Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE and FLazy-E families

Research output: Contribution to journalArticlepeer-review

11 Scopus citations

Abstract

Communication-induced checkpointing (CIC) protocols help in bounding rollback propagation by ensuring that each checkpoint taken is useful, while at the same time allowing each process to take checkpoints independently. In this paper, we focus on the evaluation of CIC protocols belonging to two families, namely, the FE family and FLazy-E family. We present both theoretical and experimental evaluation of the protocols belonging to these two families. The results of our experimental evaluation not only confirm the theoretical comparison but also reveals the fine differences between these protocols.

Original languageEnglish
Pages (from-to)429-445
Number of pages17
JournalPerformance Evaluation
Volume68
Issue number5
DOIs
StatePublished - May 2011

Bibliographical note

Funding Information:
Manivannan is a recipient of the Faculty CAREER Award from the US National Science Foundation and is a senior member of the IEEE and a senior member of the ACM.

Funding Information:
This material is based in part upon work supported by the US National Science Foundation under Grant No. IIS-0414791 . Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

Keywords

  • Communication-induced checkpointing protocols
  • Consistent global checkpoints
  • Distributed systems

ASJC Scopus subject areas

  • Software
  • Modeling and Simulation
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE and FLazy-E families'. Together they form a unique fingerprint.

Cite this