRIPTION
  • In accordance with the present invention, a method and apparatus is described for a massively parallel super computer system to perform template based checkpointing using a parallel application of a rolling checksum algorithm. Embodiments herein include an application of the rsync protocol, compression and network broadcast to improve application checkpointing in a massively parallel super computer environment. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system.
  • FIG. 1 shows a block diagram that represents a prior art computer system 100 such as the Blue Gene computer system. A checkpoint server 110 is connected to the super computer system 120 through one or more communication links 130. The super computer system 120 executes an application program to solve a problem as described in the background. In the Blue Gene computer system, one of the communication links 130 that connects the checkpoint server 110 to the super computer system 120 is essentially a standard ethernet network connection. The Blue Gene computer system includes several other communication links and networks that connect the computer system that are not particularly pertinent to the present invention. In other embodiments the checkpoint server may encompass multiple entities. For example, each physical checkpoint server may be a checkpoint server for a group of I/O nodes and communicate with the other checkpoint servers.
  • FIG. 2 shows a block diagram that represents the logical tree network 200 of a computer system such as the Blue Gene computer system. The compute nodes in the cluster are organized into a tree hierarchy as shown. The top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer. The checkpoint server is a non-compute node that is the topmost node of the tree hierarchy. The checkpoint server is connected to the I/O nodes of the computer system 100 for the tree network by an interface 210. Each of the I/O nodes is connected to a first compute node at the compute surface of the computer. Each compute node except for the last level (not shown) may have one or two children nodes 220 in a tree structure. The nodes are shown with a balanced tree with two children each for simplicity. Each I/O node has 64 total compute nodes in the tree (not all are shown).
  • FIG. 3 shows a block diagram that represents a computer system 300 such as the Blue Gene computer system using a checkpoint save/restore mechanism 322 per embodiments described herein. The checkpoint server 310 is connected to the super computer system 320 through one or more communication links 330. The super computer system 320 executes an application program to solve a problem as described in the background. The described embodiments herein are directed to the Blue Gene architecture but can be implemented on any cluster of compute nodes with a high speed interconnect that can perform broadcast communications.
  • FIG. 4 shows a block diagram that represents the massively parallel computer system 320 arranged in a logical tree network 420 where each I/O node 410 and each compute node 420 incorporates a checkpoint save/restore mechanism 412 according to an embodiment herein. The overall computer system structure is the same as that described above. The compute nodes in the cluster are organized into a tree hierarchy as shown. The top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer. The checkpoint server is a non-compute node that is the topmost node of the tree hierarchy. The checkpoint server is connected to the I/O nodes 210 of the computer system 300 in a tree network. Each of the I/O nodes 410 is connected to a first compute node 410 at the compute surface 420 of the computer.
  • Each compute node except for the last level (not shown) may have one or two children nodes in a tree structure. The nodes are shown with a balanced tree with two children each for simplicity. Each I/O node has 64 compute nodes in the tree. In the Blue Gene computer system, one of the communication links 330 that connects the checkpoint server 310 to the super computer system 320 is essentially a standard ethernet network connection. The Blue Gene computer system includes several other communication links and networks that connect the computer system that are not particularly pertinent to the present invention.
  • The check point server 310 collects and stores a checkpoint of the super computer system 320 as described below. The checkpoint represents the content of memory of all compute nodes in the cluster. In the specific case of Blue Gene this will be 65,536 nodes each containing 512 megabytes (up to 2 GB) of memory. The checkpoint contains a set of small sized data blocks with their corresponding checksums. These data blocks represent data from all nodes in the system. For each node in the system the checkpoint contains a list of references or a template to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node. Since there is much commonality to the content between the nodes in the system (because they are running the same parallel application) the template of references between any pair of nodes will contain much overlap of actual data blocks. Thus, the actual pool of data blocks will be significantly smaller in size than the sum total of memory in the cluster.
  • In preferred embodiments, the stored checkpoint represents the entire content of memory, or a specified portion of the memory from all compute nodes in the cluster. Checkpointing the entire memory provides a system checkpoint. A specified portion less than the entire memory may be used to provide an application checkpoint, or a checkpoint of a subset of an application. The checkpoint contains a set of actual data blocks each of small size with their corresponding checksums. These data blocks represent data from all nodes in the system. For each node in the system the checkpoint contains a template of references to these data blocks such that if the actual data blocks were collected together in order they would represent the memory image of that node. Further, the data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.
  • In preferred embodiments, the compute nodes in the cluster are organized into a tree hierarchy as shown but could be organized using other network topologies such as proximity to each other on the network (subnet) or by blade of a switch. The top of the logical tree network is a storage device connected to the computer at an I/O control surface of the computer. In the preferred embodiment described herein, the storage device includes a check point server 310 as shown in FIG. 4. The checkpoint server is a non-compute node that is the topmost node of the tree hierarchy. The checkpoint server is connected to the I/O nodes of the computer system 100 for the tree network by an interface 330. In Blue Gene, this network is an ethernet network. Each of the I/O nodes is connected to a first compute node at the compute surface of the computer. Each compute node except for the last level (not shown) has two children nodes in a tree structure as shown. Each I/O node has 64 compute nodes in the tree. On a general purpose cluster the checkpoint server could be a compute node of the same cluster.
  • The checkpoint server usually begins with a previously written checkpoint. Since the data in all nodes is often the same when processing begins, the first checkpoint is generated as a data image that can be read or computed by the checkpoint server without extensive communication with the compute nodes. In the case of an application this will be the executable program image, or in the case of a partial application data checkpoint it may just assume an image of all zeros. This initial checkpoint is this memory image broken into data blocks and all nodes contain the same list of references to these data blocks. The list of data block checksums for each node form a template to recreate the memory using the stored data blocks.
  • The checkpoint save/restore mechanism described above can be implemented as a system kernel of code residing in each of the I/O nodes and compute nodes. The save restore mechanism performs the procedures described below to save the state of the computer system or a checkpoint on the checkpoint server.
  • FIG. 5 shows a diagram of a checkpoint structure 500 showing check point memory blocks 510, memory templates 520 and their associated memory images 530 according to a preferred embodiment. The memory blocks 510 are archived on the checkpoint server 310 (FIG. 3). Each memory block 510 is preferably unique. The memory blocks 510 shown in FIG. 5 are given an alphabetic identifier (A through J) for illustration and discussion. Each node in the system has a template 520 that servers to identify which of the memory blocks stored in the checkpoint server 310 make up the memory of the respective node. The template holds a list of pointers or numbers in the order of the memory image that point to the memory blocks 510. The template can be used to assemble a memory image 530 for the associated node. The process to create the template, the memory archive and to restore the memory image are described further below.
  • The process to save a checkpoint on the checkpoint server by the checkpoint save/restore mechanism will now be described. At some point in execution the application decides it is time to create a checkpoint. To do this, the application saves the necessary state into its own memory and initiates the checkpoint. One of the nodes in the application notifies the checkpoint server to begin checkpoint. The checkpoint server responds by broadcasting the list of data block checksums to all compute nodes in the cluster. The compute nodes then search their own memory image for checksum matches using the rsync protocol rolling checksum algorithm. This is very compute intensive but the nodes are able to perform this step in parallel with each other so a 65,536 node system will finish in the same time as a single node system. When each compute node is finished analyzing its own memory image it will produce a template of new data blocks with checksums that didn't exist in the previous checkpoint, and it will produce a template of references to the original data blocks that did exist in the previous checkpoint.
  • The checkpoint continues by each node sending its updated checksum template to its parent node in the hierarchy of nodes. Each node receives the checksum template from all of its children in the hierarchy. If a node has no children it will skip this step. By comparing checksums this node finds common data blocks between all children as well as its own data blocks. Note that all nodes at this level of the hierarchy are executing this step in parallel with each other. Once it has found common blocks by comparing these checksums it informs the children of this fact telling them to replace its reference to such a data block with a reference to a data block on another node (either another child or the parent).
  • The process is repeated by having each node send the complete checksum template to its parent until the top of the hierarchy is reached. The top of the hierarchy will be the checkpoint server. Note that non-compute nodes, such as the checkpoint server, can be part of the checkpoint hierarchy. A non-compute node will perform the same steps except it has no local data checksums to compare against child data checksums. But it can still perform the other steps. In Blue Gene the I/O nodes would be non-compute nodes that are part of the hierarchy. Once the checkpoint server is reached in the hierarchy all common data blocks will be identified and all compute nodes will have been notified to update their reference templates. At this point the checkpoint server will collect those reference templates from the compute nodes. These templates are very small compared to the overall memory images of the compute nodes. These templates are stored in the checkpoint.
  • Finally, the checkpoint server asks for the data for the new unique data blocks that were not part of the original checkpoint image. The compute nodes send this data to the checkpoint server after first compressing the data using standard compute-intensive data compression algorithms. The compression occurs in parallel on the nodes that have the data. Once the data is received and stored the checkpoint operation is complete and the compute nodes are resumed.
  • FIG. 6 shows a method 600 of parallel checkpointing according to embodiments herein. The checkpoint server starts the checkpoint when instructed by the application or otherwise as described above. The checkpoint server first broadcasts the template of data block checksums to all compute nodes in the cluster (step 610). The compute nodes then search their own memory image for checksum matches using the rsync protocol rolling checksum algorithm (step 620). After each compute node analyzes its own memory image it produces a template of new data blocks with checksums that didn't exist in the previous checkpoint, and a template of references to the original data blocks that did exist in the previous checkpoint (step 630). Each compute node then sends its new data block checksum template to its parent node in the hierarchy of nodes (step 640). Nodes receive the checksum template from all of its children in the hierarchy and find common data blocks between all children as well as its own data blocks, informs the children to replace its reference to common data block with a reference to a data block on another node (step 650). The process is repeated by having this node send the complete checksum template to its parent until the top of the hierarchy is reached (step 660=no). Once the top of the hierarchy (checkpoint server) is reached (step 660=yes), the checkpoint server will collect those reference templates from the compute nodes and store them in the checkpoint server (step 670). Finally, the checkpoint server asks for the data for the new unique data blocks that were not part of the original checkpoint image from the compute nodes and stores them (step 680). The method of checkpointing is then complete and the application can proceed with normal processing.
  • Other Embodiments of the Checkpoint Save
  • The compute nodes could maintain a local cache of checksums from a previous checkpoint so the broadcast may be eliminated. Since caching the checksums takes additional storage this may be done on some or all the clusters where storage is available. The final checkpoint image may contain a “history” of checkpoint images. This is implemented by archiving the node reference templates from previous checkpoints. This may actually increase efficiency if nodes return to previous memory state after a period of execution (or if the state moves from one node to another). This also allows the application to be “rolled back” to previous checkpoints for analysis or debug.
  • Storage of the new data blocks can be performed in parallel. For example, in Blue Gene the compute nodes might forward the data to the I/O nodes and the I/O nodes will store the data to unique storage servers leveraging 1024 gigabit network lines rather than funneling through a single gigabit ethernet line.
  • The checkpoint server does not need to actually see the data blocks. All it needs are the checksums of the data blocks. So, the data blocks can be stored on auxiliary storage servers tuned for that purpose. The checkpoint server itself may leverage a high speed database to track the references. The checkpoint is not limited to an application image. The checkpoint could be a subset of data to be stored by an application, or the checkpoint could be a memory image for a system crash dump.
  • The pool of data blocks could be common across checkpoints of differing applications. This may be useful if applications share a large amount of common code. Further, the references templates can be optimized by exploiting commonality. They could be divided into “references of references” so that a subset of the template can be shared. For example, the reference template for the memory containing application instructions is unlikely to change between nodes and this subset of the reference template could be shared. If the reference templates are large enough they could be treated as a memory image and the entire algorithm repeated over this memory image.
  • Parallel Checkpoint Restore
  • When the computer system needs to recover from an error or when directed by a system operator, the last stored checkpoint can be used to restore the computer system to the conditions of the stored checkpoint. Restoring a checkpoint uses the stored reference template for each node. The checkpoint server performs the restore as follows. The checkpoint server first sends reference template to each node in the system. Each compute node receives its reference template and prepares to receive broadcast data from the checkpoint server. For each data block referenced by the union of all compute node reference templates, the checkpoint server broadcasts that data block onto the network. For each data block received via broadcast each compute node examines its reference template to see if it refers to this data block. If the data block is referenced (perhaps multiple times in the template), the compute node copies the data block contents into place in memory. Once all data blocks have been broadcast, the checkpoint server broadcasts a start message. This message implies that the restore is complete and the compute nodes should begin processing to their saved location which is part of the restored memory image.
  • FIG. 7 shows a method 700 of a parallel checkpoint restore according to embodiments herein. The checkpoint server starts the checkpoint restore when instructed by the application or otherwise as described above. The checkpoint server first sends the reference template of the data blocks to each compute node (step 710). The checkpoint server then broadcasts the reference template of data block checksums to all compute nodes in the cluster (step 720). The compute nodes copy data from the broadcast for checksum that matches its own reference template (step 730). The checkpoint server then broadcasts a message to start the application from the point of the now restored checkpoint (step 740).
  • As described above, embodiments provide a method and apparatus for parallel rsync-based checkpoint for a massively parallel super computer system. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system to solve the prior art problem of network bandwidth and CPU time needed to checkpoint the progress of the software application. The present invention leverages off of the prior art that used checksum algorithms like rsync to copy a computer file from one machine to another. In contrast, the preferred embodiments describe a method and apparatus for making a template checkpoint of the computer memory in a massively parallel computer system using a checksum algorithm such as rsync applied in a parallel fashion. One skilled in the art will appreciate that many variations are possible within the scope of the present invention. Thus, while the invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that these and other changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1. A computer implemented method for checkpointing a parallel computer system comprising the steps of:
a) a checkpoint server broadcasting a template of data block checksums from a previous checkpoint to all compute nodes arranged in a cluster; and
b) each compute node searching its own memory image for checksum matches.
2. The computer implemented method of claim 1 wherein the steps of each compute node searching its own memory image for checksum matches uses an rsync protocol in a rolling checksum algorithm.
3. The computer implemented method of claim 2 further comprising each node performing the steps of:
a) producing a template of new data blocks with checksums that didn't exist in the previous checkpoint; and
b) producing a template of references to the original data blocks that did exist in the previous checkpoint.
4. The computer implemented method of claim 3 further comprising each node performing the steps of:
a) sending its new data block checksum template to an adjacent node in the cluster of nodes;
b) comparing checksums to find common data blocks between all adjacent nodes as well as its own data blocks; and
c) informing adjacent nodes to replace a reference to a common data block with a reference to a data block on another node.
5. The computer implemented method of claim 4 further comprising the steps of:
a) collecting reference templates from the compute nodes and storing them in the checkpoint server; and
b) collecting new unique data blocks and storing them to the checkpoint server.
6. The computer implemented method of claim 5 wherein the step of storing the data blocks stores the data on auxiliary storage servers instead of the checkpoint server.
7. The computer implemented method of claim 5 wherein the step of storing the data blocks stores uses the I/O nodes to store the data to unique storage servers over network lines to the I/O nodes rather than funneling the data through a network line to the checkpoint server.
8. The computer implemented method of claim 5 further comprising the step of sharing a subset of the reference template from a first application to a second application.
9. A computer implemented method for restoring a memory of a parallel computer system with a stored checkpoint comprising the steps of:
a) a checkpoint server sends a reference template of data block checksums from a previous checkpoint to a plurality of compute nodes in a cluster;
b) the checkpoint server broadcasts data block to the nodes;
c) each node copies broadcast data according to its own template of data block checksums; and
d) the checkpoint server broadcasts a start message.
10. A computer implemented method for checkpointing a parallel computer system comprising the steps of:
a) a checkpoint server broadcasting a template of data block checksums from a previous checkpoint to all compute nodes arranged in a cluster; and
b) each compute node searching its own memory image for checksum matches using an rsync protocol in a rolling checksum algorithm;
c) each node performing the steps of:
c1) producing a template of new data blocks with checksums that didn't exist in the previous checkpoint;
c2) producing a template of references to the original data blocks that did exist in the previous checkpoint
c3) sending its new data block checksum template to an adjacent node in the cluster of nodes;
c4) comparing checksums to find common data blocks between all adjacent nodes as well as its own data blocks; and
c5) informing adjacent nodes to replace a reference to a common data block with a reference to a data block on another node;
d) collecting reference templates from the compute nodes and storing them in the checkpoint server;
e) collecting new unique data blocks and storing them to the checkpoint server; and
f) sharing a subset of the reference template from a first application to a second application.
US11/953,037 2005-04-14 2007-12-08 Method and apparatus for template based parallel checkpointing Abandoned US20080092030A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/953,037 US20080092030A1 (en) 2005-04-14 2007-12-08 Method and apparatus for template based parallel checkpointing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/106,010 US7478278B2 (en) 2005-04-14 2005-04-14 Template based parallel checkpointing in a massively parallel computer system
US11/953,037 US20080092030A1 (en) 2005-04-14 2007-12-08 Method and apparatus for template based parallel checkpointing

