An Adaptive-Grained Consistency Maintenance Scheme for Shared Data on Emergency and Rescue Applications

نویسندگان

  • Jyh-Biau Chang
  • Po-Cheng Chen
  • Ce-Kuen Shieh
  • Jia-Hao Yang
  • Sheng-Hung Hsieh
چکیده

Efficient information sharing is difficult to achieve in the scenario of emergency and rescue operations because there is no communication infrastructure at the disaster sites. In general, the network condition is relatively reliable in the intra-site environment but relatively unreliable in the inter-site environment. The network partitioning problem may occur between two sites. Although one can exploit the replication technique used in data grid to improve the information availability in emergency and rescue applications, the data consistency problem occurs between replicas. In this paper, the authors propose a middleware called “Seagull” to transparently manage the data availability and consistency issues of emergency and rescue applications. Seagull adopts the optimistic replication scheme to provide the higher data availability in the inter-site environment. It also adopts the pessimistic replication scheme to provide the stronger data consistency guarantee in the intra-site environment. Moreover, it adopts an adaptive consistency granularity strategy that achieves the better performance of the consistency management because this strategy provides the higher parallelism when the false sharing happens. Lastly, Seagull adopts the transparency data consistency management scheme, and thus the users do not need to modify their source codes to run on the Seagull. An Adaptive-Grained Consistency Maintenance Scheme for Shared Data on Emergency and Rescue Applications

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications

Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastructure exists. Therefore, Mobile Ad-Hoc Network (MANET) technologies need to be leveraged for generic information sharing services. However, MANETs are using the shared medium of wireless networks, i.e., IEEE 802.11, whic...

متن کامل

Designing a Robust Control Scheme for Robotic Systems with an Adaptive Observer

This paper introduces a robust task-space control scheme for a robotic system with an adaptive observer. The proposed approach does not require the availability of the system states and an adaptive observer is developed to estimate the state variables. These estimated states are then used in the control scheme. First, the dynamic model of a robot is derived. Next, an observer-based robust contr...

متن کامل

Design and Evaluation of a Method for Partitioning and Offloading Web-based Applications in Mobile Systems with Bandwidth Constraints

Computation offloading is known to be among the effective solutions of running heavy applications on smart mobile devices. However, irregular changes of a mobile data rate have direct impacts on code partitioning when offloading is in progress. It is believed that once a rate-adaptive partitioning performed, the replication of such substantial processes due to bandwidth fluctuation can be avoid...

متن کامل

Towards Secure and Reliable Information Sharing in Emergency and Rescue Operations

Efficient information sharing among rescue personnel is crucial for a successful rescue operation. If computer networks were actively used by the rescue personnel, it would allow for more efficient communication, and information sharing in general, compared to standard walkie-talkies still in use today (often more than one at a time). However, emergency and rescue operations present the system ...

متن کامل

Towards an Adaptive Distributed Shared Memory 1 ( Preliminary

The focus of this report is on software implementations of Distributed Shared Memory (DSM). In the recent years, many protocols for implementing DSM have been proposed. The protocols can be broadly divided into two classes: invalidation-based schemes and update-based schemes. Performance of these protocols depends on the memory access behavior of the applications. Some researchers have proposed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJGHPC

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2013