Abstract
Casual message logging protocols [3] have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and can never cause orphans to be created by crashes. Causal message logging, however, does require additional data to be piggybacked on application messages. The amount of such piggybacked data can become large. In this paper, we present five different implementations of casual message logging. All of the corresponding protocols are parameterized by f, the maximum number of processes that can fail concurrently. We also explore how the application's communication structure can be exploited to limit the amount of piggybacked data.
Cite
CITATION STYLE
Alvisi, L., & Marzullo, K. (1996). Trade-offs in implementing causal message logging protocols. In Proceedings of the Annual ACM Symposium on Principles of Distributed Computing (pp. 58–67). ACM. https://doi.org/10.1145/248052.248061
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.