Analysis of Replication Control Protocols
نویسنده
چکیده
In recent years many replication control protocols have been proposed, but too often these protocols are presented with insufficient evidence to demonstrate superiority over existing protocols. In this article, some simple analytical tools are presented that allow replication control protocols to be compared. A dynamic voting protocol is used as an example.
منابع مشابه
A Practical Approach to Replication of Abstract Data Objects
There is a great need for computer systems that remain available with high probability at all times. Highly available systems can be implemented on networks of general purpose computers by replicating data: storing the data redundantly at two or more of the nodes comprising the system. Some replication protocol is necessary to control access to the replicas. In essence, the replication protocol...
متن کاملWhen Is Operation Ordering Required in Replicated Transactional Storage?
Today’s replicated transactional storage systems typically have a layered architecture, combining protocols for transaction coordination, consistent replication, and concurrency control. These systems generally require costly strongly-consistent replication protocols like Paxos, which assign a total order to all operations. To avoid this cost, we ask whether all replicated operations in these s...
متن کاملA formal characterization of SI-based ROWA replication protocols
Snapshot Isolation (SI) is commonly used in some commercial DBMSs with a multiversion concurrency control mechanism since it never blocks read-only transactions. Recent database replication protocols have been designed using SI replicas where transactions are firstly executed in a delegate replica and their updates (if any) are propagated to the rest of replicas at commit time; i.e. they follow...
متن کاملPomegranate peel extract inhibits internalization and replication of the influenza virus: An in vitro study
Objective: Influenza virus, which is associated with high level of morbidity and mortality, has been recently considered a public health concern; however, the methods of choice to control and treat it are limited. Our previous study showed anti-influenza virus activity of pomegranate peel extract (PPE). In this study, the mechanism through which PPE acts against influenza virus...
متن کاملDon't Trust Your Roommate, or, Access Control and Replication Protocols in "Home" Environments
A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1990