SlideShare a Scribd company logo
ARBA MINCH UNIVERSITY
INSTITUTE OF TECHNOLOGY
FACULTY OF COMPUTING AND SOFTWARE ENGNEERING
DEPARTMENT OF COMPUTER SCIENCE
Presentation on :The Chandy–Lamport algorithm
Prepared by
1.Tekle Dargaso ------------------PRAMIT/094/13
The Chandy–Lamport algorithm
 The Chandy–Lamport algorithm is a snapshot algorithm that is
used in distributed systems for recording a consistent global
state of an asynchronous system. It was developed by and
named after Leslie Lamport and K. Mani Chandy.
• The assumptions of the algorithm are as follows:
 There are no failures and all messages arrive intact and only once
 The communication channels are unidirectional and FIFO ordered
 There is a communication path between any two processes in the
system
 Any process may initiate the snapshot algorithm
 The snapshot algorithm does not interfere with the normal execution
of the processes
 Each process in the system records its local state and the state of its
incoming channels
How Algorithm Works
• The Chandy–Lamport algorithm works like this:
The observer process (the process taking a snapshot):
Saves its own local state
Sends a snapshot request message bearing a snapshot token to all other
processes
A process receiving the snapshot token for the first time on any message:
Sends the observer process its own saved state
Attaches the snapshot token to all subsequent messages (to help propagate the
snapshot token)
 When a process that has already received the snapshot token receives a message
that does not bear the snapshot token, this process will forward that message to
the observer process.
Design and analysis of algorithm chapter two.pptx
Design and analysis of algorithm chapter two.pptx

More Related Content

Similar to Design and analysis of algorithm chapter two.pptx (20)

PPTX
DISTRIBUTED COMPUTTING (snapshot).pptx
950621104027GODWINJ
 
PPT
Network monotoring
Programmer
 
PDF
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
 
PPT
Improving Passive Packet Capture : Beyond Device Polling
Hargyo T. Nugroho
 
PPTX
Computer architecture presentation
Muhammad Hamza
 
PPT
Packet Sniffing
guestfa1226
 
PPT
PLC Explained pp.ppt for educational purpose
brendsriverasy
 
PPT
Operating System - Monitors (Presentation)
Experts Desk
 
PPTX
Time Triggered Protocol
Dhruv Goel
 
PDF
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Andrea Tino
 
PPTX
Techno-Fest-15nov16
Satish Navkar
 
PDF
Platform Technology (2).pdf
FranzLawrenzDeTorres1
 
PPTX
LVTS Projects
Vladislav Kaplan
 
PDF
ARM architcture
Hossam Adel
 
PDF
UNIT-1-Operating-System-Overview and introduction.
PratikTimalsena1
 
PPTX
Types of Operating Systems for Computer Science.pptx
hassanarif1022
 
PDF
Raft presentation
Patroclos Christou
 
PDF
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
cscpconf
 
PPTX
Pipeline & Nonpipeline Processor
Smit Shah
 
PDF
Procuring the Anomaly Packets and Accountability Detection in the Network
IOSR Journals
 
DISTRIBUTED COMPUTTING (snapshot).pptx
950621104027GODWINJ
 
Network monotoring
Programmer
 
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
 
Improving Passive Packet Capture : Beyond Device Polling
Hargyo T. Nugroho
 
Computer architecture presentation
Muhammad Hamza
 
Packet Sniffing
guestfa1226
 
PLC Explained pp.ppt for educational purpose
brendsriverasy
 
Operating System - Monitors (Presentation)
Experts Desk
 
Time Triggered Protocol
Dhruv Goel
 
Implementation of a Deadline Monotonic algorithm for aperiodic traffic schedu...
Andrea Tino
 
Techno-Fest-15nov16
Satish Navkar
 
Platform Technology (2).pdf
FranzLawrenzDeTorres1
 
LVTS Projects
Vladislav Kaplan
 
ARM architcture
Hossam Adel
 
UNIT-1-Operating-System-Overview and introduction.
PratikTimalsena1
 
Types of Operating Systems for Computer Science.pptx
hassanarif1022
 
Raft presentation
Patroclos Christou
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
cscpconf
 
Pipeline & Nonpipeline Processor
Smit Shah
 
Procuring the Anomaly Packets and Accountability Detection in the Network
IOSR Journals
 

More from Tekle12 (20)

