Latest Distributed Systems News
OTHER CONSISTENCY MODELS
Models of memory consistency can be divided into uniform models, which do…
Overlay case studies: Pastry, Tapestry
The prefix routing approach is adopted by both Pastry and Tapestry. Pastry…
Peer to Peer Computing
The peer to peer computing architecture contains nodes that are equal participants…
Comparison between Checkpoint Schemes
Table 1. Comparison between uncoordinated, coordinated and qusi-synchronoun checkpointing Coordinated checkpointing algorithms…
Checkpoint-Recovery
Introduction Checkpoint-Recovery is a common technique for imbuing a program or system…
Deadlock detection
In a distributed system deadlock can neither be prevented nor avoided as…
Suzuki–Kasami Algorithm
Suzuki–Kasami algorithm is a token-based algorithm for achieving mutual exclusion in distributed systems.This…
Maekawa’s Algorithm
Maekawa’s Algorithm is quorum based approach to ensure mutual exclusion in distributed systems.…




