Selection of a Checkpoint Interval in Coordinated Checkpointing Protocol for Fault Tolerant Open MPI
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
The goal of this paper is to address the selection of efficient checkpoint interval which reduces the total overhead cost due to the checkpointing and restarting of the applications in a distributed system environment. Coordinated checkpointing rollback recovery protocol is used for making the application programs fault tolerant on a stand-alone system under no load conditions using BLCR and OPEN MPI at system level. We have presented an experimental study in which we have determined the optimum checkpoint interval and we have used it to compare the performance of coordinated checkpointing protocol using two types of checkpointing intervals namely fixed and incremental checkpoint intervals. We measured the checkpoint cost, rollback cost and total cost of overheads aused by the above two methods of checkpointing intervals Failures are simulated using the Poisson distribution with one failure per hour and the inter arrival time between the failures follow exponential distribution. We have observed from the results that, rollback overhead and total cost of overheads due to checkpointing the application are very high in incremental checkpoint interval method than in fixed checkpoint interval method. Hence, we conclude that fixed checkpointing interval method is more efficient as it reduces the rollback overhead and also total cost of overheads considerably.
Authors and Affiliations
Mallikarjuna Shastry P. M. , K. Venkatesh
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
Classification is one of the most efficient and widely used data mining technique. In classification, Decision trees can handle high dimensional data, and their representation is intuitive and generally easy to assimilat...
A Survey on Optimistic Fair Digital Signature Exchange Protocols
Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For th...
IROBOT CREATE: PROGRAMMED AS PROVIDER
This paper elucidates the research and implementation of guiding robots to a predetermined path. The robot is programmed through an 8 bit micro controller. The input to the robot for a particular path can be given by pre...
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for detecting Copy-Move forger...
ROLE OF DATA MINING IN RETAIL SECTOR
Data mining is proved to be one of the important tools for identifying useful information from very large amount of data bases in almost all the industries. Industries are using data mining to increase revenues and reduc...