2008
DOI: 10.1016/j.peva.2007.09.001
|View full text |Cite
|
Sign up to set email alerts
|

Model-based performance evaluation of distributed checkpointing protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Tuple spaces along with checkpointing and replication mechanisms have been applied to grid scheduling in [12]. The performance of distributed checkpointing protocols has been evaluated by Agbaria and Friedman [4]. They consider the overhead ratio which also takes the recovery time into account in performance evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…Tuple spaces along with checkpointing and replication mechanisms have been applied to grid scheduling in [12]. The performance of distributed checkpointing protocols has been evaluated by Agbaria and Friedman [4]. They consider the overhead ratio which also takes the recovery time into account in performance evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…for the case e t+1 = rec ij (msg), P i ∈ I, P j ∈ CP (S) we show that it cannot occur. So suppose there was such an event, then This implies rec ij ( msg, 0 ) is in the history of p S j (by (1) and (2)) and occurs before mcp taken S i or cp taken S i (by (1) and 3). Hence, by Rule 2.1, dep S j (i) = 1.…”
Section: Resultsmentioning
confidence: 99%
“…A concise formal model can be the base of qualitative comparisons which would add to existing quantitative comparisons based on simulations, like [1,12]. We gave such a comparison with the blocking queue algorithm introduced in [13].…”
Section: Discussionmentioning
confidence: 99%
“…The conventional method for failure management and fault tolerance relies on checkpointing/restart mechanisms, which periodically save a snapshot of a system to a stable storage and use it to recover the system from failures reactively; see [10] for a comprehensive review and [23], [25], [3], [6] for examples. However, this method does not prevent systems from failures, and work loss is inevitable due to its rollback process [10].…”
Section: R Wmentioning
confidence: 99%