A graph transformation-based approach for the validation of checkpointing algorithms in distributed systems

被引:2
|
作者
Khlif, Houda [1 ]
Kacem, Hatem Hadj [1 ]
Hernandez, Saul E. Pomares [2 ,3 ,4 ]
Eichler, Cedric [3 ,4 ]
Kacem, Ahmed Hadj [1 ]
Simon, Alberto Calixto [5 ]
机构
[1] Univ Sfax, ReDCAD Lab, FSEGS, Sfax, Tunisia
[2] Inst Nacl Astrofis Opt & Electr, Puebla 72840, Mexico
[3] CNRS, LAAS, F-31400 Toulouse, France
[4] Univ Toulouse, LAAS, F-31400 Toulouse, France
[5] Univ Papaloapan, UNPA, Loma Bonita 68400, Oaxaca, Mexico
关键词
D O I
10.1109/WETICE.2014.23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Autonomic Computing Systems are oriented to prevente the human intervention and to enable distributed systems to manage themselves. One of their challenges is the efficient monitoring at runtime oriented to collect information from which the system can automatically repair itself in case of failure. Quasi-Synchronous Checkpointing is a well-known technique, which allows processes to recover in spite of failures. Based on this technique, several checkpointing algorithms have been developed. According to the checkpoint properties detected and ensured, they are classified into: Strictly Z-Path Free (SZPF), Z-Path Free (ZPF) and Z-Cycle Free (ZCF). In the literature, the simulation has been the method adopted for the performance evaluation of checkpointing algorithms. However, few works have been designed to validate their correctness. In this paper, we propose a validation approach based on graph transformation oriented to automatically detect the previous mentioned checkpointing properties. To achieve this, we take the vector clocks resulting from the algorithm execution, and we model it into a causal graph. Then, we design and use transformation rules oriented to verify if in such a causal graph, the algorithm is exempt from non desirable patterns, such as Z-paths or Z-cycles, according to the case.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] A Graph Transformation-Based Approach for applying MDA to SOA
    Taghizadeh, F.
    Taghizadeh, S. R.
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 446 - +
  • [2] Graph Transformation-Based Approach to Formal Modeling and Verification of Workflows
    Rafe, Vahid
    Rahmani, Adel T.
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 291 - 298
  • [3] A Validation Approach for Quasi-Synchronous Checkpointing Algorithms in HPC Systems
    Khlif, Houda
    Kacem, Hatem Hadj
    Hernandez, Saul E. Pomares
    Kacem, Ahmed Hadj
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 622 - 629
  • [4] Transformation-Based Operationalization of Graph Languages
    Weinell, Erhard
    GRAPH TRANSFORMATIONS, ICGT 2008, 2008, 5214 : 520 - 522
  • [5] From Class Diagrams to Relational Tables: A Graph Transformation-based Approach
    Rafe, Vahid
    Jamali, Shahram
    Rahmani, Mohsen
    Mahdian, Farzaneh
    PRZEGLAD ELEKTROTECHNICZNY, 2011, 87 (08): : 163 - 165
  • [6] An index-based checkpointing/recovery approach for distributed systems
    Gupta, B
    Banerjee, SK
    Wang, Z
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 166 - 170
  • [7] Review of Some Checkpointing Algorithms for Distributed and Mobile Systems
    Gupta, Sunil Kumar
    Kumar, Parveen
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 167 - +
  • [8] Survey on transformation-based large graph visualization
    Shi, L. (shil@ios.ac.cn), 1600, Institute of Computing Technology (25):
  • [9] Affine Transformation-Based Knowledge Graph Embedding
    Jiang, Jiahao
    Pu, Fei
    Cui, Jie
    Yang, Bailin
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT I, KSEM 2024, 2024, 14884 : 284 - 297
  • [10] CHECKPOINTING AND ROLLBACK-RECOVERY ALGORITHMS IN DISTRIBUTED SYSTEMS
    DENG, Y
    PARK, EK
    JOURNAL OF SYSTEMS AND SOFTWARE, 1994, 25 (01) : 59 - 71