• Title/Summary/Keyword: Checkpoints

Search Result 106, Processing Time 0.028 seconds

RELIABILITY ANALYSIS OF CHECKPOINTING MODEL WITH MULTIPLE VERIFICATION MECHANISM

  • Lee, Yutae
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.6
    • /
    • pp.1435-1445
    • /
    • 2019
  • We consider a checkpointing model for silent errors, where a checkpoint is taken every fixed number of verifications. Assuming generally distributed i.i.d. inter-occurrence times of errors, we derive the reliability of the model as a function of the number of verifications between two checkpoints and the duration of work interval between two verifications.

A Multistriped Checkpointing Scheme for the Fault-tolerant Cluster Computers (다중 분할된 구조를 가지는 클러스터 검사점 저장 기법)

  • Chang, Yun-Seok
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.607-614
    • /
    • 2006
  • The checkpointing schemes should reduce the process delay through managing the checkpoints of each node to fit the network load to enhance the performance of the process running on the cluster system that write the checkpoints into its global stable storage. For this reason, a cluster system with single IO space on a distributed RAID chooses a suitable checkpointng scheme to get the maximum IO performance and the best rollback recovery efficiency. In this paper, we improved the striped checkpointing scheme with dynamic stripe group size by adapting to the network bandwidth variation at the point of checkpointing. To analyze the performance of the multi striped checkpointing scheme, we applied Linpack HPC benchmark with MPI on our own cluster system with maximum 512 virtual nodes. The benchmark results showed that the multistriped checkpointing scheme has better performance than the striped checkpointing scheme on the checkpoint writing efficiency and rollback recovery at heavy system load.

An Efficient Checkpointing Method for Mobile Hosts via the Software Agent (이동 기기에 적합한 소프트웨어 에이전트 기반의 효율적 체크포인팅 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.111-118
    • /
    • 2008
  • With the advance in mobile communication systems, the need for distributed applications running on multiple mobile devices also grows gradually. As such applications are subject to H/W failures of the mobile device or communication disruptions, compared to the traditional applications in fixed networks, it is crucial to develop any recovery mechanism suitable for them. For this, checkpointing is widely used to restart interrupted applications. In this paper, we devise an efficient checkpointing method that adopts the software agent executed at the mobile support station. The agent, called the checkpointing agent, is aimed at supporting the concept of rollback-distance (R-distance) that bounds the maximum number of roll-backed local checkpoints. By means of the R-distance, our method can prevent undesirable domino effects and heavy checkpoint overhead, while providing high flexibility in checkpoint creation.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

Analysis of Topography Using RC Helicopter Surveying System (무선조정 헬리콥터 사진측량시스템을 이용한 지형 분석)

  • Jang, Ho-Sik;Lee, Jung-Chool;Kim, Cha-Kyum;Cha, Sung-Yeoul
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.157-160
    • /
    • 2007
  • In this study, the method of extracting DEM is presented using RC Helicopter Photogrammetry System. From the result of reference points and checkpoints using Total Station which is conventional type of survey, the errors turned out to $-0.194{\sim}0.224m$ on the X-axis, $-0.088{\sim}0.180m$ on the Y-axis and $-0.286{\sim}0.283m$ on the Z-axis when RC Helicopter Photogrammetry System utilized. Through this RC Helicopter Photogrammetry System, they can provide efficient update of digital map on toparchy area or access is not easy area.

  • PDF

Analytic Model for Optimal Checkpoints in Mobile Real-time Systems

  • Lim, Sung-Hwa;Lee, Byoung-Hoon;Kim, Jai-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3689-3700
    • /
    • 2016
  • It is not practically feasible to apply hardware-based fault-tolerant schemes, such as hardware replication, in mobile devices. Therefore, software-based fault-tolerance techniques, such as checkpoint and rollback schemes, are required. In checkpoint and rollback schemes, the optimal checkpoint interval should be applied to obtain the best performance. Most previous studies focused on minimizing the expected execution time or response time for completing a given task. Currently, most mobile applications run in real-time environments. Therefore, it is extremely essential for mobile devices to employ optimal checkpoint intervals as determined by the real-time constraints of tasks. In this study, we tackle the problem of determining the optimal inter-checkpoint interval of checkpoint and rollback schemes to maximize the deadline meet ratio in real-time systems and to build a probabilistic cost model. From this cost model, we can numerically find the optimal checkpoint interval using mathematical tools. The performance of the proposed solution is evaluated using analytical estimates.

