l9_feb12

l9_feb12 - 1 Lecture 9 Other models: Monitoring models...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 Lecture 9 Other models: Monitoring models Reliability and fault-tolerance models Performance models. Scheduling policies. Security models 2 Student presentations and midterm I expect a progress report the week after the Spring break (March 18 24). The final project report is due the week before last. Midterm: two weeks from today Material Chapters 1,2, and 3 up to the last lecture. Open book. 3 questions: 30 minutes 3 Monitoring models A monitor could be a process responsible to establish the global state of a System. Intrusion Heissenbers uncertainty for quantum processes. Run : a total ordering of all events in the global history of a process. Cut : a subset of the local history of all processes. Frontier of a cut : the last event of every process in the cut. 4 Consistent and inconsistent cuts Consistent cut : a cut that agrees with causality. Inconsistent cut : violates causality. Causal history of an event : the smallest cut including the event. The snapshot algorithm of Chandy and Lamport. Checkpointing in parallel and distributed computing. 5 Consistent and inconsistent cuts m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2 C 1 C 2 6 Causal history m 2 m 1 m 3 p 1 p 2 p 3 m 4 m 5 e 1 1 e 2 1 e 3 1 e 4 1 e 5 1 e 6 1 e 1 2 e 2 2 e 3 2 e 4 2 e 1 3 e 2 3 e 3 3 e 4 3 e 5 3 e 5 2 e 6 2 7 The snapshot protocol (Chandy&Lamport) p p 1 p 5 p 4 p 3 p 2 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 8 Reliability and fault-tolerance models A failure at time t is un undesirable event...
View Full Document

Page1 / 28

l9_feb12 - 1 Lecture 9 Other models: Monitoring models...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online