Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we have also determined the optimal number of processors (processes) required for executing the fault tolerant MPI applications. We have presented an experimental study in which, we have used an ptimal checkpoint restart model [1] with Weibull’s and xponential distributions to determine the optimal checkpoint interval. We have observed that, the optimal checkpoint ntervals obtained using Weibull’s distribution, produce minimal average completion time; as compared with the optimal checkpoint intervals obtained using Exponential distribution. The optimal checkpoint interval is approximately directly proportional to the checkpoint cost and inversely proportional to shape parameter. The study indicates that, the checkpoint cost of MPI applications increases with the number of processors (processes) used for execution. We have etermined the optimal number of processes (processors) required to execute the MPI applications considered in this paper, as 4.
Authors and Affiliations
Mallikarjuna Shastry P. M. , K. Venkatesh
CP-Miner : A hybrid Approach for Colorectal Polyp Detection
Computed Tomography Colonography (CTC) is the new eneration technique for detecting colorectal polyps using volumetric CT data combined with Computer Aided Detection (CAD) system. The aim of this paper is to detail the i...
Analysis and diagnosis of the different defects of asynchronous machines by vibration analysis
The electric machines and particularly the asynchronous machines act an important role nowadays in all industrial applications. To assure the availability and the safety of working of these is a fundamental job. It is th...
LOCATION DISCOVERY WITH SECURITY IN WIRELESS SENSOR NETWORK
Localization is one of the supporting technologies in wireless sensor networks. To identify the exact location of each and every sensor may not be feasible. In most of the sensor network application gathered by sensor wi...
AN EFFICIENT CLASSIFICATION OF GENOMES BASED ON CLASSES AND SUBCLASSES
The grass family has been the subject of intense research over the past. Reliable and fast classification / sub-classification of large sequences which are rapidly gaining importance due to genome sequencing projects all...
Investigation on Efficient Management of workflows in cloud computing Environment
Cloud computing is an on-demand service model often based on virtualization technique and this paper explores the use of cloud computing for scientific workflows, focusing on a widely used application. The approach is to...