What is the load on process in terms of heartbeats

Assignment Help Data Structure & Algorithms
Reference no: EM133248206

Assignment:

Although the NE Patriots team did not win the last Superbowl, their coach is still paranoid. Due to their paranoia they decide to design a failure detector for an asynchronous system of N processes (N very large). A cornerback has designed a ring-based failure detection protocol that works as follows: each process i selects a set of target processes (once selected, these targets don't change) and asks these processes to send to it (i.e., to process i) heartbeats directly. Targets are selected as follows. All processes are organized in a virtual ring. Targets of a process i include three subsets: its k predecessors, its k successors, and k further processes chosen randomly among all non-predecessor/successor/i processes. Once the list of targets is selected, it is not changed (including the randomly selected members). k is a fixed number much smaller than N, and known to all. Heartbeats are not relayed (so this is not gossip, but more like ring failure 6 detection, except there is no ring), and process i times out if it doesn't receive heartbeats. A process is detected as failed if any of its heartbeat receivers do not receive expected heartbeats within a pre-specified timeout

When is completeness violated? That is, find the value M so that if there are (M-1) simultaneous failures, all of them will be detected, but if there are M simultaneous failures then not all of them may be detected.

Is the algorithm 100% accurate?

If the period is fixed (say 1 s) at all processes, what is the load on each process in terms of heartbeats that it needs to send? Calculate the worst case, best case, and average load.

Reference no: EM133248206

Questions Cloud

Research magnetic recording technology development team : If you have the opportunity to be a researcher in the magnetic recording technology development team.
Why should we hire you in it field : What The Hiring Manager Wants to Know: The best way to answer this question is to discuss what you can do for the company.
How use one-way hashing to store the passwords securely : How could you use one-way hashing to store the passwords securely and how would you then check passwords for users who try to login using the accounts.
How are going to helping refine capacity planning process : How are you going to help with helping refine the capacity planning process and modeling improvements to help drive positive Free Cash Flow?
What is the load on process in terms of heartbeats : If the period is fixed (say 1 s) at all processes, what is the load on each process in terms of heartbeats that it needs to send?
Which stands for domain name server operate : How does the acronym DNS, which stands for "Domain Name Server," operate? Could you possibly provide a systematic illustration?
Analyze the current business processes : In an effort to increase efficiency, your college has hired you to analyze its current business pro- cesses for registering for classes.
Explain the impact of the improvements in chip organization : Explain the impact of the improvements in chip organization and architecture on the computer system performance.
How can the use of internet technology help companies : How can the use of Internet Technology help companies in each type of agility? Give a real-world example to illustrate your answer.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Describe an algorithm that identifies the top logn flyers

Tamarindo Airlines wants to give a first-class upgrade coupon to their top log n frequent. Describe an algorithm that identifies the top logn flyers in O(n).

  Prove that floyd algorithm does not add duplicates

Suppose that you want to generate a random permutation of N distinct items drawn from the range 1, 2, ..., M.

  Short discussion on the concept of cryptography

The answer gives the learner with a short discussion on the concept of cryptography and the different aspects and functions that are provided through using encryption.

  List the advantages of all the searching algorithms discuss

List the advantages and disadvantages of all the searching algorithms discussed in this chapter.

  Show the hash table that results

Using a hash table with eleven locations and the hashing function h(i) =i % 11, show the hash table that results when the following integers.

  Write a function to carry out a three-way merge

Write a function to carry out a three-way merge-that is, a procedure that merges three sorted files to form another sorted file.

  Show that the vertex of largest degree in bk is the root

Show that the vertex of largest degree in Bk is the root. A rooted tree T is called an Sk-tree if it satisfies this recursive definition.

  Algorithm for locating nth successor in circlar linked list

Write algorithm or code segment for locating nth successor of an item in circlar linked list (the nth item that follows the given item in the list).

  Show how to solve given version of the shortest path problem

Suppose that in a directed graph, the cost of the path is the sum of the edge costs on the path PLUS the number of edges on the path.

  Build a basic bayesian network representing a power plant

Build a basic Bayesian network representing a power plant - Set the probabilities for the Bayes Net and Use inference to calculate several marginal probabilities within the Net.

  What are some advantages of having unstructured data

DISUCSSION QUESTION must have 450- 550 words. What are some advantages and disadvantages of having unstructured data?

  Let sbe the set of all people in the world for a b epsilon

let sbe the set of all people in the world. for a b epsilon s define a binary relation r as follows a b epsilon r if

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd