Embedding Protocols for Scalable Replication Management 1

نویسنده

  • Henning Koch
چکیده

The concept of embedding protocols is proposed as a new technique for constructing replication protocols. A number of replicas is combined to one logical building block and a replication protocol is applied to it. By allowing those building blocks to become part of another building block a hierarchy is set up. Since every building block can use a diierent replication protocol, the resulting protocol can be regarded as an embedding replication protocol. It is shown how these protocols can be constructed and analyzed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

IRL: A Three-Tier Approach to FT-CORBA Infrastructures

A replication logic is the set of protocols and mechanisms implementing a software replication technique. A three-tier approach to replication consists in separating the replication logic from both clients and servers by embedding such logic in a mid-tier. This novel approach allows (i) to design thin client (embedding the presentation code and some redirection/retransmission mechanism), (ii) t...

متن کامل

Evaluation of Database Replication Techniques for Cloud Systems

Cloud computing is becoming one of the preferred paradigms to deploy highly available and scalable systems. These systems usually demand the management of huge amounts of data, which cannot be solved with traditional database systems. Traditional replication protocols are not scalable enough for a cloud environment. This paper evolves different static replication techniques to achieve transacti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994