Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
TradeOffs in Implementing Causal Message Logging Protocols Lorenzo Alvisi \Lambda Keith Marzullo y
 

Summary: Trade­Offs in Implementing Causal Message Logging Protocols
Lorenzo Alvisi \Lambda Keith Marzullo y
Abstract
Casual message logging protocols [3] have several at­
tractive properties: they introduce no blocking, send
no additional messages over those sent by the appli­
cation, and can never cause orphans to be created by
crashes. Causal message logging, however, does require
additional data to be piggybacked on application mes­
sages. The amount of such piggybacked data can be­
come large.
In this paper, we present five different implementa­
tions of casual message logging. All of the corresponding
protocols are parameterized by f , the maximum number
of processes that can fail concurrently. We also explore
how the application's communication structure can be
exploited to limit the amount of piggybacked data.
1 Introduction
Message logging is a common technique used to build
systems that can tolerate process crash failures. These

  

Source: Alvisi, Lorenzo - Department of Computer Sciences, University of Texas at Austin

 

Collections: Computer Technologies and Information Sciences