Chandy–Lamport algorithm: Difference between revisions

Content deleted Content added
Diction: changed "overcome" to "facilitated" in the last paragraph. You don't "overcome" an assumption. In this case, you may "facilitate" it by mitigating vulnerabilities...
Line 11:
The algorithm works using marker messages. Each process that wants to initiate a snapshot records its local state and sends a marker on each of its outgoing channels. All the other processes, upon receiving a marker, record their local state, the state of the channel from which the marker just came as empty, and send marker messages on all of their outgoing channels. If a process receives a message after having recorded its local state, it records the state of the incoming channel from which the marker came as carrying all the messages received since it first recorded its local state.
 
Some of the assumptions of the algorithm can be overcomefacilitated using a more reliable communication protocol such as [[Internet protocol suite|TCP/IP]]. The algorithm can be adapted so that there could be multiple snapshots occurring simultaneously.
[[Category:Algorithms]]