Architecture and Operation Invocation in the Clouds Kernel
نویسنده
چکیده
Many distributed opcraLing systems have been developed in recent years based on the acLion/object paradigm. The Clouds mullicamputee system provides a faull-tolemnt distributed compuling environment buill from passive data objccts,fault-aromic lransactions, processes, and a global kemel inlerface implemented on LOp of unreliable hardware. Key to the successful functioning of Clouds is its simple architecture consisling of passive, abslI'act data objccts and me uniform operation invocation m~hanism. This architecture allows plain processes or nested lransactions La access user and SYSLeffi data in a lransparem, uniform manner, whether those objects are local to the eurrent machine or on some remoLe processor. The same basic interface used to make opcl'lluon invocation requests on objects can be used to spawn processes and actions, and LO gain access to resLriCLed kernel services. This paper presents an abbreviated description of the Clouds architecture and its relation to the operation of the invocation mechanism, including remote invocation, perobjcct access control, and location independent invocation. Some conclusions derived from the first prototype arc also presented.
منابع مشابه
Kernel-Kernel Communication in a Shared-Memory Multiprocessor t
In the standard kernel organization on a shared-memory multiprocessor all processors share the code and data of the operating system; explicit synchronization is used to control access to kernel data structures. Distributed-memory multicomputers use an alternative approach, in which each instance of the kernel performs local operations directly and uses remote invocation to perform remote opera...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملArchitectural Plan for Constructing Fault Tolerable Workflow Engines Based on Grid Service
In this paper the design and implementation of fault tolerable architecture for scientific workflow engines is presented. The engines are assumed to be implemented as composite web services. Current architectures for workflow engines do not make any considerations for substituting faulty web services with correct ones at run time. The difficulty is to rollback the execution state of the workflo...
متن کاملDetection of some Tree Species from Terrestrial Laser Scanner Point Cloud Data Using Support-vector Machine and Nearest Neighborhood Algorithms
acquisition field reference data using conventional methods due to limited and time-consuming data from a single tree in recent years, to generate reference data for forest studies using terrestrial laser scanner data, aerial laser scanner data, radar and Optics has become commonplace, and complete, accurate 3D data from a single tree or reference trees can be recorded. The detection and identi...
متن کاملA nested invocation suppression mechanism for active replication fault-tolerant CORBA
Active replication is a common approach to building highly available and reliable distributed software applications. The redundant nested invocation (RNI) problem arises when servers in a replicated group issues nested invocations to other server groups in response to a client invocation. Automatic suppression of RNI is always a desirable solution, yet it is usually a difficult design issue. If...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013