Results 1 - 10
of
1,995
Sender-based message logging
"... Sender-based message logging is a new low-overhead mechanism for providing transparent fault-tolerance in distributed systems. It differs from conventional message logging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent. Keeping the message ..."
Abstract
-
Cited by 159 (12 self)
- Add to MetaCart
Sender-based message logging is a new low-overhead mechanism for providing transparent fault-tolerance in distributed systems. It differs from conventional message logging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent. Keeping the message
Message Logging: Pessimistic, Optimistic, and Causal
- IEEE Transactions on Software Engineering
, 1995
"... Message logging protocols are an integral part of a technique for implementing processes that can recover from crash failures. All message logging protocols require that, when recovery is complete, there be no orphan processes, which are surviving processes whose states are inconsistent with the rec ..."
Abstract
-
Cited by 140 (16 self)
- Add to MetaCart
Message logging protocols are an integral part of a technique for implementing processes that can recover from crash failures. All message logging protocols require that, when recovery is complete, there be no orphan processes, which are surviving processes whose states are inconsistent
Message Logging in Mobile Computing
, 1999
"... Dependable mobile computing is enhanced by independent recovery, low power consumption and no dependence on stable storage at the mobile host. Existing recovery protocols proposed for mobile environments typically create consistent global checkpoints that do not guarantee independent recovery and lo ..."
Abstract
-
Cited by 28 (6 self)
- Add to MetaCart
and low power consumption. This paper demonstrates the advantages of message logging by describing a receiver based logging protocol. Checkpointing is utilized to limit log size and recovery latency. We compare the performance of our approach with that of existing mobile checkpointing and recovery
Using Message Logging and Checkpointing
, 1989
"... Fault tolerance can allow processes executing in a computer system to survive failures within the system. This thesis addresses the theory and practice of transparent faulttolerance methods using message logging and checkpointing in distributed systems. A general model for reasoning about the behavi ..."
Abstract
- Add to MetaCart
Fault tolerance can allow processes executing in a computer system to survive failures within the system. This thesis addresses the theory and practice of transparent faulttolerance methods using message logging and checkpointing in distributed systems. A general model for reasoning about
Message Logging in Mobile Computing
"... Dependable mobile computing is enhanced by indepen-dent recovery, low power consumption and no dependence on stable storage at the mobile host. Existing recovery pro-tocols proposed for mobile environments typically create consistent global checkpoints that do not guarantee inde-pendent recovery and ..."
Abstract
- Add to MetaCart
and low power consumption. This paper demonstrates the advantages of message logging by de-scribing a receiver based logging protocol. Checkpointing is utilized to limit log size and recovery latency. We com-pare the performance of our approach with that of existing mobile checkpointing and recovery
An Efficient Algorithm for Causal Message Logging
, 1998
"... Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algor ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging
The Cost of Recovery in Message Logging Protocols
, 1998
"... Past research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. In this paper, we give the first experimental evaluation of the performance of these protocols during recovery. We discover that, if ..."
Abstract
-
Cited by 37 (3 self)
- Add to MetaCart
Past research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. In this paper, we give the first experimental evaluation of the performance of these protocols during recovery. We discover that
Recovery in Distributed Systems Using Optimistic Message Logging and Checkpointing
, 1988
"... In a distributed system using message logging and checkpointing to provide fault tolerance, there is always a unique maximum recoverable system state, regardless of the message logging protocol used. The proof of this relies on the observation that the set of system states that have occurred during ..."
Abstract
-
Cited by 224 (14 self)
- Add to MetaCart
In a distributed system using message logging and checkpointing to provide fault tolerance, there is always a unique maximum recoverable system state, regardless of the message logging protocol used. The proof of this relies on the observation that the set of system states that have occurred during
Message Logging Optimization for Wireless Networks
, 2001
"... This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station fail ..."
Abstract
- Add to MetaCart
This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station
A Survey of Rollback-Recovery Protocols in Message-Passing Systems
, 1996
"... this paper, we use the terms event logging and message logging interchangeably ..."
Abstract
-
Cited by 716 (22 self)
- Add to MetaCart
this paper, we use the terms event logging and message logging interchangeably
Results 1 - 10
of
1,995