Analysis of communication induced checkpointing

Lorenzo Alvisi*, Elmootazbellah Elnozahy, Sriram Rao, Syed Amir Husain, Asanka De Mel

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

94 Scopus citations

Abstract

Communication induced checkpointing (CIC) allows processes in a distributed computation to take independent checkpoints and to avoid the domino effect. This paper presents an analysis of CIC protocols based on a prototype implementation and validated simulations. Our result indicate that there is sufficient evidence to suspect that much of the conventional wisdom about these protocols is questionable.

Original languageEnglish (US)
Title of host publicationProceedings - Annual International Conference on Fault-Tolerant Computing
PublisherIEEE
Pages242-249
Number of pages8
ISBN (Print)0780357639
StatePublished - 1999
Externally publishedYes
EventProceedings of the 1999 29th Annual International Symposium on Fault-Tolerant Computing (FTCS-29) - Madison, WI, USA
Duration: Jun 15 1999Jun 18 1999

Publication series

NameProceedings - Annual International Conference on Fault-Tolerant Computing
ISSN (Print)0731-3071

Other

OtherProceedings of the 1999 29th Annual International Symposium on Fault-Tolerant Computing (FTCS-29)
CityMadison, WI, USA
Period06/15/9906/18/99

ASJC Scopus subject areas

  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Analysis of communication induced checkpointing'. Together they form a unique fingerprint.

Cite this