{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

l9_feb12 - Lecture 9 Other models Monitoring models...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Lecture 9 Other models: Monitoring models Reliability and fault-tolerance models Performance models. Scheduling policies. Security models
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Student presentations and midterm I expect a progress report the week after the Spring break (March 18 – 24). The final project report is due the week before last. Midterm: two weeks from today – Material – Chapters 1,2, and 3 up to the last lecture. Open book. 3 questions: 30 minutes
Background image of page 2
3 Monitoring models A monitor could be a process responsible to establish the global state of a System. Intrusion – Heissenber’s uncertainty for quantum processes. Run : a total ordering of all events in the global history of a process. Cut : a subset of the local history of all processes. Frontier of a cut : the last event of every process in the cut.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
4 Consistent and inconsistent cuts Consistent cut : a cut that agrees with causality. Inconsistent cut : violates causality. Causal history of an event : the smallest cut including the event. The snapshot algorithm of Chandy and Lamport. Checkpointing in parallel and distributed computing.
Background image of page 4
5 Consistent and inconsistent cuts m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2 C 1 C 2
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
6 Causal history m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2
Background image of page 6
7 The snapshot protocol (Chandy&Lamport) p 0 p 1 p 5 p 4 p 3 p 2 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8 Reliability and fault-tolerance models
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}