190 research outputs found

    CAP Theorem: Revision of its related consistency models

    Get PDF
    [EN] The CAP theorem states that only two of these properties can be simultaneously guaranteed in a distributed service: (i) consistency, (ii) availability, and (iii) network partition tolerance. This theorem was stated and proved assuming that "consistency" refers to atomic consistency. However, multiple consistency models exist and atomic consistency is located at the strongest edge of that spectrum. Many distributed services deployed in cloud platforms should be highly available and scalable. Network partitions may arise in those deployments and should be tolerated. One way of dealing with CAP constraints consists in relaxing consistency. Therefore, it is interesting to explore the set of consistency models not supported in an available and partition-tolerant service (CAP-constrained models). Other weaker consistency models could be maintained when scalable services are deployed in partitionable systems (CAP-free models). Three contributions arise: (1) multiple other CAP-constrained models are identified, (2) a borderline between CAP-constrained and CAP-free models is set, and (3) a hierarchy of consistency models depending on their strength and convergence is built.Muñoz-EscoĂ­, FD.; Juan MarĂ­n, RD.; GarcĂ­a Escriva, JR.; GonzĂĄlez De MendĂ­vil Moreno, JR.; Bernabeu AubĂĄn, JM. (2019). CAP Theorem: Revision of its related consistency models. The Computer Journal. 62(6):943-960. https://doi.org/10.1093/comjnl/bxy142S943960626Davidson, S. B., Garcia-Molina, H., & Skeen, D. (1985). Consistency in a partitioned network: a survey. ACM Computing Surveys, 17(3), 341-370. doi:10.1145/5505.5508Gilbert, S., & Lynch, N. (2002). Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, 33(2), 51-59. doi:10.1145/564585.564601Muñoz-EscoĂ­, F. D., & BernabĂ©u-AubĂĄn, J. M. (2016). A survey on elasticity management in PaaS systems. Computing, 99(7), 617-656. doi:10.1007/s00607-016-0507-8Brewer, E. (2012). CAP twelve years later: How the «rules» have changed. Computer, 45(2), 23-29. doi:10.1109/mc.2012.37Attiya, H., Ellen, F., & Morrison, A. (2017). Limitations of Highly-Available Eventually-Consistent Data Stores. IEEE Transactions on Parallel and Distributed Systems, 28(1), 141-155. doi:10.1109/tpds.2016.2556669Viotti, P., & Vukolić, M. (2016). Consistency in Non-Transactional Distributed Storage Systems. ACM Computing Surveys, 49(1), 1-34. doi:10.1145/2926965Burckhardt, S. (2014). Principles of Eventual Consistency. Foundations and TrendsÂź in Programming Languages, 1(1-2), 1-150. doi:10.1561/2500000011Herlihy, M. P., & Wing, J. M. (1990). Linearizability: a correctness condition for concurrent objects. ACM Transactions on Programming Languages and Systems, 12(3), 463-492. doi:10.1145/78969.78972Lamport. (1979). How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs. IEEE Transactions on Computers, C-28(9), 690-691. doi:10.1109/tc.1979.1675439Ladin, R., Liskov, B., Shrira, L., & Ghemawat, S. (1992). Providing high availability using lazy replication. ACM Transactions on Computer Systems, 10(4), 360-391. doi:10.1145/138873.138877Yu, H., & Vahdat, A. (2002). Design and evaluation of a conit-based continuous consistency model for replicated services. ACM Transactions on Computer Systems, 20(3), 239-282. doi:10.1145/566340.566342Curino, C., Jones, E., Zhang, Y., & Madden, S. (2010). Schism. Proceedings of the VLDB Endowment, 3(1-2), 48-57. doi:10.14778/1920841.1920853Das, S., Agrawal, D., & El Abbadi, A. (2013). ElasTraS. ACM Transactions on Database Systems, 38(1), 1-45. doi:10.1145/2445583.2445588Chen, Z., Yang, S., Tan, S., He, L., Yin, H., & Zhang, G. (2014). A new fragment re-allocation strategy for NoSQL database systems. Frontiers of Computer Science, 9(1), 111-127. doi:10.1007/s11704-014-3480-4Kamal, J., Murshed, M., & Buyya, R. (2016). Workload-aware incremental repartitioning of shared-nothing distributed databases for scalable OLTP applications. Future Generation Computer Systems, 56, 421-435. doi:10.1016/j.future.2015.09.024Elghamrawy, S. M., & Hassanien, A. E. (2017). A partitioning framework for Cassandra NoSQL database using Rendezvous hashing. The Journal of Supercomputing, 73(10), 4444-4465. doi:10.1007/s11227-017-2027-5Muñoz-EscoĂ­, F. D., GarcĂ­a-EscrivĂĄ, J.-R., Sendra-Roig, J. S., BernabĂ©u-AubĂĄn, J. M., & GonzĂĄlez de MendĂ­vil, J. R. (2018). Eventual Consistency: Origin and Support. Computing and Informatics, 37(5), 1037-1072. doi:10.4149/cai_2018_5_1037Fischer, M. J., Lynch, N. A., & Paterson, M. S. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32(2), 374-382. doi:10.1145/3149.21412

    Merging Queries in OLTP Workloads

    Get PDF
    OLTP applications are usually executed by a high number of clients in parallel and are typically faced with high throughput demand as well as a constraint latency requirement for individual statements. In enterprise scenarios, they often face the challenge to deal with overload spikes resulting from events such as Cyber Monday or Black Friday. The traditional solution to prevent running out of resources and thus coping with such spikes is to use a significant over-provisioning of the underlying infrastructure. In this thesis, we analyze real enterprise OLTP workloads with respect to statement types, complexity, and hot-spot statements. Interestingly, our findings reveal that workloads are often read-heavy and comprise similar query patterns, which provides a potential to share work of statements belonging to different transactions. In the past, resource sharing has been extensively studied for OLAP workloads. Naturally, the question arises, why studies mainly focus on OLAP and not on OLTP workloads? At first sight, OLTP queries often consist of simple calculations, such as index look-ups with little sharing potential. In consequence, such queries – due to their short execution time – may not have enough potential for the additional overhead. In addition, OLTP workloads do not only execute read operations but also updates. Therefore, sharing work needs to obey transactional semantics, such as the given isolation level and read-your-own-writes. This thesis presents THE LEVIATHAN, a novel batching scheme for OLTP workloads, an approach for merging read statements within interactively submitted multi-statement transactions consisting of reads and updates. Our main idea is to merge the execution of statements by merging their plans, thus being able to merge the execution of not only complex, but also simple calculations, such as the aforementioned index look-up. We identify mergeable statements by pattern matching of prepared statement plans, which comes with low overhead. For obeying the isolation level properties and providing read-your-own-writes, we first define a formal framework for merging transactions running under a given isolation level and provide insights into a prototypical implementation of merging within a commercial database system. Our experimental evaluation shows that, depending on the isolation level, the load in the system, and the read-share of the workload, an improvement of the transaction throughput by up to a factor of 2.5x is possible without compromising the transactional semantics. Another interesting effect we show is that with our strategy, we can increase the throughput of a real enterprise workload by 20%.:1 INTRODUCTION 1.1 Summary of Contributions 1.2 Outline 2 WORKLOAD ANALYSIS 2.1 Analyzing OLTP Benchmarks 2.1.1 YCSB 2.1.2 TATP 2.1.3 TPC Benchmark Scenarios 2.1.4 Summary 2.2 Analyzing OLTP Workloads from Open Source Projects 2.2.1 Characteristics of Workloads 2.2.2 Summary 2.3 Analyzing Enterprise OLTP Workloads 2.3.1 Overview of Reports about OLTP Workload Characteristics 2.3.2 Analysis of SAP Hybris Workload 2.3.3 Summary 2.4 Conclusion 3 RELATED WORK ON QUERY MERGING 3.1 Merging the Execution of Operators 3.2 Merging the Execution of Subplans 3.3 Merging the Results of Subplans 3.4 Merging the Execution of Full Plans 3.5 Miscellaneous Works on Merging 3.6 Discussion 4 MERGING STATEMENTS IN MULTI STATEMENT TRANSACTIONS 4.1 Overview of Our Approach 4.1.1 Examples 4.1.2 Why Naïve Merging Fails 4.2 THE LEVIATHAN Approach 4.3 Formalizing THE LEVIATHAN Approach 4.3.1 Transaction Theory 4.3.2 Merging Under MVCC 4.4 Merging Reads Under Different Isolation Levels 4.4.1 Read Uncommitted 4.4.2 Read Committed 4.4.3 Repeatable Read 4.4.4 Snapshot Isolation 4.4.5 Serializable 4.4.6 Discussion 4.5 Merging Writes Under Different Isolation Levels 4.5.1 Read Uncommitted 4.5.2 Read Committed 4.5.3 Snapshot Isolation 4.5.4 Serializable 4.5.5 Handling Dependencies 4.5.6 Discussion 5 SYSTEM MODEL 5.1 Definition of the Term “Overload” 5.2 Basic Queuing Model 5.2.1 Option (1): Replacement with a Merger Thread 5.2.2 Option (2): Adding Merger Thread 5.2.3 Using Multiple Merger Threads 5.2.4 Evaluation 5.3 Extended Queue Model 5.3.1 Option (1): Replacement with a Merger Thread 5.3.2 Option (2): Adding Merger Thread 5.3.3 Evaluation 6 IMPLEMENTATION 6.1 Background: SAP HANA 6.2 System Design 6.2.1 Read Committed 6.2.2 Snapshot Isolation 6.3 Merger Component 6.3.1 Overview 6.3.2 Dequeuing 6.3.3 Merging 6.3.4 Sending 6.3.5 Updating MTx State 6.4 Challenges in the Implementation of Merging Writes 6.4.1 SQL String Implementation 6.4.2 Update Count 6.4.3 Error Propagation 6.4.4 Abort and Rollback 7 EVALUATION 7.1 Benchmark Settings 7.2 System Settings 7.2.1 Experiment I: End-to-end Response Time Within a SAP Hybris System 7.2.2 Experiment II: Dequeuing Strategy 7.2.3 Experiment III: Merging Improvement on Different Statement, Transaction and Workload Types 7.2.4 Experiment IV: End-to-End Latency in YCSB 7.2.5 Experiment V: Breakdown of Execution in YCSB 7.2.6 Discussion of System Settings 7.3 Merging in Interactive Transactions 7.3.1 Experiment VI: Merging TATP in Read Uncommitted 7.3.2 Experiment VII: Merging TATP in Read Committed 7.3.3 Experiment VIII: Merging TATP in Snapshot Isolation 7.4 Merging Queries in Stored Procedures Experiment IX: Merging TATP Stored Procedures in Read Committed 7.5 Merging SAP Hybris 7.5.1 Experiment X: CPU-time Breakdown on HANA Components 7.5.2 Experiment XI: Merging Media Query in SAP Hybris 7.5.3 Discussion of our Results in Comparison with Related Work 8 CONCLUSION 8.1 Summary 8.2 Future Research Directions REFERENCES A UML CLASS DIAGRAM

