Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/233013.233050acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
Article
Free access

Minimizing completion time of a program by checkpointing and rejuvenation

Published: 15 May 1996 Publication History

Abstract

Checkpointing with rollback-recovery is a well known technique to reduce the completion time of a program in the presence of failures. While checkpointing is corrective in nature, rejuvenation refers to preventive maintenance of software aimed to reduce unexpected failures mostly resulting from the "aging" phenomenon. In this paper, we show how both these techniques may be used together to further reduce the expected completion time of a program. The idea of using checkpoints to reduce the amount of rollback upon a failure is taken a step further by combining it with rejuvenation. We derive the equations for expected completion time of a program with finite failure free running time for the following three cases when; (a) neither checkpointing nor rejuvenation is employed, (b) only checkpointing is employed, and finally (c) both checkpointing and rejuvenation are employed.We also present numerical results for Weibull failure time distribution for the above three cases and discuss optimal checkpointing and rejuvenation that minimizes the expected completion time. Using the numerical results, some interesting conclusions are drawn about benefits of these techniques in relation to the nature of failure distribution.

References

[1]
M. Sullivan and R. Chillarege, "Software defects and their impact on system availability- A study of field failures in operating systems", in Proc. IEEE Fault-Tolerant Computing Symposium, pp. 2-9, 1991.
[2]
J-C. Laprie, J. Arlat, C. B~ounes and K. Kanoun, "Architectural issues in software fault-tolerance", Software Fault Tolerance, Ed. M. R. Lyu, John, Wiley & sons. ltd., pp. 47-80, 1995.
[3]
Y. Huang and C. Kintala, "Software fault-tolerance in the application layer", Software Fault Tolerance, Ed. M. R. Lyu, John, Wiley & sons. ltd., pp. 231- 248, 1995.
[4]
Y. Huang, C. Kintala, N. Koletis, N. D. Fulton, "Software Rejuvenation-design, implementation and analysis", Proc. of Fault-tolerant Computing Symposium, Pasadena, CA, June 1995.
[5]
Y-M Wang, Y. Huang, P. Vo, P-Y Chung and C. Kintala, "Checkpointing and its applications", In Proc. of Symposium on Fault Tolerant Computer Systems, Pasadena, California, 1995.
[6]
J. Gray, "A census of tandem system availability between 1985 and 1990", IEEE Trans. on Reliability, Vol. 39, pp. 409-418, Oct. 1990.
[7]
J. Gray, "Why do computers stop and what can be done about it?", Proc. of 5~h Syrup. on Reliability in Distributed Software and Database Systems, pp. 3-12, January 1986.
[8]
J. Gray and D. P. Siewiorek, "High-availability computer systems", IEEE Computer Mag., pp. 39- 48, Sept. 1991.
[9]
B. Randell, "System structure for software fault tolerance", IEEE Trans. on Software Engg., Vol. SE-1, pp. 220-232, June 1975.
[10]
A. Avizienis, "The n-verion approach to faulttolerant software", IEEE Trans. on Soflware Engg., Vol. SE-11, No. 12, pp. 1491-1501, December 1985.
[11]
P. Jalote, Y. Huang and C. Kintala, "A framework for understanding and handling transient failures", In Proc. of 2nd ISSAT Intnl. Conf. on Reliability and Quality in Design, March 8-10, 1995, Orlando, Florida, pp.231-237.
[12]
Inhwan Lee, "Software dependability in the operational phase", Ph.D. Thesis, Dept. of Electrical and Computer Engineering, Univ. of Illinois, Urbana- Champaign, 1995.
[13]
P. E. Ammann and J. C. Knight, "Data-diversity: an approach to software fault-tolerance", Proc. of 17th Intnl. Syrup. on Fault Tolerant Computing, pp. 122-126, June 1987.
[14]
K. G. Shin, T. Lin and Y. Lee, "Optimal checkpointing of real-time tasks", IEEE Transactions on Computers, Vol. C-36, No. 11, November 1987.
[15]
C. H. C. Leung and Q. H. Choo, "On the execution of large batch programs in unreliable computing systems", IEEE Trans. on Software Engg., Vol. SE- 10, No. 4, July 1984, pp. 444-450.
[16]
E. G. Coffman and E. N. Gilbert, "Optimal strategies for scheduling checkpoints and preventive maintenance" IEEE Trans. on Reliability, Vol. 39, No. 1, April 1990, pp. 9-18.
[17]
A. Duda, "The effects of checkpointing on program execution time", Information Processing Letters, Vol. 16, pp. 221-229, 1983.
[18]
V.G. Kulkarni, V.F. Nicola and K. S. Trivedi, "Effects of checkpointing and queuing on program performance", Communications on Statistics. Stochastic Models, 6(4), 615-648, 1990.
[19]
S. Toueg and O. Babouglu, "On the optimum checkpoint selection problem", SIAM Journal on Computing, Vol. 13, No. 3, pp. 630-649, August 1984.
[20]
R. Geist, R. Reynolds and J. Westall, "Selection of a checkpoint interval in a critical-task environment", IEEE Trans. on Reliability, 37(4), 395-400~ October 1988.
[21]
K. S. Trivedi, "Probability and Statistics with reliability, queuing and computer science applications", Prentice.Hall, 1982.

Cited By

View all
  • (2020)Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)10.1109/ISSREW51248.2020.00091(319-320)Online publication date: Oct-2020
  • (2017)Analytic Models of Checkpointing for Concurrent Component-Based Software SystemsProceedings of the 8th ACM/SPEC on International Conference on Performance Engineering10.1145/3030207.3030209(245-256)Online publication date: 17-Apr-2017
  • (2017)Optimal checkpointing of fault tolerant systems subject to correlated failure2017 Annual Reliability and Maintainability Symposium (RAMS)10.1109/RAM.2017.7889756(1-6)Online publication date: 2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMETRICS '96: Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
May 1996
279 pages
ISBN:0897917936
DOI:10.1145/233013
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 1996

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGMETRICS96
Sponsor:

Acceptance Rates

Overall Acceptance Rate 459 of 2,691 submissions, 17%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)15
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)10.1109/ISSREW51248.2020.00091(319-320)Online publication date: Oct-2020
  • (2017)Analytic Models of Checkpointing for Concurrent Component-Based Software SystemsProceedings of the 8th ACM/SPEC on International Conference on Performance Engineering10.1145/3030207.3030209(245-256)Online publication date: 17-Apr-2017
  • (2017)Optimal checkpointing of fault tolerant systems subject to correlated failure2017 Annual Reliability and Maintainability Symposium (RAMS)10.1109/RAM.2017.7889756(1-6)Online publication date: 2017
  • (2015)Reliability-Aware Speedup Models for Parallel Applications with Coordinated Checkpointing/RestartIEEE Transactions on Computers10.1109/TC.2014.231718264:5(1402-1415)Online publication date: 3-Apr-2015
  • (2015)Lightweight Virtual Machine Checkpoint and Rollback for Long-running ApplicationsAlgorithms and Architectures for Parallel Processing10.1007/978-3-319-27137-8_42(577-596)Online publication date: 16-Dec-2015
  • (2014)Job completion time on a virtualized server with software rejuvenationACM Journal on Emerging Technologies in Computing Systems10.1145/253912110:1(1-26)Online publication date: 13-Jan-2014
  • (2012)Uncertainty Analysis of the Remote Exploration and Experimentation SystemJournal of Spacecraft and Rockets10.2514/1.5138049:6(1032-1042)Online publication date: Nov-2012
  • (2012)Optimizing Software Rejuvenation Policies under Interval Reliability CriteriaProceedings of the 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing10.1109/UIC-ATC.2012.111(478-485)Online publication date: 4-Sep-2012
  • (2011)A measurement‐based ageing analysis of the JVMSoftware Testing, Verification and Reliability10.1002/stvr.46723:3(199-239)Online publication date: 8-Sep-2011
  • (2010)Rejuvenation with workload migrationProceedings of the 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)10.1109/DSNW.2010.5542617(80-85)Online publication date: 28-Jun-2010
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media