An Adaptive Protocol for Implementing Causally Consistent Distributed Services

نویسندگان

  • Mustaque Ahamad
  • Michel Raynal
  • Gérard Thia-Kime
چکیده

Distributed services that are accessed by widely distributed clients are becoming common place (e.g., especially services targeted to the home). Such services cannot be provided at the needed level of performance and availability(1) without replicating the service at multiple nodes, and (2) without allowing a \relatively" weak level of consistency among replicated copies of the state of a service. The latter is especially important in large scale systems where communication latencies can be high and communication may not be possible between service instances at all times. In this paper we explore causally consistent distributed services when multiple related services are replicated to meet performance and availability requirements. This consistency criterion is particularly well suited for some distributed services (e.g., cooperative document sharing), and it is attractive because of the eecient implementations that are allowed by it. We develop a new protocol for implementing causally consistent services that has several novel features. First, service instances can be created and deleted dynamically according to service access patterns in the distributed system. Also, when diierent services are related and consistency is needed across replicated copies of such services, our protocol handles the case where diierent but related services are replicated independently. Another novel aspect of our protocol lies in its ability to use both push and pull mechanisms for disseminating updates to objects that encapsulate service state.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An adaptive architecture for causally consistent distributed services

This paper explores causally consistent distributed services when multiple related services are replicated to meet performance and availability requirements. This consistency criterion is particularly well suited for distributed services such as cooperative document sharing, and it is attractive because of the efficient implementations that are allowed by it. A new protocol for implementing cau...

متن کامل

A Causally Consistent Protocol for Distributed Shared Memory

Distributed shared memory provides a virtual address space that is shared among processors in a distributed system. It allows application programmers to elude message passing and use the familiar shared-memory paradigm. To increase eeciency, DSM implementations replicate memory pages, introducing the problem of consistency. As fewer restrictions are imposed to the replicas, more eecient impleme...

متن کامل

An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach

Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...

متن کامل

Implementing Causal Logging Using OrbixWeb Interception

Some form of replicated data management is a basic service of nearly all distributed systems. Replicated data management maintains the consistency of replicated data. In wide-area distributed systems, causal consistency is often used, because it is strong enough to allow one to easily solve many problems while still keeping the cost low even with the large variance in latency that one nds in a ...

متن کامل

Towards an Adaptive Distributed Shared Memory 1 ( Preliminary

The focus of this report is on software implementations of Distributed Shared Memory (DSM). In the recent years, many protocols for implementing DSM have been proposed. The protocols can be broadly divided into two classes: invalidation-based schemes and update-based schemes. Performance of these protocols depends on the memory access behavior of the applications. Some researchers have proposed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998