The Relative Overhead of Piggybacking in Causal Message Logging Protocols
نویسندگان
چکیده
Message logging protocols ensure that crashed processes make the same choices when re-executing nondeterministic events during recovery. Causal message logging protocols achieve this by piggybacking the results of these choices (called determinants) on the ambient message traffic. By doing so, these protocols do not create orphan processes nor introduce blocking in failure-free executions. To survive f failures, they ensure that determinants are stored by at least f +1 processes. Causal logging protocols differ in the kind of information they piggyback to other processes. The more information they send, the better each process is able to estimate global properties of the determinants, which in turn results in fewer needless piggybacking of determinants. This paper attempts to quantify the tradeoff between the cost of sending more information and the benefit of doing so.
منابع مشابه
The Cost of Recovery in Message Logging Protocols
ÐPast research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. In this paper, we give the first experimental evaluation of the performance of these protocols during recovery. Our results suggest that applications face a complex trade-off when choosing a message logging protocol for fault to...
متن کاملScalable Causal Message Logging for Wide-Area Environments
Causal message logging spread recovery information around the network in which the processes execute. This is an attractive property for wide area networks: it can be used to replicate processes that are otherwise inaccessible due to network partitions. However, current causal message logging protocols do not scale to thousands of processes. We describe the Hierarchical Causal Logging Protocol ...
متن کاملAlgorithm for Reducing Overhead of Message Purging in Large-Scale Sender-Based Logging
When attempting to apply sender-based message logging with checkpointing into large-scale and geographically distributed systems, two important things should be reconsidered: reducing the number of messages passing on core networks during its fully message logging and recovery procedures and purging effectively logged messages from their senders' volatile memories. This paper presents a novel m...
متن کاملOn Tolerating Failures of Mobile Hosts and Mobile Support Stations
In this paper, we present two fault-tolerant protocols for mobile computing systems; a causal message logging protocol and a receiver-based pessimistic message logging protocol for tolerating failures of mobile hosts (MHs) and mobile support stations (MSSs) respectively. The systems raise several constraints such as limited life of battery power, mobility and disconnection of hosts and lack of ...
متن کاملNovel Log Management for Sender-based Message Logging
Among message logging approaches, volatile logging by sender processes considerably alleviates the normal operation overhead of synchronous logging on stable storage. But, this approach forces each process to maintain log information of its sent messages in its limited volatile memory. This paper presents a novel log management algorithm to effectively eliminate the volatile log information at ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998