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/106,010 Division US7478278B2 (en) 2005-04-14 2005-04-14 Template based parallel checkpointing in a massively parallel computer system

Publications (1)

Publication Number Publication Date
US20080092030A1 true US20080092030A1 (en) 2008-04-17

Family

ID=37109974

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/106,010 Expired - Fee Related US7478278B2 (en) 2005-04-14 2005-04-14 Template based parallel checkpointing in a massively parallel computer system
US11/953,037 Abandoned US20080092030A1 (en) 2005-04-14 2007-12-08 Method and apparatus for template based parallel checkpointing
US12/104,224 Expired - Fee Related US7627783B2 (en) 2005-04-14 2008-04-16 Template based parallel checkpointing in a massively parallel computer system
US12/104,284 Expired - Fee Related US7487393B2 (en) 2005-04-14 2008-04-16 Template based parallel checkpointing in a massively parallel computer system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/106,010 Expired - Fee Related US7478278B2 (en) 2005-04-14 2005-04-14 Template based parallel checkpointing in a massively parallel computer system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/104,224 Expired - Fee Related US7627783B2 (en) 2005-04-14 2008-04-16 Template based parallel checkpointing in a massively parallel computer system
US12/104,284 Expired - Fee Related US7487393B2 (en) 2005-04-14 2008-04-16 Template based parallel checkpointing in a massively parallel computer system

Country Status (1)

Country Link
US (4) US7478278B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271779A1 (en) * 2008-04-25 2009-10-29 Vmware, Inc. Updating a file using differences and file format therefor
US20100017655A1 (en) * 2008-07-16 2010-01-21 International Business Machines Corporation Error Recovery During Execution Of An Application On A Parallel Computer
US20100082788A1 (en) * 2008-09-29 2010-04-01 Michael Basil Mundy Providing improved message handling performance in computer systems utilizing shared network devices

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516361B2 (en) * 2005-06-27 2009-04-07 Sun Microsystems, Inc. Method for automatic checkpoint of system and application software
US9043640B1 (en) * 2005-08-26 2015-05-26 Open Invention Network, LLP System and method for event-driven live migration of multi-process applications
US7657796B1 (en) * 2005-09-30 2010-02-02 Symantec Operating Corporation System and method for distributed storage verification
US8145947B1 (en) * 2006-09-29 2012-03-27 Emc Corporation User customizable CVFS namespace
JP5595633B2 (en) * 2007-02-26 2014-09-24 スパンション エルエルシー Simulation method and simulation apparatus
US7873869B2 (en) * 2008-10-09 2011-01-18 International Business Machines Corporation Checkpointing a hybrid architecture computing system
US8108662B2 (en) * 2008-10-09 2012-01-31 International Business Machines Corporation Checkpointing a hybrid architecture computing system
US8745442B1 (en) 2011-04-28 2014-06-03 Open Invention Network, Llc System and method for hybrid kernel- and user-space checkpointing
US10019327B1 (en) 2008-12-15 2018-07-10 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US9256496B1 (en) 2008-12-15 2016-02-09 Open Invention Network, Llc System and method for hybrid kernel—and user-space incremental and full checkpointing
US8549106B2 (en) * 2009-06-15 2013-10-01 Microsoft Corporation Leveraging remote server pools for client applications
US8321326B2 (en) 2009-09-15 2012-11-27 Auerbach Group Llc Method and system for enhancing the efficiency of a digitally communicated data exchange
US8307243B2 (en) * 2010-02-01 2012-11-06 International Business Machines Corporation Parallel debugging in a massively parallel computing system
US8701113B2 (en) 2010-05-27 2014-04-15 International Business Machines Corporation Switch-aware parallel file system
US8782434B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time
US11625307B1 (en) 2011-04-28 2023-04-11 International Business Machines Corporation System and method for hybrid kernel- and user-space incremental and full checkpointing
US11307941B1 (en) 2011-04-28 2022-04-19 Open Invention Network Llc System and method for hybrid kernel- and user-space incremental and full checkpointing
US8726076B2 (en) * 2011-05-27 2014-05-13 Microsoft Corporation Operator state checkpoint markers and rehydration
US8868520B1 (en) 2012-03-01 2014-10-21 Netapp, Inc. System and method for removing overlapping ranges from a flat sorted data structure
WO2013184125A1 (en) * 2012-06-08 2013-12-12 Hewlett-Packard Development Company, L.P. Checkpointing using fpga
US9063721B2 (en) 2012-09-14 2015-06-23 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
US9069782B2 (en) 2012-10-01 2015-06-30 The Research Foundation For The State University Of New York System and method for security and privacy aware virtual machine checkpointing
US9053065B2 (en) * 2012-12-10 2015-06-09 Vmware, Inc. Method for restoring virtual machine state from a checkpoint file
US9053064B2 (en) * 2012-12-10 2015-06-09 Vmware, Inc. Method for saving virtual machine state to a checkpoint file
US9110930B2 (en) * 2013-08-22 2015-08-18 International Business Machines Corporation Parallel application checkpoint image compression
GB2517780A (en) 2013-09-02 2015-03-04 Ibm Improved checkpoint and restart
US9436552B2 (en) 2014-06-12 2016-09-06 International Business Machines Corporation Checkpoint triggering in a computer system
GB2533342A (en) * 2014-12-17 2016-06-22 Ibm Checkpointing module and method for storing checkpoints
US11061705B2 (en) 2015-03-16 2021-07-13 Bmc Software, Inc. Maintaining virtual machine templates
US9727421B2 (en) * 2015-06-24 2017-08-08 Intel Corporation Technologies for data center environment checkpointing
CN105893633A (en) * 2016-06-06 2016-08-24 浪潮电子信息产业股份有限公司 File system real-time synchronization method based on rsync
US10586210B2 (en) * 2016-11-30 2020-03-10 International Business Machines Corporation Blockchain checkpoints and certified checkpoints
US10560351B1 (en) * 2017-12-28 2020-02-11 Architecture Technology Corporation Network monitoring tool for supercomputers
CN110033078B (en) * 2018-01-12 2024-01-12 华为技术有限公司 Computing system and method based on tree topology
CN111061434B (en) * 2019-12-17 2021-10-01 人和未来生物科技(长沙)有限公司 Gene compression multi-stream data parallel writing and reading method, system and medium

Citations (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5043866A (en) * 1988-04-08 1991-08-27 International Business Machines Corporation Soft checkpointing system using log sequence numbers derived from stored data pages and log records for database recovery
US5214652A (en) * 1991-03-26 1993-05-25 International Business Machines Corporation Alternate processor continuation of task of failed processor
US5235700A (en) * 1990-02-08 1993-08-10 International Business Machines Corporation Checkpointing mechanism for fault-tolerant systems
US5257359A (en) * 1989-02-08 1993-10-26 Hitachi Microsystems, Inc. Instruction cache buffer with program-flow control
US5269017A (en) * 1991-08-29 1993-12-07 International Business Machines Corporation Type 1, 2 and 3 retry and checkpointing
US5319648A (en) * 1988-01-22 1994-06-07 International Business Machines Corporation Control flow reduction in selective repeat protocols
US5630047A (en) * 1995-09-12 1997-05-13 Lucent Technologies Inc. Method for software error recovery using consistent global checkpoints
US5634096A (en) * 1994-10-31 1997-05-27 International Business Machines Corporation Using virtual disks for disk system checkpointing
US5692121A (en) * 1995-04-14 1997-11-25 International Business Machines Corporation Recovery unit for mirrored processors
US5712971A (en) * 1995-12-11 1998-01-27 Ab Initio Software Corporation Methods and systems for reconstructing the state of a computation
US5845082A (en) * 1994-08-19 1998-12-01 Fujitsu Limited Distributed system having an improved method and apparatus for checkpoint taking
US5923832A (en) * 1996-03-15 1999-07-13 Kabushiki Kaisha Toshiba Method and apparatus for checkpointing in computer system
US5922078A (en) * 1996-03-19 1999-07-13 Kabushiki Kaisha Toshiba Method and apparatus for recovering from faults in distributed memory type multiprocessor computing systems
US5941999A (en) * 1997-03-31 1999-08-24 Sun Microsystems Method and system for achieving high availability in networked computer systems
US5974425A (en) * 1996-12-17 1999-10-26 Oracle Corporation Method and apparatus for reapplying changes to a database
US5996088A (en) * 1997-01-22 1999-11-30 Oracle Corporation High-speed database checkpointing through sequential I/O to disk
US6052799A (en) * 1998-05-15 2000-04-18 International Business Machines Corporation System and method for recovering a directory for a log structured array
US6195760B1 (en) * 1998-07-20 2001-02-27 Lucent Technologies Inc Method and apparatus for providing failure detection and recovery with predetermined degree of replication for distributed applications in a network
US6266781B1 (en) * 1998-07-20 2001-07-24 Academia Sinica Method and apparatus for providing failure detection and recovery with predetermined replication style for distributed applications in a network
US6289474B1 (en) * 1998-06-24 2001-09-11 Torrent Systems, Inc. Computer system and process for checkpointing operations on data in a computer system by partitioning the data
US6332200B1 (en) * 1998-10-29 2001-12-18 International Business Machines Corporation Capturing and identifying a complete and consistent set of checkpoint files
US6332199B1 (en) * 1998-10-29 2001-12-18 International Business Machines Corporation Restoring checkpointed processes including adjusting environment variables of the processes
US6338147B1 (en) * 1998-10-29 2002-01-08 International Business Machines Corporation Program products for performing checkpoint/restart of a parallel program
US20020023129A1 (en) * 1998-07-21 2002-02-21 Hui-I Hsiao Method and system for efficiently coordinating commit processing in a parallel or distributed database system
US6393583B1 (en) * 1998-10-29 2002-05-21 International Business Machines Corporation Method of performing checkpoint/restart of a parallel program
US6446183B1 (en) * 2000-02-15 2002-09-03 International Business Machines Corporation Systems and methods for persistent and robust memory management
US20030078933A1 (en) * 2001-02-24 2003-04-24 Gara Alan G. Checkpointing filesystem
US20030115291A1 (en) * 2001-09-28 2003-06-19 Kendall Gary David Publish subscribe system
US6594779B1 (en) * 1999-03-30 2003-07-15 International Business Machines Corporation Method, system and program products for managing the checkpointing/restarting of resources of a computing environment
US6691245B1 (en) * 2000-10-10 2004-02-10 Lsi Logic Corporation Data storage with host-initiated synchronization and fail-over of remote mirror
US6694346B1 (en) * 1999-04-30 2004-02-17 International Business Machines Corporation Long running, reusable, extendible, virtual machine
US20040054800A1 (en) * 2002-08-28 2004-03-18 Samir Shah Content synchronization frameworks using dynamic attributes and file bundles for connected devices
US20040103218A1 (en) * 2001-02-24 2004-05-27 Blumrich Matthias A Novel massively parallel supercomputer
US20040153761A1 (en) * 2002-11-26 2004-08-05 Samsung Electronics Co., Ltd. Method of data backup and recovery
US6823474B2 (en) * 2000-05-02 2004-11-23 Sun Microsystems, Inc. Method and system for providing cluster replicated checkpoint services
US20050065907A1 (en) * 1998-11-24 2005-03-24 Oracle Corporation Managing checkpoint queues in a multiple node system
US6892320B1 (en) * 2002-06-03 2005-05-10 Sun Microsystems, Inc. Method and apparatus for providing multiple-version support for highly available objects
US6952708B2 (en) * 2001-06-27 2005-10-04 Microsoft Corporation Method and system for using a sync key
US6959323B1 (en) * 1998-08-27 2005-10-25 Lucent Technologies Inc. Scalable atomic multicast
US20050267885A1 (en) * 2004-04-30 2005-12-01 Peter Klier Method for computing the minimum edit distance with fine granularity suitably quickly
US20060018253A1 (en) * 2004-07-23 2006-01-26 Windisch Kurt J System and method for preserving multicast data forwarding during control failures in a router
US20060117208A1 (en) * 2004-11-17 2006-06-01 Raytheon Company On-demand instantiation in a high-performance computing (HPC) system
US7096392B2 (en) * 2004-05-07 2006-08-22 Asempra Technologies, Inc. Method and system for automated, no downtime, real-time, continuous data protection
US7162698B2 (en) * 2001-07-17 2007-01-09 Mcafee, Inc. Sliding window packet management systems
US7197665B2 (en) * 2000-06-22 2007-03-27 Hewlett-Packard Development Company, L.P. Physical incremental backup using snapshots
US7203863B2 (en) * 2003-05-09 2007-04-10 Oracle International Corporation Distributed transaction state management through application server clustering
US7216254B1 (en) * 2003-03-24 2007-05-08 Veritas Operating Corporation Method and system of providing a write-accessible storage checkpoint
US7237140B2 (en) * 2003-03-28 2007-06-26 Nec Corporation Fault tolerant multi-node computing system for parallel-running a program under different environments
US7260590B1 (en) * 2000-12-06 2007-08-21 Cisco Technology, Inc. Streamed database archival process with background synchronization
US7287180B1 (en) * 2003-03-20 2007-10-23 Info Value Computing, Inc. Hardware independent hierarchical cluster of heterogeneous media servers using a hierarchical command beat protocol to synchronize distributed parallel computing systems and employing a virtual dynamic network topology for distributed parallel computing system
US7293200B2 (en) * 2004-08-26 2007-11-06 Availigent, Inc. Method and system for providing transparent incremental and multiprocess checkpointing to computer applications
US20070277056A1 (en) * 2003-11-17 2007-11-29 Virginia Tech Intellectual Properties, Inc. Transparent checkpointing and process migration in a distributed system
US7356734B2 (en) * 2000-05-19 2008-04-08 Centerbeam, Inc. Method and apparatus for creating a backup of data of from multiple sources
US7363537B1 (en) * 2003-12-23 2008-04-22 Network Appliance, Inc. System and method for fault-tolerant synchronization of replica updates for fixed persistent consistency point image consumption
US7370223B2 (en) * 2000-09-08 2008-05-06 Goahead Software, Inc. System and method for managing clusters containing multiple nodes
US20080126445A1 (en) * 2003-06-06 2008-05-29 Eric Michelman Method and system for reciprocal data backup
US7394832B1 (en) * 2003-09-09 2008-07-01 Nortel Networks Limited Technique for synchronizing redundant network elements
US7529834B1 (en) * 2000-06-02 2009-05-05 Hewlett-Packard Development Company, L.P. Method and system for cooperatively backing up data on computers in a network

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401216B1 (en) 1998-10-29 2002-06-04 International Business Machines Corporation System of performing checkpoint/restart of a parallel program
US6874104B1 (en) 1999-06-11 2005-03-29 International Business Machines Corporation Assigning recoverable unique sequence numbers in a transaction processing system
US6526447B1 (en) 1999-12-14 2003-02-25 International Business Machines Corporation Apparatus for restarting interrupted data transfer and method therefor
US6687853B1 (en) 2000-05-31 2004-02-03 International Business Machines Corporation Checkpointing for recovery of channels in a data processing system
US6766471B2 (en) 2000-12-28 2004-07-20 International Business Machines Corporation User-level checkpoint and restart for groups of processes
JP3663393B2 (en) 2001-06-27 2005-06-22 インターナショナル・ビジネス・マシーンズ・コーポレーション Method, processor unit and computer system for checkpointing a multi-processor data processing system
US6718435B2 (en) 2001-08-14 2004-04-06 International Business Machines Corporation Method and system for migrating data in a raid logical drive migration
GB0211179D0 (en) 2002-05-16 2002-06-26 Ibm A method,apparatus and computer program for reducing the amount of data checkpointed
US7302607B2 (en) 2003-08-29 2007-11-27 International Business Machines Corporation Two node virtual shared disk cluster recovery
CN1292346C (en) 2003-09-12 2006-12-27 国际商业机器公司 System and method for performing task in distributing calculating system structure

Patent Citations (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5319648A (en) * 1988-01-22 1994-06-07 International Business Machines Corporation Control flow reduction in selective repeat protocols
US5043866A (en) * 1988-04-08 1991-08-27 International Business Machines Corporation Soft checkpointing system using log sequence numbers derived from stored data pages and log records for database recovery
US5257359A (en) * 1989-02-08 1993-10-26 Hitachi Microsystems, Inc. Instruction cache buffer with program-flow control
US5235700A (en) * 1990-02-08 1993-08-10 International Business Machines Corporation Checkpointing mechanism for fault-tolerant systems
US5214652A (en) * 1991-03-26 1993-05-25 International Business Machines Corporation Alternate processor continuation of task of failed processor
US5269017A (en) * 1991-08-29 1993-12-07 International Business Machines Corporation Type 1, 2 and 3 retry and checkpointing
US5845082A (en) * 1994-08-19 1998-12-01 Fujitsu Limited Distributed system having an improved method and apparatus for checkpoint taking
US5634096A (en) * 1994-10-31 1997-05-27 International Business Machines Corporation Using virtual disks for disk system checkpointing
US5692121A (en) * 1995-04-14 1997-11-25 International Business Machines Corporation Recovery unit for mirrored processors
US5630047A (en) * 1995-09-12 1997-05-13 Lucent Technologies Inc. Method for software error recovery using consistent global checkpoints
US5712971A (en) * 1995-12-11 1998-01-27 Ab Initio Software Corporation Methods and systems for reconstructing the state of a computation
US5923832A (en) * 1996-03-15 1999-07-13 Kabushiki Kaisha Toshiba Method and apparatus for checkpointing in computer system
US5922078A (en) * 1996-03-19 1999-07-13 Kabushiki Kaisha Toshiba Method and apparatus for recovering from faults in distributed memory type multiprocessor computing systems
US5974425A (en) * 1996-12-17 1999-10-26 Oracle Corporation Method and apparatus for reapplying changes to a database
US5996088A (en) * 1997-01-22 1999-11-30 Oracle Corporation High-speed database checkpointing through sequential I/O to disk
US5941999A (en) * 1997-03-31 1999-08-24 Sun Microsystems Method and system for achieving high availability in networked computer systems
US6052799A (en) * 1998-05-15 2000-04-18 International Business Machines Corporation System and method for recovering a directory for a log structured array
US6289474B1 (en) * 1998-06-24 2001-09-11 Torrent Systems, Inc. Computer system and process for checkpointing operations on data in a computer system by partitioning the data
US6195760B1 (en) * 1998-07-20 2001-02-27 Lucent Technologies Inc Method and apparatus for providing failure detection and recovery with predetermined degree of replication for distributed applications in a network
US6266781B1 (en) * 1998-07-20 2001-07-24 Academia Sinica Method and apparatus for providing failure detection and recovery with predetermined replication style for distributed applications in a network
US20020023129A1 (en) * 1998-07-21 2002-02-21 Hui-I Hsiao Method and system for efficiently coordinating commit processing in a parallel or distributed database system
US6959323B1 (en) * 1998-08-27 2005-10-25 Lucent Technologies Inc. Scalable atomic multicast
US6338147B1 (en) * 1998-10-29 2002-01-08 International Business Machines Corporation Program products for performing checkpoint/restart of a parallel program
US6393583B1 (en) * 1998-10-29 2002-05-21 International Business Machines Corporation Method of performing checkpoint/restart of a parallel program
US6332199B1 (en) * 1998-10-29 2001-12-18 International Business Machines Corporation Restoring checkpointed processes including adjusting environment variables of the processes
US6332200B1 (en) * 1998-10-29 2001-12-18 International Business Machines Corporation Capturing and identifying a complete and consistent set of checkpoint files
US7065540B2 (en) * 1998-11-24 2006-06-20 Oracle International Corporation Managing checkpoint queues in a multiple node system
US7296039B2 (en) * 1998-11-24 2007-11-13 Oracle International Corporation Managing checkpoint queues in a multiple node system
US20050065907A1 (en) * 1998-11-24 2005-03-24 Oracle Corporation Managing checkpoint queues in a multiple node system
US6594779B1 (en) * 1999-03-30 2003-07-15 International Business Machines Corporation Method, system and program products for managing the checkpointing/restarting of resources of a computing environment
US6694346B1 (en) * 1999-04-30 2004-02-17 International Business Machines Corporation Long running, reusable, extendible, virtual machine
US6446183B1 (en) * 2000-02-15 2002-09-03 International Business Machines Corporation Systems and methods for persistent and robust memory management
US6823474B2 (en) * 2000-05-02 2004-11-23 Sun Microsystems, Inc. Method and system for providing cluster replicated checkpoint services
US7356734B2 (en) * 2000-05-19 2008-04-08 Centerbeam, Inc. Method and apparatus for creating a backup of data of from multiple sources
US7529834B1 (en) * 2000-06-02 2009-05-05 Hewlett-Packard Development Company, L.P. Method and system for cooperatively backing up data on computers in a network
US7197665B2 (en) * 2000-06-22 2007-03-27 Hewlett-Packard Development Company, L.P. Physical incremental backup using snapshots
US7370223B2 (en) * 2000-09-08 2008-05-06 Goahead Software, Inc. System and method for managing clusters containing multiple nodes
US6691245B1 (en) * 2000-10-10 2004-02-10 Lsi Logic Corporation Data storage with host-initiated synchronization and fail-over of remote mirror
US7260590B1 (en) * 2000-12-06 2007-08-21 Cisco Technology, Inc. Streamed database archival process with background synchronization
US6895416B2 (en) * 2001-02-24 2005-05-17 International Business Machines Corporation Checkpointing filesystem
US20040103218A1 (en) * 2001-02-24 2004-05-27 Blumrich Matthias A Novel massively parallel supercomputer
US20030078933A1 (en) * 2001-02-24 2003-04-24 Gara Alan G. Checkpointing filesystem
US6952708B2 (en) * 2001-06-27 2005-10-04 Microsoft Corporation Method and system for using a sync key
US7162698B2 (en) * 2001-07-17 2007-01-09 Mcafee, Inc. Sliding window packet management systems
US20030115291A1 (en) * 2001-09-28 2003-06-19 Kendall Gary David Publish subscribe system
US6892320B1 (en) * 2002-06-03 2005-05-10 Sun Microsystems, Inc. Method and apparatus for providing multiple-version support for highly available objects
US20040054800A1 (en) * 2002-08-28 2004-03-18 Samir Shah Content synchronization frameworks using dynamic attributes and file bundles for connected devices
US20040153761A1 (en) * 2002-11-26 2004-08-05 Samsung Electronics Co., Ltd. Method of data backup and recovery
US7287180B1 (en) * 2003-03-20 2007-10-23 Info Value Computing, Inc. Hardware independent hierarchical cluster of heterogeneous media servers using a hierarchical command beat protocol to synchronize distributed parallel computing systems and employing a virtual dynamic network topology for distributed parallel computing system
US7216254B1 (en) * 2003-03-24 2007-05-08 Veritas Operating Corporation Method and system of providing a write-accessible storage checkpoint
US7237140B2 (en) * 2003-03-28 2007-06-26 Nec Corporation Fault tolerant multi-node computing system for parallel-running a program under different environments
US7203863B2 (en) * 2003-05-09 2007-04-10 Oracle International Corporation Distributed transaction state management through application server clustering
US20080126445A1 (en) * 2003-06-06 2008-05-29 Eric Michelman Method and system for reciprocal data backup
US7394832B1 (en) * 2003-09-09 2008-07-01 Nortel Networks Limited Technique for synchronizing redundant network elements
US7536591B2 (en) * 2003-11-17 2009-05-19 Virginia Tech Intellectual Properties, Inc. Transparent checkpointing and process migration in a distributed system
US20070277056A1 (en) * 2003-11-17 2007-11-29 Virginia Tech Intellectual Properties, Inc. Transparent checkpointing and process migration in a distributed system
US7363537B1 (en) * 2003-12-23 2008-04-22 Network Appliance, Inc. System and method for fault-tolerant synchronization of replica updates for fixed persistent consistency point image consumption
US20050267885A1 (en) * 2004-04-30 2005-12-01 Peter Klier Method for computing the minimum edit distance with fine granularity suitably quickly
US7313555B2 (en) * 2004-04-30 2007-12-25 Anácapa North Method for computing the minimum edit distance with fine granularity suitably quickly
US7096392B2 (en) * 2004-05-07 2006-08-22 Asempra Technologies, Inc. Method and system for automated, no downtime, real-time, continuous data protection
US7363549B2 (en) * 2004-05-07 2008-04-22 Asempra Technologies, Inc. Method and system for automated, no downtime, real-time, continuous data protection
US20060282697A1 (en) * 2004-05-07 2006-12-14 Asempra Technologies, Inc. Method and system for automated, no downtime, real-time, continuous data protection
US20060018253A1 (en) * 2004-07-23 2006-01-26 Windisch Kurt J System and method for preserving multicast data forwarding during control failures in a router
US7293200B2 (en) * 2004-08-26 2007-11-06 Availigent, Inc. Method and system for providing transparent incremental and multiprocess checkpointing to computer applications
US20060117208A1 (en) * 2004-11-17 2006-06-01 Raytheon Company On-demand instantiation in a high-performance computing (HPC) system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271779A1 (en) * 2008-04-25 2009-10-29 Vmware, Inc. Updating a file using differences and file format therefor
US8661428B2 (en) * 2008-04-25 2014-02-25 Vmware, Inc. Updating a file using differences and file format therefor
US9436458B2 (en) 2008-04-25 2016-09-06 Vmware, Inc. Updating a file using differences and file format therefor
US9842118B2 (en) 2008-04-25 2017-12-12 Vmware, Inc. Updating a file using differences and file format therefor
US10853054B2 (en) 2008-04-25 2020-12-01 Vmware, Inc. Updating a file using sync directories
US20100017655A1 (en) * 2008-07-16 2010-01-21 International Business Machines Corporation Error Recovery During Execution Of An Application On A Parallel Computer
US20100082788A1 (en) * 2008-09-29 2010-04-01 Michael Basil Mundy Providing improved message handling performance in computer systems utilizing shared network devices
US8166146B2 (en) 2008-09-29 2012-04-24 International Business Machines Corporation Providing improved message handling performance in computer systems utilizing shared network devices

Also Published As

Publication number Publication date
US7627783B2 (en) 2009-12-01
US20080215916A1 (en) 2008-09-04
US20060236152A1 (en) 2006-10-19
US7487393B2 (en) 2009-02-03
US7478278B2 (en) 2009-01-13
US20080195892A1 (en) 2008-08-14

Similar Documents

Publication Publication Date Title
US7487393B2 (en) Template based parallel checkpointing in a massively parallel computer system
JP7086093B2 (en) Synchronously replicating datasets and other managed objects to cloud-based storage systems
US10037154B2 (en) Incremental copy performance between data stores
US7719443B1 (en) Compressing data in a continuous data protection environment
US8595188B2 (en) Operating system and file system independent incremental data backup
US20110082832A1 (en) Parallelized backup and restore process and system
CN107003890B (en) Efficiently providing virtual machine reference points
CN102880663A (en) Optimization of a partially deduplicated file
CN103548003A (en) Processes and methods for client-side fingerprint caching to improve deduplication system backup performance
CN107665154A (en) Authentic data analysis method based on RDMA and message transmission
US8307243B2 (en) Parallel debugging in a massively parallel computing system
US10613923B2 (en) Recovering log-structured filesystems from physical replicas
Xie et al. Orpheus: Efficient distributed machine learning via system and algorithm co-design
Yan et al. Lightweight fault tolerance in pregel-like systems
Chen et al. Optimizing checkpoint restart with data deduplication
Tan et al. SAFE: A source deduplication framework for efficient cloud backup services
Sigdel et al. Coalescing and deduplicating incremental checkpoint files for restore-express multi-level checkpointing
Zhang et al. Efficient Fault Tolerance for Recommendation Model Training via Erasure Coding
de Camargo et al. Strategies for storage of checkpointing data using non-dedicated repositories on grid systems
EP3853734A1 (en) Applying a log to storage segments
Geng et al. Er-kv: High performance hybrid fault-tolerant key-value store
US20220206906A1 (en) Distributed site data recovery in a geographically distributed data storage environment
WO2017023244A1 (en) Fault tolerant computing
Mouratidis Optimizing the recovery of data consistency gossip algorithms on distributed object-store systems (CEPH)
CN117730314A (en) Computing device and method for use in the same

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE