Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing1 Eager Replication and mobile nodes Read on disconnected clients may give stale data Eager replication prohibits.

Slides:



Advertisements
Similar presentations
Replication. Topics r Why Replication? r System Model r Consistency Models r One approach to consistency management and dealing with failures.
Advertisements

Replication and Consistency (2). Reference r Replication in the Harp File System, Barbara Liskov, Sanjay Ghemawat, Robert Gruber, Paul Johnson, Liuba.
Distributed Databases John Ortiz. Lecture 24Distributed Databases2  Distributed Database (DDB) is a collection of interrelated databases interconnected.
Recovery CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison Wesley 2002)
Definition of a Distributed System (1) A distributed system is: A collection of independent computers that appears to its users as a single coherent system.
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Business Continuity and DR, A Practical Implementation Mich Talebzadeh, Consultant, Deutsche Bank
Database Replication techniques: a Three Parameter Classification Authors : Database Replication techniques: a Three Parameter Classification Authors :
Distributed Systems 2006 Styles of Client/Server Computing.
Computer Science Lecture 16, page 1 CS677: Distributed OS Last Class: Web Caching Use web caching as an illustrative example Distribution protocols –Invalidate.
Sinfonia: A New Paradigm for Building Scalable Distributed Systems Marcos K. Aguilera, Arif Merchant, Mehul Shah, Alistair Veitch, Christonos Karamanolis.
Transaction Processing IS698 Min Song. 2 What is a Transaction?  When an event in the real world changes the state of the enterprise, a transaction is.
Computer Science 162 Section 1 CS162 Teaching Staff.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
G Robert Grimm New York University Bayou: A Weakly Connected Replicated Storage System.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
University of Pennsylvania 11/21/00CSE 3801 Distributed File Systems CSE 380 Lecture Note 14 Insup Lee.
Distributed Databases
REPLICATION IN THE HARP FILE SYSTEM B. Liskov, S. Ghemawat, R. Gruber, P. Johnson, L. Shrira, M. Williams MIT.
6.4 Data and File Replication Gang Shen. Why replicate  Performance  Reliability  Resource sharing  Network resource saving.
Highly Available ACID Memory Vijayshankar Raman. Introduction §Why ACID memory? l non-database apps: want updates to critical data to be atomic and persistent.
Database Replication. Replication Replication is the process of sharing information so as to ensure consistency between redundant resources, such as software.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
Practical Replication. Purposes of Replication Improve Availability Replicated databases can be accessed even if several replicas are unavailable Improve.
Feb 7, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Consistency and Replication CSCI 4780/6780. Chapter Outline Why replication? –Relations to reliability and scalability How to maintain consistency of.
Feb 7, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Tomorrow’s class is officially cancelled. If you need someone to go over the reference implementation.
Jan 31, 2001CSCI {4,6}900: Ubiquitous Computing1 Recap. Ubiquitous Computing Vision –The Computer for the Twenty-First Century, Mark Weiser –The Coming.
Replication and Consistency. Reference The Dangers of Replication and a Solution, Jim Gray, Pat Helland, Patrick O'Neil, and Dennis Shasha. In Proceedings.
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui SWEN 432 Advanced Database Design and Implementation Trade-offs in Cloud.
Replication March 16, Replication What is Replication?  A technique for increasing availability, fault tolerance and sometimes, performance 
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
G063 - Distributed Databases. Learning Objectives: By the end of this topic you should be able to: explain how databases may be stored in more than one.
Distributed Computing Systems CSCI 4780/6780. Distributed System A distributed system is: A collection of independent computers that appears to its users.
Concurrency Control. Objectives Management of Databases Concurrency Control Database Recovery Database Security Database Administration.
Darkstar. Darkstar is a Sun research project on massively parallel online games The objective (not yet demonstrated!) is to supply a framework for massively.
Databases Illuminated
Robustness in the Salus scalable block store Yang Wang, Manos Kapritsos, Zuocheng Ren, Prince Mahajan, Jeevitha Kirubanandam, Lorenzo Alvisi, and Mike.
Service Primitives for Internet Scale Applications Amr Awadallah, Armando Fox, Ben Ling Computer Systems Lab Stanford University.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
1 Multiversion Reconciliation for Mobile Databases Shirish Hemanath Phatak & B.R.Badrinath Presented By Presented By Md. Abdur Rahman Md. Abdur Rahman.
Caching Consistency and Concurrency Control Contact: Dingshan He
Definition of a Distributed System (1) A distributed system is: A collection of independent computers that appears to its users as a single coherent system.
Chapter 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University Building Dependable Distributed Systems.
3/6/99 1 Replication CSE Transaction Processing Philip A. Bernstein.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
EEC 688/788 Secure and Dependable Computing Lecture 9 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE 486/586 CSE 486/586 Distributed Systems Consistency Steve Ko Computer Sciences and Engineering University at Buffalo.
Highly Available Services and Transactions with Replicated Data Jason Lenthe.
Mobility Victoria Krafft CS /25/05. General Idea People and their machines move around Machines want to share data Networks and machines fail Network.
Storage Systems CSE 598d, Spring 2007 Lecture 13: File Systems March 8, 2007.
Remote Backup Systems.
6.4 Data and File Replication
Introduction to NewSQL
EECS 498 Introduction to Distributed Systems Fall 2017
Outline Announcements Fault Tolerance.
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
Consistency and Replication
Distributed File Systems
EEC 688/788 Secure and Dependable Computing
Distributed File Systems
EEC 688/788 Secure and Dependable Computing
Distributed File Systems
Outline The Case for Non-transparent Replication: Examples from Bayou Douglas B. Terry, Karin Petersen, Mike J. Spreitzer, and Marvin M. Theimer. IEEE.
Last Class: Web Caching
EEC 688/788 Secure and Dependable Computing
Remote Backup Systems.
Concurrency Control.
Presentation transcript:

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing1 Eager Replication and mobile nodes Read on disconnected clients may give stale data Eager replication prohibits updates if any node is disconnected R R R RR R time

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing2 Lazy replication and mobile nodes With Lazy group replication, we have to wait for all nodes to come online to commit Lazy master replication cannot work for mobile nodes and network connection is needed for transaction to complete

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing3 Example replication scenario: #1 Replicated DNS servers –One primary DNS server –Multiple replicas DNS1.UGA.EDU DNS2.UGA.EDU DNS3.UGA.EDU –Replicas use zone transfers to get an uptodate database from the the primary server –Transfers database every so often –Inconsistent state between transfers Lazy, master replication

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing4 Example replication #2 Palm Pilot Synchronization Database (your address book) is in PIM (Outlook say), Palm Desktop, your Palm device. Updates are allowed anywhere. You could authorize your secretary to add items to your Outlook Lazy group update

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing5 Example replication #3 Gnutella – when you add a new song into your computer, when do the other nodes see it? Eventually Lazy group update

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing6 Example replication #4 Newsgroups Everyone can post to newsgroup. You post in comp.risks from UGA, and your friend also posts at the same time from GATECH. My friend at Duke will see it in some order (UGA first and then GATECH or the other way around) Lazy group replication

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing7 Example replication #5 Distributed databases with ACID syntax Eager group or master HARP Eager master

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing8 Convergence property If no new transactions arrive, if all the nodes are connected together, they will all converge to the same replicated state after exchanging replica updates Updates may be lost because of newer updates Commutative updates – incremental transformations that can be applied in any order

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing9 Two-tier replication Mobile nodes –Disconnected most of the time. –Mobile nodes store Master version and Tentative version Master version on disconnected or lazy replica maybe outdated Most recent value due to local updates is maintained as a tentative value Base Nodes –Always connected. Store a replica of the database. Items are mastered in base nodes

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing10 Two-tier transaction Base transaction –Work only on master data –Produce new master data Tentative transaction –Work on local tentative data –Produce new tentative versions –Also produce base transaction to be run at a later time on the base nodes Acceptance criteria for each transaction update

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing11 Key properties of two-tier replication schemes Mobile nodes may make tentative database updates Base transactions execute with single-copy serializability so the master base system state is the result of a serializable execution A transaction becomes durable when the base transaction completes Replicas at all connected nodes converge to the base system state If all transactions commute, there are no reconciliations

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing12 Discussion

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing13 Course project Project goal: –Solve a real world problem using technologies that we discuss in class. Think of a problem that you face in your life. Try to solve it for the course project E.g. I am developing a “study search” system. I want the students to access it, not only from their desktops, but from their PalmPilots Since time is limited, however, I will reward those that aim high even if they do not completely succeed. The key to a successful class project is ensuring that some aspects of your work are completely done; it is hard to grade a project where nothing quite works. The projects will be graded as follows -- by what you discover in doing the project, how coherently you present your results, and how well you put your work in perspective with other research

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing14 Course project Keys to a successful project: –What are you trying to achieve? (e.g. I am developing a global peer-to-peer file system) –List the specific project goal (e.g. I am looking at the scalable communication protocol for this file system) –How do you measure success? (e.g. I will be successful if I can scale better than n 2 [n is number of nodes]) –Expected obstacles (e.g. I need to run experiments on n hosts, where n is as large as possible. I need to install…) –Methods and tools that may be used for the implementation (e.g. I need a palm pilot and DEV kit) –Deliverables –Considerations (e.g. scalability, robustness, security)

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing15 Course project Outline Proposals should include: –a description of your topic, –a crisp statement of the hypothesis that you will test, –a statement of why you think the topic is important, –a description of the methods you will use to evaluate your ideas, and –references to at least three papers you have obtained with a summary of how they relate to your work. Proposals should not exceed 2 pages in length.

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing16 Outline Replication in the Harp File System, Barbara Liskov, Sanjay Ghemawat, Robert Gruber, Paul Johnson, Liuba Shrira, Michael Williams, MIT

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing17 Highly Available, Reliable, Persistent (HARP) fs Replicated Unix file system accessible via the Virtual File System (VFS) interface VFS is a software abstraction in UNIX like OS. It provides a unified approach a number of different file systems VFS NTFSUFSEXT2FSHARP Low level file system

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing18 HARP Provides highly available, reliable storage for files Guarantees atomic file operations in spite of concurrency and failure Primary copy replication –Master server authoritative –Replicas – backup servers –Updates are sent to “enough” replicas to guarantee fail- safe behavior Log structured updates

Feb 1, 2001CSCI {4,6}900: Ubiquitous Computing19 Using logs for throughput Disks are partitioned into tracks, sectors and cylinders Writing a file might involve writing blocks in different tracks (slow because of seeks) Log structure file systems allow user to write sequentially onto disk. Logs contain the transformations. Lazy update.