From Traditional Fault Tolerance to Blockchain. Wenbing Zhao

Чтение книги онлайн.

Читать онлайн книгу From Traditional Fault Tolerance to Blockchain - Wenbing Zhao страница 9

From Traditional Fault Tolerance to Blockchain - Wenbing Zhao

Скачать книгу

of Liability/Disclaimer of Warranty

      While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant-ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

       Library of Congress Cataloging-in-Publication Data

      ISBN 978-1-119-68195-3

      Cover image: Pixabay.Com

      Cover design by Russell Richardson

      Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

      Printed in the USA

      10 9 8 7 6 5 4 3 2 1

       To My Parents

      List of Figures

      1.1 An example of a chain of threats with two levels of recursion.

      1.2 The rollback recovery is enabled by periodically taking checkpoints and usually logging of the requests received.

      1.3 With redundant instances in the system, the failure of a replica in some cases can be masked and the system continue providing services to its clients without any disruption.

      1.4 Main types of assets in a distributed system.

      2.1 An example distributed system.

      2.2 Consistent and inconsistent global state examples.

      2.3 An example of the domino effect in recovery with uncoordinated checkpointing.

      2.4 Finite state machine specification for the coordinator in the Tamir and Sequin checkpointing protocol.

      2.5 Finite state machine specification for the participant in the Tamir and Sequin checkpointing protocol.

      2.6 Normal operation of the Tamir and Sequin checkpointing protocol in an example three-process distributed system.

      2.7 Finite state machine specification for the Chandy and Lamport distributed snapshot protocol.

      2.8 Normal operation of the Chandy and Lamport global snapshot protocol in an example three-process distributed system.

      2.9 A comparison of the channel state definition between (a) the Chandy and Lamport distributed snapshot protocol and (b) the Tamir and Sequin global checkpointing protocol.

      2.10 Example state intervals.

      2.11 An example for pessimistic logging.

      2.12 Transport level (a) and application level (b) reliable messaging.

      2.13 Optimization of pessimistic logging: (a) concurrent message logging and execution (b) logging batched messages.

      2.14 Probability density function of the logging latency.

      2.16 Probability density function of the end-to-end latency.

      2.17 Normal operation of the sender-based logging protocol.

      2.18 An example normal operation of the sender-based logging protocol.

      2.19 Two concurrent failures could result in the loss of determinant information for regular messages.

      3.1 The three-tier architecture.

      3.2 The Java EE architecture.

      3.3 An example runtime path of an end-user request.

      3.4 Component class and component instances.

      3.5 The chi-square cumulative distribution function for degree of freedom of 1, 2, 3, 4, 5.

      3.6 The path shape of the example runtime path shown in Figure 3.3.

      3.7 Component class and component instances.

      3.8

Скачать книгу