首页 > 最新文献

[1989] Proceedings. The 9th International Conference on Distributed Computing Systems最新文献

英文 中文
Transparent concurrent execution of mutually exclusive alternatives 互斥替代方案的透明并发执行
Jonathan M. Smith, Gerald Q. Maguire
The task of concurrently computing alternative solutions to a problem where only one of the solutions is needed is examined. In this case the rule for selecting between the solutions is faster first, where the first successful alternative is selected. For problems where the required execution time is unpredictable, this method shows substantial execution time performance increases over other methods. In order to test the utility of the design, it is used for two application areas: distributed execution of recovery blocks and OR-parallelism in Prolog. The authors present: (1) a model for selection of alternatives in a sequential setting: (2) a transformation that allows alternatives to execute concurrently; (3) a description of the semantics-preservation mechanism; and (4) parameterization of where the performance improvements can be expected. Additionally, examples of application areas for the method are given.<>
在只需要一个解决方案的情况下,并发计算一个问题的备选解决方案的任务被检查。在这种情况下,在解决方案之间进行选择的规则首先更快,其中第一个成功的替代方案被选中。对于所需执行时间不可预测的问题,此方法显示执行时间性能比其他方法有显著提高。为了测试该设计的实用性,将其用于两个应用领域:恢复块的分布式执行和Prolog中的or并行性。作者提出:(1)在顺序设置中选择备选方案的模型;(2)允许备选方案并发执行的转换;(3)对语义保存机制的描述;(4)参数化可以期望性能改进的地方。此外,还给出了该方法应用领域的实例。
{"title":"Transparent concurrent execution of mutually exclusive alternatives","authors":"Jonathan M. Smith, Gerald Q. Maguire","doi":"10.1109/ICDCS.1989.37929","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37929","url":null,"abstract":"The task of concurrently computing alternative solutions to a problem where only one of the solutions is needed is examined. In this case the rule for selecting between the solutions is faster first, where the first successful alternative is selected. For problems where the required execution time is unpredictable, this method shows substantial execution time performance increases over other methods. In order to test the utility of the design, it is used for two application areas: distributed execution of recovery blocks and OR-parallelism in Prolog. The authors present: (1) a model for selection of alternatives in a sequential setting: (2) a transformation that allows alternatives to execute concurrently; (3) a description of the semantics-preservation mechanism; and (4) parameterization of where the performance improvements can be expected. Additionally, examples of application areas for the method are given.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A flexible algorithm for replicated directory management 灵活的复制目录管理算法
S. Sarin, R. Floyd, Nilkanth Phadnis
A replicated directory management algorithm is presented that supports full location-transparency by allowing migration and reconfiguration at the granularity of individual names. Initially, all names in a directory (including names not yet in use) are controlled by the same set of sites, but control over any individual name (or range of names) can be migrated, e.g. to the set of sites that control the data object associated with the name. The method is based on a directory replication algorithm of J.J. Bloch et al. (1987), incorporating two extensions: (1) allowing control over individual names in a directory to migrate independently; and (2) allowing the definition of relationships among names, such that if control over a given name migrates, then those names that depend on it are automatically migrated as well. Finally, it is stated that the major cost of the algorithm, compared to simpler approaches that do not provide the same degree of location transparency, is the additional complexity and difficulty of obtaining a consistent view of the entire directory.<>
提出了一种复制目录管理算法,该算法通过允许在单个名称的粒度上迁移和重新配置来支持完全的位置透明性。最初,目录中的所有名称(包括尚未使用的名称)由同一组站点控制,但是对任何单个名称(或名称范围)的控制可以迁移,例如,迁移到控制与该名称相关的数据对象的站点集。该方法基于J.J. Bloch等人(1987)的目录复制算法,包含两个扩展:(1)允许对目录中的单个名称进行独立迁移的控制;(2)允许定义名字之间的关系,这样,如果对给定名字的控制迁移了,那么依赖于它的那些名字也会自动迁移。最后,本文指出,与不提供相同程度位置透明度的更简单方法相比,该算法的主要成本是获得整个目录的一致视图的额外复杂性和难度。
