Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

@

Journal of Information Science and Engineering, Vol. 23 No. 5, pp. 1611-1621 (September 2007)

Applying the Fully-Informed Checkpointing Protocol to the Lazy Indexing Strategy*

Jichiang Tsai
Department of Electrical Engineering
National Chung Hsing University
Taichung, 402 Taiwan
E-mail: jichiangt@nchu.edu.tw

Communication-induced checkpointing (CIC) protocols can be used to prevent domino effect. The fully-informed (FI) protocol proposed in the literature is known as the best CIC protocol so far. Such a protocol is originally designed according to the classical indexing strategy. In this paper, we show how to apply the FI protocol to another improved indexing strategy, called lazy indexing strategy in the context. The lazy-indexing version of such a protocol can reduce number of forced checkpoints for a distributed computation with the lazy indexing strategy. Particularly, the management of a boolean array in FIs control information carried on a message must be modified. Finally, we present a simulation experiment to analyze the impact of such a modification.

Keywords: fault tolerant computing, checkpointing protocols, distributed systems, domino effect, rollback-recovery

Full Text () Retrieve PDF document (200709_19.pdf)

Received July 26, 2005; accepted November 16, 2005.
Communicated by Sy-Yen Kuo.
*This work was supported by the National Science Council of Taiwan, R.O.C., under grant No. NSC 94-2213-E-005- 021.