Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Computation Checkpointing and Migration, PDF eBook

Computation Checkpointing and Migration PDF

Edited by Vipin Chaudhary, Hai Jiang, John Paul N. Walters

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

Computational clusters have long provided a mechanism for the acceleration of high performance computing (HPC) applications.

With today's supercomputers now exceeding the petaflop scale, however, they are also exhibiting an increase in heterogeneity.

Thisheterogeneity spans a range of technologies, from multiple operating systems to hardware accelerators and novel architectures. Because of the exceptional acceleration some of these heterogeneous architectures provide, they are being embraced as viable tools for HPC applications.

Given the scale of today's supercomputers, it is clear that scientists must consider the use of fault-tolerance in their applications.

This is particularly true as computational clusters with hundreds and thousands of processors become ubiquitous in large-scale scientific computing, leading to lower mean-times-to-failure.

This forces the systems to effectively deal with the possibility of arbitrary and unexpected node failure.

In this book the address the issue of fault-tolerance via checkpointing.

They discuss the existing strategies to provide rollback recovery to applications - both via MPI at the user level and through application-level techniques.

Checkpointing itself has been studied extensively in the literature, including the authors' own works.

Here they give a general overview of checkpointing and how it's implemented.

More importantly, they describe strategies to improve the performance of checkpointing, particularly in the case of distributed systems.

Information

Other Formats

Information