首页 > 最新文献

Proceedings. IEEE Symposium on Computers and Communications最新文献

英文 中文
A resilient application-level failure detection system for distributed computing environments 面向分布式计算环境的弹性应用级故障检测系统
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523694
B. Welch, A. Helal, R. Elmasri
A methodology for detecting failures that occur in distributed computer systems connected by a communications network is described. The methodology utilizes active polling of monitored systems. The entities polled must be service entities that function at the application layers of service providing machines. A prototype system has been implemented to test this methodology.
描述了一种用于检测由通信网络连接的分布式计算机系统中发生的故障的方法。该方法利用对被监视系统的主动轮询。轮询的实体必须是在提供服务的机器的应用层上起作用的服务实体。已经实现了一个原型系统来测试该方法。
{"title":"A resilient application-level failure detection system for distributed computing environments","authors":"B. Welch, A. Helal, R. Elmasri","doi":"10.1109/SCAC.1995.523694","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523694","url":null,"abstract":"A methodology for detecting failures that occur in distributed computer systems connected by a communications network is described. The methodology utilizes active polling of monitored systems. The entities polled must be service entities that function at the application layers of service providing machines. A prototype system has been implemented to test this methodology.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"66 4 1","pages":"401-406"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89876243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive (T/sub 1/, T/sub 2/)-multiplexing transmission schemes for voice/data integrated networks 语音/数据综合网络的自适应(T/sub 1/, T/sub 2/)多路传输方案
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523698
A. Nguyen, N. Bambos, M. Sherif
Integrated multiplexing schemes are needed to optimize the use of transmission bandwidth in integrated networks. In this paper, we introduce the idea of a dynamically controlled (T/sub 1/, T/sub 2/) multiplexing scheme. The advantages of this transmission policy is that it allocates the transmission capacity of the channel to two traffic types according to the instantaneous needs. We consider only two types of traffic, voice band traffic and digital data. The channel access times for voice and data are T/sub 1/ and T/sub 2/, respectively. In this paper, we present some preliminary results of our proposed scheme. In our simulations, we observe that a reduction in blocking probability of 15% or more is possible.
为了优化综合网络中传输带宽的利用,需要采用综合复用方案。本文介绍了一种动态控制(T/sub 1/, T/sub 2/)复用方案的思想。这种传输策略的优点是根据瞬时需求将信道的传输容量分配给两种流量类型。我们只考虑两种类型的流量,语音频带流量和数字数据。语音和数据的通道接入时间分别为T/sub 1/和T/sub 2/。在本文中,我们给出了我们提出的方案的一些初步结果。在我们的模拟中,我们观察到阻塞概率降低15%或更多是可能的。
{"title":"Adaptive (T/sub 1/, T/sub 2/)-multiplexing transmission schemes for voice/data integrated networks","authors":"A. Nguyen, N. Bambos, M. Sherif","doi":"10.1109/SCAC.1995.523698","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523698","url":null,"abstract":"Integrated multiplexing schemes are needed to optimize the use of transmission bandwidth in integrated networks. In this paper, we introduce the idea of a dynamically controlled (T/sub 1/, T/sub 2/) multiplexing scheme. The advantages of this transmission policy is that it allocates the transmission capacity of the channel to two traffic types according to the instantaneous needs. We consider only two types of traffic, voice band traffic and digital data. The channel access times for voice and data are T/sub 1/ and T/sub 2/, respectively. In this paper, we present some preliminary results of our proposed scheme. In our simulations, we observe that a reduction in blocking probability of 15% or more is possible.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"43 1","pages":"430-435"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90701703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A machine learning technique for monitoring database systems 一种用于监控数据库系统的机器学习技术
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523697
H. Mathkour, A. Al-Salamah
A machine learning technique based database monitoring system is introduced. We report on a system which makes use of effective machine learning techniques to analyze user's queries and make appropriate, valuable suggestions to the database administrator (DBA) to fine tune the performance of the database at hand. The system uses several machine learning algorithms to monitor the queries and attempt to extract commonalities exhibited by the queries. The concepts learnt are passed to another module of the system which will perform the restructuring of the database. We also report on the design and development of a carefully selected database application and the set of queries formed for the system.
介绍了一种基于机器学习技术的数据库监控系统。我们报告了一个系统,它利用有效的机器学习技术来分析用户的查询,并向数据库管理员(DBA)提出适当的、有价值的建议,以微调手头数据库的性能。该系统使用几种机器学习算法来监控查询,并尝试提取查询所显示的共性。学习到的概念被传递到系统的另一个模块,该模块将执行数据库的重组。我们还报告了精心挑选的数据库应用程序的设计和开发,以及为系统形成的查询集。
{"title":"A machine learning technique for monitoring database systems","authors":"H. Mathkour, A. Al-Salamah","doi":"10.1109/SCAC.1995.523697","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523697","url":null,"abstract":"A machine learning technique based database monitoring system is introduced. We report on a system which makes use of effective machine learning techniques to analyze user's queries and make appropriate, valuable suggestions to the database administrator (DBA) to fine tune the performance of the database at hand. The system uses several machine learning algorithms to monitor the queries and attempt to extract commonalities exhibited by the queries. The concepts learnt are passed to another module of the system which will perform the restructuring of the database. We also report on the design and development of a carefully selected database application and the set of queries formed for the system.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"45 1","pages":"421-427"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78291140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimal program covering based on the output variables 基于输出变量的最小程序覆盖
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523679
Habib M. Ammari, A. Jaoua
This paper discusses how a program can be represented by a binary relation, R, and how to decompose the latter into a set of rectangular relations. Next, we present our methodology based on relational operators and dependence relations, to show how we can use these rectangles to obtain more interesting ones that describe the entire behavior of every variable in the program. The notion of lattice of maximal rectangles is effective in that it permits to have a particular representation of the program which shows all the different parts that constitute the original program. By looking at this lattice structure, we find that the set of the leaves of this lattice, which represent "pertinent" rectangles associated to output variables, gives a minimal program covering.
本文讨论了如何用一个二元关系R来表示一个程序,以及如何将后者分解成一组矩形关系。接下来,我们将介绍基于关系运算符和依赖关系的方法,以展示如何使用这些矩形来获得描述程序中每个变量的整个行为的更有趣的矩形。最大矩形晶格的概念是有效的,因为它允许有一个特定的程序表示,它显示了构成原始程序的所有不同部分。通过观察这个点阵结构,我们发现这个点阵的叶子(表示与输出变量相关的“相关”矩形)的集合给出了一个最小的程序覆盖。
{"title":"Minimal program covering based on the output variables","authors":"Habib M. Ammari, A. Jaoua","doi":"10.1109/SCAC.1995.523679","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523679","url":null,"abstract":"This paper discusses how a program can be represented by a binary relation, R, and how to decompose the latter into a set of rectangular relations. Next, we present our methodology based on relational operators and dependence relations, to show how we can use these rectangles to obtain more interesting ones that describe the entire behavior of every variable in the program. The notion of lattice of maximal rectangles is effective in that it permits to have a particular representation of the program which shows all the different parts that constitute the original program. By looking at this lattice structure, we find that the set of the leaves of this lattice, which represent \"pertinent\" rectangles associated to output variables, gives a minimal program covering.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"70 1","pages":"282-288"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79162330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic restoration of telecommunication networks 电信网络自动恢复
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523659
M. Mansour, F. Wong
The paper provides a set of guidelines to design and evaluate automatic restoration for telecommunication networks. The operation of a telecommunications network is defined to be in one of three modes: normal, abnormal and restorative. The paper emphasizes the coordinated performance of a network management system (NMS) and an automatic restoration system (RS). The NMS detects the abnormal mode, and the RS restores normal operating conditions. The paper defines and explains the necessary steps of real-time restoration, provides design and evaluation parameters for automatic restoration and presents the operational reliability considerations.
本文提供了一套用于电信网络自动恢复设计和评估的准则。电信网络的运行被定义为三种模式之一:正常、异常和恢复。本文着重研究了网络管理系统(NMS)和自动恢复系统(RS)的协同性能。网管检测到模式异常,RS恢复正常运行状态。定义和说明了实时恢复的必要步骤,给出了自动恢复的设计和评估参数,并提出了运行可靠性考虑。
{"title":"Automatic restoration of telecommunication networks","authors":"M. Mansour, F. Wong","doi":"10.1109/SCAC.1995.523659","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523659","url":null,"abstract":"The paper provides a set of guidelines to design and evaluate automatic restoration for telecommunication networks. The operation of a telecommunications network is defined to be in one of three modes: normal, abnormal and restorative. The paper emphasizes the coordinated performance of a network management system (NMS) and an automatic restoration system (RS). The NMS detects the abnormal mode, and the RS restores normal operating conditions. The paper defines and explains the necessary steps of real-time restoration, provides design and evaluation parameters for automatic restoration and presents the operational reliability considerations.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"17 1","pages":"141-147"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/SCAC.1995.523659","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72526002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of a shared-medium ATM switch 共享介质ATM交换机的性能分析
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523641
A. Zaghloul, H. Perros
In this paper, we present an approximate analysis of a generic shared-medium ATM switch with input and output queueing. Input traffic is assumed to be bursty and is modelled by an interrupted Bernoulli process (IBP). Three different bus service policies are analyzed: time division multiplexing (TDM), cyclic, and random. The output links may have constant or geometric service time. The analysis is based on the notion of decomposition whereby the switch is decomposed into smaller sub-systems. First, each input queue is analyzed in isolation after we modify its service process. Subsequently, the shared medium is analyzed as a separate sub-system utilizing the output process of each input queue. Finally, each output queue is analyzed in isolation. The results from the individual sub-systems are combined together through an iterative scheme. This method permits realistic system characteristics such as limited buffer size, asymmetric load conditions, and nonuniform destinations to be taken into consideration in the analysis. The model's accuracy is verified through simulation.
本文给出了一种具有输入和输出排队的通用共享介质ATM交换机的近似分析。假定输入流量是突发的,并采用中断伯努利过程(IBP)建模。分析了三种不同的总线服务策略:时分复用(TDM)、循环和随机。输出链路可以具有恒定或几何服务时间。分析基于分解的概念,即将开关分解为更小的子系统。首先,在修改每个输入队列的服务进程后,对其进行隔离分析。随后,将共享媒体作为利用每个输入队列的输出过程的单独子系统进行分析。最后,对每个输出队列进行隔离分析。通过迭代方案将各个子系统的结果组合在一起。该方法允许在分析中考虑实际的系统特性,如有限的缓冲区大小、非对称负载条件和非均匀目的地。通过仿真验证了模型的准确性。
{"title":"Performance analysis of a shared-medium ATM switch","authors":"A. Zaghloul, H. Perros","doi":"10.1109/SCAC.1995.523641","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523641","url":null,"abstract":"In this paper, we present an approximate analysis of a generic shared-medium ATM switch with input and output queueing. Input traffic is assumed to be bursty and is modelled by an interrupted Bernoulli process (IBP). Three different bus service policies are analyzed: time division multiplexing (TDM), cyclic, and random. The output links may have constant or geometric service time. The analysis is based on the notion of decomposition whereby the switch is decomposed into smaller sub-systems. First, each input queue is analyzed in isolation after we modify its service process. Subsequently, the shared medium is analyzed as a separate sub-system utilizing the output process of each input queue. Finally, each output queue is analyzed in isolation. The results from the individual sub-systems are combined together through an iterative scheme. This method permits realistic system characteristics such as limited buffer size, asymmetric load conditions, and nonuniform destinations to be taken into consideration in the analysis. The model's accuracy is verified through simulation.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"83 1","pages":"16-22"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85599895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing the obstacles to network technology adoption 消除网络技术采用的障碍
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523693
H. Meleis
The obstacles to adopting new network technologies that enable new applications and services are reviewed and discussed. Technologies such as client-server and interconnection mechanisms enable the realization of new applications which are "nice to have." Making these new technologies as easy as possible to exploit and use is a key in adopting them. Obstacles such as cost and complexity of managing the changes have been proven to be two of the barriers to adopting these technologies. Additionally, ignoring the importance of the legacy systems and their associated applications services, and infrastructures as well as introducing a set of new technologies which may not work well with the older systems impedes the acceptance of these new technologies. A set of migration technologies and strategies must be developed to remove the obstacles and to accelerate the adoption of these new network technologies.
审查和讨论了采用新网络技术以实现新应用和服务的障碍。客户机-服务器和互连机制等技术支持实现“拥有就好”的新应用程序。使这些新技术尽可能易于开发和使用是采用它们的关键。成本和管理变更的复杂性等障碍已被证明是采用这些技术的两个障碍。此外,忽略遗留系统及其相关的应用程序服务和基础设施的重要性,以及引入一组可能无法与旧系统很好地工作的新技术,会阻碍对这些新技术的接受。必须开发一套迁移技术和战略,以消除障碍并加速采用这些新的网络技术。
{"title":"Removing the obstacles to network technology adoption","authors":"H. Meleis","doi":"10.1109/SCAC.1995.523693","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523693","url":null,"abstract":"The obstacles to adopting new network technologies that enable new applications and services are reviewed and discussed. Technologies such as client-server and interconnection mechanisms enable the realization of new applications which are \"nice to have.\" Making these new technologies as easy as possible to exploit and use is a key in adopting them. Obstacles such as cost and complexity of managing the changes have been proven to be two of the barriers to adopting these technologies. Additionally, ignoring the importance of the legacy systems and their associated applications services, and infrastructures as well as introducing a set of new technologies which may not work well with the older systems impedes the acceptance of these new technologies. A set of migration technologies and strategies must be developed to remove the obstacles and to accelerate the adoption of these new network technologies.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"12 1","pages":"392-400"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90259239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a hybrid encryption scheme for Ethernet 以太网混合加密方案的实现
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523660
M. El-Hadidi, N. Hegazi, H. Aslan
A software-based implementation of a hybrid encryption scheme for Ethernet LAN is given. It uses a DES-type symmetric key for information exchange between communicating users. In addition, a Diffie-Hellman method is adopted for key distribution which incorporates an RSA-type public key scheme for securing the exchange of the symmetric key components. To facilitate distribution of public keys and to guarantee authenticity, a separate network entity called security management facility (SMF) is deployed. A brief description of the software components for the proposed hybrid encryption scheme is given, and a Petri net representation of the software operation is provided. In addition, evaluation of the proposed scheme is carried out on a prototype network, and the numerical values for the encryption time and the message transfer time are obtained to illustrate the feasibility of the new scheme.
给出了一种基于软件实现的以太网局域网混合加密方案。它使用des类型的对称密钥在通信用户之间进行信息交换。此外,采用Diffie-Hellman方法进行密钥分发,该方法结合了rsa类型的公钥方案,以确保对称密钥组件的交换安全。为了方便公钥的分发和保证真实性,需要部署一个单独的网络实体,称为安全管理设施(SMF)。简要描述了所提出的混合加密方案的软件组件,并给出了软件操作的Petri网表示。此外,在一个原型网络上对所提出的方案进行了评估,得到了加密时间和消息传输时间的数值,以说明新方案的可行性。
{"title":"Implementation of a hybrid encryption scheme for Ethernet","authors":"M. El-Hadidi, N. Hegazi, H. Aslan","doi":"10.1109/SCAC.1995.523660","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523660","url":null,"abstract":"A software-based implementation of a hybrid encryption scheme for Ethernet LAN is given. It uses a DES-type symmetric key for information exchange between communicating users. In addition, a Diffie-Hellman method is adopted for key distribution which incorporates an RSA-type public key scheme for securing the exchange of the symmetric key components. To facilitate distribution of public keys and to guarantee authenticity, a separate network entity called security management facility (SMF) is deployed. A brief description of the software components for the proposed hybrid encryption scheme is given, and a Petri net representation of the software operation is provided. In addition, evaluation of the proposed scheme is carried out on a prototype network, and the numerical values for the encryption time and the message transfer time are obtained to illustrate the feasibility of the new scheme.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"77 1","pages":"150-156"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88110743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Building a network infrastructure for global competitiveness 构建具有全球竞争力的网络基础设施
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523682
J. Lias
The paper provides a strategic impact analysis of communications technology on a nations' global competitiveness. Global competitiveness and its definition is described, along with communications architectures, technologies and economics that have a direct impact on national competitiveness. It is shown that enhancing the communications needs of business workers can fundamentally shift the global competitive position of a nation. The technologies and architectures required to enable the satisfaction of these communications needs are analyzed. Technology and architectural evolution required to provide a business worker oriented service offering from PTTs and communications service providers is also presented.
本文对通信技术对一国全球竞争力的战略影响进行了分析。描述了全球竞争力及其定义,以及对国家竞争力有直接影响的通信架构、技术和经济。研究表明,提高企业员工的沟通需求可以从根本上改变一个国家的全球竞争地位。分析了满足这些通信需求所需的技术和体系结构。还介绍了从ptt和通信服务提供商提供面向业务工作者的服务所需要的技术和体系结构演变。
{"title":"Building a network infrastructure for global competitiveness","authors":"J. Lias","doi":"10.1109/SCAC.1995.523682","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523682","url":null,"abstract":"The paper provides a strategic impact analysis of communications technology on a nations' global competitiveness. Global competitiveness and its definition is described, along with communications architectures, technologies and economics that have a direct impact on national competitiveness. It is shown that enhancing the communications needs of business workers can fundamentally shift the global competitive position of a nation. The technologies and architectures required to enable the satisfaction of these communications needs are analyzed. Technology and architectural evolution required to provide a business worker oriented service offering from PTTs and communications service providers is also presented.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"16 1","pages":"305-312"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88446304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A distributed transaction processing facility for the MMS specification 用于MMS规范的分布式事务处理设施
Pub Date : 1995-06-27 DOI: 10.1109/SCAC.1995.523695
Y. Dakroury, J. Elloy
The manufacturing message specification (MMS) is an application service element of the manufacturing automation protocol (MAP) standardized by ISO to support messaging communication to and from programmable devices in a computer integrated manufacturing (CIM) environment. Although this MMS standard is designed to function in a distributed environment, its specification does not include a support to execute distributed transactions while these ones are mandatory for the CIM applications to support the manufacturing operations implemented by the distributed devices. We propose a distributed transaction processing facility that permits the organization of a distributed manufacturing process in terms of a set of MMS services encapsulated together to perform the manufacturing task. The facility is supported by the transaction processing (TP) standard, designed by the ISO, to guarantee the correct behavior of the distributed MMS transactions. This guarantee is based on the satisfaction of the atomicity, consistency, isolation, and durability (ACID) properties defined by the ISO.
制造消息规范(MMS)是ISO标准化的制造自动化协议(MAP)的一个应用程序服务元素,用于支持计算机集成制造(CIM)环境中可编程设备之间的消息通信。尽管这个MMS标准是为在分布式环境中工作而设计的,但它的规范不包括对执行分布式事务的支持,而这些事务对于CIM应用程序来说是必需的,以支持由分布式设备实现的制造操作。我们提出了一种分布式事务处理工具,它允许根据一组封装在一起的MMS服务来组织分布式制造过程,以执行制造任务。该设施由ISO设计的事务处理(TP)标准提供支持,以保证分布式MMS事务的正确行为。这种保证是基于对ISO定义的原子性、一致性、隔离性和持久性(ACID)属性的满足。
{"title":"A distributed transaction processing facility for the MMS specification","authors":"Y. Dakroury, J. Elloy","doi":"10.1109/SCAC.1995.523695","DOIUrl":"https://doi.org/10.1109/SCAC.1995.523695","url":null,"abstract":"The manufacturing message specification (MMS) is an application service element of the manufacturing automation protocol (MAP) standardized by ISO to support messaging communication to and from programmable devices in a computer integrated manufacturing (CIM) environment. Although this MMS standard is designed to function in a distributed environment, its specification does not include a support to execute distributed transactions while these ones are mandatory for the CIM applications to support the manufacturing operations implemented by the distributed devices. We propose a distributed transaction processing facility that permits the organization of a distributed manufacturing process in terms of a set of MMS services encapsulated together to perform the manufacturing task. The facility is supported by the transaction processing (TP) standard, designed by the ISO, to guarantee the correct behavior of the distributed MMS transactions. This guarantee is based on the satisfaction of the atomicity, consistency, isolation, and durability (ACID) properties defined by the ISO.","PeriodicalId":90699,"journal":{"name":"Proceedings. IEEE Symposium on Computers and Communications","volume":"45 1","pages":"407-413"},"PeriodicalIF":0.0,"publicationDate":"1995-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89360520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings. IEEE Symposium on Computers and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1