“…After a failure, the application rolls back to the last state that was saved and starts its re-execution. Checkpoint protocols are usually divided into two groups, uncoordinated (Borg et al, 1989) (Johnson and Zwaenepoel, 1987) (Neves et al, 1994) (Strom and Yemini, 1985) (Wang and Fuchs, 1993) (Wang and Fuchs, 1992) and coordinated (Chandy and Lamport, 1985) (Cristian and Jahanian, 1991) (Kim and Park, 1993) (Koo and Toueg, 1987) (Neves and Fuchs, 1996) (Neves and Fuchs, 1998a) (Plank, 1993). In uncoordinated checkpoint protocols, each process determines independently from the others the instant when its state should be saved.…”