{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:19:35Z","timestamp":1761862775545},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/comst.2008.4564478","type":"journal-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T20:13:56Z","timestamp":1216325636000},"page":"34-46","source":"Crossref","is-referenced-by-count":25,"title":["Fault tolerance for highly available internet services: concepts, approaches, and issues"],"prefix":"10.1109","volume":"10","author":[{"given":"Narjess","family":"Ayari","sequence":"first","affiliation":[]},{"given":"Denis","family":"Barbaron","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Lefevre","sequence":"additional","affiliation":[]},{"given":"Pascale","family":"Primet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209949"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209950"},{"key":"ref31","year":"2003","journal-title":"CARP Common Address Redundancy Protocol"},{"key":"ref30","year":"0"},{"key":"ref37","year":"0"},{"key":"ref36","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209948"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.14"},{"key":"ref10","author":"kopper","year":"2005","journal-title":"The Linux Enterprise Cluster Build a highly available cluster with commodity hardware and free software"},{"key":"ref11","year":"0"},{"key":"ref12","article-title":"Shared Storage Clusters","author":"bottomley","year":"2000","journal-title":"SteelEye Tech Tutorial"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176979"},{"key":"ref14","author":"schmidt","year":"2000","journal-title":"Leaders\/Followers A Design Pattern for Efficient Multi-Threaded I\/O Demultiplexing and Dispatching"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00038-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2005.347039"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315630"},{"key":"ref18","author":"aghadie","year":"2005","journal-title":"Transparent Fault Tolerant Network Services Using Off-the-Shelf Components"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1112"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2338"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532603"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/190.357399"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3768"},{"key":"ref5","author":"torres-pomales","year":"2000","journal-title":"Software Fault Tolerance A Tutorial"},{"key":"ref8","article-title":"Implementing Clusters for High Availability","author":"bottomley","year":"2004","journal-title":"Proc Usenix Conf"},{"key":"ref7","author":"aggarwal","year":"2007","journal-title":"Internet Draft BFD For MPLS LSPs"},{"key":"ref2","article-title":"Fault Tolerance Terminology Proposals","author":"anderson","year":"1982","journal-title":"Proc 12th Int'l Symp Fault Tolerant Computing"},{"key":"ref9","author":"marowsky","year":"2004","journal-title":"A New Cluster Resource Manager for Heartbeat"},{"key":"ref1","author":"anderson","year":"1981","journal-title":"Fault Tolerance Principles and Practice"},{"key":"ref20","article-title":"Why Optimistic Message Logging Has Not Been Used in Telecommunications Systems","author":"huang","year":"1995","journal-title":"Proc 25th Int'l Symp Fault-Tolerant Computing"},{"key":"ref22","year":"2002","journal-title":"The Link Aggregation Protocol According to the IEEE 802 3ad"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/3959.3962","article-title":"Optimistic Recovery in Distributed Systems","author":"strom","year":"1985","journal-title":"ACM Trans Computer Sys"},{"key":"ref24","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2003.1267533"},{"key":"ref26","year":"0"},{"key":"ref25","year":"0"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9739\/4564474\/04564478.pdf?arnumber=4564478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:17:51Z","timestamp":1638217071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4564478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":38,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2008.4564478","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}