Tradeoffs in implementing primary-backup protocols

نویسندگان

  • Navin Budhiraja
  • Keith Marzullo
چکیده

P&*Ic repw"t Willa to, Sfti cuedian 91 kitomuiitas i elImWWW to average I tioKV Pat i.spoII. ic"duisg tN or to, kmevmiefi" btabuagef. Mawtii e*'is** das almm". eameuw" WWi maanVeAaw Wt4 da" nem id, 4anu J and m w e e ci tadou Saud hiNonu"ma reg uikig inte so Wa i i9me o my woow o"ci Hift ci5• • d c ilom ,asaM. ktluisig suggta0 t0 o0 , aIN dukig Wt •oiden. %o Waaitihalo Headquaes Savicae. Dkiectoee t0r dlmno~ni O psralms and R4apao . 1215 Jeiltaon Davis HlV /. Sub 12D4. Aihgion. VA 222 0243OZ jt W4IOU* O e 5e al MS a Bucldg. P -wok ReaualionPra 10704-OiB), WlMngt1an. DC205. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED October 1992 Special Technical 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Tradeoffs in Implementing Primary-Backup Protocols NAG 2-593

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Primary-Backup Protocols

One way to implement a fault-tolerant service is to employ multiple sites that fail independently. The state of the service is replicated and distributed among these sites, and updates are coordinated so that even when a subset of the sites fail, the service remains available. A common approach to structuring such replicated services is to designate one site as the primary and all the others as...

متن کامل

Weak Leader Election in the receive-omission failure model

ions that enables one to more expressively represent failure scenarios by considering failures that are not independent or not identically distributed; 4) although it allows for faulty processes to be elected, correct processes are able to detect it, enabling the use of alarms to indicate failures in the system. Relating to our discussion on Primary-Backup protocols, by assuming that faulty pro...

متن کامل

A Driven Backup Routing Table to Find Alternative Dijoint Path in Ad Hoc Wireless

The performances of the routing protocols are important since they compute the primary path between source and destination. In addition, routing protocols need to detect failure within a short period of time when nodes move to start updating the routing table in order to find a new primary path to the destination. Meantime, loss of packets and end-toend delays will increase thereby reducing thr...

متن کامل

Efficient Resource Management Mechanism with Fault Tolerant Model for Computational Grids

Grid computing provides a framework and deployment environment that enables resource sharing, accessing, aggregation and management. It allows resource and coordinated use of various resources in dynamic, distributed virtual organization. The grid scheduling is responsible for resource discovery, resource selection and job assignment over a decentralized heterogeneous system. In the existing sy...

متن کامل

Implementing a Modern Backup Architecture

Introduction Fail-proof data backup and recovery is more critical to an organization’s survival than ever before as few businesses can survive for any period of time without their IT function. With so much reliance on electronic data, an organization can lose millions of dollars associated with lost data including its competitive advantage and credibility as in the case of security breaches. Im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995