نتایج جستجو برای: backup nodes

تعداد نتایج: 136625  

2007
Heejo Lee Jong Kim

In this paper, we show two process allocation schemes to tolerate multiple faults when the primary-backup replication method is used. The rst scheme, called multiple backup scheme, is running multiple backup processes for each process to tolerate multiple faults. The second scheme, called regenerative backup scheme, is running only one backup process for each process, but regenerates backup pro...

2006
Tokihiro FUKATSU Masayuki HIRAFUJI Takuji KIURA

This paper presents the framework and function of an agent system developed for Field Server to manage Web-based sensor network. This system consisting of an agent program, program configuration files, and a Web interface, can easily and autonomously manage Web-based sensor nodes via the Internet. It can perform simple function such as monitoring to more complex and intelligent operations to ad...

1999
Heejo LEE Jong KIM Sung Je HONG

In this paper, we show two process allocation schemes to tolerate multiple faults when the primary-backup replication method is used. The first scheme, called multiple backup scheme, is running multiple backup processes for each process to tolerate multiple faults. The second scheme, called regenerative backup scheme, is running only one backup process for each process, but re-generates backup ...

1997
Tyler Barnett Kyle McPeek Larry S. Lile Ray Hyatt

This paper describes two similar user-initiated methods to backup and restore PC workstations over an ethernet network. The first method concerns ‘‘PC Hardware All Alike,’’ or the backup and restoring of sets of identical disk images across many identical systems. The second method is the backup and restoring of ‘‘PC Hardware All Different,’’ which manages unique disk images on individual syste...

1998
Kexiang Hu Sharad Mehrotra Simon M. Kaplan

In a primary-backup system, transaction processing takes place at the primary and the log records generated are propagated to the backup which uses them to reconstruct a recent state of the database. If the primary fails, the backup takes over transaction processing without causing users to observe a breach in service. Existing approaches can be broadly classi ed as 2-safe or 1-safe based on wh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

چکیده مسأله جایابی و تعیین ظرفیت تولیدات پراکنده با توجه به نقش انکار ناپذیر آنها در حفظ و پایداری ولتاژ، یکی از مباحث مهم در مبحث کاهش تلفات شبکه های توزیع به شمار می آید. روشهایی که تاکنون به این موضوع پر داخته اند، هیچگاه تولیدات پراکنده را به عنوان تامین کننده اصلی شبکه در شرایطی که منابع توان آن شبکه به نحوی از سرویس دهی خارج شوند بررسی ننموده اند. لذا در کنار مباحثی که با تعاریف توابع هد...

2007
Tran Dinh Nguyen Jinyang Li

We are keeping an increasing amount of valuable data in digital format only. Offsite backup systems are ideal for ensuring that such irreplaceable personal information will be preserved in the face of disk failures, unexpected disastrous events and operator mistakes. It is time to bring offsite backup solutions, traditionally a luxury to only deep pocketed enterprises, to the masses of home use...

2017
Atish Kathpal Priya Sehgal

While NoSQL databases are gaining popularity for business applications, they pose unique challenges towards backup and recovery. Our solution, BARNS addresses these challenges, namely taking: a) cluster consistent backup and ensuring repair free restore, b) storage efficient backups, and c) topology oblivious backup and restore. Due to eventual consistency semantics of these databases, traditio...

2017
HAJIME KAWAI HIROAKI SANDOH

A hard disk has, in recent years, become an essential component for a personal computer as well as a work station. A hard disk stores a variety of files, which are daily updated. The files in a hard disk are, however, lost because ofhuman errors and afailure of the hard disk. This is called a hard disk failure. In order to protect usfrom such a serions loss, it is important to make a backup cop...

Journal: :J. High Speed Networks 2017
Mohand Yazid Saidi Bernard Cousin

With the widespread use of real-time applications (VoIP, IPTV, Video conference, etc.) in Internet, protection and resource optimization become increasingly desired. Network protection aims to decrease the interruption time of communications by precomputing backup paths capable to receive and route traffics of affected primary paths upon failures. Resource optimization is achieved by improving ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید