首页 > 最新文献

Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing最新文献

英文 中文
Brief Announcement: Optimal Record and Replay under Causal Consistency 简要公告:因果一致性下的最佳记录与重播
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212789
Russell L. Jones, M. S. Khan, N. Vaidya
We investigate the minimum record needed to replay executions of processes that share causally consistent memory. For a version of causal consistency, we identify optimal records under both offline and online recording setting. Under the offline setting, a central authority has information about every process' view of the execution and can decide what information to record for each process. Under the online setting, each process has to decide on the record at runtime as the operations are observed.
我们研究了共享因果一致内存的进程重放执行所需的最小记录。对于因果一致性的一个版本,我们确定了离线和在线记录设置下的最佳记录。在脱机设置下,中央权威机构拥有关于每个流程执行视图的信息,并且可以决定为每个流程记录哪些信息。在在线设置下,每个进程必须在运行时观察操作时决定记录。
{"title":"Brief Announcement: Optimal Record and Replay under Causal Consistency","authors":"Russell L. Jones, M. S. Khan, N. Vaidya","doi":"10.1145/3212734.3212789","DOIUrl":"https://doi.org/10.1145/3212734.3212789","url":null,"abstract":"We investigate the minimum record needed to replay executions of processes that share causally consistent memory. For a version of causal consistency, we identify optimal records under both offline and online recording setting. Under the offline setting, a central authority has information about every process' view of the execution and can decide what information to record for each process. Under the online setting, each process has to decide on the record at runtime as the operations are observed.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1B: Shared Memory Theory 会话详情:会话1B:共享内存理论
Dan Alistarh
{"title":"Session details: Session 1B: Shared Memory Theory","authors":"Dan Alistarh","doi":"10.1145/3258696","DOIUrl":"https://doi.org/10.1145/3258696","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sublinear Message Bounds for Randomized Agreement 随机化协议的子线性消息边界
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212751
John E. Augustine, A. R. Molla, Gopal Pandurangan
This paper focuses on understanding the message complexity of randomized agreement in synchronous distributed networks. We focus on the so-called implicit agreement problem where each node starts with an input value (0 or 1) and at the end one or more nodes should decide on a common input value which should be equal to some node's input value (there can be undecided nodes). Implicit agreement is a generalization of the fundamental agreement and leader election problems. We present sublinear (in n, where n is the number of nodes) algorithms and lower bounds on the message complexity of implicit agreement in fully-connected (i.e., complete) networks. Specifically our main results are: We show that for any implicit agreement algorithm that succeeds with probability at least 1 - ε, for some suitably small constant ε > 0, needs at least Ω(n0.5) messages with constant probability. This bound holds regardless of the number of rounds used and applies to both LOCAL and CONGEST models. This lower bound is essentially tight for complete networks, as there exists a randomized agreement algorithm that uses only Õ (n0.5) messages1 with high probability2 and runs inO(1) rounds and succeeds with high probability. Both the upper and lower bounds assume that nodes have access to (only) private coins. In contrast to the above bounds, if nodes have access to an unbiased global (shared) coin, we present a randomized algorithm which, with high probability, achieves implicit agreement, and uses Õ (n0.4) messages in expectation and runs in O(1) rounds (deterministically). This algorithm works in the CONGEST model as well. Our result shows the power of a global coin in significantly improving (by a polynomial factor) the message complexity of agreement. As another contrast, we show that the same benefit does not apply to leader election, i.e., even with access to a global coin, Ω(n0.5) messages (in expectation) are needed for any leader election algorithm that succeeds with probability at least 1 - ε, for a small constant ε > 0. We extend our results to a natural generalization of agreement called as subset agreement where a given (non-empty) subset of nodes should agree on a common value. We show that subset agreement on a subset of size k nodes can be accomplished by a randomized algorithm that succeeds with high probability, and uses (in expecation) Õ (min{kn0.5,n}) (using only private coins) and Õ (min{kn0.4,n}) messages (using global coin) respectively
本文主要研究同步分布式网络中随机协议的消息复杂度。我们关注所谓的隐式协议问题,其中每个节点从一个输入值(0或1)开始,最后一个或多个节点应该决定一个公共输入值,该输入值应该等于某些节点的输入值(可能存在未决定的节点)。隐性协议是基本协议和领导人选举问题的概括。我们提出了次线性(在n中,其中n是节点数)算法和全连接(即完全)网络中隐式协议的消息复杂度的下界。具体来说,我们的主要结果是:我们表明,对于任何以概率至少为1 - ε成功的隐式协议算法,对于一些适当的小常数ε > 0,至少需要具有恒定概率的Ω(n0.5)消息。无论使用的轮数如何,这个边界都适用于LOCAL和CONGEST模型。对于完整的网络来说,这个下限本质上是严格的,因为存在一种随机协议算法,它只使用Õ (n0.5) messages1的概率很高2,运行inO(1)轮并以高概率成功。上界和下界都假设节点只能访问私有币。与上述边界相反,如果节点可以访问无偏全局(共享)硬币,我们提出了一种随机算法,该算法在高概率下实现隐式协议,并在预期中使用Õ (n0.4)消息,并以O(1)轮(确定性)运行。该算法也适用于CONGEST模型。我们的结果表明,全球币在显着提高(通过多项式因子)协议消息复杂性方面的能力。作为另一个对比,我们表明同样的好处并不适用于领导者选举,即,即使访问全局硬币,对于一个小常数ε > 0,任何以概率至少为1 - ε成功的领导者选举算法都需要Ω(n0.5)消息(在期望中)。我们将我们的结果扩展到称为子集协议的协议的自然概括,其中给定的(非空的)节点子集应该在公共值上达成一致。我们证明,在大小为k的节点子集上的子集协议可以通过一个随机算法来完成,该算法以高概率成功,并分别使用(预期)Õ (min{kn0.5,n})(仅使用私有币)和Õ (min{kn0.4,n})消息(使用全局币)
{"title":"Sublinear Message Bounds for Randomized Agreement","authors":"John E. Augustine, A. R. Molla, Gopal Pandurangan","doi":"10.1145/3212734.3212751","DOIUrl":"https://doi.org/10.1145/3212734.3212751","url":null,"abstract":"This paper focuses on understanding the message complexity of randomized agreement in synchronous distributed networks. We focus on the so-called implicit agreement problem where each node starts with an input value (0 or 1) and at the end one or more nodes should decide on a common input value which should be equal to some node's input value (there can be undecided nodes). Implicit agreement is a generalization of the fundamental agreement and leader election problems. We present sublinear (in n, where n is the number of nodes) algorithms and lower bounds on the message complexity of implicit agreement in fully-connected (i.e., complete) networks. Specifically our main results are: We show that for any implicit agreement algorithm that succeeds with probability at least 1 - ε, for some suitably small constant ε > 0, needs at least Ω(n0.5) messages with constant probability. This bound holds regardless of the number of rounds used and applies to both LOCAL and CONGEST models. This lower bound is essentially tight for complete networks, as there exists a randomized agreement algorithm that uses only Õ (n0.5) messages1 with high probability2 and runs inO(1) rounds and succeeds with high probability. Both the upper and lower bounds assume that nodes have access to (only) private coins. In contrast to the above bounds, if nodes have access to an unbiased global (shared) coin, we present a randomized algorithm which, with high probability, achieves implicit agreement, and uses Õ (n0.4) messages in expectation and runs in O(1) rounds (deterministically). This algorithm works in the CONGEST model as well. Our result shows the power of a global coin in significantly improving (by a polynomial factor) the message complexity of agreement. As another contrast, we show that the same benefit does not apply to leader election, i.e., even with access to a global coin, Ω(n0.5) messages (in expectation) are needed for any leader election algorithm that succeeds with probability at least 1 - ε, for a small constant ε > 0. We extend our results to a natural generalization of agreement called as subset agreement where a given (non-empty) subset of nodes should agree on a common value. We show that subset agreement on a subset of size k nodes can be accomplished by a randomized algorithm that succeeds with high probability, and uses (in expecation) Õ (min{kn0.5,n}) (using only private coins) and Õ (min{kn0.4,n}) messages (using global coin) respectively","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Erasure Coding in Object Stores: Challenges and Opportunities 对象存储中的擦除编码:挑战与机遇
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212799
Lewis Tseng
Recent years have seen a tremendous growth in the popularity of online services accessed over the Internet. Our daily lives are becoming more and more dependent on these online services, which generate and/or rely on huge amount of data. One core technique to deal with the unprecedented amount of data is the distributed storage systems that allow users/applications to read and write data in a distributed fashion and ensure fault-tolerance, durability, scalability, and availability. This tutorial will focus on the distributed key-value storage systems, i.e., read/write objects. One common implementation of such a read/write object is via replicating data across multiple servers or even data-centers. The replication-based implementation has been studied in the literature, e.g., ABD [Attiya, Bar-Noy and Dolev '96] and LDR [Fan and Lynch '03], and adopted in practice e.g., Cassandra, MongoDB, and DynamoDB. One drawbacks of the replication-based mechanism is high storage cost and communication cost due to unnecessary redundancy. To address the issue, there is an ongoing effort on applying erasure codes to distributed storage systems in both academia and industry. For example, Microsoft applies erasure coding across data-centers to build strongly consistent objects (Giza in Microsoft Azure Storage), and OpenStack provides erasure coding as a storage policy in their read/write object Swift. However, the field is still fairly young and has many interesting open problems. This tutorial will focus on the challenges of using erasure codes in read/write objects that guarantee consistency. To begin with, I will introduce concepts on consistency models, erasure codes followed by some recent algorithms and existing practical systems. I will then discuss the state-of-the-art techniques in this field, and conclude the talk with potential challenges that lead to interesting research problems. The talk will be accessible to anyone with a background a basic knowledge on algorithms or programming. First part of the results are done by Viveck Cadambe, Kishori Konwar, N. Prakash, Nancy Lynch, and Muriel Médard. In the end, I will also share our recent results.
近年来,通过互联网访问的在线服务的普及程度有了巨大的增长。我们的日常生活越来越依赖于这些产生和/或依赖于大量数据的在线服务。处理空前海量数据的一项核心技术是分布式存储系统,它允许用户/应用程序以分布式方式读写数据,并确保容错、持久性、可伸缩性和可用性。本教程将重点介绍分布式键值存储系统,即读/写对象。这种读/写对象的一种常见实现是通过跨多个服务器甚至数据中心复制数据。基于复制的实现已经在文献中进行了研究,例如ABD [Attiya, Bar-Noy和Dolev '96]和LDR [Fan和Lynch '03],并在实践中采用,例如Cassandra, MongoDB和DynamoDB。基于复制的机制的一个缺点是由于不必要的冗余而导致的高存储成本和通信成本。为了解决这个问题,学术界和工业界都在努力将擦除码应用于分布式存储系统。例如,Microsoft跨数据中心应用擦除编码来构建强一致性对象(Microsoft Azure Storage中的Giza), OpenStack在其读写对象Swift中提供擦除编码作为存储策略。然而,该领域仍然相当年轻,并且有许多有趣的开放问题。本教程将重点介绍在保证一致性的读/写对象中使用擦除码的挑战。首先,我将介绍一致性模型、擦除码的概念,然后是一些最新的算法和现有的实用系统。然后,我将讨论该领域的最新技术,并以导致有趣的研究问题的潜在挑战来结束演讲。任何具有算法或编程基础知识的人都可以参加该讲座。第一部分结果是由vivek Cadambe, Kishori Konwar, N. Prakash, Nancy Lynch和Muriel m达德完成的。最后,我也将分享我们最近的成果。
{"title":"Erasure Coding in Object Stores: Challenges and Opportunities","authors":"Lewis Tseng","doi":"10.1145/3212734.3212799","DOIUrl":"https://doi.org/10.1145/3212734.3212799","url":null,"abstract":"Recent years have seen a tremendous growth in the popularity of online services accessed over the Internet. Our daily lives are becoming more and more dependent on these online services, which generate and/or rely on huge amount of data. One core technique to deal with the unprecedented amount of data is the distributed storage systems that allow users/applications to read and write data in a distributed fashion and ensure fault-tolerance, durability, scalability, and availability. This tutorial will focus on the distributed key-value storage systems, i.e., read/write objects. One common implementation of such a read/write object is via replicating data across multiple servers or even data-centers. The replication-based implementation has been studied in the literature, e.g., ABD [Attiya, Bar-Noy and Dolev '96] and LDR [Fan and Lynch '03], and adopted in practice e.g., Cassandra, MongoDB, and DynamoDB. One drawbacks of the replication-based mechanism is high storage cost and communication cost due to unnecessary redundancy. To address the issue, there is an ongoing effort on applying erasure codes to distributed storage systems in both academia and industry. For example, Microsoft applies erasure coding across data-centers to build strongly consistent objects (Giza in Microsoft Azure Storage), and OpenStack provides erasure coding as a storage policy in their read/write object Swift. However, the field is still fairly young and has many interesting open problems. This tutorial will focus on the challenges of using erasure codes in read/write objects that guarantee consistency. To begin with, I will introduce concepts on consistency models, erasure codes followed by some recent algorithms and existing practical systems. I will then discuss the state-of-the-art techniques in this field, and conclude the talk with potential challenges that lead to interesting research problems. The talk will be accessible to anyone with a background a basic knowledge on algorithms or programming. First part of the results are done by Viveck Cadambe, Kishori Konwar, N. Prakash, Nancy Lynch, and Muriel Médard. In the end, I will also share our recent results.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 2A: Approximation and Learning 会议细节:会议2A:近似和学习
I. Keidar
{"title":"Session details: Session 2A: Approximation and Learning","authors":"I. Keidar","doi":"10.1145/3258699","DOIUrl":"https://doi.org/10.1145/3258699","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124141622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nearly-Tight Analysis for 2-Choice and 3-Majority Consensus Dynamics 2-选择和3-多数共识动力学的近紧密分析
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212738
M. Ghaffari, J. Lengler
We present improved analyses for two of the well-studied randomized dynamics of stabilizing consensus, namely 2-choice and 3-majority. The resulting bounds are tight up to logarithmic factors. In the latter case, this answers an open question of Becchetti et al. [SODA'16]. Consider a distributed system of n nodes, each initially holding an opinion in 1, 2, ...., k . The system should converge to a setting where all (non-corrupted) nodes hold the same opinion. This consensus opinion should be valid, meaning that it should be among the initially supported opinions, and the (fast) convergence should happen even in the presence of a malicious adversary who can corrupt a bounded number of nodes per round and in particular modify their opinions. Two of the well-studied distributed algorithms for this problem work as follows: In both of these dynamics, each node gathers the opinion of three nodes and sets its new opinion equal to the majority of this set. In the 2-choice dynamics, the three nodes are the node itself and two random nodes and ties are broken towards the node's own opinion. In the 3-majority dynamics, the three nodes are selected at random and ties are broken randomly. Becchetti et al. [SODA'16] showed that the 3-majority dynamics converges to consensus in O((k^2sq√rtlog n + klog n)(k+log n)) rounds, even in the presence of a limited adversary, for k bounded by some polynomial of n. We prove that, even with a stronger adversary, the convergence happens within O(klog n) rounds, both for 3-majority and 2-choice. For 3-majority, this bound is known to be optimal for k=tildeO (√ ). More generally, we prove that 3-majority converges always in Õ (n^2/3 ) time, improving on a Õ (n^3/4 ) upper bound of Berenbrink et al. [PODC'17].
我们对稳定共识的两种被充分研究的随机动态进行了改进的分析,即2-选择和3-多数。所得的边界紧致于对数因子。在后一种情况下,这回答了Becchetti等人[SODA'16]的一个开放性问题。考虑一个有n个节点的分布式系统,每个节点最初在 1,2,....中持有一个意见, k。系统应该收敛到一个所有(未损坏的)节点持有相同意见的设置。这个共识意见应该是有效的,这意味着它应该是最初支持的意见之一,并且(快速)收敛应该发生,即使存在恶意对手,他们每轮可以破坏有限数量的节点,特别是修改他们的意见。对于这个问题,有两种研究得很好的分布式算法是这样工作的:在这两种动态中,每个节点收集三个节点的意见,并将其新意见设置为该集合的大多数。在二选择动态中,三个节点是节点本身和两个随机节点,并且根据节点自己的意见打破联系。在3多数动力学中,随机选择三个节点,随机打破关系。Becchetti等人[SODA'16]表明,3-majority动态收敛于O((k^2sq√rtlog n + klog n)(k+log n))轮内的一致性,即使在有限对手存在的情况下,对于k以n的某个多项式为界。我们证明,即使有更强的对手,收敛发生在O(klog n)轮内,无论是3-majority还是2-choice。对于3-majority,已知该界对于k=tildeO(√)是最优的。更一般地,我们证明了3多数总是在Õ (n^2/3)时间内收敛,改进了Berenbrink等人[PODC'17]的Õ (n^3/4)上界。
{"title":"Nearly-Tight Analysis for 2-Choice and 3-Majority Consensus Dynamics","authors":"M. Ghaffari, J. Lengler","doi":"10.1145/3212734.3212738","DOIUrl":"https://doi.org/10.1145/3212734.3212738","url":null,"abstract":"We present improved analyses for two of the well-studied randomized dynamics of stabilizing consensus, namely 2-choice and 3-majority. The resulting bounds are tight up to logarithmic factors. In the latter case, this answers an open question of Becchetti et al. [SODA'16]. Consider a distributed system of n nodes, each initially holding an opinion in 1, 2, ...., k . The system should converge to a setting where all (non-corrupted) nodes hold the same opinion. This consensus opinion should be valid, meaning that it should be among the initially supported opinions, and the (fast) convergence should happen even in the presence of a malicious adversary who can corrupt a bounded number of nodes per round and in particular modify their opinions. Two of the well-studied distributed algorithms for this problem work as follows: In both of these dynamics, each node gathers the opinion of three nodes and sets its new opinion equal to the majority of this set. In the 2-choice dynamics, the three nodes are the node itself and two random nodes and ties are broken towards the node's own opinion. In the 3-majority dynamics, the three nodes are selected at random and ties are broken randomly. Becchetti et al. [SODA'16] showed that the 3-majority dynamics converges to consensus in O((k^2sq√rtlog n + klog n)(k+log n)) rounds, even in the presence of a limited adversary, for k bounded by some polynomial of n. We prove that, even with a stronger adversary, the convergence happens within O(klog n) rounds, both for 3-majority and 2-choice. For 3-majority, this bound is known to be optimal for k=tildeO (√ ). More generally, we prove that 3-majority converges always in Õ (n^2/3 ) time, improving on a Õ (n^3/4 ) upper bound of Berenbrink et al. [PODC'17].","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Passing Messages while Sharing Memory 在共享内存时传递消息
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212741
M. Aguilera, N. Ben-David, I. Calciu, R. Guerraoui, E. Petrank, S. Toueg
We introduce a new distributed computing model called m&m that allows processes to both pass messages and share memory. Motivated by recent hardware trends, we find that this model improves the power of the pure message-passing and shared-memory models. As we demonstrate by example with two fundamental problems---consensus and eventual leader election---the added power leads to new algorithms that are more robust against failures and asynchrony. Our consensus algorithm combines the superior scalability of message passing with the higher fault tolerance of shared memory, while our leader election algorithms reduce the system synchrony needed for correctness. These results point to a wide new space for future exploration of other problems, techniques, and benefits.
我们引入了一种新的分布式计算模型,称为m&m,它允许进程传递消息和共享内存。受最近硬件趋势的影响,我们发现该模型改进了纯消息传递和共享内存模型的功能。正如我们通过两个基本问题(共识和最终领导人选举)的例子所展示的那样,增加的能力导致新的算法对失败和异步更具鲁棒性。我们的一致性算法结合了消息传递的优越可伸缩性和共享内存的更高容错性,而我们的leader选举算法减少了正确性所需的系统同步。这些结果为未来探索其他问题、技术和效益指明了广阔的新空间。
{"title":"Passing Messages while Sharing Memory","authors":"M. Aguilera, N. Ben-David, I. Calciu, R. Guerraoui, E. Petrank, S. Toueg","doi":"10.1145/3212734.3212741","DOIUrl":"https://doi.org/10.1145/3212734.3212741","url":null,"abstract":"We introduce a new distributed computing model called m&m that allows processes to both pass messages and share memory. Motivated by recent hardware trends, we find that this model improves the power of the pure message-passing and shared-memory models. As we demonstrate by example with two fundamental problems---consensus and eventual leader election---the added power leads to new algorithms that are more robust against failures and asynchrony. Our consensus algorithm combines the superior scalability of message passing with the higher fault tolerance of shared memory, while our leader election algorithms reduce the system synchrony needed for correctness. These results point to a wide new space for future exploration of other problems, techniques, and benefits.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Overview of Persistent Memory in Distributed Systems Architecture -- Past, Present, Future 分布式系统架构中持久性内存的概述——过去、现在和未来
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212796
R. Peglar
During the past half-century, persistent memory has had an interesting history and relationship to the design of computing and storage systems. In this talk, the history of systems design using persistent memory (as well as non-persistent, aka volatile memory) will be briefly discussed, as well as approaches to data storage. The majority of the talk will focus on two areas. First, the current state of the persistent memory art, as well as a taxonomy of persistent memory. Second, current methods and issues surrounding the use of persistent memory in systems, in particular distributed systems. The relationship between processing (e.g. CPUs) and persistent memory will be discussed in detail, illustrating certain challenges and opportunities with regard to several forms of distributed computation, in particular concerning large-scale multi-processor designs using shared persistent memory technology.
在过去的半个世纪里,持久内存与计算和存储系统的设计有着有趣的历史和关系。在这次演讲中,将简要讨论使用持久内存(以及非持久内存,又名易失性内存)的系统设计历史,以及数据存储方法。演讲的主要内容将集中在两个方面。首先,持久性内存技术的当前状态,以及持久性内存的分类。其次,当前围绕系统(特别是分布式系统)中持久性内存使用的方法和问题。我们将详细讨论处理(例如cpu)和持久内存之间的关系,说明关于几种形式的分布式计算的某些挑战和机遇,特别是关于使用共享持久内存技术的大规模多处理器设计。
{"title":"Overview of Persistent Memory in Distributed Systems Architecture -- Past, Present, Future","authors":"R. Peglar","doi":"10.1145/3212734.3212796","DOIUrl":"https://doi.org/10.1145/3212734.3212796","url":null,"abstract":"During the past half-century, persistent memory has had an interesting history and relationship to the design of computing and storage systems. In this talk, the history of systems design using persistent memory (as well as non-persistent, aka volatile memory) will be briefly discussed, as well as approaches to data storage. The majority of the talk will focus on two areas. First, the current state of the persistent memory art, as well as a taxonomy of persistent memory. Second, current methods and issues surrounding the use of persistent memory in systems, in particular distributed systems. The relationship between processing (e.g. CPUs) and persistent memory will be discussed in detail, illustrating certain challenges and opportunities with regard to several forms of distributed computation, in particular concerning large-scale multi-processor designs using shared persistent memory technology.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silence 沉默
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212768
G. Goren, Y. Moses
The cost of communication is a substantial factor affecting the scalability of many distributed applications. Every message sent can incur a cost in storage, computation, energy and bandwidth. Consequently, reducing the communication costs of distributed applications is highly desirable. The best way to reduce message costs is by communicating without sending any messages whatsoever. This paper initiates a rigorous investigation into the use of silence in synchronous settings, in which processes can fail. We formalize sufficient conditions for information transfer using silence, as well as necessary conditions for particular cases of interest. This allows us to identify message patterns that enable communication through silence. In particular, a pattern called a em silent choir is identified, and shown to be central to information transfer via silence in failure-prone systems. The power of the new framework is demonstrated on the em atomic commitment problem (AC). A complete characterization of the tradeoff between message complexity and round complexity in the synchronous model with crash failures is provided, in terms of lower bounds and matching protocols. In particular, a new message-optimal AC protocol is designed using silence, in which processes decide in~3 rounds in the common case. This significantly improves on the best previously known message-optimal AC protocol, in which decisions were performed in Θ(n) rounds.
通信成本是影响许多分布式应用程序可伸缩性的一个重要因素。发送的每条消息都会在存储、计算、能源和带宽方面产生成本。因此,减少分布式应用程序的通信成本是非常可取的。减少消息成本的最佳方法是不发送任何消息就进行通信。本文对同步设置中静默的使用进行了严格的研究,在同步设置中,进程可能会失败。我们形式化了使用沉默传递信息的充分条件,以及特殊情况下的必要条件。这使我们能够识别通过沉默进行交流的信息模式。特别地,一种被称为“em沉默合唱团”的模式被识别出来,并被证明是在容易发生故障的系统中通过沉默传递信息的核心。在em原子承诺问题(AC)上证明了新框架的强大功能。从下限和匹配协议的角度,提供了具有崩溃故障的同步模型中消息复杂性和循环复杂性之间权衡的完整特征。特别地,设计了一种新的消息最优交流协议,该协议采用静默方式,在一般情况下进程需要3轮来决定。这大大改进了先前已知的最佳消息最优AC协议,其中决策以Θ(n)轮执行。
{"title":"Silence","authors":"G. Goren, Y. Moses","doi":"10.1145/3212734.3212768","DOIUrl":"https://doi.org/10.1145/3212734.3212768","url":null,"abstract":"The cost of communication is a substantial factor affecting the scalability of many distributed applications. Every message sent can incur a cost in storage, computation, energy and bandwidth. Consequently, reducing the communication costs of distributed applications is highly desirable. The best way to reduce message costs is by communicating without sending any messages whatsoever. This paper initiates a rigorous investigation into the use of silence in synchronous settings, in which processes can fail. We formalize sufficient conditions for information transfer using silence, as well as necessary conditions for particular cases of interest. This allows us to identify message patterns that enable communication through silence. In particular, a pattern called a em silent choir is identified, and shown to be central to information transfer via silence in failure-prone systems. The power of the new framework is demonstrated on the em atomic commitment problem (AC). A complete characterization of the tradeoff between message complexity and round complexity in the synchronous model with crash failures is provided, in terms of lower bounds and matching protocols. In particular, a new message-optimal AC protocol is designed using silence, in which processes decide in~3 rounds in the common case. This significantly improves on the best previously known message-optimal AC protocol, in which decisions were performed in Θ(n) rounds.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132744518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Nesting-Safe Recoverable Linearizability: Modular Constructions for Non-Volatile Memory 嵌套安全可恢复线性性:非易失性存储器的模块化结构
