This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: 1 Lecture 9 Other models: Monitoring models Reliability and faulttolerance models Performance models. Scheduling policies. Security models 2 Student presentations and midterm I expect a progress report the week after the Spring break (March 18 – 24). The final project report is due the week before last. Midterm: two weeks from today – Material – Chapters 1,2, and 3 up to the last lecture. Open book. 3 questions: 30 minutes 3 Monitoring models A monitor could be a process responsible to establish the global state of a System. Intrusion – Heissenber’s uncertainty for quantum processes. Run : a total ordering of all events in the global history of a process. Cut : a subset of the local history of all processes. Frontier of a cut : the last event of every process in the cut. 4 Consistent and inconsistent cuts Consistent cut : a cut that agrees with causality. Inconsistent cut : violates causality. Causal history of an event : the smallest cut including the event. The snapshot algorithm of Chandy and Lamport. Checkpointing in parallel and distributed computing. 5 Consistent and inconsistent cuts m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2 C 1 C 2 6 Causal history m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2 7 The snapshot protocol (Chandy&Lamport) p p 1 p 5 p 4 p 3 p 2 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 8 Reliability and faulttolerance models A failure at time t is un undesirable event...
View
Full
Document
 Fall '11
 Staff
 Cryptography, Encryption, Scheduling algorithm

Click to edit the document details