Method and system for deciding when to checkpoint an application based on risk analysis
First Claim
Patent Images
1. In a multi-node information processing system, a method for checkpointing an application comprising steps of:
- receiving from an application a request for checkpointing, wherein the request includes node health-related parameters;
determining whether to grant the checkpointing request, based on node health parameters;
determining a last time when the application was checkpointed; and
determining how long the application takes to be checkpointed.
1 Assignment
0 Petitions
Accused Products
Abstract
Briefly, according to the invention in an information processing system including a plurality of information processing nodes, a request for checkpointing by an application includes node health criteria (or parameters). The system has the authority to grant or deny the checkpointing request depending on the system health or availability. This scheme significantly improves not only the system performance, but also the application running time as the system. By skipping a checkpoint the application can use the same time to run the application instead of spending extra time for checkpointing.
18 Citations
8 Claims
-
1. In a multi-node information processing system, a method for checkpointing an application comprising steps of:
-
receiving from an application a request for checkpointing, wherein the request includes node health-related parameters; determining whether to grant the checkpointing request, based on node health parameters; determining a last time when the application was checkpointed; and determining how long the application takes to be checkpointed. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. In a multi-node information processing system, a method for checkpointing an application comprising steps of:
-
receiving from an application a request for checkpointing, wherein the request includes node health-related parameters; determining a risk associated with shipping a checkpoint associated with the application; comparing a cost of checkpointing with the risk of shipping the checkpoint; granting the request for checkpointing if the risk exceeds the cost.
-
Specification