Lazy Garbage Collection of Recovery State for Fault-Tolerant Distributed Shared Memory

  • Authors:
  • Florin Sultan;Thu D. Nguyen;Liviu Iftode

  • Affiliations:
  • Rutgers Univ., Piscataway, NJ;Rutgers Univ., Piscataway, NJ;Rutgers Univ., Piscataway, NJ

  • Venue:
  • IEEE Transactions on Parallel and Distributed Systems
  • Year:
  • 2002

Quantified Score

Hi-index 0.01

Visualization

Abstract

Editor's Note: This paper unfortunately contains some errors which led to the paper being reprinted in the October 2002 issue. Please see IEEE Transactions on Parallel and Distributed Systems,vol. 13, no. 10, October 2002,pp. 1085-1098 for the correct paper (available without subscription).In this paper, we address the problem of garbage collection in a single-failure fault-tolerant home-based lazy release consistency (HLRC) distributed shared-memory (DSM) system based on independent checkpointing and logging. Our solution uses laziness in garbage collection and exploits consistency constraints of the HLRC memory model for low overhead and scalability. We prove safe bounds on the state that must be retained in the system to guarantee correct recovery after a failure. We devise two algorithms for garbage collection of checkpoints and logs, checkpoint garbage collection (CGC), and lazy log trimming (LLT). The proposed approach targets large-scale distributed shared-memory computing on local-area clusters of computers. In such systems, using global synchronization or extra communication for garbage collection is inefficient or simply impractical due to system scale and temporary disconnections in communication. The challenge lies in controlling the size of the logs and the number of checkpoints without global synchronization while tolerating transient disruptions in communication. Our garbage collection scheme is completely distributed, does not force processes to synchronize, does not add extra messages to the base DSM protocol, and uses only the available DSM protocol information. Evaluation results for real applications show that it effectively bounds the number of past checkpoints to be retained and the size of the logs in stable storage.