D. Gomes, G. Gonçalves, P. Endo, Moisés Rodrigues, J. Kelner, D. Sadok, C. Curescu
{"title":"不要失去重点,检查一下:您的云应用程序是否使用了正确的策略","authors":"D. Gomes, G. Gonçalves, P. Endo, Moisés Rodrigues, J. Kelner, D. Sadok, C. Curescu","doi":"10.1504/IJGUC.2019.10023121","DOIUrl":null,"url":null,"abstract":"Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspective, failures must be transparent and should not impact application performance. In order to recover a failed application, cloud providers must perform checkpoints, and periodically save application data, which can then be recovered following a failover. Currently, a checkpoint service can be implemented in many ways, each presenting different performance results. The main research question to be answered is: what is the best checkpoint strategy to use given some users' requirements? In this paper, we performed experiments with different checkpoint service strategies to understand how these are affected by the computing resources. We also provide a discussion about the relationship between service availability and the checkpoint service.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2019-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Don't lose the point, check it: Is your cloud application using the right strategy\",\"authors\":\"D. Gomes, G. Gonçalves, P. Endo, Moisés Rodrigues, J. Kelner, D. Sadok, C. Curescu\",\"doi\":\"10.1504/IJGUC.2019.10023121\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspective, failures must be transparent and should not impact application performance. In order to recover a failed application, cloud providers must perform checkpoints, and periodically save application data, which can then be recovered following a failover. Currently, a checkpoint service can be implemented in many ways, each presenting different performance results. The main research question to be answered is: what is the best checkpoint strategy to use given some users' requirements? In this paper, we performed experiments with different checkpoint service strategies to understand how these are affected by the computing resources. We also provide a discussion about the relationship between service availability and the checkpoint service.\",\"PeriodicalId\":44878,\"journal\":{\"name\":\"International Journal of Grid and Utility Computing\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2019-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Utility Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJGUC.2019.10023121\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Utility Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJGUC.2019.10023121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Don't lose the point, check it: Is your cloud application using the right strategy
Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspective, failures must be transparent and should not impact application performance. In order to recover a failed application, cloud providers must perform checkpoints, and periodically save application data, which can then be recovered following a failover. Currently, a checkpoint service can be implemented in many ways, each presenting different performance results. The main research question to be answered is: what is the best checkpoint strategy to use given some users' requirements? In this paper, we performed experiments with different checkpoint service strategies to understand how these are affected by the computing resources. We also provide a discussion about the relationship between service availability and the checkpoint service.