Checkpointing and Communication Pattern-Neutral Algorithm for Removing Messages Logged by Senders

The traditional sender-based message logging protocols use a garbage collection algorithm to result in a large number of additional messages and forced checkpoints. So, in our previous work, an algorithm was introduced to allow each process to autonomously remove useless log information in its volat...

Full description

Saved in:
Bibliographic Details
Published inHigh Performance Computing and Communications pp. 71 - 80
Main Author Ahn, JinHo
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3540393684
9783540393689
ISSN0302-9743
1611-3349
DOI10.1007/11847366_8

Cover

Abstract The traditional sender-based message logging protocols use a garbage collection algorithm to result in a large number of additional messages and forced checkpoints. So, in our previous work, an algorithm was introduced to allow each process to autonomously remove useless log information in its volatile storage by piggybacking only some additional information without requiring any extra message and forced checkpoint. However, even after a process has executed the algorithm, its storage buffer may still be overloaded in some communication and checkpointing patterns. This paper proposes a new garbage collection algorithm CCPNA for sender-based message logging to address all the problems mentioned above. The algorithm considerably reduces the number of processes to participate in the garbage collection by using the size of the log information of each process. Thus, CCPNA incurs more additional messages and forced checkpoints than our previous algorithm. However, it can avoid the risk of overloading the storage buffers regardless of the specific checkpointing and communication patterns. Also, CCPNA reduces the number of additional messages and forced checkpoints compared with the traditional algorithm.
AbstractList The traditional sender-based message logging protocols use a garbage collection algorithm to result in a large number of additional messages and forced checkpoints. So, in our previous work, an algorithm was introduced to allow each process to autonomously remove useless log information in its volatile storage by piggybacking only some additional information without requiring any extra message and forced checkpoint. However, even after a process has executed the algorithm, its storage buffer may still be overloaded in some communication and checkpointing patterns. This paper proposes a new garbage collection algorithm CCPNA for sender-based message logging to address all the problems mentioned above. The algorithm considerably reduces the number of processes to participate in the garbage collection by using the size of the log information of each process. Thus, CCPNA incurs more additional messages and forced checkpoints than our previous algorithm. However, it can avoid the risk of overloading the storage buffers regardless of the specific checkpointing and communication patterns. Also, CCPNA reduces the number of additional messages and forced checkpoints compared with the traditional algorithm.
Author Ahn, JinHo
Author_xml – sequence: 1
  givenname: JinHo
  surname: Ahn
  fullname: Ahn, JinHo
  email: jhahn@kyonggi.ac.kr
  organization: Dept. of Computer Science, College of Science, Kyonggi University, Kyonggido, Republic of Korea
BookMark eNpFUMlOwzAUNFAk2tILX-Ajl4C3eDlWEZtUFrGco9h5SUMbu7JTJP4eIipxGmlGM5qZGZr44AGhC0quKCHqmlItFJey1EdoYZTmuSDccMXkMZpSSWnGuTAnaHYQpBYTNCWcsMwowc_QLKVPQghThk1RVazBbXah80PnW1z5Gheh7_e-c9XQBY9fqmGA6LMn2A-x2uLltg2xG9Y9bkLEr9CHr9H4CClVLSS8Cm0LNbbf-A18DTGdo9Om2iZYHHCOPm5v3ov7bPV891AsV1mihOtMUWYb2RhJRW04MAe1rlXOhHF6ZI2g40hu80ZZ01inXQ3OgJG5tULkfI4u_3LTLv42gljaEDappKQcfyv_f-M_9f9dvA
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2006
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2006
DOI 10.1007/11847366_8
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783540393726
3540393722
EISSN 1611-3349
Editor Kranzlmüller, Dieter
Gerndt, Michael
Editor_xml – sequence: 1
  givenname: Michael
  surname: Gerndt
  fullname: Gerndt, Michael
  email: Michael.Gerndt@in.tum.de
– sequence: 2
  givenname: Dieter
  surname: Kranzlmüller
  fullname: Kranzlmüller, Dieter
  email: dk@gup.jku.at
EndPage 80
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1038-712bf6f9614d93e2ced8d75249c8f96194193723b5f7b9fbc8cdec9e965bb4453
ISBN 3540393684
9783540393689
ISSN 0302-9743
IngestDate Wed Sep 17 03:54:49 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1038-712bf6f9614d93e2ced8d75249c8f96194193723b5f7b9fbc8cdec9e965bb4453
PageCount 10
ParticipantIDs springer_books_10_1007_11847366_8
PublicationCentury 2000
PublicationDate 2006
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 2006
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006. Proceedings
PublicationTitle High Performance Computing and Communications
PublicationYear 2006
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssj0002792
ssj0000318102
Score 1.2985404
Snippet The traditional sender-based message logging protocols use a garbage collection algorithm to result in a large number of additional messages and forced...
SourceID springer
SourceType Publisher
StartPage 71
SubjectTerms checkpointing
fault-tolerance
garbage collection
message logging
message-passing system
Title Checkpointing and Communication Pattern-Neutral Algorithm for Removing Messages Logged by Senders
URI http://link.springer.com/10.1007/11847366_8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09b9swECUadyk6pJ_oN1igm6HCESmKHDoYQQojcDK0SZHN0FGUbaSRilgZ2l_fO5GU7dQI2i6CQcgWcU8-Ho_33jH2QZv0AFxeJcqlVSIV2MSMZJEIpzE8tpUTBfGdT07V5FweX2QX6_r5jl3Swkf7ayev5H9QxTHElViy_4Bs_6M4gJ8RX7wiwni9Ffxup1m9TiFuq6mAva_79w0aIulwi_nRB87jhediLOtJs_m2HC6cvfzRLOvd3yclf8ockpYHpUaG4-_z5nrZLq66MsUv7sonJk6ooQqpRkyb-dzHtl-7XnV-AmQUt_o0DecWp03blYMNY2uJ6GnuTEXEVOTwDqWukGkSRijfOiiSt9Ax49bG-zrnfbEihUXhFU2Df_XtWuJKPdq5BviyD9w4yVwoNdN7bA8fOmD3x0fH0299Ao68WaedFpZtUlL0R05-JoEI1M3UK0huzHxD6Hb9oD8O07sY5ewRe0i8FU6EEjTlY3bP1U_YfjQtD6Z9yootrDlizbew5rew5j3WHLHmEWseseYeaw4_ecD6GTv_fHR2OElCo41kRfr4SX6QQqUqg6FaaYRLrSt1mWe4M7eaRo3EMD9PBWRVDqYCq23prHFGZQBSZuI5G9RN7V4wPsqyYgRQCSlKaUEDhj9QoKfXWkEqy5fsfbTRjP46q1nUzV7b8dVf3POaPVi_gW_YoL2-cW8xPGzhXQD6NygwY08
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=High+Performance+Computing+and+Communications&rft.au=Ahn%2C+JinHo&rft.atitle=Checkpointing+and+Communication+Pattern-Neutral+Algorithm+for+Removing+Messages+Logged+by+Senders&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540393689&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=71&rft.epage=80&rft_id=info:doi/10.1007%2F11847366_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon