Trade-offs in implementing causal message logging protocols

23Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Casual message logging protocols [3] have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and can never cause orphans to be created by crashes. Causal message logging, however, does require additional data to be piggybacked on application messages. The amount of such piggybacked data can become large. In this paper, we present five different implementations of casual message logging. All of the corresponding protocols are parameterized by f, the maximum number of processes that can fail concurrently. We also explore how the application's communication structure can be exploited to limit the amount of piggybacked data.

Cite

CITATION STYLE

APA

Alvisi, L., & Marzullo, K. (1996). Trade-offs in implementing causal message logging protocols. In Proceedings of the Annual ACM Symposium on Principles of Distributed Computing (pp. 58–67). ACM. https://doi.org/10.1145/248052.248061

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free