Hierarchical replication techniques to ensure checkpoint storage reliability in grid environment

Fatiha Bouabache, Thomas Herault, Gilles Fedak, Franck Cappello

Research output: Contribution to journalArticlepeer-review


An efficient and reliable fault tolerance protocol plays a key role in High Performance Computing. Rollback recovery is the most common fault tolerance technique used in High Performance Computing and especially in MPI applications. This technique relies on the reliability of the checkpoint storage. Most of the rollback recovery protocols assume that the checkpoint servers machines are reliable. However, in a grid environment any unit can fail at any moment, including components used to connect different administrative domains. Such failures lead to the loss of a whole set of machines, including the more reliable machines used to store the checkpoints in this administrative domain. Thus it is not safe to rely on the high Mean Time Between Failures of specific machines to store the checkpoint images. This paper introduces a new coordinated checkpoint protocol, which tolerates checkpoint server failures and clusters failures, and ensures a checkpoint storage reliability in a grid environment. To provide this reliability the protocol is based on a replication process. We propose new hierarchical replication strategies that exploit the locality of checkpoint images in order to minimize inter-cluster communication. We evaluate the effectiveness of our two hierarchical replication strategies through simulations against several criteria such as topology and scalability.

Original languageEnglish (US)
Pages (from-to)345-364
Number of pages20
JournalJournal of Interconnection Networks
Issue number4
StatePublished - Dec 2009
Externally publishedYes


  • Fault tolerance
  • Grid computing
  • Replication

ASJC Scopus subject areas

  • Computer Networks and Communications


Dive into the research topics of 'Hierarchical replication techniques to ensure checkpoint storage reliability in grid environment'. Together they form a unique fingerprint.

Cite this