Web Essentials

Web Essentials

Server:  The software that distributes the information and the machine where the information and software reside is called the server.  • provides requested service to client • e.g., Web server sends requested…
OTHER CONSISTENCY MODELS

OTHER CONSISTENCY MODELS

Models of memory consistency can be divided into uniform models, which do not distinguish between types of memory access, and hybrid models, which do distinguish between ordinary and synchronization accesses…
Peer to Peer Computing

Peer to Peer Computing

The peer to peer computing architecture contains nodes that are equal participants in data sharing. All the tasks are equally divided between all the nodes. The nodes interact with each…
Comparison between Checkpoint Schemes

Comparison between Checkpoint Schemes

Table 1. Comparison between uncoordinated, coordinated and qusi-synchronoun checkpointing Coordinated checkpointing algorithms are made up by using the following scheme: • All process checkpointing: This requires all processes in the…
ROLLBACK RECOVERY MECHANISM

ROLLBACK RECOVERY MECHANISM

Log-Based rollback Recovery Mechanism Checkpoint-Based Rollback Recovery Mechanism In checkpointing based rollback recovery is a well-established technique to deal with process failures and increase the system reliability and fault-tolerance in…
Checkpoint-Recovery

Checkpoint-Recovery

Introduction Checkpoint-Recovery is a common technique for imbuing a program or system with fault tolerant qualities, and grew from the ideas used in systems which employ transaction processing [lyu95]. It…
Deadlock detection

Deadlock detection

In a distributed system deadlock can neither be prevented nor avoided as the system is so vast that it is impossible to do so. Therefore, only deadlock detection can be…