Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Efficient Coordinated Checkpointing Scheme Based on PWD Model

  • Conference paper
  • First Online:
Information Networking: Wireless Communications Technologies and Network Applications (ICOIN 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2344))

Included in the following conference series:

  • 536 Accesses

Abstract

In this paper, we will prove that the new consistency condition for checkpoints must be needed in systems based on PWD model and propose an efficient coordinated checkpointing scheme. In our scheme, whenever process constructs a consistent global checkpoint set, it must obey the new consistency condition instead of previous consistency condition. That is, an execution of process is divided into an unique state interval occurred by non-deterministic event and checkpoint is taken in only processes happened a state interval transition. Consequently, proposed coordinated checkpointing scheme removes an unnecessary overhead emerged in previous works and guarantees the limited rollback propagation on the occurrence of a failure in systems based on PWD model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. E. N. Elnozahy, D. B. Johnson and Y. M. Wang, “A Survey of Rollbalck-Recovery Protocols in Message Passing Systems,” CMU Technical Report CMU-CS-99-148, June. 1999.

    Google Scholar 

  2. E. N. Elnozahy and W. Zwaenepoel, “On the use and implementation of message logging,” In Proceedings of the 24-th International Symposium on Fault-Tolerant Computing, pp. 298–307, Jun. 1994.

    Google Scholar 

  3. R. E. Strom and S. Yemini, “Optimistic recovery in distributed systems,” ACM Trans. on Computer Systemss, vol. 3, No. 3, pp. 204226, Aug. 1985.

    Google Scholar 

  4. L. Alvisi, “Understanding the message logging paradigm ofr mssking process crashes,” Ph. D. Thesis, Department of Computer Science, Comell University, Jan. 1996.

    Google Scholar 

  5. L. Alvisi and K. Marzullo, “Message Logging: Pessimistic, Optimistic, Causal and Optimal,” IEEE Trans. on Software Engineering, vol. 24, pp. 149–159, Feb. 1998.

    Google Scholar 

  6. S. Rao, L. Alvisi and H. M. Vin, “The cost of recovery in message logging protocols,” In Proceedings of the 17-th IEE-E Symposium on Reliable Distributed Sys-tems(SRDS), pp. 10–18, 1998.

    Google Scholar 

  7. D. B. Johnson and W. Zwaenepoel, “Recovery in distributed systems using optimistic message logging and checkpointing,” Journal of Algorithms, vol. 11, pp. 462–491, Sept. 1990.

    Google Scholar 

  8. E. N. Elnozahy, D. B. Johnson and W. Zwaenepoel, “The Performance of Consistent Checkpointing,” Proc. 11th Symp. on Reliable Distributed Systems, pp. 39–47, Oct. 1992.

    Google Scholar 

  9. D. B. Johnson and W. Zwaenepoel, “Sender-based message logging,” In Proceedings of the 17th International Symposium on Fault=Tolerant Computing, pp. 14–19, June. 1987.

    Google Scholar 

  10. D. B. Johnson, ”Distributed system fault tolerance using message logging and checkpointing,” Ph. D. Thesis, Rice University, Dec. 1989.

    Google Scholar 

  11. K. M. Chandy and L. Lamport, “Distributed snapshots: Determining global states of distributed systems,” ACM Trans. on Computer Systems, vol. 3, No. 1, pp. 63–75, Feb. 1985.

    Article  Google Scholar 

  12. R. Koo and S. Toueg, “Checkpointing and rollback-recovery for distributed systems,” IEEE Trans. on Software Engineering, vol. SE-13, No. 1, pp. 23–31, Jan. 1987.

    Article  Google Scholar 

  13. G. Cao and M. Singhal, ”On Coordinated Checkpointing in Distributed Systems,” IEEE Trans. on Parallel and Distributed Systems, vol. 9, No. 12, pp. 1213–1225, Dec. 1998.

    Article  Google Scholar 

  14. H. J. Michel, R. H. Netzer and M. Raynal, “Consistency Issues in Distributed Checkpoints,” IEEE Trans. on Software Engineering, vol. 25, No. 2, pp. 274–281, March/April. 1999.

    Article  Google Scholar 

  15. Nitin H. Vaidya, “Staggered Consistent Checkpointing,” IEEE Trans. on Parallel and Distributed Systems, vol. 10, No. 7, pp. 694–702, July. 1999.

    Article  MathSciNet  Google Scholar 

  16. J. Fowler and W. Zwaenepoel, “Causal Distributed Breakpoints,” Proc. Int’l Conf. Distributed Computing Systems, pp. 134–141, May. 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baik, M., Shon, J., Kim, K., Ahn, J., Hwang, C. (2002). An Efficient Coordinated Checkpointing Scheme Based on PWD Model. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_73

Download citation

  • DOI: https://doi.org/10.1007/3-540-45801-8_73

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44255-4

  • Online ISBN: 978-3-540-45801-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics