A synchronized protocol for distributed collaborative modeling

Slides:



Advertisements
Similar presentations
More on Processes Chapter 3. Process image _the physical representation of a process in the OS _an address space consisting of code, data and stack segments.
Advertisements

CS542 Topics in Distributed Systems Diganta Goswami.
Concurrency: Mutual Exclusion and Synchronization Chapter 5.
Interprocess Communication CH4. HW: Reading messages: User Agent (the user’s mail reading program) is either a client of the local file server or a client.
Ch. 7 Process Synchronization (1/2) I Background F Producer - Consumer process :  Compiler, Assembler, Loader, · · · · · · F Bounded buffer.
Remote Procedure Call (RPC)
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
ECEN5053 SW Eng of Dist Systems, Arch Des Part 3, Univ of Colorado, Boulder1 Architectural Design of Distributed Systems, Part 3 ECEN5053 SW.
Lecture 19 Distributed Programming (Ch. 10) Other message-passing programming models  Channels vs mailboxes  Synchronous vs asynchronous.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
The University of New Hampshire InterOperability Laboratory Serial ATA (SATA) Protocol Chapter 10 – Transport Layer.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Concurrency, Mutual Exclusion and Synchronization.
Transaction Communications Yi Sun. Outline Transaction ACID Property Distributed transaction Two phase commit protocol Nested transaction.
Copyright © Curt Hill, Client – Server Computing An important paradigm.
(Business) Process Centric Exchanges
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
Page 1 Distributed Shared Memory Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 March 20, 2008 Session 9.
Hwajung Lee.  Improves reliability  Improves availability ( What good is a reliable system if it is not available?)  Replication must be transparent.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Process Synchronization. Objectives To introduce the critical-section problem, whose solutions can be used to ensure the consistency of shared data To.
Mutual Exclusion Algorithms. Topics r Defining mutual exclusion r A centralized approach r A distributed approach r An approach assuming an organization.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 7, 2005 Session 23.
Distributed Databases – Advanced Concepts Chapter 25 in Textbook.
Coordination and Agreement
Validation of legal entities and financial capacity check
OPCATeam OPM-based Collaborative Systems Modeling
OPCAT: Object-Process CASE Tool
Chapter 2: Computer-System Structures(Hardware)
Chapter 2: Computer-System Structures
Building Distributed Educational Applications using P2P
Synchronization: Distributed Deadlock Detection
Prof. Leonardo Mostarda University of Camerino
Chapter 2: System Structures
Object-Oriented Network Communication (OOMI)
Goals of soBGP Verify the origin of advertisements
Lecture 18: Coherence and Synchronization
Ivy Eva Wu.
Flexible Synchronisation of Shared Groupware Objects
Chapter 6: Community Features.
Client-Server Interaction
U.S. EPA e-Manifest Program
Synchronization in Distributed File System
Concurrency: Mutual Exclusion and Synchronization
Commit Protocols CS60002: Distributed Systems
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
Chapter 2: Operating-System Structures
Concurrency: Mutual Exclusion and Process Synchronization
CSE 486/586 Distributed Systems Mutual Exclusion
Presented by: Francisco Martin-Recuerda
Lecture 25: Multiprocessors
Chapter 29: Program Security
KERBEROS.
Lecture 25: Multiprocessors
Lecture 24: Multiprocessors
System calls….. C-program->POSIX call
Lecture: Coherence Topics: wrap-up of snooping-based coherence,
Distributed Resource Management: Distributed Shared Memory
Chapter 2: Computer-System Structures
Chapter 2: Computer-System Structures
Lecture 19: Coherence and Synchronization
Chapter 2: Operating-System Structures
Lecture 18: Coherence and Synchronization
Distributed Optimistic Algorithm
Chapter 3: Process Management
Transactions, Properties of Transactions
Presentation transcript:

A synchronized protocol for distributed collaborative modeling Dov Dori, Dizza Beimel and Lior Galanti dori@ie dizza@tx sgalanti@t2 Technion, Israel Institute of Technology, Haifa, Israel. 5 June 2005 Lior Galanti. Technion, Israel Institute Of Technology.

Synchronous collaborative protocols: Requirements Participants should be able to continuously and asynchronously propose modifications Modifiers must be applied synchronously The document’s validity must be maintained at all times Lior Galanti. Technion, Israel Institute Of Technology.

Traditional collaboration Synchronous Restricts the participants to editing the document one at a time Uses single lock mechanisms Lior Galanti. Technion, Israel Institute Of Technology.

Single lock mechanisms Synchronous collaboration revolves around dynamically allocating access permissions, called “floors” Can be extended with moderation Floors control semantics is derived from concurrency control methodology Floor holder is granted mutually exclusive access rights Lior Galanti. Technion, Israel Institute Of Technology.

A new approach: Synchronized collaborative protocol Relaxing the floor control requirement Lior Galanti. Technion, Israel Institute Of Technology.

Requirements Participants can edit the document continuously without obtaining the floor Modifications are applied synchronously for all participants The document’s validity is maintained at all times Lior Galanti. Technion, Israel Institute Of Technology.

Assumptions about underlying transport protocol message delivery is: Reliable FIFO Persistent Lior Galanti. Technion, Israel Institute Of Technology.

Data structures Document Modifier The formal entity being shared Sufficient instructions to perform modifications to a document Transforms a document into another Lior Galanti. Technion, Israel Institute Of Technology.

Messages Register Initialize Modify Publish Reject Lior Galanti. Technion, Israel Institute Of Technology.

The Participant super role Can validate a modifier to a document Can apply a modifier to a document Step number is increased by one every time a modifier is applied Domain specific functionality Lior Galanti. Technion, Israel Institute Of Technology.

The Session Controller role Single in a session Executes methods in atomic transactions Generates the order relation for the modifiers Synchronizes the session Validates published modifiers for their corresponding published step Performs weak validation Lior Galanti. Technion, Israel Institute Of Technology.

The Editor role Editor Handles user requests Applies published modifiers from the session controller Validates user modifiers before they are sent to the session controller Tags modifiers with the step they were validated for Lior Galanti. Technion, Israel Institute Of Technology.

Editor/Session Controller interaction Lior Galanti. Technion, Israel Institute Of Technology.

Weak validation Requires O(1) operations Always rejects invalid modifiers May reject valid modifiers as well Always accepts if the document’s step is identical to the modifier’s step Lior Galanti. Technion, Israel Institute Of Technology.

Session Controller message handlers Replies to Register messages with an Initialize message containing the current known document Replies to Modify messages with a multicast Publish message if the modifier weakly validates or a Reject message if weak validation fails Lior Galanti. Technion, Israel Institute Of Technology.

Editor interaction Sends a Register message at boot and waits for the Initialize message from the session controller Applies published modifiers to the persistent document when they arrive After sending a modify message blocks until modifier status is resolved, either published or rejected Lior Galanti. Technion, Israel Institute Of Technology.

Editor interaction, continued idle wait send {Register} ready receive {Initialize} receive {publish} send {modify} [modifierId=x] blocked [modifierId!=x] receive {publish or reject} [modifierId=x] Lior Galanti. Technion, Israel Institute Of Technology.

Persistent and secondary document Published modifiers are applied to the persistent document User generates modifiers on the secondary copy May be simulated using a history stack Modifiers are validated against the persistent document before they are requested Lior Galanti. Technion, Israel Institute Of Technology.

Persistent and secondary document, continued Returning from blocked to ready due to modifier being published results in replacing the secondary copy with the persistent document Returning due to rejection allows revalidation of the rejected modifier Due to FIFO policy the step at which the modifier was rejected should be available Lior Galanti. Technion, Israel Institute Of Technology.

Weak validation in the OPM domain Weak validation is domain specific Refining permissions in conjunction with refinement/abstraction mechanisms can be used for efficient weak validation A modifier can be weakly validated if it does not concern zones changed by modifiers it was not aware of Lior Galanti. Technion, Israel Institute Of Technology.

Special thanks To Prof. Dov Dori and Ms. Dizza Beimel for their insightful comments and ongoing support. To Ms. Hamutal Shamash and my brother, Mr. Gil Galanti, for so many proof readings and for being there. Lior Galanti. Technion, Israel Institute Of Technology.