Читать книгу From Traditional Fault Tolerance to Blockchain - Wenbing Zhao - Страница 43
2.2 Checkpoint-Based Protocols
ОглавлениеCheckpoint-based protocols do not rely on the piecewise deterministic assumption, hence, they are simpler to implement and less restrictive (because the developers do not have to identify all forms of nondeterministic events and log them properly). However, a tradeoff is that the distributed systems that choose to use checkpoint-based protocols must be willing to tolerate loss of execution unless a checkpoint is taken prior to every event, which is normally not realistic.