Average message overhead of replica control protocols
D Saha, S Rangarajan… - [1993] Proceedings. The …, 1993 - ieeexplore.ieee.org
D Saha, S Rangarajan, SK Tripathi
[1993] Proceedings. The 13th International Conference on …, 1993•ieeexplore.ieee.orgManagement of replicated data has received considerable attention in the last few years.
Several replica control schemes have been proposed which work in the presence of both
node and communication link failures. However, this resiliency to failure inflicts a
performance penalty in terms of the communication overhead incurred. Though the issue of
performance of these schemes, from the standpoint of availability of the system, has been
well addressed, the issue of message overhead has been limited to the analysis of worst …
Several replica control schemes have been proposed which work in the presence of both
node and communication link failures. However, this resiliency to failure inflicts a
performance penalty in terms of the communication overhead incurred. Though the issue of
performance of these schemes, from the standpoint of availability of the system, has been
well addressed, the issue of message overhead has been limited to the analysis of worst …
Management of replicated data has received considerable attention in the last few years. Several replica control schemes have been proposed which work in the presence of both node and communication link failures. However, this resiliency to failure inflicts a performance penalty in terms of the communication overhead incurred. Though the issue of performance of these schemes, from the standpoint of availability of the system, has been well addressed, the issue of message overhead has been limited to the analysis of worst-case and best-case message bounds. In this paper, we compare several well-known replica management protocols and control schemes in terms of their average-case message overhead. We also consider the tradeoff between the message overhead and availability, and we define the system model considered. Analytical expressions are derived for five well-known replica control protocols. The results are discussed with numerical examples.< >
ieeexplore.ieee.org
Showing the best result for this search. See all results