Resilient Logical Structures for Efficient Management of Replicated Data

نویسندگان

  • Divyakant Agrawal
  • Amr El Abbadi
چکیده

Replicated data management protocols have been pro posed that exploit a logically structured set of copies. These protocols have the advantage that they provide limited fault-tolerance at low communication cost. The propceed protocols can be viewed as analogues of the read-one write-all protocol in the context of logical structures. In this paper, these protocols are generalized in two ways for a grid and a tree structure. First, the quorum based approach is applied to develop protocols that use structured read and write quorums, thus attaining a high degree of data availability for both read and write operations. Next, the reconfiguration or views approach is developed for both grid and tree structures resulting in protocols that attain high degrees of availability at significantly low communication cost for read operations. In this sense, the proposed protocols have the advantages of the readone write-all protocol for low cost read operations as well as the majority quorum protocol for high data availability. *This research is supported by the NSF under grant numbers IRI-9004998 and IRI-9117904. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the VLDB copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee and/or special permission

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Inference on Generalized Fault Diagrams

The generalized fault diagram, a data structure for failure analysis based on the influence diagram, is defined. Unlike the fault tree, this structure allows for dependence among the basic events and replicated logical elements. A heuristic procedure is developed for efficient processing of these structures.

متن کامل

Exploiting Logical Structures to Reduce Quorum Sizes of Replicated Databases

Voting is a traditional mechanism used for maintaining the consistency of replicated data in distributed systems. A significant problem in protocols that use voting is the size of the quorum needed on each access to the replicated data. In this paper, we propose replica control protocols where the synchronization cost is reduced by exploiting the structural information of the underlying system....

متن کامل

Designing a logical data model of athletes' hospital information management system based on international standards

Background and purpose: Today, hospital care, relying on the health record system, has received more attention than before. Considering the diversity of data in these systems, the design of standard conceptual and logical models by service providers will play an important role in their success. Therefore, this research was conducted with the aim of designing a logical data model of the hospital...

متن کامل

Compilation and Assessment of a Model for the Correlations between Emotional Self-regulation and Social Problem-solving with Disease Perception and Resilient Mediation in Patients with Multiple Sclerosis in Tabriz, Iran

Objective: The present study aimed to assess the correlations between emotional self-regulation and problem-solving with disease perception through resilient mediation in patients with multiple sclerosis (MS) in Tabriz, Iran. Methodology: This study was carried out as structural equations on 250 MS patients in Tabriz in 2018, who completed emotional self-regulation, problem-solving, disease per...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992