An efficient index-based checkpointing protocol with constant-size control information on messages

被引:6
|
作者
Tsai, JC [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Elect Engn, Taichung 40254, Taiwan
关键词
distributed systems; fault tolerance; domino effect; communication-induced checkpointing; index-based protocols;
D O I
10.1109/TDSC.2005.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Communication-induced checkpointing (CIC) protocols can be used to prevent the domino effect. Such protocols that belong to the index-based category were shown to have a better performance. In this paper, we propose an efficient index-based CIC protocol. The fully informed (FI) protocol proposed in the literature has been known to be the best index-based CIC protocol that one can achieve since the optimal protocol needs to acquire the future information. We discover that the enhancement adopted by such a protocol rarely takes effect in practice. By discarding this enhancement, we obtain a new protocol, called NMMP. Simulation results show that our protocol is almost as efficient as FI in some typical computational environments. Especially, we demonstrate that the two protocols have the same behavior over a tree communication network. Surprisingly, NMMP only has to piggyback on each message control information of constant size, regardless of the number of processes.
引用
收藏
页码:287 / 296
页数:10
相关论文
共 50 条
  • [1] An improved scheme of index-based checkpointing
    Luo, YS
    Min, YH
    Zhang, DF
    [J]. 11TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2005, : 167 - 171
  • [2] An Index-Based Mobile Checkpointing and Recovery Algorithm
    Singh, Awadhesh Kumar
    Bhat, Rohit
    Kumar, Anshul
    [J]. DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 200 - 205
  • [3] An index-based checkpointing algorithm for autonomous distributed systems
    Baldoni, R
    Quaglia, F
    Fornara, P
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1999, 10 (02) : 181 - 192
  • [4] An index-based checkpointing/recovery approach for distributed systems
    Gupta, B
    Banerjee, SK
    Wang, Z
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2001, : 166 - 170
  • [5] An index-based checkpointing algorithm for autonomous distributed systems
    Baldoni, R
    Quaglia, F
    Fornara, P
    [J]. SIXTEENTH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1997, : 27 - 34
  • [6] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [7] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [8] Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
    Teng, Wei
    Yang, Geng
    Xiang, Yang
    Zhang, Ting
    Wang, Dongyang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 617 - 627
  • [9] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [10] Performance comparisons of index-based communication-induced checkpointing protocols
    Tsai, Jichiang
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2006, 29 (06) : 1113 - 1118