message logging
Recently Published Documents


TOTAL DOCUMENTS

111
(FIVE YEARS 7)

H-INDEX

17
(FIVE YEARS 1)

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1428
Author(s):  
Jinho Ahn

This paper introduces an effective communication-induced checkpointing protocol using message logging to enable the number of extra checkpoints to be far lower than the previous number. Even if a situation occurs in which it is decided that a process receiving a message has to perform forced checkpointing, our protocol allows the process to skip the forced checkpointing action if it recognizes that the state of its sender right before the receipt of the message is recoverable. Additionally, the communication-induced checkpointing protocol is thus not required to assume the piecewise deterministic model, despite being combined with message logging. This protocol can maintain these features by piggybacking a one-bit variable and an n-size vector on each message sent. Our simulation results verify our claim that the presented protocol performs much better than the representative optimized protocol with respect to the forced checkpointing frequency, regardless of the communication pattern.


Author(s):  
Kiril Dichev ◽  
Daniele De Sensi ◽  
Dimitrios S. Nikolopoulos ◽  
Kirk W Cameron ◽  
Ivor Spence

2019 ◽  
Vol 29 (02) ◽  
pp. 1950005
Author(s):  
Jinho Ahn

The inherent shortcoming of the conventional Sender-Based Message Logging (SBML) protocols is to require additional control message interactions per application message to satisfy the always-no-orphans condition in case of sequential failures. In this paper, a scalable SBML protocol is introduced to lower the communication overhead by handling a sequence of messages consecutively received by each process before sending as a party. The protocol enables the process to delay the update of their receive sequence numbers to their senders until there comes out the first message it is willing to send, and then perform the collective filling out task with each sender requiring only one control message exchange. Experimental results show that our protocol outperforms the previous one in terms of the number of control messages generated.


2019 ◽  
Vol 91 ◽  
pp. 450-464 ◽  
Author(s):  
Nuria Losada ◽  
George Bosilca ◽  
Aurélien Bouteiller ◽  
Patricia González ◽  
María J. Martín

2017 ◽  
Vol 104 ◽  
pp. 206-222 ◽  
Author(s):  
Hugo Meyer ◽  
Ronal Muresano ◽  
Marcela Castro-León ◽  
Dolores Rexachs ◽  
Emilio Luque
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document