PPTX
MAD-4 (2).pptx mobile application development
Tekle12
 
PPTX
MAD-3 (2).pptx mobile application development
Tekle12
 
PPTX
MAD-2.pptx mobile application development
Tekle12
 
PPTX
MAD-1.pptx mobile application development
Tekle12
 
PPTX
MAD-4 (2).pptx mobile application development
Tekle12
 
PPTX
MAD-3 (2).pptx mobile application development
Tekle12
 
PPTX
MAD-2.pptx mobile application development
Tekle12
 
PPTX
Chapter 3 - EMTE.pptx artificial intelligence
Tekle12
 
PPTX
Chapter 2.pptx emerging technology data science
Tekle12
 
PPTX
Chapter 4 - EMTE.pptx internet of things
Tekle12
 
PPTX
This is Emerging Technology Power point shared here
Tekle12
 
PPTX
ch1introduction about android development.pptx
Tekle12
 
PPTX
Chapter 3 Naming in distributed system.pptx
Tekle12
 
PPTX
Chapter Introductionn to distributed system .pptx
Tekle12
 
PPTX
Chapter 6emerging technology - EMTE.pptx
Tekle12
 
PPTX
Chapter 4about internet of things IoT.pptx
Tekle12
 
PPT
Chapter1.1 Introduction to design and analysis of algorithm.ppt
Tekle12
 
PPT
Chapter 6 WSN.ppt
Tekle12
 
PPTX
Chapter 2.1.pptx
Tekle12
 
PPT
CHAPTER-3a.ppt
Tekle12
 
MAD-4 (2).pptx mobile application development
Tekle12
 
MAD-3 (2).pptx mobile application development
Tekle12
 
MAD-2.pptx mobile application development
Tekle12
 
MAD-1.pptx mobile application development
Tekle12
 
MAD-4 (2).pptx mobile application development
Tekle12
 
MAD-3 (2).pptx mobile application development
Tekle12
 
MAD-2.pptx mobile application development
Tekle12
 
Chapter 3 - EMTE.pptx artificial intelligence
Tekle12
 
Chapter 2.pptx emerging technology data science
Tekle12
 
Chapter 4 - EMTE.pptx internet of things
Tekle12
 
This is Emerging Technology Power point shared here
Tekle12
 
ch1introduction about android development.pptx
Tekle12
 
Chapter 3 Naming in distributed system.pptx
Tekle12
 
Chapter Introductionn to distributed system .pptx
Tekle12
 
Chapter 6emerging technology - EMTE.pptx
Tekle12
 
Chapter 4about internet of things IoT.pptx
Tekle12
 
Chapter1.1 Introduction to design and analysis of algorithm.ppt
Tekle12
 
Chapter 6 WSN.ppt
Tekle12
 
Chapter 2.1.pptx
Tekle12
 
CHAPTER-3a.ppt
Tekle12
 
Ad

Recently uploaded (20)

PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
The Future of Artificial Intelligence (AI)
Mukul
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Ad

Design and analysis of algorithm chapter two.pptx

  • 1. ARBA MINCH UNIVERSITY INSTITUTE OF TECHNOLOGY FACULTY OF COMPUTING AND SOFTWARE ENGNEERING DEPARTMENT OF COMPUTER SCIENCE Presentation on :The Chandy–Lamport algorithm Prepared by 1.Tekle Dargaso ------------------PRAMIT/094/13
  • 2. The Chandy–Lamport algorithm  The Chandy–Lamport algorithm is a snapshot algorithm that is used in distributed systems for recording a consistent global state of an asynchronous system. It was developed by and named after Leslie Lamport and K. Mani Chandy. • The assumptions of the algorithm are as follows:  There are no failures and all messages arrive intact and only once  The communication channels are unidirectional and FIFO ordered  There is a communication path between any two processes in the system  Any process may initiate the snapshot algorithm  The snapshot algorithm does not interfere with the normal execution of the processes  Each process in the system records its local state and the state of its incoming channels
  • 3. How Algorithm Works • The Chandy–Lamport algorithm works like this: The observer process (the process taking a snapshot): Saves its own local state Sends a snapshot request message bearing a snapshot token to all other processes A process receiving the snapshot token for the first time on any message: Sends the observer process its own saved state Attaches the snapshot token to all subsequent messages (to help propagate the snapshot token)  When a process that has already received the snapshot token receives a message that does not bear the snapshot token, this process will forward that message to the observer process.