首页 > 最新文献

Proceedings 22nd International Conference on Distributed Computing Systems最新文献

英文 中文
Snap-stabilizing PIF algorithm in arbitrary networks 任意网络中的快速稳定PIF算法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022257
Alain Cournier, A. Datta, F. Petit, V. Villain
We present the first snap-stabilizing propagation of information with feedback (PIF) protocol in arbitrary networks. A snap-stabilizing protocol, starting from any arbitrary initial system configuration, always behaves according to its specification. Our protocol is distributed, deterministic, and does not use a pre-constructed spanning tree.
提出了任意网络中具有反馈的信息快速稳定传播(PIF)协议。从任意初始系统配置开始的快照稳定协议总是按照其规范运行。我们的协议是分布式的、确定性的,并且不使用预先构造的生成树。
{"title":"Snap-stabilizing PIF algorithm in arbitrary networks","authors":"Alain Cournier, A. Datta, F. Petit, V. Villain","doi":"10.1109/ICDCS.2002.1022257","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022257","url":null,"abstract":"We present the first snap-stabilizing propagation of information with feedback (PIF) protocol in arbitrary networks. A snap-stabilizing protocol, starting from any arbitrary initial system configuration, always behaves according to its specification. Our protocol is distributed, deterministic, and does not use a pre-constructed spanning tree.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Non-blocking transactional mobile agent execution 非阻塞事务性移动代理执行
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022283
Stefan Pleisch, A. Schiper
Mobile agents are computer programs that act autonomously on behalf of a user and travel through a network of heterogeneous machines. To enable mobile agent technology for e-business, transaction support needs to be provided, in particular execution atomicity. Execution atomicity ensures that either all operations of the agent succeed, or none at all, and needs to be ensured also in the face of infrastructure failures. We distinguish between blocking and non-blocking solutions for transactional mobile agents, i.e., mobile agents, that execute as a transaction. The approach presented in the paper is non-blocking. A non-blocking transactional mobile agent execution has the important advantage, that it can make progress despite failures.
移动代理是代表用户自主行动的计算机程序,并在异构机器网络中运行。为了使移动代理技术适用于电子商务,需要提供事务支持,特别是执行原子性。执行原子性确保代理的所有操作都成功,或者根本不成功,并且在面对基础设施故障时也需要确保。我们区分事务性移动代理的阻塞和非阻塞解决方案,即作为事务执行的移动代理。本文提出的方法是非阻塞的。非阻塞的事务性移动代理执行具有重要的优势,即它可以在失败的情况下取得进展。
{"title":"Non-blocking transactional mobile agent execution","authors":"Stefan Pleisch, A. Schiper","doi":"10.1109/ICDCS.2002.1022283","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022283","url":null,"abstract":"Mobile agents are computer programs that act autonomously on behalf of a user and travel through a network of heterogeneous machines. To enable mobile agent technology for e-business, transaction support needs to be provided, in particular execution atomicity. Execution atomicity ensures that either all operations of the agent succeed, or none at all, and needs to be ensured also in the face of infrastructure failures. We distinguish between blocking and non-blocking solutions for transactional mobile agents, i.e., mobile agents, that execute as a transaction. The approach presented in the paper is non-blocking. A non-blocking transactional mobile agent execution has the important advantage, that it can make progress despite failures.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Impact of network density on data aggregation in wireless sensor networks 无线传感器网络中网络密度对数据聚合的影响
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022289
C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann
In-network data aggregation is essential for wireless sensor networks where energy resources are limited. In a previously proposed data dissemination scheme (directed diffusion with opportunistic aggregation), data is opportunistically aggregated at intermediate nodes on a low-latency tree. In this paper, we explore and evaluate greedy aggregation, a novel approach that adjusts aggregation points to increase the amount of path sharing, reducing energy consumption. Our preliminary results suggest that, under investigated scenarios, greedy aggregation can achieve up to 45% energy savings over opportunistic aggregation in high-density networks without adversely impacting latency or robustness.
在能量有限的无线传感器网络中,网络内数据聚合是必不可少的。在先前提出的数据传播方案(有机会聚集的定向扩散)中,数据在低延迟树的中间节点上机会地聚集。本文探讨并评价了贪婪聚合,一种通过调整聚合点来增加路径共享量,降低能耗的新方法。我们的初步结果表明,在调查的场景下,在高密度网络中,贪婪聚合可以比机会聚合节省高达45%的能量,而不会对延迟或鲁棒性产生不利影响。
{"title":"Impact of network density on data aggregation in wireless sensor networks","authors":"C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann","doi":"10.1109/ICDCS.2002.1022289","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022289","url":null,"abstract":"In-network data aggregation is essential for wireless sensor networks where energy resources are limited. In a previously proposed data dissemination scheme (directed diffusion with opportunistic aggregation), data is opportunistically aggregated at intermediate nodes on a low-latency tree. In this paper, we explore and evaluate greedy aggregation, a novel approach that adjusts aggregation points to increase the amount of path sharing, reducing energy consumption. Our preliminary results suggest that, under investigated scenarios, greedy aggregation can achieve up to 45% energy savings over opportunistic aggregation in high-density networks without adversely impacting latency or robustness.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 825
A self-stabilizing protocol for pipelined PIF in tree networks 树形网络中管道PIF的自稳定协议
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022255
Daisuke Kondou, Hideo Masuda, T. Masuzawa
Self-stabilization is a promising paradigm for achieving fault-tolerance of distributed systems. A self-stabilizing protocol can converge to its intended behavior even when it starts from any system configuration, and, thus, can tolerate any type and any number of transient faults. The PIF (propagation of information with feedback) scheme in a tree network allows the root process to broadcast its information to all other processes and to collect their responses. Many distributed systems utilize the PIF scheme as a fundamental communication scheme. This paper first formalizes the pipelined PIF in tree networks, and proposes a self-stabilizing protocol for the pipelined PIF. The protocol applies the PIF to a sequence of information in a pipelined fashion. The protocol has stabilizing time of O(h) (where h is the height of the tree network). After stabilization, it completes each PIF in O(h) asynchronous rounds and has throughput of O(1). Moreover, the protocol achieves fault-containment: for a complete binary tree network, its expected stabilizing time from 1-faulty configurations is O(1).
自稳定是实现分布式系统容错的一种很有前途的范式。即使从任何系统配置开始,自稳定协议也可以收敛到其预期行为,因此可以容忍任何类型和任意数量的瞬态故障。树形网络中的PIF(带反馈的信息传播)方案允许根进程向所有其他进程广播其信息并收集它们的响应。许多分布式系统使用PIF方案作为基本通信方案。本文首先形式化了树形网络中的管道PIF,并提出了管道PIF的自稳定协议。该协议以流水线方式将PIF应用于信息序列。该协议的稳定时间为O(h)(其中h为树状网络的高度)。稳定后,每个PIF在O(h)轮异步中完成,吞吐量为O(1)。此外,该协议实现了故障包容:对于一个完整的二叉树网络,其1个故障配置的期望稳定时间为O(1)。
{"title":"A self-stabilizing protocol for pipelined PIF in tree networks","authors":"Daisuke Kondou, Hideo Masuda, T. Masuzawa","doi":"10.1109/ICDCS.2002.1022255","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022255","url":null,"abstract":"Self-stabilization is a promising paradigm for achieving fault-tolerance of distributed systems. A self-stabilizing protocol can converge to its intended behavior even when it starts from any system configuration, and, thus, can tolerate any type and any number of transient faults. The PIF (propagation of information with feedback) scheme in a tree network allows the root process to broadcast its information to all other processes and to collect their responses. Many distributed systems utilize the PIF scheme as a fundamental communication scheme. This paper first formalizes the pipelined PIF in tree networks, and proposes a self-stabilizing protocol for the pipelined PIF. The protocol applies the PIF to a sequence of information in a pipelined fashion. The protocol has stabilizing time of O(h) (where h is the height of the tree network). After stabilization, it completes each PIF in O(h) asynchronous rounds and has throughput of O(1). Moreover, the protocol achieves fault-containment: for a complete binary tree network, its expected stabilizing time from 1-faulty configurations is O(1).","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A working-set approach to reduce the download-execution time of mobile programs 一种减少移动程序下载执行时间的工作集方法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022261
Tsutomu Gamou
The on-demand downloading of application code over a wireless network is an emerging paradigm for the distributed environment of mobile computing devices. In this environment, a user must wait while a mobile computing device fetches the application code over the network prior to execution. To reduce this downloading latency, we have developed a download approach based on working sets, and have designed and implemented a working-set generator that defines working sets by focusing on the intervals during which a program refers to junctions, variables, and constants. The program invocation times with this approach, simulated using trace information obtained from actual program behavior on Linux, have been compared with those of all-at-once, page, class, and symbol download approaches. This simulation showed that the working-set approach can reduce the download-execution time compared to that with the four other approaches.
通过无线网络按需下载应用程序代码是移动计算设备分布式环境的新兴范例。在这种环境中,当移动计算设备在执行之前通过网络获取应用程序代码时,用户必须等待。为了减少这种下载延迟,我们开发了一种基于工作集的下载方法,并设计并实现了一个工作集生成器,该生成器通过关注程序引用连接、变量和常量的间隔来定义工作集。使用从Linux上的实际程序行为获得的跟踪信息模拟了这种方法的程序调用时间,并将其与一次性下载、页面下载、类下载和符号下载方法的调用时间进行了比较。仿真结果表明,与其他四种方法相比,工作集方法可以减少下载执行时间。
{"title":"A working-set approach to reduce the download-execution time of mobile programs","authors":"Tsutomu Gamou","doi":"10.1109/ICDCS.2002.1022261","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022261","url":null,"abstract":"The on-demand downloading of application code over a wireless network is an emerging paradigm for the distributed environment of mobile computing devices. In this environment, a user must wait while a mobile computing device fetches the application code over the network prior to execution. To reduce this downloading latency, we have developed a download approach based on working sets, and have designed and implemented a working-set generator that defines working sets by focusing on the intervals during which a program refers to junctions, variables, and constants. The program invocation times with this approach, simulated using trace information obtained from actual program behavior on Linux, have been compared with those of all-at-once, page, class, and symbol download approaches. This simulation showed that the working-set approach can reduce the download-execution time compared to that with the four other approaches.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling real-time data items in multiple channels and multiple receivers environments 在多通道和多接收器环境中调度实时数据项
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022288
Guanling Lee, Yi-Ning Pan, Arbee L. P. Chen
The problem of transmitting data items with timing constraint in the multiple broadcast channels where clients equipped with multiple receivers is studied. In our approach, the data items are divided into two sets, the broadcast data set and the on-demand data set. The data items in the broadcast data set is periodically broadcast on the broadcast channels while the data items in the on-demand data set are transmitted when they are requested. The server offline allocates the data items in the broadcast data set to the multiple broadcast channels. The clients retrieved data items from the broadcast channels are guaranteed to receive them within the timing constraint. Once the desired data item is not included in the broadcast channels, clients make requests associated with deadlines to the server. By using the bandwidth remaining for the on-demand mode, the server broadcasts the requested data items in an online fashion. The intention of our work is to serve as many requests as possible.
研究了客户端有多个接收机的多广播信道中带时间约束的数据传输问题。在我们的方法中,数据项被分为两组,广播数据集和点播数据集。广播数据集中的数据项周期性地在广播通道上广播,而按需数据集中的数据项则在请求时传输。服务器脱机将广播数据集中的数据项分配给多个广播通道。保证从广播通道检索到的客户端在定时约束内接收到它们。一旦所需的数据项没有包含在广播通道中,客户机就会向服务器发出与截止日期相关的请求。通过使用用于按需模式的剩余带宽,服务器以在线方式广播请求的数据项。我们工作的目的是为尽可能多的请求提供服务。
{"title":"Scheduling real-time data items in multiple channels and multiple receivers environments","authors":"Guanling Lee, Yi-Ning Pan, Arbee L. P. Chen","doi":"10.1109/ICDCS.2002.1022288","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022288","url":null,"abstract":"The problem of transmitting data items with timing constraint in the multiple broadcast channels where clients equipped with multiple receivers is studied. In our approach, the data items are divided into two sets, the broadcast data set and the on-demand data set. The data items in the broadcast data set is periodically broadcast on the broadcast channels while the data items in the on-demand data set are transmitted when they are requested. The server offline allocates the data items in the broadcast data set to the multiple broadcast channels. The clients retrieved data items from the broadcast channels are guaranteed to receive them within the timing constraint. Once the desired data item is not included in the broadcast channels, clients make requests associated with deadlines to the server. By using the bandwidth remaining for the on-demand mode, the server broadcasts the requested data items in an online fashion. The intention of our work is to serve as many requests as possible.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134467402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Geometric spanners for wireless ad hoc networks 无线自组织网络的几何扳手
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022254
Yang Wang, Xiangyang Li
We propose a new geometric spanner, for wireless ad hoc networks, which can be constructed efficiently in a distributed manner. It combines the connected dominating set and the local Delaunay graph to form the backbone of a wireless network. This new spanner has the following attractive properties: (1) the backbone is a planar graph; (2) the node degree of the backbone is bounded from above by a positive constant; (3) it is a spanner both for hops and length; moreover, we show that, given any two nodes u and /spl upsi/, there is a path connecting them in the backbone such that its length is no more than 6 times that of the shortest path and the number of links is no more than 3 times that of the shortest path; (4) it can be constructed locally and is easy to maintain when the nodes move around; and (5) we show that the computation cost of each node is at most O(d log d), where d is its l-hop neighbors in the original unit disk graph, and the communication cost of each node is bounded by a constant. Simulation results are also presented for studying its practical performance.
