An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols | SpringerLink
Skip to main content

An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3816))

Abstract

To continuously log messages in the limited volatile memories of their sending processes, existing SBML protocols force the processes to periodically flush the message log into the stable storage or messages in the log to be useless for future failures and then removes them. But, these garbage collection algorithms may result in a large number of stable storage accesses or high communication and checkpointing overheads as inter-process communication rate increases. To address this problem, we propose an efficient algorithm to autonomously remove useless log information in its volatile storage by piggybacking only some additional information. It requires no extra message and forced checkpoint. Additionally, the algorithm efficiently supports fast commit of all output to the outside world. Simulation results show that our algorithm considerably outperforms the traditional algorithm with respect to the average elapsed time required until the memory buffer for message logging of a process is full.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahn, J. (2005). An Efficient Algorithm for Removing Useless Logged Messages in SBML Protocols. In: Chakraborty, G. (eds) Distributed Computing and Internet Technology. ICDCIT 2005. Lecture Notes in Computer Science, vol 3816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604655_20

Download citation

  • DOI: https://doi.org/10.1007/11604655_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30999-4

  • Online ISBN: 978-3-540-32429-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics