1993
DOI: 10.1109/71.238629
|View full text |Cite
|
Sign up to set email alerts
|

An efficient protocol for checkpointing recovery in distributed systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
58
0

Year Published

1998
1998
2006
2006

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 95 publications
(58 citation statements)
references
References 15 publications
0
58
0
Order By: Relevance
“…All the above algorithms follow two approaches to reduce the overhead associated with coordinated checkpointing algorithms: One is to minimize the number of synchronization messages and the number of checkpoints [2], [5], [6], [9], [10], [13], [19], the other is to make checkpointing nonblocking [4], [7], [11], [20]. These two approaches were orthogonal in previous years until the Prakash-Singhal algorithm [18] combined them.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…All the above algorithms follow two approaches to reduce the overhead associated with coordinated checkpointing algorithms: One is to minimize the number of synchronization messages and the number of checkpoints [2], [5], [6], [9], [10], [13], [19], the other is to make checkpointing nonblocking [4], [7], [11], [20]. These two approaches were orthogonal in previous years until the Prakash-Singhal algorithm [18] combined them.…”
Section: Related Workmentioning
confidence: 99%
“…In Koo and Toueg's algorithm [10], if any of the involved processes is not able to or not willing to take a checkpoint, the entire checkpointing process is aborted. Kim and Park [9] proposed an improved scheme that allows the new checkpoints in some subtrees to be committed while the others are aborted.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…After a failure, the application rolls back to the last state that was saved and starts its re-execution. Checkpoint protocols are usually divided into two groups, uncoordinated (Borg et al, 1989) (Johnson and Zwaenepoel, 1987) (Neves et al, 1994) (Strom and Yemini, 1985) (Wang and Fuchs, 1993) (Wang and Fuchs, 1992) and coordinated (Chandy and Lamport, 1985) (Cristian and Jahanian, 1991) (Kim and Park, 1993) (Koo and Toueg, 1987) (Neves and Fuchs, 1996) (Neves and Fuchs, 1998a) (Plank, 1993). In uncoordinated checkpoint protocols, each process determines independently from the others the instant when its state should be saved.…”
Section: Introductionmentioning
confidence: 99%