我们提出了一种新的几何扳手,用于无线自组织网络,可以高效地以分布式方式构建。它结合连通支配集和局部德劳内图构成无线网络的主干。该扳手具有以下吸引人的特性:(1)主轴为平面图形;(2)主干网节点度以正常数为界;(3)它是一个用于跳和长度的扳手;此外,我们证明,给定任意两个节点u和/spl upsi/,在主干中存在一条连接它们的路径,其长度不超过最短路径的6倍,链路数不超过最短路径的3倍;(4)可局部构建,节点移动时易于维护;(5)我们证明了每个节点的计算代价不超过O(d log d),其中d为其在原始单元磁盘图中的l跳邻居,并且每个节点的通信代价以一个常数为界。为研究其实际性能,给出了仿真结果。
{"title":"Geometric spanners for wireless ad hoc networks","authors":"Yang Wang, Xiangyang Li","doi":"10.1109/ICDCS.2002.1022254","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022254","url":null,"abstract":"We propose a new geometric spanner, for wireless ad hoc networks, which can be constructed efficiently in a distributed manner. It combines the connected dominating set and the local Delaunay graph to form the backbone of a wireless network. This new spanner has the following attractive properties: (1) the backbone is a planar graph; (2) the node degree of the backbone is bounded from above by a positive constant; (3) it is a spanner both for hops and length; moreover, we show that, given any two nodes u and /spl upsi/, there is a path connecting them in the backbone such that its length is no more than 6 times that of the shortest path and the number of links is no more than 3 times that of the shortest path; (4) it can be constructed locally and is easy to maintain when the nodes move around; and (5) we show that the computation cost of each node is at most O(d log d), where d is its l-hop neighbors in the original unit disk graph, and the communication cost of each node is bounded by a constant. Simulation results are also presented for studying its practical performance.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 337
Design of adaptive and reliable mobile agent communication protocols 自适应可靠移动代理通信协议设计
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022295
Jiannong Cao, Xinyu Feng, Jian Lu, Sajal K. Das
This paper presents a mailbox-based scheme for designing flexible and adaptive message delivery protocols in mobile agent (MA) systems. The scheme associates each mobile agent with a mailbox while allowing the decoupling between them, i.e., a mobile agent can migrate to a new site without bringing its mailbox. By separating the concerns of locating the mailbox of a mobile agent and delivering a message to the agent, we obtain a large space of protocol design with flexibility. Using a three-dimensional model based on the scheme, we have developed a taxonomy of MA communication protocols, which not only covers, as special cases, several known MA message delivery protocols, but also allows for the design of new ones well suited for various application requirements. We describe such an efficient and adaptive protocol derived front the model. The protocol guarantees reliable delivery of messages to mobile agents. We analyze the design trade-offs and performance of the protocol, using an analytic model as well as extensive simulation experiments.
提出了一种基于邮箱的移动代理(MA)系统中灵活、自适应的消息传递协议设计方案。该方案将每个移动代理与一个邮箱相关联,同时允许它们之间的解耦,即移动代理可以迁移到一个新的站点而不需要携带其邮箱。通过分离移动代理邮箱定位和向代理发送消息的关注点,我们获得了较大的协议设计空间和灵活性。使用基于该方案的三维模型,我们开发了一个MA通信协议的分类,该分类不仅涵盖了作为特殊情况的几种已知的MA消息传递协议,而且还允许设计适合各种应用需求的新协议。我们描述了一种基于该模型的高效自适应协议。该协议保证向移动代理可靠地传递消息。我们使用分析模型和广泛的仿真实验来分析协议的设计权衡和性能。
{"title":"Design of adaptive and reliable mobile agent communication protocols","authors":"Jiannong Cao, Xinyu Feng, Jian Lu, Sajal K. Das","doi":"10.1109/ICDCS.2002.1022295","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022295","url":null,"abstract":"This paper presents a mailbox-based scheme for designing flexible and adaptive message delivery protocols in mobile agent (MA) systems. The scheme associates each mobile agent with a mailbox while allowing the decoupling between them, i.e., a mobile agent can migrate to a new site without bringing its mailbox. By separating the concerns of locating the mailbox of a mobile agent and delivering a message to the agent, we obtain a large space of protocol design with flexibility. Using a three-dimensional model based on the scheme, we have developed a taxonomy of MA communication protocols, which not only covers, as special cases, several known MA message delivery protocols, but also allows for the design of new ones well suited for various application requirements. We describe such an efficient and adaptive protocol derived front the model. The protocol guarantees reliable delivery of messages to mobile agents. We analyze the design trade-offs and performance of the protocol, using an analytic model as well as extensive simulation experiments.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The transition from asynchronous to synchronous system operation: an approach for distributed fault-tolerant systems 从异步到同步系统操作的转换:分布式容错系统的一种方法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022270
W. Steiner, M. Paulitsch
Immediately after power-up, synchronous distributed systems need some time until essential timing properties, which are required to operate correctly, are established. We say that synchronous systems are initially in asynchronous operation. In this paper, we present an algorithm and architectural guidelines that assure the transition from asynchronous to synchronous operation within a bounded duration even in case of failures.
在上电后,同步分布式系统需要一段时间才能建立正确运行所需的基本定时特性。我们说,同步系统最初处于异步运行状态。在本文中,我们提出了一种算法和架构指南,以确保即使在出现故障的情况下,也能在有限的持续时间内从异步操作转换到同步操作。
{"title":"The transition from asynchronous to synchronous system operation: an approach for distributed fault-tolerant systems","authors":"W. Steiner, M. Paulitsch","doi":"10.1109/ICDCS.2002.1022270","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022270","url":null,"abstract":"Immediately after power-up, synchronous distributed systems need some time until essential timing properties, which are required to operate correctly, are established. We say that synchronous systems are initially in asynchronous operation. In this paper, we present an algorithm and architectural guidelines that assure the transition from asynchronous to synchronous operation within a bounded duration even in case of failures.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131339564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Reclaiming space from duplicate files in a serverless distributed file system 从无服务器分布式文件系统中的重复文件中回收空间
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022312
John R. Douceur, A. Adya, W. Bolosky, D. Simon, M. Theimer
The Farsite distributed file system provides availability by replicating each file onto multiple desktop computers. Since this replication consumes significant storage space, it is important to reclaim used space where possible. Measurement of over 500 desktop file systems shows that nearly half of all consumed space is occupied by duplicate files. We present a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication. Our mechanism includes: (1) convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys; and (2) SALAD, a Self-Arranging Lossy Associative Database for aggregating file content and location information in a decentralized, scalable, fault-tolerant manner. Large-scale simulation experiments show that the duplicate-file coalescing system is scalable, highly effective, and fault-tolerant.
Farsite分布式文件系统通过将每个文件复制到多台桌面计算机上来提供可用性。由于这种复制会消耗大量存储空间,因此尽可能回收已使用的空间非常重要。对超过500个桌面文件系统的测量表明,几乎所有消耗的空间的一半被重复文件占用。我们提出了一种机制,从这种偶然的复制中回收空间,使其可用于受控文件复制。我们的机制包括:(1)收敛加密,即使文件是用不同用户的密钥加密的,也可以将重复的文件合并到单个文件的空间中;(2) SALAD,一种自安排有损关联数据库,用于以分散、可扩展、容错的方式聚合文件内容和位置信息。大规模仿真实验表明,该系统具有可扩展性、高效性和容错性。
{"title":"Reclaiming space from duplicate files in a serverless distributed file system","authors":"John R. Douceur, A. Adya, W. Bolosky, D. Simon, M. Theimer","doi":"10.1109/ICDCS.2002.1022312","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022312","url":null,"abstract":"The Farsite distributed file system provides availability by replicating each file onto multiple desktop computers. Since this replication consumes significant storage space, it is important to reclaim used space where possible. Measurement of over 500 desktop file systems shows that nearly half of all consumed space is occupied by duplicate files. We present a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication. Our mechanism includes: (1) convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys; and (2) SALAD, a Self-Arranging Lossy Associative Database for aggregating file content and location information in a decentralized, scalable, fault-tolerant manner. Large-scale simulation experiments show that the duplicate-file coalescing system is scalable, highly effective, and fault-tolerant.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 787
期刊
Proceedings 22nd International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1