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212753
H. Attiya, Ohad Ben-Baruch, Danny Hendler
We presents a novel abstract individual-process crash-recovery model for non-volatile memory, which enables modularity, so that complex recoverable objects can be constructed in a modular manner from simpler recoverable base objects. Within the framework of this model, we define nesting-safe recoverable linearizability (NRL) -- a novel correctness condition that captures the requirements for nesting recoverable objects. Informally, NRL allows the recovery code to extend the interval of the failed operation until the recovery code succeeds to complete (possibly after multiple failures and recovery attempts). Unlike previous correctness definitions, the NRL condition implies that, following recovery, an implemented (higher-level) recoverable operation is able to complete its invocation of a base-object operation and obtain its response. We present algorithms for nesting-safe recoverable primitives, namely, recoverable versions of widely-used primitive shared-memory operations such as read, write, test-and-set and compare-and-swap, which can be used to implement higher-level recoverable objects. We then exemplify how these recoverable base objects can be used for constructing a recoverable counter object. Finally, we prove an impossibility result on wait-free implementations of recoverable test-and-set (TAS) objects from read, write and TAS operations, thus demonstrating that our model also facilitates rigorous analysis of the limitations of recoverable concurrent objects.
提出了一种新的抽象的非易失性内存的单进程崩溃恢复模型,该模型支持模块化,使得复杂的可恢复对象可以由简单的可恢复基本对象以模块化的方式构造出来。在这个模型的框架内,我们定义了嵌套安全可恢复线性性(NRL)——一种新的正确性条件,它捕获了嵌套可恢复对象的需求。非正式地,NRL允许恢复代码延长失败操作的间隔,直到恢复代码成功完成(可能在多次失败和恢复尝试之后)。与以前的正确性定义不同,NRL条件意味着,在恢复之后,实现的(更高级别的)可恢复操作能够完成对基本对象操作的调用并获得其响应。我们提出了嵌套安全可恢复原语的算法,即广泛使用的原语共享内存操作(如读、写、测试与设置和比较与交换)的可恢复版本,可用于实现更高级别的可恢复对象。然后,我们举例说明如何使用这些可恢复的基对象来构造可恢复的计数器对象。最后,我们证明了读、写和TAS操作中可恢复的测试和设置(TAS)对象的无等待实现的不可能结果,从而表明我们的模型也有助于严格分析可恢复并发对象的局限性。
{"title":"Nesting-Safe Recoverable Linearizability: Modular Constructions for Non-Volatile Memory","authors":"H. Attiya, Ohad Ben-Baruch, Danny Hendler","doi":"10.1145/3212734.3212753","DOIUrl":"https://doi.org/10.1145/3212734.3212753","url":null,"abstract":"We presents a novel abstract individual-process crash-recovery model for non-volatile memory, which enables modularity, so that complex recoverable objects can be constructed in a modular manner from simpler recoverable base objects. Within the framework of this model, we define nesting-safe recoverable linearizability (NRL) -- a novel correctness condition that captures the requirements for nesting recoverable objects. Informally, NRL allows the recovery code to extend the interval of the failed operation until the recovery code succeeds to complete (possibly after multiple failures and recovery attempts). Unlike previous correctness definitions, the NRL condition implies that, following recovery, an implemented (higher-level) recoverable operation is able to complete its invocation of a base-object operation and obtain its response. We present algorithms for nesting-safe recoverable primitives, namely, recoverable versions of widely-used primitive shared-memory operations such as read, write, test-and-set and compare-and-swap, which can be used to implement higher-level recoverable objects. We then exemplify how these recoverable base objects can be used for constructing a recoverable counter object. Finally, we prove an impossibility result on wait-free implementations of recoverable test-and-set (TAS) objects from read, write and TAS operations, thus demonstrating that our model also facilitates rigorous analysis of the limitations of recoverable concurrent objects.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1