Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004. 2004
DOI: 10.1109/reldis.2004.1353013
|View full text |Cite
|
Sign up to set email alerts
|

An efficient checkpointing protocol for the minimal characterization of operational rollback-dependency trackability

Abstract: A checkpointing protocol that enforces rollbackdependency trackability (RDT) during the progress of a distributed computation must induce processes to take forced checkpoints to avoid the formation of non-trackable rollback dependencies. A protocol based on the minimal characterization of RDT tests only the smallest set of non-trackable dependencies. The literature indicated that this approach would require the processes to maintain and propagate O(n 2 ) control information, where n is the number of processes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2005
2005
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 14 publications
0
9
0
2
Order By: Relevance
“…Dependency vectors [19] capture causal dependencies among checkpoints and are commonly used in RDT checkpointing protocols [3,10,21]. In this mechanism, each process p i maintains and propagates inside application messages a size-n dependency vector DV , initially (0, .…”
Section: Dependency Vectorsmentioning
confidence: 99%
See 4 more Smart Citations
“…Dependency vectors [19] capture causal dependencies among checkpoints and are commonly used in RDT checkpointing protocols [3,10,21]. In this mechanism, each process p i maintains and propagates inside application messages a size-n dependency vector DV , initially (0, .…”
Section: Dependency Vectorsmentioning
confidence: 99%
“…Initially, p i eliminates the checkpoints rolled back and calculates the new dependency vector DV (lines 4-6). After that, p i finds for every process p f , based on Theorem 1, the stable checkpoint that must be retained by p i because of p f and updates UC [f ] accordingly (lines [9][10][11][12][13][14] …”
Section: Algorithm 1 Data Structures Of Rdt-lgcmentioning
confidence: 99%
See 3 more Smart Citations