2021
DOI: 10.1587/transinf.2021edl8027
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Sender-Based Message Logging for Reducing Forced Checkpointing Overhead in Distributed Systems

Abstract: The previous communication-induced checkpointing may considerably induce worthless forced checkpoints because each process receiving messages cannot obtain sufficient information related to non-causal Z-paths. This paper presents an enhanced sender-based message logging protocol applicable to any communication-induced checkpointing to lead to a high decrease of the forced checkpointing overhead of communicationinduced checkpointing in an effective way while permitting no useless checkpoint. The protocol allows… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Most existing CIC protocols [3][4][5][6][7][8][9][10]14,15] have been designed to ensure that no basic checkpoint becomes useless by satisfying Theorem 2 at all times.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Most existing CIC protocols [3][4][5][6][7][8][9][10]14,15] have been designed to ensure that no basic checkpoint becomes useless by satisfying Theorem 2 at all times.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, if needed before message delivery, additional checkpoints, called forced checkpoints, can be taken based on the local variables of the process and the information piggybacked on the messages [2]. Most CIC protocols [3][4][5][6][7][8][9][10][11][12][13][14][15] with these advantages have the following common behavioral features. If each process recognizes the delivery of a message may make any other local checkpoint of another process, called a basic checkpoint, become useless, the protocols make the process take a forced checkpoint.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations