0% found this document useful (0 votes)
5 views6 pages

module4_distributed

The document discusses three checkpointing strategies for system recovery: Coordinated Checkpointing, Uncoordinated Checkpointing, and Communication-Induced Checkpointing, each with its own benefits and challenges. Coordinated Checkpointing ensures a globally consistent state but requires synchronization, while Uncoordinated Checkpointing allows for independent operation at the cost of potential inconsistencies. Communication-Induced Checkpointing aims to balance the advantages of both methods by inducing coordinated checkpoints based on communication patterns, though it introduces complexity in determining when to force checkpoints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views6 pages

module4_distributed

The document discusses three checkpointing strategies for system recovery: Coordinated Checkpointing, Uncoordinated Checkpointing, and Communication-Induced Checkpointing, each with its own benefits and challenges. Coordinated Checkpointing ensures a globally consistent state but requires synchronization, while Uncoordinated Checkpointing allows for independent operation at the cost of potential inconsistencies. Communication-Induced Checkpointing aims to balance the advantages of both methods by inducing coordinated checkpoints based on communication patterns, though it introduces complexity in determining when to force checkpoints.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Orteied

Dedule
teain abt longpat: Beg
sot-e-eaasslce psoeem,
ottt it
deail.
TeeeAAetyeS fitsib2}cd
(2eeciteCosttatiagisest ette sh

gneitate eropeg

ispleoeSarE8ibzidsaic

2asaSisCuE in

hootite b e l z e d e t R o i o i s k o d s e t e g r o i o s k

t i s b g a y Sioielay o baw Cacheroe

isanalaetrtrtis eltoesetat B,
At
e a é e e eteste aeiscol2seia.e tisa
eetat enbecered
ceiagdbeiae(ctociogavayi t i a e
apaes decdeetlathe
eisel gais

A
ilstotebc peoceeR iee
atbealet a o e tbe toler
’etefaatAess Aetel htbembe auo.
pesanpetpa
’ e t t e n tbee~RACT0S Doe Guba lol,onbe J,

istotet batporit )

i r e Cfttepocee etlenisot otatoeane


bas les
betoanGunMest peCYi betee
tohoit fato arpeete)
eee tt biak fonte apP;ie•e id
CsiHeeSeco.

nota]-o
AG-sitbn.

CJ= e
ustet]= (aobeo]trabe(1]+

Bave Saee

aetec.
urabeliJ=0;
key baceA Reeback Recovery
’ Af log bated poebtK lecoYeyaes re fteteroisicbe
ad ndeteeroiicse eeotsinacoop24tobo.
detesoite oesr: he sodepetoyevst
fsarn apaccees
dor-dtesoistic
te: Paehe aet/aeeve frocoe
fror a Sodea digtaletots.
hoy based goebak eovEacseEtoott

d coaesped etedeteras Cnbe


Gogjet ioto-tbe de cte. &Coctuigfeue
eee opestoth

et ebeacendetericoceveotpat 9caR

dége Sthe
e e:AeetSe p O E S t t deee
aadeteaoioicbe eNeote ACepäoceE&tate
Aepedsa)
Cet
egle)'tyepseKer At aye ggedtoe Ceg f
e'e detchodot itbchVAaSeeoy
Yaiabttat

Gass
ettesThat e avepRoer aloepsoreP
Addtfeietbk PBee depedsaetehairs
Gyeste se deteroits eaotbeaored
otDe
1tasADEg taatafiGueCn Oeo aay
oteeh
S-pheepoçeS loq deterozols

Atee|eollel-o
freveot is ootint e Gate Chalebe

’ttasSagEthotoGi oiebeCorpete
befnte failwe s s
eantal
’aobiorTbe oçefbet
pesigissendpbsstp

TtCte.

Qirt&itetedbaeytekeaadagg
pesabar Casbenee
tSeedta been
aprtas)
beseroo Pype ( A e e s khe
data pase

gsler)
No eoony bottleoK (as eachpseg

nope Sster oiee cte)


Aue to aratolefee)
Sebocthan eal ctaceay
-’ Hasda to tebg

oaacelt ate tba


Ogeeoste Cocist tad
o t o t state/ cheekplat

feeot-BpesfsRyEin sCebcKAECNey

’ Lastsages

’Ospngese
04:55 O Þ33 Vo 91l l 30%
1. Coordinated Checkpointing with Message Logging

Concept
In this approach, all processes in the system coordinate to take a checkpoint:
simultaneously. Additionally, all messages sent and received between checkpoints are
logged.
Benefits:
Ensures a globally consistent state at each checkpoint.
Simplifies recovery by restoring the checkpoint and replaying the logged messages.
Implementation:
Periodically, all processes agree on a checkpoint time.
Each process logs messages it receives after the checkpoint.
In the event of a failure, the system restores the state from the last coordinated
checkpoint and replays the logged messages to recover.

Challenges:
oRequires synchronization, which can introduce latency and performance overhead.
The frequency of checkpoints and the volume af logged messages must be managed
efficiently.

2. Uncoordinated Checkpointing with Message Logging

" Concept
Processes take checkpoints independently without coordination. Messages are logged
to ensure that lost messages can be replayed during recovery.
"Benefits:
Reduces the need for synchronization, potentially improving performance.
Each process can operate more independently, enhancing scalability.
"Implementation:
Each process periodically saves its state independently
All incoming messages are logged with information about the sender, receiver, and
content.
During recovery. processes restore their state from their latest checkpoint and replay
logged messages in the order they were originally recelved.
Challenges:
Risk of the domino effect, where a failure in one process might require multiple
processes to roll back to their previous checkpoints.
Ensuring consistency across independently checkpointed processes can be complex.

3. Communication-Induced Checkpointing with Message Logging

" Concept:
Processes take independent checkpoints but are occasionally forced to take coordinated
checkpoints based on communication patterns. Message logging is used to log

messages received after the last checkpoint.


"Benefits:
Combines the low-overhead of uncoordinated checkpointing with the consistency
benefits of coordinated checkpointing.
oReduces the risk of the domino effect.
"Implementation:

Processes periodically checkpoint independently.


Cesses log all recelved messages
oProcesses
When a process detects a potential inconsistency due to message passing. it induces a
forced checkpoint, ensuring a consistent global state.
Recovery involves restoring from the last checkpoint and replaying logged messages.
"Challenges:
Determining when to induce forced checkpoints can be complex and may require
sophisticated algorithms.
Balancing the frequency of forced checkpoints with performance considerations.

You might also like