Fault recovery in distributed processing loop networks
dc.contributor.author | Yanney, Raif M. | en_US |
dc.contributor.author | Hayes, John P. (John Patrick) | en_US |
dc.date.accessioned | 2006-04-07T20:12:21Z | |
dc.date.available | 2006-04-07T20:12:21Z | |
dc.date.issued | 1988-09 | en_US |
dc.identifier.citation | Yanney, Raif M., Hayes, John P. (1988/09)."Fault recovery in distributed processing loop networks." Computer Networks and ISDN Systems 15(4): 229-243. <http://hdl.handle.net/2027.42/27151> | en_US |
dc.identifier.uri | http://www.sciencedirect.com/science/article/B6TYT-48V22Y5-7P/2/7f544b92ad4598703059ae1f8665b307 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/27151 | |
dc.description.abstract | A graph model is introduced to formalize the fault recovery process in distributed loop networks. This model is applicable to centralized as well as distributed recovery. Key fault tolerance and recovery parameters including redundancy, fault model, recovery time, and recovery strategy are characterized. Centralized recovery strategies for a given fault-tolerant loop network are presented and analyzed. A distributed recovery strategy, which depends on the cooperation of a set of processors, is given, and its application to a new class of fault-tolerant loop networksis evaluated. | en_US |
dc.format.extent | 1147470 bytes | |
dc.format.extent | 3118 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.language.iso | en_US | |
dc.publisher | Elsevier | en_US |
dc.title | Fault recovery in distributed processing loop networks | en_US |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | en_US |
dc.subject.hlbsecondlevel | Information and Library Science | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Social Sciences | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Electrical Engineering and Computer Science Department, University of Michigan, Ann Arbor, MI 48109, U.S.A. | en_US |
dc.contributor.affiliationother | TRW Defense Systems Group, Redondo Beach, CA 90278, U.S.A. | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/27151/1/0000145.pdf | en_US |
dc.identifier.doi | http://dx.doi.org/10.1016/0169-7552(88)90061-X | en_US |
dc.identifier.source | Computer Networks and ISDN Systems | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.