{"title":"A flexible algorithm for replicated directory management","authors":"S. Sarin, R. Floyd, Nilkanth Phadnis","doi":"10.1109/ICDCS.1989.37977","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37977","url":null,"abstract":"A replicated directory management algorithm is presented that supports full location-transparency by allowing migration and reconfiguration at the granularity of individual names. Initially, all names in a directory (including names not yet in use) are controlled by the same set of sites, but control over any individual name (or range of names) can be migrated, e.g. to the set of sites that control the data object associated with the name. The method is based on a directory replication algorithm of J.J. Bloch et al. (1987), incorporating two extensions: (1) allowing control over individual names in a directory to migrate independently; and (2) allowing the definition of relationships among names, such that if control over a given name migrates, then those names that depend on it are automatically migrated as well. Finally, it is stated that the major cost of the algorithm, compared to simpler approaches that do not provide the same degree of location transparency, is the additional complexity and difficulty of obtaining a consistent view of the entire directory.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An analysis of distributed shared memory algorithms 分布式共享内存算法分析
R. Kessler, M. Livny
Results obtained in a study of algorithms to implement a distributed-shared memory in a distributed (loosely coupled) environment are described. Distributed-shared memory is the implementation of shared memory across multiple nodes in a distributed system. This is accomplished using only the private memories of the nodes by controlling access to the pages of the shared memory and transferring data to and from the private memories when necessary. Alternative algorithms are analyzed to implement distributed-shared memory. The algorithms are analyzed and compared over a wide range of conditions. Application characteristics are identified which can be exploited by the algorithms. The conditions under which the algorithms analyzed perform better or worse than the other alternatives are shown. Results are obtained via simulation using a synthetic reference generator.<>
本文描述了在分布式(松耦合)环境中实现分布式共享内存的算法研究的结果。分布式共享内存是在分布式系统中跨多个节点实现共享内存。这是通过控制对共享内存页面的访问并在必要时将数据传输到私有内存和从私有内存传输数据来仅使用节点的私有内存来实现的。分析了实现分布式共享内存的几种算法。这些算法在广泛的条件下进行了分析和比较。识别了可被算法利用的应用特性。在哪些条件下,所分析的算法比其他方案表现得更好或更差。利用合成参考发生器进行仿真得到了结果。
{"title":"An analysis of distributed shared memory algorithms","authors":"R. Kessler, M. Livny","doi":"10.1109/ICDCS.1989.37982","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37982","url":null,"abstract":"Results obtained in a study of algorithms to implement a distributed-shared memory in a distributed (loosely coupled) environment are described. Distributed-shared memory is the implementation of shared memory across multiple nodes in a distributed system. This is accomplished using only the private memories of the nodes by controlling access to the pages of the shared memory and transferring data to and from the private memories when necessary. Alternative algorithms are analyzed to implement distributed-shared memory. The algorithms are analyzed and compared over a wide range of conditions. Application characteristics are identified which can be exploited by the algorithms. The conditions under which the algorithms analyzed perform better or worse than the other alternatives are shown. Results are obtained via simulation using a synthetic reference generator.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
The reliability of regeneration-based replica control protocols 基于再生的副本控制协议的可靠性
D. Long, J. Carroll, K. Stewart
Several strategies for replica maintenance are considered, and the benefits of each are analyzed. Formulas describing the reliability of the replicated data object are presented, and closed-form solutions are given for the tractable cases. Numerical solutions, validated by simulation results, are used to analyze the tradeoffs between reliability and storage cost. With estimates of the mean times to site failure and repair in a given system, the numerical techniques presented can be applied to predict the fewest number of replicas required to provide the desired level of reliability.<>
本文考虑了几种副本维护策略,并分析了每种策略的优点。给出了描述复制数据对象可靠性的公式,并给出了可处理情况下的封闭解。采用数值解对可靠性和存储成本进行了权衡分析,并得到了仿真结果的验证。在给定系统中,通过估计站点故障和修复的平均时间,所提出的数值技术可用于预测提供所需可靠性水平所需的最少副本数量。
{"title":"The reliability of regeneration-based replica control protocols","authors":"D. Long, J. Carroll, K. Stewart","doi":"10.1109/ICDCS.1989.37978","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37978","url":null,"abstract":"Several strategies for replica maintenance are considered, and the benefits of each are analyzed. Formulas describing the reliability of the replicated data object are presented, and closed-form solutions are given for the tractable cases. Numerical solutions, validated by simulation results, are used to analyze the tradeoffs between reliability and storage cost. With estimates of the mean times to site failure and repair in a given system, the numerical techniques presented can be applied to predict the fewest number of replicas required to provide the desired level of reliability.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Performance modeling of the modified mesh-connected parallel computer 改进的网格并联计算机性能建模
