10 3 this result implies that the common approach of sharpening the checkpoint inducing condition by piggybacking more control information on each message may not always yield a more efficient protocol