A Study on ERP Package Assessment Model in Business Firms

  • Lee, Sun-Kyu;Yim, Ki-Heung
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.343-358
    • /
    • 2004
  • Many IT specialists say that ERP (Enterprise Resource Planning) is the best way to manage resources in enterprise effectively. Actually lots of companies are using ERP solutions in the hope of getting competitiveness and employing global standard business practice. Wishing to take advantage of ERP S/W, companies have a preference for purchasing it and outsourcing ERP project. This paper is focusing on ERP Package assessment model in business firms. This paper finds out what differences there are in purchasing ERP S/W for organization characteristics and building characteristics, and suggests some guidelines of S/W development to venders. The results would be strong implications for ERP vendors. Especially this paper identify what the reasons and the checkpoints are when firms introduce ERP S/W. To do this, this paper used empirical data obtained from companies in South Korea and analyzed it using statistical software.

  • PDF

Determination of Optimal Checkpoint Interval for RM Scheduled Real-time Tasks (RM 스케줄링된 실시간 태스크에서의 최적 체크 포인터 구간 선정)

  • Kwak, Seong-Woo;Jung, Young-Joo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.6
    • /
    • pp.1122-1129
    • /
    • 2007
  • For a system with multiple real-time tasks of different deadlines, it is very difficult to find the optimal checkpoint interval because of the complexity in considering the scheduling of tasks. In this paper, we determine the optimal checkpoint interval for multiple real-time tasks that are scheduled by RM(Rate Monotonic) algorithm. Faults are assumed to occur with Poisson distribution. Checkpoints are inserted in the execution of task with equal distance in the same task, but different distances in other tasks. When faults occur, rollback to the latest checkpoint and re-execute task after the checkpoint. We derive the equation of maximum slack time for each task, and determine the number of re-executable checkpoint intervals for fault recovery. The equation to check the schedulibility of tasks is also derived. Based on these equations, we find the probability of all tasks executed within their deadlines successfully. Checkpoint intervals which make the probability maximum is the optimal.

Emerging Co-signaling Networks in T Cell Immune Regulation

  • Jung, Keunok;Choi, Inhak
    • IMMUNE NETWORK
    • /
    • v.13 no.5
    • /
    • pp.184-193
    • /
    • 2013
  • Co-signaling molecules are surface glycoproteins that positively or negatively regulate the T cell response to antigen. Co-signaling ligands and receptors crosstalk between the surfaces of antigen-presenting cells (APCs) and T cells, and modulate the ultimate magnitude and quality of T cell receptor (TCR) signaling. In the past 10 years, the field of co-signaling research has been advanced by the understanding of underlying mechanisms of the immune modulation led by newly identified co-signaling molecules and the successful preclinical and clinical trials targeting co-inhibitory molecules called immune checkpoints in the treatment of autoimmune diseases and cancers. In this review, we briefly describe the characteristics of well-known B7 co-signaling family members regarding the expression, functions and therapeutic implications and to introduce newly identified B7 members such as B7-H5, B7-H6, and B7-H7.

Cell Cycle and Cancer

  • Park, Moon-Taek;Lee, Su-Jae
    • BMB Reports
    • /
    • v.36 no.1
    • /
    • pp.60-65
    • /
    • 2003
  • Cancer is frequently considered to be a disease of the cell cycle. As such, it is not surprising that the deregulation of the cell cycle is one of the most frequent alterations during tumor development. Cell cycle progression is a highly-ordered and tightly-regulated process that involves multiple checkpoints that assess extracellular growth signals, cell size, and DNA integrity. Cyclin-dependent kinases (CDKs) and their cyclin partners are positive regulators of accelerators that induce cell cycle progression; whereas, cyclin-dependent kinase inhibitors (CKIs) that act as brakes to stop cell cycle progression in response to regulatory signals are important negative regulators. Cancer originates from the abnormal expression of activation of positive regulators and functional suppression of negative regulators. Therefore, understanding the molecular mechanisms of the deregulation of cell cycle progression in cancer can provide important insights into how normal cells become tumorigenic, as well as how cancer treatment strategies can be designed.