On characteristics of DEF communication-induced checkpointing protocols

被引:0
作者
Tsai, J [1 ]
Lin, JW [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Elect Engn, Taichung, Taiwan
来源
2002 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS | 2002年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Domino-Effect Freedom (DEF) is a property stating that unbounded, cascading rollback propagation will not occur during the process of finding a consistent global checkpoint. DEF checkpointing protocols can be classified into two different categories: index-based and model-based. An index-based protocol timestamps local checkpoints with sequence numbers for achieving consistency, while a model-based one prohibits the formation of particular checkpoint and communication patterns in the execution. In this paper we explore several characteristics of communication-induced checkpointing protocols with the DEF property. First, we will demonstrate that there is no optimal on-line scalar DEF protocol, in terms of the number of forced checkpoints. Then some techniques for comparing protocols are proposed. We will construct some patterns or give formal proofs to compare the performance of both index-based and model-based protocols.
引用
收藏
页码:29 / 36
页数:8
相关论文
共 50 条
[41]   EVALUATION OF COMMUNICATION INDUCED CHECKPOINTING IN RESOURCE CONSTRAINED EMBEDDED SYSTEMS [J].
Sababha, Belal H. ;
Rawashdeh, Osamah A. .
PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2011, VOL 3, PTS A AND B, 2012, :39-45
[42]   Optimized Checkpointing Protocols for Data Parallel Programs [J].
Bertolli, Carlo ;
Vanneschi, Marco .
PARALLEL COMPUTING: FROM MULTICORES AND GPU'S TO PETASCALE, 2010, 19 :433-440
[43]   DYNAMIC CHECKPOINTING PROCEDURE FOR THE DESIGN OF STABILIZING PROTOCOLS [J].
SALEH, K ;
AHMAD, I ;
ALSAQABI, K ;
AGARWAL, A .
INFORMATION AND SOFTWARE TECHNOLOGY, 1993, 35 (08) :479-485
[44]   An efficient communication induced rollforward checkpointing and recovery protocol for distributed systems [J].
Gu, MM ;
Zeng, L ;
Liang, ZH ;
Gupta, B .
COMPUTERS AND THEIR APPLICATIONS, 2000, :298-302
[45]   Cloud Control of Connected Vehicle Under Both Communication-Induced Sensing and Control Delay: A Prediction Method [J].
Pan, Jian ;
Xu, Qing ;
Li, Keqiang ;
Wang, Jianqiang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) :8471-8485
[46]   Fault-Tolerant Communication Induced Checkpointing and Recovery Protocol Using IoT [J].
Malhotra, Neha ;
Bala, Manju .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (03) :945-960
[47]   Optimal asynchronous garbage collection for RDT checkpointing protocols [J].
Schmidt, R ;
Garcia, IC ;
Pedone, F ;
Buzato, LE .
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, :167-176
[48]   Multiple coherence and coordinated checkpointing protocols for DSM systems [J].
Boukerche, A ;
Melo, ACMA ;
Koch, JG ;
Galdino, CR .
2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2005, :531-538
[49]   Distributed Implementation of a Stable Storage for MANET Checkpointing Protocols [J].
Benkaouha, Haroun ;
Abdelli, Abdelkrim ;
Ben-Othman, Jalel ;
Zaffoune, Youcef ;
Mokdad, Lynda .
2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, :672-677
[50]   Pupillometry reveals communication-induced object expectations in 12-but not 8-month-old infants [J].
Paetzold, Wiebke ;
Liszkowski, Ulf .
DEVELOPMENTAL SCIENCE, 2019, 22 (06)