Adaptive Protocols For Survivability Of Transactions Operating On Replicated Objects

نویسندگان

  • Horst F. Wedde
  • Sabine Böhm
  • Wolfgang Freund
چکیده

We present a novel transaction model for distributed safetycritical real-time applications in which transactions become increasingly critical under failures of subsequent incarnations. When a transaction-dependent criticality threshold has been reached the transaction is considered essentially critical or hard, i.e. the deadline has to be met lest the system is doomed to be in a disastrous state. The corresponding adaptive measures (criticality, sensitivity) to provide that potentially all hard deadlines are met, i.e. that the system survives, are based on the adaptive services of the distributed real-time operating system MELODY. Transaction criticality and sensitivity are stepwise defined starting from the corresponding measures for the tasks constituting the transaction. As the major contribution of this paper we propose adaptive techniques for distributed concurrency control under safety-critical real-time requirements such as evolving from the modification and implementation of standard concurrency control protocols. In particular, we refrain from traditional features like roll-back, or restart after preemption, because they are costly and have an unpredictable effect on meeting hard deadlines. Through extensive distributed experiments we compare the performance of a recent concurrency control algorithm (O2PL) to its adaptive version O2PL.ADT, resulting in a clear advantage of the latter one, both in terms of deadline failure rates and survivability. Since the MELODY model has been currently extended by adding reactive features (object and task similarity) we confirm our findings in reporting on experiments with the reactive protocol versions O2PL.SIM and O2PL.ADT.SIM.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1 Adaptive Protocols for Survivability of Transactions Operating on Replicated Objects

We present a novel transaction model for distributed safety-critical real-time applications in which transactions become increasingly critical under failures of subsequent incarnations. When a transaction-dependent criticality threshold has been reached the transaction is considered essentially critical or hard, i.e. the deadline has to be met lest the system is doomed to be in a disastrous sta...

متن کامل

A token-based independent update protocol for managing replicated objects

Replication is the key to providing high availability, fault tolerance, and enhanced performance in a computing system [17, 39]. Existing strategies used for managing replicated objects can be divided into two levels. At the system level, many strategies use multicast group communication systems to provide a run-time system support or toolkit for simplifying the design and implementation of rel...

متن کامل

Providing Support for Survivable CORBA Applications with the Immune System

The Immune system aims to provide survivability to CORBA applications, enabling them to continue to operate despite malicious attacks, accidents, or faults. Every object within the CORBA application is actively replicated by the Immune system, with majority voting applied on incoming invocations and responses to each replica of the object. The Secure Multicast Protocols are employed to enable t...

متن کامل

A Generic Multicast Primitive to Support Transactions on Replicated Objects in Distributed Systems

Locking and atomic commitment are two fundamental problems underlying transaction management in fault-tolerant distributed systems. In this paper we discuss these problems in the context of an asynchronous system with replicated objects. We present a generic primitive, named Dynamic-Terminating-Multicast (or DTM) of which instances enable to implement a locking protocol and an atomic commitment...

متن کامل

Group Protocol for Distributed Replicated Objects

In group protocols, larger computation and communication are consumed to causally order all messages transmitted in the network. Transactions in clients manipulate objects in servers by sending read and write requests to the servers. In this paper, we define significant messages, which are to be ordered at the application level, by using a conflicting relation among the transactions. We newly p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001