Publication | Closed Access
The Benevolent Bandit Laboratory: a testbed for distributed algorithms
17
Citations
5
References
1989
Year
EngineeringDistributed ProgrammingDistributed AlgorithmsGame TheoryComputer ArchitectureDistributed Data ProcessingDistributed Processing EnvironmentConcurrency (Computer Science)Distributed EnvironmentDatacenter ComputingParallel ComputingMechanism DesignDistributed ComputationsDistributed AlgorithmOnline AlgorithmComputer EngineeringDistributed SystemsComputer ScienceBenevolent Bandit LaboratoryExploration V ExploitationDistributed ProcessingOperating SystemsDistributed ComputingBusinessParallel ProgrammingSystem Software
The design, implementation, and use of a distributed processing environment on a network of IBM PCs running DOS is described. Temporarily unused PCs can be accessed by other users on the network to perform distributed computations. An owner of a PC need not be aware that the machine is being used during idle times; the machine is immediately returned when the owner begins to work again. Some degree of computation resiliency is provided in this unreliable environment; if a PC is part of a distributed algorithm and is reclaimed by its owner, the system finds a replacement node (if possible), resends the affected code to the processor, and restarts it. Thus, a distributed computation is able to proceed despite a set of transient processors. System performance, distributed applications, and fault tolerance are discussed. Performance improvements are demonstrated by applications like parallel merge sort and a distributed search solution to the eight puzzle.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1