Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
A quick distributed consensus protocol
Microprocessing and Microprogramming - Special quadruple issue: short notes from EUROMICRO 93
Software Fault Tolerance
Drago: An Ada Extension to Program Fault-Tolerant Distributed Applications
Ada-Europe '96 Proceedings of the 1996 Ada-Europe International Conference on Reliable Software Technologies
An Ada Library to Program Fault-Tolerant Distributed Applications
Ada-Europe '97 Proceedings of the 1997 Ada-Europe International Conference on Reliable Software Technologies
How to Modify the GNAT Frontend tp Experiment with Ada Extensions
Ada-Europe '99 Proceedings of the 1999 Ada-Europe International Conference on Reliable Software Technologies
A Distributed Consensus Protocol with a Coordinator
Proceedings of the IFIP WG10.3 International Conference on Decentralized and Distributed Systems
A Tailorable Distributed Programming Environment
Ada-Europe '02 Proceedings of the 7th Ada-Europe International Conference on Reliable Software Technologies
Programming distributed systems with group IO
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
A systematic review of software robustness
Information and Software Technology
Hi-index | 0.00 |
We propose a methodology for building robust Ada applications by reusing legacy software that we replicate among the nodes of a distributed system in order to increase fault tolerance of the service provided by the reused software. This methodology consists of writing an Ada interface which makes the binding to the legacy library. This interface forwards client requests to a group of remote servers, each one executing a copy of the legacy library. Dependability and consistency issues are solved inside the new interface code. In order to provide continuous service when adding new members, we propose techniques which prevent the server group from stopping service during state transfer. As an example of this methodology we present a robust database.