An efficient index-based checkpointing protocol with constant-size control information on messages

被引:6
|
作者
Tsai, JC [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Elect Engn, Taichung 40254, Taiwan
关键词
distributed systems; fault tolerance; domino effect; communication-induced checkpointing; index-based protocols;
D O I
10.1109/TDSC.2005.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Communication-induced checkpointing (CIC) protocols can be used to prevent the domino effect. Such protocols that belong to the index-based category were shown to have a better performance. In this paper, we propose an efficient index-based CIC protocol. The fully informed (FI) protocol proposed in the literature has been known to be the best index-based CIC protocol that one can achieve since the optimal protocol needs to acquire the future information. We discover that the enhancement adopted by such a protocol rarely takes effect in practice. By discarding this enhancement, we obtain a new protocol, called NMMP. Simulation results show that our protocol is almost as efficient as FI in some typical computational environments. Especially, we demonstrate that the two protocols have the same behavior over a tree communication network. Surprisingly, NMMP only has to piggyback on each message control information of constant size, regardless of the number of processes.
引用
收藏
页码:287 / 296
页数:10
相关论文
共 50 条
  • [31] Attribute-based ring signature scheme with constant-size signature
    Wenqiang, W.
    Shaozhen, C.
    [J]. IET INFORMATION SECURITY, 2010, 4 (02) : 104 - 110
  • [32] Cryptanalysis and improvement of a constant-size identity based ring signature scheme
    Wang, Huaqun
    Guo, Xianjiu
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 803 - +
  • [33] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    [J]. Soft Computing, 2018, 22 : 5163 - 5177
  • [34] CP-ABE Scheme Satisfying Constant-size Keys based on ECC
    Raj, Nishant
    Pais, Alwyn Roshan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 535 - 540
  • [35] Efficient structural graph clustering: an index-based approach
    Dong Wen
    Lu Qin
    Ying Zhang
    Lijun Chang
    Xuemin Lin
    [J]. The VLDB Journal, 2019, 28 : 377 - 399
  • [36] Efficient structural graph clustering: an index-based approach
    Wen, Dong
    Qin, Lu
    Zhang, Ying
    Chang, Lijun
    Lin, Xuemin
    [J]. VLDB JOURNAL, 2019, 28 (03): : 377 - 399
  • [37] Threshold Attribute-based Signcryption with Constant-Size Ciphertexts and Public Verifiability
    Han Yiliang
    Lu Wanyi
    Yang Xiaoyuan
    [J]. 2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 6373 - 6377
  • [38] Efficient Structural Graph Clustering: An Index-Based Approach
    Wen, Dong
    Qin, Lu
    Zhang, Ying
    Chang, Lijun
    Lin, Xuemin
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 11 (03): : 243 - 255
  • [39] Improved ID-based ring signature scheme with constant-size signatures
    Li, Hongwei
    Li, Xiao
    He, Mingxing
    Zeng, Shengke
    [J]. Informatica (Ljubljana), 2011, 35 (03) : 343 - 350
  • [40] Index-Based Semantic Tagging for Efficient Query Interpretation
    Devezas, Jose
    Nunes, Sergio
    [J]. EXPERIMENTAL IR MEETS MULTILINGUALITY, MULTIMODALITY, AND INTERACTION, CLEF 2016, 2016, 9822 : 208 - 213