Lesson Flashcards

(48 cards)

1
Q

What happens when Process P2 fails before logging the determinant for message m5?

A

Process P1 becomes an orphan because it had already processed m6 which depended on m5.

This leads to cascading rollbacks in P1 and P0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of causal dependencies in recovery from failures?

A

The system tracks causal dependencies to restore a globally consistent state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Communication-Induced Checkpointing work?

A

It piggybacks protocol-related information on each application message, allowing the receiver to decide if it needs a forced checkpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two types of checkpoints in Communication-Induced Checkpointing?

A
  • Autonomous Checkpoints
  • Forced Checkpoints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of Communication-Induced Checkpointing?

A

Avoids cascading rollbacks without requiring full coordination and balances overhead between uncoordinated and coordinated approaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a disadvantage of Communication-Induced Checkpointing?

A

Can introduce unnecessary checkpoints, increasing storage and processing costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main difference between Blocking and Non-Blocking approaches in Coordinated Checkpointing?

A

Blocking: Processes pause execution during checkpointing. Non-blocking: Processes continue execution while coordination happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of Communication-Induced Checkpointing?

A
  • Model-Based Checkpointing
  • Index-Based Checkpointing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Log-based rollback recovery?

A

A fault-tolerance mechanism where processes log events and messages during execution to replay them after a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pessimistic Logging?

A

Logs every nondeterministic event before execution to ensure recovery is always possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the pros and cons of Pessimistic Logging?

A
  • Pros: Fast recovery, no dependency tracking
  • Cons: High runtime overhead due to frequent logging.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Optimistic Logging?

A

Logs events asynchronously, allowing execution to proceed without waiting for logs to be written.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the pros and cons of Optimistic Logging?

A
  • Pros: Low overhead during normal execution
  • Cons: May require rollback of multiple processes due to dependency tracking.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Causal Logging?

A

Logs events based on causality tracking between processes to ensure only dependent processes rollback together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of a log-based rollback recovery system?

A
  • Relies on Piecewise Deterministic (PWD) Assumption
  • Logs nondeterministic events
  • Recovery process restores a previous checkpoint and replays logged events.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are orphan messages?

A

Messages with receive recorded but message send not recorded, often due to rollbacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are duplicate messages?

A

Messages that arise due to logging and replaying during process recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are lost messages?

A

Messages whose send is not undone but receive is undone due to rollback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are delayed messages?

A

Messages whose receive is not recorded because the receiving process was either down or the message arrived after the rollback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the domino effect in uncoordinated checkpointing?

A

A failure may require rolling back multiple checkpoints, leading to inefficiency.

21
Q

What is the Koo-Toueg coordinated checkpointing algorithm?

A

A technique that takes a consistent set of checkpoints to avoid domino effect and livelock problems during recovery.

22
Q

What are the two kinds of checkpoints in the Koo-Toueg algorithm?

A
  • Permanent checkpoint
  • Tentative checkpoint
23
Q

What is the purpose of optimistic logging protocols?

A

To track causal dependencies during failure-free execution without synchronous access to stable storage.

24
Q

What is the always-no-orphans property in logging?

A

Ensures that no process becomes an orphan if another fails.

25
What do pessimistic logging protocols require?
A non-trivial garbage collection scheme
26
What do pessimistic protocols need to keep?
Only the most recent checkpoint of each process
27
What do optimistic protocols need to keep?
Multiple checkpoints for each process
28
What is a characteristic of pessimistic logging?
Assumes a failure can occur after any non-deterministic event
29
True or False: In reality, failures are common.
False
30
What does the predicate Stable(e) indicate?
True if e’s determinant is logged on stable storage
31
What does the no-orphans consistency condition state?
If e is not stable, then Depend(e) must be a subset of Log(e)
32
What is the Juang-Venkatesan algorithm used for?
Asynchronous checkpointing and recovery
33
Describe the rollback recovery algorithm.
Restores the system state to a consistent state after a failure
34
What are the two phases of the rollback recovery algorithm?
* Initiating process sends a message to all processes for preferences * Final decision sent to all processes to act accordingly
35
What is an optimization in the rollback recovery protocol?
Not all processes need to roll back if they did not change anything
36
What assumptions does the Juang-Venkatesan algorithm make?
* Communication channels are reliable * Messages delivered in FIFO order * Infinite buffers * Message transmission delay is arbitrary but finite
37
What does the Piecewise Deterministic (PWD) assumption state?
Execution consists of deterministic state transitions interrupted by nondeterministic events
38
What are the two types of log storage maintained in the Juang-Venkatesan algorithm?
* Volatile log * Stable log
39
What is the domino effect in checkpointing and recovery?
A chain reaction of failures during recovery that leads to system inconsistency
40
Define checkpoints in the context of rollback recovery.
The saved states of a process
41
What does rollback propagation refer to?
Dependencies may force non-failed processes to roll back
42
What are in-transit messages?
Messages that have been sent but not yet received
43
What are orphan messages?
Messages with 'receive' recorded but 'send' not recorded
44
What is a consistent global state?
A global state that may occur during a failure-free execution
45
What is a global checkpoint?
A set of local checkpoints, one from each process
46
What defines a consistent global checkpoint?
No message is sent by a process after taking its local point that is received by another process before taking its checkpoint
47
What is an inconsistent global checkpoint?
Includes a message receipt event without the corresponding send event
48
True or False: A consistent state occurs if every message received has a corresponding send event.
True