Proceedings 21st International Conference on Distributed Computing Systems
DOI: 10.1109/icdsc.2001.918964
|View full text |Cite
|
Sign up to set email alerts
|

On the minimal characterization of the rollback-dependency trackability property

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…The continuity of the RDT property under RDT protocols has lead us to introduce the concept of leftdoubling [7]. A C-path µ belongs to a consistent cut C if the reception of the last message of µ belongs to C. A Z-path ζ belongs to C if all causal components of ζ belong to C. …”
Section: Figure 6 Continuous Rdtmentioning
confidence: 99%
See 1 more Smart Citation
“…The continuity of the RDT property under RDT protocols has lead us to introduce the concept of leftdoubling [7]. A C-path µ belongs to a consistent cut C if the reception of the last message of µ belongs to C. A Z-path ζ belongs to C if all causal components of ζ belong to C. …”
Section: Figure 6 Continuous Rdtmentioning
confidence: 99%
“…These assumptions imply that the RDT property must be enforced continuously during the progress of a distributed computation. Based on this observation, we introduce a property called operational RDT and we describe a checkpointing protocol, called RDT-Minimal, that breaks only the minimal set of non-trackable dependencies necessary to enforce operational RDT [7]. According to Tsai [14], this protocol must present exactly the same behavior (must induce forced checkpoints at the same execution points) as the one proposed by Baldoni, Helary, Mostefaoui, and Raynal [1,3].…”
Section: Introductionmentioning
confidence: 97%
“…This ensures that all checkrag replacements point dependencies are causal and can be tracked by using transitive dependency vectors. RDT checkpointing protocols rely on the model we presented and ensure that the CCP of any consistent cut of the distributed computation is RD-trackable [9]. Therefore, henceforth we assume that all the checkpoint and communication patterns are RD-trackable and we omit this condition in statements of definitions, lemmas and theorems.…”
Section: Rollback-dependency Trackabilitymentioning
confidence: 99%
“…Initially, p i eliminates the checkpoints rolled back and calculates the new dependency vector DV (lines 4-6). After that, p i finds for every process p f , based on Theorem 1, the stable checkpoint that must be retained by p i because of p f and updates UC [f ] accordingly (lines [9][10][11][12][13][14] …”
Section: Algorithm 1 Data Structures Of Rdt-lgcmentioning
confidence: 99%
See 1 more Smart Citation