Content deleted Content added
Diction: changed "overcome" to "facilitated" in the last paragraph. You don't "overcome" an assumption. In this case, you may "facilitate" it by mitigating vulnerabilities... |
|||
Line 11:
The algorithm works using marker messages. Each process that wants to initiate a snapshot records its local state and sends a marker on each of its outgoing channels. All the other processes, upon receiving a marker, record their local state, the state of the channel from which the marker just came as empty, and send marker messages on all of their outgoing channels. If a process receives a message after having recorded its local state, it records the state of the incoming channel from which the marker came as carrying all the messages received since it first recorded its local state.
Some of the assumptions of the algorithm can be
[[Category:Algorithms]]
|