Skip to main content

Transparent Checkpointing for Applications with Graphical User Interfaces

  • Conference paper
Service Availability (ISAS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4328))

Included in the following conference series:

Abstract

Transparent checkpointing is a well known method to increase the dependability of long running applications. However, most known implementations concentrate on applications that do not use graphical user interfaces.

In this paper we describe common problems arising with transparent checkpointing of applications including their graphical user interfaces. We present a proxy that is able to store the window session of an application and compare our approach with an existing X-Server extension that serves the same purpose.

We also discuss the performance impact of both solutions and present performance and latency measurements that demonstrate the usability of the proxy.

Category: Service infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Firefox Web Browser, http://www.mozilla.com/firefox/central/

  2. The Free Software Desktop Project, http://www.gnome.org/

  3. gzip, http://www.gzip.org/

  4. OpenOffice.org - The Free Office Suite, http://www.openoffice.org/

  5. Real VNC, http://www.realvnc.com/

  6. X11PERF Manual Page, http://www.xfree86.org/4.2.0/x11perf.1.html

  7. The XFree86 Project, http://www.xfree86.org/

  8. X.Org Foundation, http://wiki.x.org/wiki/

  9. Carothers, C.D., Szymanski, B.K.: Linux Support for Transparent Checkpointing of Multithreaded Programs. Department of Computer Science, Rensselaer Polytechnic Institute (August 2002)

    Google Scholar 

  10. Czornack, J.-T.: Transparent checkpointing. Tagungsband zum Diskussionskreis Fehlertoleranz, September 2005, pp. 23–28 (2005)

    Google Scholar 

  11. DARPA Internet Program Protocol Specification. Transmission Control Protocol (September 1981), http://www.rfc-editor.org/rfc/rfc793.txt

  12. Dieter, W.R., Lumpp, J.E.: User-Level Checkpointing for LinuxThreads Programs. Departement of Electrical and Computer Engineering, University of Kentucky (2001)

    Google Scholar 

  13. Glauber, J.: Checkpointing als Basis für transparente Service Migration unter Linux. Institut für Systemarchitektur, Technische Universität Dresden (2002)

    Google Scholar 

  14. Intel. Hyper-Threading Technology, http://www.intel.com/technology/hyperthread/

  15. Plank, J.S., Beck, M., Kingsley, G., Li, K.: Libckpt: Transparent Checkpointing under Unix. Department of Computer Science, University of Tennessee (1995)

    Google Scholar 

  16. Roman, E.: A Survey of Checkpoint/Restart Implementations. Lawrence Berkeley National Laboratory (2002)

    Google Scholar 

  17. Solomita, E., Kempf, J., Duchamp, D.: Xmove: A pseudoserver for x window movement. The X Resource, July 1994, 143–170 (1994)

    Google Scholar 

  18. Stellner, G.: Cocheck: Checkpointing and process migration for mpi. In: 10th International Parallel Processing Symposium, p. 526 (1996)

    Google Scholar 

  19. Szydlowski, C.: Multithreaded technology and multicore processors. Dr. Dobb’s Journal (May 2005)

    Google Scholar 

  20. Zandy, V.C.: Application Mobility. Computer Sciences Department, University of Wisconsin (2004)

    Google Scholar 

  21. Zandy, V.C., Miller, B.P.: Checkpoints of GUI-based applications. In: USENIX Annual Technical Conference, pp. 155–166 (2003)

    Google Scholar 

  22. Zandy, V.C., Miller, B.P., Livny, M.: Process hijacking. In: Eighth IEEE International Symposium on High Performance Distributed Computing, p. 32 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Czornack, JT., Trinitis, C., Walter, M. (2006). Transparent Checkpointing for Applications with Graphical User Interfaces. In: Penkler, D., Reitenspiess, M., Tam, F. (eds) Service Availability. ISAS 2006. Lecture Notes in Computer Science, vol 4328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11955498_10

Download citation

  • DOI: https://doi.org/10.1007/11955498_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68724-5

  • Online ISBN: 978-3-540-68725-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics