Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we have also determined the optimal number of processors (processes) required for executing the fault tolerant MPI applications. We have presented an experimental study in which, we have used an ptimal checkpoint restart model [1] with Weibull’s and xponential distributions to determine the optimal checkpoint interval. We have observed that, the optimal checkpoint ntervals obtained using Weibull’s distribution, produce minimal average completion time; as compared with the optimal checkpoint intervals obtained using Exponential distribution. The optimal checkpoint interval is approximately directly proportional to the checkpoint cost and inversely proportional to shape parameter. The study indicates that, the checkpoint cost of MPI applications increases with the number of processors (processes) used for execution. We have etermined the optimal number of processes (processors) required to execute the MPI applications considered in this paper, as 4.
Authors and Affiliations
Mallikarjuna Shastry P. M. , K. Venkatesh
Image Mining Using Texture and Shape Feature
Discovering knowledge from data stored in typical alphanumeric databases, such as relational databases, has been the focal point of most of the work in database mining. However, with advances in secondary and tertiary st...
High payload using mixed codebooks of Vector Quantization
Abstract—Data hiding involves conveying secret messages under the cover digital media such as images. It is the science of concealed communication. The term hiding can refer to keeping the very existence of the embedded...
Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks
Wireless Sensor Networks are resource constrained application specific adhoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for...
Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new...
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
This paper introduces a novel idea of Binary Pattern observation of column wise and Row wise Walsh transformed color images for feature vector generation. The density distribution of Sal, Cal components of Binary Pattern...