![]() ![]() ![]() ![]() Remus aims to provide high availability to the applications to achieve this, it works in four phases: 1.Ĭheckpoint the changed memory state at the primary and continue to the next epoch of network and disk request streams. In particular, we discuss the design of Remus as an example system that offers these properties. Because the protocol is applied at the VM level, this scheme can be used independent of the application and underlying hardware, offering an increased level of generality. The system or user application that must be protected from failures is first encapsulated in a VM (say an active VM or the primary), and operations are performed at the VM level (in contrast to traditional approach of operating at the application level) to obtain paired servers that run in active–passive configuration. A scheme that leverages virtualization technology to tolerate crash faults in the cloud in a transparent manner is discussed in this section. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |