计算机工程

• 先进计算与数据处理 • 上一篇    下一篇

基于并发性发掘的低开销回卷恢复实现方法

袁功彪a,杨金民a,白树仁b   

  1. (湖南大学 a. 信息科学与工程学院;b. 超级计算中心,长沙 410082)
  • 收稿日期:2012-12-28 出版日期:2013-11-15 发布日期:2013-11-13
  • 作者简介:袁功彪(1987-),男,硕士研究生,主研方向:容错计算;杨金民、白树仁,教授、博士
  • 基金项目:
    国家自然科学基金资助项目(61272401, 61133005);湖南省科技计划基金资助重点项目(201GK2003)

Implementation Method of Low Overhead Rollback Recovery Based on Concurrency Exploiting

YUAN Gong-biao   a, YANG Jin-min   a, BAI Shu-ren   b   

  1. (a. College of Information Science and Engineering; b. Supercomputing Center, Hunan University, Changsha 410082, China)
  • Received:2012-12-28 Online:2013-11-15 Published:2013-11-13

摘要: 现有的回卷恢复容错技术存在同步约束和阻塞问题,其时间开销随系统节点规模的增大而剧增。为此,提出一种基于并发性发掘的低开销回卷恢复实现方法。利用消息传递附带跟踪消息依赖的策略解除消息日志中的同步约束,解析进程负载以发掘进程负载的并发性,构建进程负载并发执行的实现架构,采用数据缓存策略和多线程技术实现进程内部各负载的并发执行,以降低故障恢复开销。3个NAS NPB2.3标准性能检测程序的实验结果表明,该方法可使检查点开销从0.63 s、3.19 s、1.21 s分别降低到0.18 s、0.67 s、0.19 s,日志开销率从13.4%、3.5%、18.3%分别降低到0.7%、0.1%、1.0%。

关键词: 回卷恢复, 时间开销, 同步约束, 并发性挖掘, 消息日志, 检查点

Abstract: Existing rollback recovery technologies show that their time overheads increase sharply with the scale of nodes due to synchronization constraints and the sequential execution pattern. Aiming at this problem, this paper proposes an implementation method of low overhead rollback recovery based on concurrency exploiting. It uses the strategy of piggybacking dependency on messages to release the message log synchronization constraints. In addition, the workloads in a process is resolved to exploit their concurrency. Then data buffering strategy and multithreading technology are applied to implement the concurrent execution of various process workloads, leading to a low overhead rollback recovery scheme. Experimental results of three NAS NPB2.3 benchmarks show that the overheads of a checkpoint are decreased from 0.63 s, 3.19 s, 1.21 s to 0.18 s, 0.67 s, 0.19 s respectively, and the overhead ratios of message logging are decreased from 13.4%, 3.5%, 18.3% to 0.7%, 0.1%, 1.0% respectively.

Key words: rollback recovery, time overhead, synchronization constraint, concurrency exploiting, message log, checkpoint

中图分类号: