Client-access protocols for replicated services
نویسندگان
چکیده
منابع مشابه
Client--Access Protocols for Replicated Services
The paper addresses the problem of client–service interaction in the case of replicated service provision. Existing systems that follow the State Machine approach concentrate on the synchronisation of the server replicas and do not consider the problem of client interaction with the server group. Client interaction is analysed and a number of access protocols are proposed to meet a range of cli...
متن کاملClient-side selection of replicated web services: An empirical assessment
Replicating web services over physically distributed servers can offer client applications a number of QoS benefits, including higher availability and reduced response time. However, selecting the ‘‘best” service replica to invoke at the client-side is not a trivial task, as this requires taking into account factors such as local and external network conditions, and the servers’ current workloa...
متن کاملRegeneration Protocols for Replicated Objects
The reliability and availability of replicated data can often be increased by generating new replicas when some become inaccessible due to system malfunctions. This technique has been used in the Regeneration Algorithm, a replica control protocol based on file regeneration. The read and write availabilities of replicated data managed by the Regeneration Algorithm are evaluated and two new regen...
متن کاملSession based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example where service is based on a distributed architecture of replica servers to guarantee resource availability and proximity to final users. In such distributed systems, network links are not dedicated, and may be subject to ...
متن کاملDecentralized Replicated-Object Protocols
We describe a new replicated-object protocol designed for use in mobile and weakly-connected environments. The protocol differs from previous protocols in combining epidemic information propagation with voting, and in using fixed per-object currencies for voting. The advantage of epidemic protocols is that data movement only requires pairwise communication. Hence, there is no need for a majorit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 1999
ISSN: 0098-5589
DOI: 10.1109/32.748915