A survey of rollback-recovery protocols in message-passing systems.
This survey covers rollback-recovery techniques that do not require special language constructs. In the first part of the survey we classify rollback-recovery protocols into checkpoint-based and log-based. Checkpoint-based protocols rely solely on checkpointing for system state restoration. Checkpoi...
| Published in: | ACM computing surveys. 34, 3 (2002). |
|---|---|
| Main Author: | |
| Other Authors: | , , |
| Format: | Article |
| Language: | English |
| Subjects: |