TY - GEN
T1 - Adaptive checkpointing protocol to bound recovery time with message logging
AU - Ssu, Kuo Feng
AU - Yao, Bin
AU - Fuchs, W. Kent
PY - 1999
Y1 - 1999
N2 - Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures. These solutions are often not applicable due to the lack of accurate data on the probability distribution of failures. Most current checkpoint libraries require application users to define a fixed time interval for checkpointing. The checkpoint interval usually implies the approximate maximum recovery time for single process applications. However, actual recovery time can be much smaller when message logging is used. Due to this faster recovery, checkpointing may be more frequent than needed and thus unnecessary execution overhead is introduced. In this paper, an adaptive checkpointing protocol is developed to accurately enforce the user-defined recovery time and to reduce excessive checkpoints. An adaptive protocol has been implemented and evaluated using a receiver-based message logging algorithm on wired and wireless mobile networks. The results show that the protocol precisely maintains the user-defined maximum recovery times for several traces with varying message exchange rates. The mechanism incurs low overhead, avoids unnecessary checkpointing, and reduces failure free execution time.
AB - Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures. These solutions are often not applicable due to the lack of accurate data on the probability distribution of failures. Most current checkpoint libraries require application users to define a fixed time interval for checkpointing. The checkpoint interval usually implies the approximate maximum recovery time for single process applications. However, actual recovery time can be much smaller when message logging is used. Due to this faster recovery, checkpointing may be more frequent than needed and thus unnecessary execution overhead is introduced. In this paper, an adaptive checkpointing protocol is developed to accurately enforce the user-defined recovery time and to reduce excessive checkpoints. An adaptive protocol has been implemented and evaluated using a receiver-based message logging algorithm on wired and wireless mobile networks. The results show that the protocol precisely maintains the user-defined maximum recovery times for several traces with varying message exchange rates. The mechanism incurs low overhead, avoids unnecessary checkpointing, and reduces failure free execution time.
UR - http://www.scopus.com/inward/record.url?scp=0033354943&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0033354943&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:0033354943
SN - 0769502911
T3 - Proceedings of the IEEE Symposium on Reliable Distributed Systems
SP - 244
EP - 252
BT - Proceedings of the IEEE Symposium on Reliable Distributed Systems
PB - IEEE
T2 - Proceedings of the 1999 18th IEEE Symposium on Reliable Distributed Systems (SRDS'99)
Y2 - 19 October 1999 through 22 October 1999
ER -