Adaptive Protocols For Survivability Of Transactions Operating On Replicated Objects
نویسندگان
چکیده
We present a novel transaction model for distributed safetycritical real-time applications in which transactions become increasingly critical under failures of subsequent incarnations. When a transaction-dependent criticality threshold has been reached the transaction is considered essentially critical or hard, i.e. the deadline has to be met lest the system is doomed to be in a disastrous state. The corresponding adaptive measures (criticality, sensitivity) to provide that potentially all hard deadlines are met, i.e. that the system survives, are based on the adaptive services of the distributed real-time operating system MELODY. Transaction criticality and sensitivity are stepwise defined starting from the corresponding measures for the tasks constituting the transaction. As the major contribution of this paper we propose adaptive techniques for distributed concurrency control under safety-critical real-time requirements such as evolving from the modification and implementation of standard concurrency control protocols. In particular, we refrain from traditional features like roll-back, or restart after preemption, because they are costly and have an unpredictable effect on meeting hard deadlines. Through extensive distributed experiments we compare the performance of a recent concurrency control algorithm (O2PL) to its adaptive version O2PL.ADT, resulting in a clear advantage of the latter one, both in terms of deadline failure rates and survivability. Since the MELODY model has been currently extended by adding reactive features (object and task similarity) we confirm our findings in reporting on experiments with the reactive protocol versions O2PL.SIM and O2PL.ADT.SIM.
منابع مشابه
1 Adaptive Protocols for Survivability of Transactions Operating on Replicated Objects
We present a novel transaction model for distributed safety-critical real-time applications in which transactions become increasingly critical under failures of subsequent incarnations. When a transaction-dependent criticality threshold has been reached the transaction is considered essentially critical or hard, i.e. the deadline has to be met lest the system is doomed to be in a disastrous sta...
متن کاملA token-based independent update protocol for managing replicated objects
Replication is the key to providing high availability, fault tolerance, and enhanced performance in a computing system [17, 39]. Existing strategies used for managing replicated objects can be divided into two levels. At the system level, many strategies use multicast group communication systems to provide a run-time system support or toolkit for simplifying the design and implementation of rel...
متن کاملProviding Support for Survivable CORBA Applications with the Immune System
The Immune system aims to provide survivability to CORBA applications, enabling them to continue to operate despite malicious attacks, accidents, or faults. Every object within the CORBA application is actively replicated by the Immune system, with majority voting applied on incoming invocations and responses to each replica of the object. The Secure Multicast Protocols are employed to enable t...
متن کاملA Generic Multicast Primitive to Support Transactions on Replicated Objects in Distributed Systems
Locking and atomic commitment are two fundamental problems underlying transaction management in fault-tolerant distributed systems. In this paper we discuss these problems in the context of an asynchronous system with replicated objects. We present a generic primitive, named Dynamic-Terminating-Multicast (or DTM) of which instances enable to implement a locking protocol and an atomic commitment...
متن کاملGroup Protocol for Distributed Replicated Objects
In group protocols, larger computation and communication are consumed to causally order all messages transmitted in the network. Transactions in clients manipulate objects in servers by sending read and write requests to the servers. In this paper, we define significant messages, which are to be ordered at the application level, by using a conflicting relation among the transactions. We newly p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001