5 research outputs found

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks

    Get PDF
    This study focuses on resolving the problem of mutual exclusion in mobile ad hoc networks. A Mobile Ad Hoc Network (MANET) is a wireless network without fixed infrastructure. Nodes are mobile and topology of MANET changes very frequently and unpredictably. Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. Token-based algorithms depend on circulation of a specific message known as token. The owner of the token has priority for entering the critical section. Token may lose during communications, because of link failure or failure of token host. However, the processes for token-loss detection and token regeneration are very complicated and time-consuming. Token-based algorithms are generally non-fault-tolerant (although some mechanisms are utilized to increase their level of fault-tolerance) because of common problem of single token as a single point of failure. On the contrary, permission-based algorithms utilize the permission of multiple nodes to guarantee mutual exclusion. It yields to high traffic when number of nodes is high. Moreover, the number of message transmissions and energy consumption increase in MANET by increasing the number of mobile nodes accompanied in every decision making cycle. The purpose of this study is to introduce a method of managing the critical section,named as Ancestral, having higher fault-tolerance than token-based and fewer message transmissions and traffic rather that permission-based algorithms. This method makes a tradeoff between token-based and permission-based. It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. The algorithm based on ancestral is named as DAD algorithms and increases the availability of fully connected network between 2.86 to 59.83% and decreases the number of message transmissions from 4j-2 to 3j messages (j as number of nodes in partition). This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. The results of study show that MDA algorithm guarantees mutual exclusion,dead lock freedom and starvation freedom. It improves the availability of CS to minimum 154.94% and 113.36% for low load and high load of CS requests respectively compared to other permission-based lgorithm.Furthermore, it improves response time up to 90.69% for high load and 75.21% for low load of CS requests. It degrades the number of messages from n to 2 messages in the best case and from 3n/2 to n in the worst case. MDA algorithm is resilient to transient partitioning of network that is normally occurs due to failure of nodes or links

    Rule based replication strategy for heterogeneous, autonomous information systems

    Get PDF
    Bei der regelbasierten Replikationsstrategie RegRess erfolgt die Koordination der Schreib- und Lesezugriffe auf die Replikate mittels Replikationsregeln. Diese Regeln werden in der eigens entwickelten Regelsprache RRML formuliert, wobei fachliche und technische Anforderungen berücksichtigt werden können. Vor jedem Zugriff auf die Replikate wird eine Inferenz dieser Regeln durchgeführt, um die betroffenen Replikate zu bestimmen. Dadurch wird unterschiedlichstes Konsistenzverhalten von RegRess realisiert, insbesondere werden temporäre Inkonsistenzen toleriert. Eine Regelmenge mit für einen Anwendungsfall spezifizierten Regeln bildet die Konfiguration von RegRess. Weil in den Regeln Systemzustände berücksichtigt werden können, kann zur Laufzeit das Verhalten angepasst werden. Somit handelt es sich bei RegRess um eine konfigurierbare, adaptive Replikationsstrategie. Zur Realisierung von RegRess dient der Replikationsmanager KARMA, der einen Regelinterpreter für die RRML beinhaltet.At the rule based replication strategy RegRess the coordination of the write and read accesses is carried out on the replicas by means of replication rules. These rules are formulated in the specifically developed rule language RRML, in which functional and technical requirements can be taken into account. An inference of these rules is carried out in front of every access to the replicas to determine the replicas concerned. The most different consistency behaviour is realized by recourse through this, temporary inconsistencies particularly are tolerated. An amount of rule with rules specified for an application case forms the configuration of RegRess. Because in the rules system states can be taken into account, the behaviour can be adapted to the running time. Therefore RegRess is a configurable, adaptive replication strategy. The replication manager KARMA who contains a rule interpreter for the RRML serves for the realization of RegRess

    Replication techniques for balancing data integrity with availability

    No full text
    Zsfassung in dt. SpracheReplikation wird in verteilten Systemen zur Verbesserung der Verfügbarkeit und Performanz verwendet. Die Konsistenz der Replikate und die Einhaltung der Datenintegrität (Konsistenz bezüglich von Integritätsbedingungen) sind Korrektheitskriterien in datenzentrierten verteilten Systemen. Falls Konsistenz immer eingehalten werden muss, verschlechtert sich die Verfügbarkeit des Systems in Fehlersituationen (Verbindungsfehler, Rechnerausfälle).Es gibt jedoch Systeme (z.B. in der Flugsicherung) in denen die Konsistenz temporär in Fehlersitutationen abgeschwächt werden kann, um die Verfügbarkeit zu erhöhen. Das heißt, Verfügbarkeit und Konsistenz können gegeneinander balanciert werden. Dies erfordert jedoch Reparaturmaßnahmen, wenn Netzwerkpartitionen wieder zusammengefügt werden. D.h., mit Hilfe von Reconciliation-Protokollen muss sowohl die Konsistenz der Replikate als auch die Datenintegrität wiederhergestellt werden.Der Hauptfokus dieser Dissertation liegt auf Replikationstechniken, welche die Steuerung des Zusammenspiels zwischen Verfügbarkeit und Konsistenz ermöglichen. Ein zweiter Fokus liegt auf Replikationstechniken für datenzentrierte service-orientierte Systeme. Die Dissertation besteht daher aus drei Hauptteilen:Erstens wird ein Replikationsmodell für die Balancierung von Verfügbarkeit und Konsistenz vorgestellt, das sogenannte Availability/Consistency Balancing Replication Model (ACBRM).Zweitens wird Adaptive Voting präsentiert, ein konkretes Replikationsprotokoll, welches dem abstrakten Replikationsmodell folgt. Sowohl eine Analyse der Verfügbarkeit als auch eine Prototyp-Implementierung zeigen die Sinnhaftigkeit des Ansatzes, inbesonders wenn (i) eine signifikante Anzahl an Integritätsbedingungen aufweichbar ist und (ii) die Zeit zur Wiederherstellung der Konsistenz kürzer ist als die Zeit, in der Fehler auftraten.Drittens werden Replikationsmiddleware für verteilte Objektsysteme (z.B. die auf das ACBRM zugeschnittene DeDiSys Middleware) und Replikations-middleware für service-orientierte Systeme auf Architekturebene verglichen. Basierend auf dieser Analyse und Erfahrungen mit unseren Prototypen stammt die Schlussfolgerung, dass viele etablierte Middleware-Architekturen in service-orientierten Systemen wiederverwendet werden können.Zukünftige Arbeiten sollten sich auf Techniken zur Erreichung von Sicherheit und Zuverlässigkeit in service-orientierten Systemen fixieren, die durch Heterogenität, hohe Skalierbarkeitsanforderungen, und Dynamik charakterisiert sind.Replication is used in distributed systems to achieve higher availability and/or performance. Correctness criteria for data-centric distributed systems are replica consistency and data integrity (also called constraint consistency). If consistency needs to be ensured all times, such systems soon become (partially) unavailable if node and link failures occur. However, there exist applications (e.g., in air traffic control) in which consistency can be temporarily relaxed during degraded situations in order to achieve higher availability. Thus, consistency can be balanced against availability. This in turn requires repair actions after reunification of network partitions. That is, reconciliation is necessary to re-establish replica consistency and data integrity when the system becomes healthy again.The main focus of this thesis is on replication techniques for controlling this trade-off in distributed object systems; a secondary focus is on replication techniques for data-centric service oriented systems. Thus, the contribution of this thesis is three-fold:First, we introduce an enhanced replication model for trading data integrity against availability - the Availability/Consistency Balancing Replication Model (ACBRM).Second, we present Adaptive Voting - a concrete protocol that realizes the abstract model. Both an analytical availability analysis and a prototype implementation show the feasibility of the approach, especially if (i) a significant portion of data integrity constraints of the system is relaxable and (ii) reconciliation time is shorter than degradation time.Third, distributed object replication middleware systems (e.g., the DeDiSys middleware which is targeted to the ACBRM) and service replication middleware systems are compared on an architectural level. From this analysis and experiences with our middleware prototypes we conclude that many well-established replication middleware architectures can be reapplied in service oriented systems.Future work needs to focus on dependability and security techniques for service oriented systems of the future characterized by cross-organizational heterogeneity, massive scale, and dynamicity.9
    corecore