Chia-Jiu Wang, V. Nelson, C. Wu
A message-passing computer architecture called the modified mesh-connected parallel computer (MMCPC) is proposed and studied. The MMCPC is designed to be general-purpose parallel architecture suitable for wafer-scale integration. Generalized stochastic Petri nets (GSPNs) are used to model the behavior of the MMCPC. The GSPN performance modeling results show a need for a new processing element (PE). A PE architecture, able to handle data processing and message passing concurrently, is proposed, and the silicon overhead is estimated in comparison with transputerlike PEs. Based on the proposed PE, optimum sizes of the MMCPC for different program structures are derived. A two-dimensional fast Fourier transform problem is used as an example to demonstrate that the MMCPC is a cost-effective performance-enhancement architecture to a real problem.<>
提出并研究了一种消息传递计算机体系结构——改进的网格连接并行计算机(MMCPC)。MMCPC被设计成适合晶圆级集成的通用并行架构。采用广义随机Petri网(gspn)对MMCPC的行为进行了建模。GSPN性能建模结果表明,需要一种新的处理单元(PE)。提出了一种能够同时处理数据处理和消息传递的PE体系结构,并与类似传输器的PE进行了比较,估计了硅开销。在此基础上,推导出不同程序结构下MMCPC的最佳尺寸。以二维快速傅里叶变换问题为例,证明了MMCPC是一种经济高效的性能增强体系结构。
{"title":"Performance modeling of the modified mesh-connected parallel computer","authors":"Chia-Jiu Wang, V. Nelson, C. Wu","doi":"10.1109/ICDCS.1989.37981","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37981","url":null,"abstract":"A message-passing computer architecture called the modified mesh-connected parallel computer (MMCPC) is proposed and studied. The MMCPC is designed to be general-purpose parallel architecture suitable for wafer-scale integration. Generalized stochastic Petri nets (GSPNs) are used to model the behavior of the MMCPC. The GSPN performance modeling results show a need for a new processing element (PE). A PE architecture, able to handle data processing and message passing concurrently, is proposed, and the silicon overhead is estimated in comparison with transputerlike PEs. Based on the proposed PE, optimum sizes of the MMCPC for different program structures are derived. A two-dimensional fast Fourier transform problem is used as an example to demonstrate that the MMCPC is a cost-effective performance-enhancement architecture to a real problem.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault tolerance in a very large database system: a strawman analysis 一个非常大的数据库系统中的容错:一个稻草人分析
A. Sheth
A simple model is used to study the effect of fault-tolerance techniques and system design on system availability. A generic multiprocessor architecture is used that can be configured in different ways to study the effect of system architectures. Important parameters studied are different system architectures and hardware fault-tolerance techniques, mean time to failure of basic components, database size and distribution, interconnect capacity, etc. Quantitative analysis compares the relative effect of different parameter values. Results show that the effect of different parameter values on system availability can be very significant. System architecture, use of hardware fault tolerance (particularly mirroring), and data storage methods emerge as very important parameters under the control of a system designer.<>
用一个简单的模型研究了容错技术和系统设计对系统可用性的影响。使用通用的多处理器体系结构,可以用不同的方式配置它来研究系统体系结构的影响。研究的重要参数包括不同的系统架构和硬件容错技术、基本组件的平均故障间隔时间、数据库的大小和分布、互连容量等。定量分析比较了不同参数值的相对效果。结果表明,不同的参数值对系统可用性的影响是非常显著的。系统架构、硬件容错(特别是镜像)的使用和数据存储方法成为系统设计者控制下的非常重要的参数。
{"title":"Fault tolerance in a very large database system: a strawman analysis","authors":"A. Sheth","doi":"10.1109/ICDCS.1989.37951","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37951","url":null,"abstract":"A simple model is used to study the effect of fault-tolerance techniques and system design on system availability. A generic multiprocessor architecture is used that can be configured in different ways to study the effect of system architectures. Important parameters studied are different system architectures and hardware fault-tolerance techniques, mean time to failure of basic components, database size and distribution, interconnect capacity, etc. Quantitative analysis compares the relative effect of different parameter values. Results show that the effect of different parameter values on system availability can be very significant. System architecture, use of hardware fault tolerance (particularly mirroring), and data storage methods emerge as very important parameters under the control of a system designer.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128409168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive transaction routing in a heterogeneous database environment 异构数据库环境中的自适应事务路由
A. Leff, Philip S. Yu, Yann-Hang Lee
The issue of transaction routing in a heterogeneous database environment is examined where transaction characteristics like reference locality implies that certain processing systems can be identified as being, in general, more suitable than others for a given transaction class. Routing which ignores these distinctions in an attempt to balance system load can degrade system performance. An adaptive routing strategy is considered which: (1) estimates the response time based on a steady-state analysis; (2) monitors how well actual response time conforms to the estimate; and (3) adaptively adjusts future estimates through a feedback control based on (2). It is found that the adaptive strategy greatly enhances performance robustness as compared to the results of the strategy without feedback. The feedback process used alleviates the sensitivity to accurate estimations of workload and system parameters. Various simulation studies are used to illustrate the adaptive strategy's robustness.<>
本文研究了异构数据库环境中的事务路由问题,其中的事务特征(如引用局部性)意味着某些处理系统通常比其他处理系统更适合给定的事务类。在试图平衡系统负载时忽略这些区别的路由可能会降低系统性能。考虑了一种自适应路由策略:(1)基于稳态分析估计响应时间;(2)监测实际响应时间与估计相符的程度;(3)通过基于(2)的反馈控制自适应调整未来估计。研究发现,与无反馈策略的结果相比,自适应策略大大增强了性能鲁棒性。所使用的反馈过程减轻了对准确估计工作量和系统参数的敏感性。各种仿真研究证明了自适应策略的鲁棒性。
{"title":"Adaptive transaction routing in a heterogeneous database environment","authors":"A. Leff, Philip S. Yu, Yann-Hang Lee","doi":"10.1109/ICDCS.1989.37971","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37971","url":null,"abstract":"The issue of transaction routing in a heterogeneous database environment is examined where transaction characteristics like reference locality implies that certain processing systems can be identified as being, in general, more suitable than others for a given transaction class. Routing which ignores these distinctions in an attempt to balance system load can degrade system performance. An adaptive routing strategy is considered which: (1) estimates the response time based on a steady-state analysis; (2) monitors how well actual response time conforms to the estimate; and (3) adaptively adjusts future estimates through a feedback control based on (2). It is found that the adaptive strategy greatly enhances performance robustness as compared to the results of the strategy without feedback. The feedback process used alleviates the sensitivity to accurate estimations of workload and system parameters. Various simulation studies are used to illustrate the adaptive strategy's robustness.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive load sharing in heterogeneous systems 异构系统中的自适应负载共享
R. Mirchandaney, D. Towsley, J. Stankovic
The performance characteristics of simple load-sharing algorithms are studied for heterogeneous distributed systems. It is assumed that non-negligible delays are encountered in transforming jobs from one node to another and in gathering remote state information. The effects of these delays on the performance of two algorithms called Forward and Reverse are analyzed. Queuing theoretic models are formulated for each of the algorithms operating in heterogeneous systems under the assumption that the job arrival process at each node is Poisson and the service times and job transfer time are exponentially distributed. The models are solved using the matrix-geometric solution technique. The models are tested with regard to the effects of varying thresholds, the impact of changing the probe limit, and the determination of the optimal response times over a large range of loads and delays. Wherever relevant, the results of the models are compared with M/M/1, random assignment, and the M/M/K models.<>
研究了异构分布式系统中简单负载共享算法的性能特点。假设在将作业从一个节点转换到另一个节点和收集远程状态信息时遇到不可忽略的延迟。分析了这些延迟对正向和反向两种算法性能的影响。在假定作业到达各节点过程为泊松过程、服务时间和作业转移时间呈指数分布的条件下,建立了异构系统中各算法的排队理论模型。采用矩阵-几何解法对模型进行求解。针对不同阈值的影响、改变探针极限的影响以及在大范围负载和延迟上确定最佳响应时间,对模型进行了测试。在相关的情况下,将模型的结果与M/M/1、随机分配和M/M/K模型进行比较。
{"title":"Adaptive load sharing in heterogeneous systems","authors":"R. Mirchandaney, D. Towsley, J. Stankovic","doi":"10.1109/ICDCS.1989.37959","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37959","url":null,"abstract":"The performance characteristics of simple load-sharing algorithms are studied for heterogeneous distributed systems. It is assumed that non-negligible delays are encountered in transforming jobs from one node to another and in gathering remote state information. The effects of these delays on the performance of two algorithms called Forward and Reverse are analyzed. Queuing theoretic models are formulated for each of the algorithms operating in heterogeneous systems under the assumption that the job arrival process at each node is Poisson and the service times and job transfer time are exponentially distributed. The models are solved using the matrix-geometric solution technique. The models are tested with regard to the effects of varying thresholds, the impact of changing the probe limit, and the determination of the optimal response times over a large range of loads and delays. Wherever relevant, the results of the models are compared with M/M/1, random assignment, and the M/M/K models.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Replicated transactions 复制事务
T. Ng, Shepherd S. B. Shi
A scheme to replicate transactions is described. The scheme allows a k-replicated transaction to survive (k-1) failures. No coordination among the k replicas is needed until one of them reaches the end and proceeds to abort the others. Consequently, the scheme avoids the overhead and delay caused by failure detection reconfiguration, and synchronization during the k replicas' execution. A robust commit protocol to choose the transaction replica that should be committed and a procedure to choose the nodes on which a transaction replica is executed are described. The goal of the procedure is to maximize reliability.<>
描述了一个复制事务的方案。该方案允许k个复制的事务在(k-1)次失败中存活。k个副本之间不需要协调,直到其中一个到达终点并继续中止其他副本。因此,该方案避免了k个副本执行期间由故障检测、重新配置和同步引起的开销和延迟。描述了一个健壮的提交协议,用于选择应该提交的事务副本,以及一个过程,用于选择执行事务副本的节点。该程序的目标是使可靠性最大化。
{"title":"Replicated transactions","authors":"T. Ng, Shepherd S. B. Shi","doi":"10.1109/ICDCS.1989.37979","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37979","url":null,"abstract":"A scheme to replicate transactions is described. The scheme allows a k-replicated transaction to survive (k-1) failures. No coordination among the k replicas is needed until one of them reaches the end and proceeds to abort the others. Consequently, the scheme avoids the overhead and delay caused by failure detection reconfiguration, and synchronization during the k replicas' execution. A robust commit protocol to choose the transaction replica that should be committed and a procedure to choose the nodes on which a transaction replica is executed are described. The goal of the procedure is to maximize reliability.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Intelligent routers 智能路由器
C. D. Wolfson, E. Voorhees, Maura M. Flatley
The authors describe a mechanism known as intelligent routers that provides a means to implement distributed applications in a heterogeneous environment. A router is a process that may explicitly request to migrate to another machine so it can avail itself of that machine's capabilities. The router environment supports the migration despite differences in the computer hardware, operating systems, and communication networks in the target set of computers. Three main goals are described for intelligent router systems: that the routers be self-directing; that the systems accommodate heterogeneity; and that the systems be robust. A description of the architecture of an intelligent router system is presented. Also presented is an implementation of a particular intelligent router system. This prototype supports simultaneous execution of multiple routers on a variety of hardware and operating systems; however, it is not yet robust. Finally, worm programs, Knos, and routers are compared and their differences are explored.<>
作者描述了一种被称为智能路由器的机制,它提供了一种在异构环境中实现分布式应用程序的方法。路由器是一个进程,它可以显式地请求迁移到另一台机器,这样它就可以利用那台机器的功能。尽管目标计算机集中的计算机硬件、操作系统和通信网络存在差异,但路由器环境支持迁移。描述了智能路由器系统的三个主要目标:路由器是自导向的;系统能容纳异质性;并且系统是健壮的。介绍了一种智能路由器系统的体系结构。同时给出了一种特殊的智能路由器系统的实现。该原型支持在各种硬件和操作系统上同时执行多个路由器;然而,它还不够强大。最后,对蠕虫程序、Knos和路由器进行了比较,并探讨了它们之间的差异。
{"title":"Intelligent routers","authors":"C. D. Wolfson, E. Voorhees, Maura M. Flatley","doi":"10.1109/ICDCS.1989.37967","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37967","url":null,"abstract":"The authors describe a mechanism known as intelligent routers that provides a means to implement distributed applications in a heterogeneous environment. A router is a process that may explicitly request to migrate to another machine so it can avail itself of that machine's capabilities. The router environment supports the migration despite differences in the computer hardware, operating systems, and communication networks in the target set of computers. Three main goals are described for intelligent router systems: that the routers be self-directing; that the systems accommodate heterogeneity; and that the systems be robust. A description of the architecture of an intelligent router system is presented. Also presented is an implementation of a particular intelligent router system. This prototype supports simultaneous execution of multiple routers on a variety of hardware and operating systems; however, it is not yet robust. Finally, worm programs, Knos, and routers are compared and their differences are explored.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
[1989] Proceedings. The 9th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1