    Omnichannel management capabilities in international marketing: the effects of word of mouth on customer engagement and customer equity

    Get PDF
    Purpose The main purpose of this study is to fill the research gap on how B2B global service firms integrate dynamic capabilities within their omnichannel management to influence positive word of mouth (WOM), customer engagement (CE) and customer equity. Design/methodology/approach Drawing on the dynamic capability and WOM theories, a model has been developed that defines the subjects of the empirical test. The paper reports on data collected from 312 service-oriented global firms in Australia, through a cross-sectional survey. Data were analyzed using structural equation modeling. Findings The findings suggest that content management (i.e. information consistency, source trustworthiness and endorsement) and concerns management (i.e. privacy, security and recovery) capabilities are the two significant antecedents of positive WOM within a B2B omnichannel setting in international marketing. The findings also confirm the key mediating role of CE between positive WOM and customer equity. Originality/value The findings extend dynamic capability theory in the context of international marketing by linking WOM, CE and customer equity. The findings add further theoretical rigor by establishing the nomological chain between positive WOM and customer equity, in which CE plays a key mediating role

    Film festivals towards a hybrid form: Challenges and opportunities

    Get PDF
    Beginning after WWII film festivals have created their own network and ecosystem and they have proved themselves as vital nodes of the film industry. Although the systematic academic research on film festivals is at its early stage, the crisis of covid-19 posed new challenges to both organizers and researchers. The aim of this study is to document the reactions of festival organizers to that crisis, identify how digital technology contributed to that process and recognize factors that affect the process. Also, attention has been paid to the influence that hybrid form had on the film festival product, thus the atmosphere and the experience of a film festival. To answer these questions, six in-depth interviews with festival organizers were conducted. These organizers are involved in the management of seven different festivals, which also have been analysed through secondary data. The analysis has shown that internal factors had a significant influence on organizers reaction to the crisis, while external factors also determined to a high degree the strategy that festivals will follow. The necessity of digital technology introduction and hybridity in festivals’ delivery didn’t extinguish the festival atmosphere but created a different one. The study suggests that there are positive ramifications and opportunities of the hybrid form but, while the crisis is ongoing, it is yet to find out how the film festival industry will use the new know-how in a post-covid era.ApĂłs a 2ÂȘ Guerra Mundial, os festivais de films criaram-se e ao seu prĂłprio network e ecosistema, demostrando serem um nĂșcle vital da indĂșstria de films. Embora a investigação relativa aos festivais de films esteja ainda numa fase embrionĂĄria, a crise do covid-19 trouxe novos desafios tanto a organizadores como a investigadores.Este estudo visa analisar as reacçÔes dos organizadores dos festivais de filmes Ă  crise Covid-19, identificando como a tecnologia digital contribuiu para este processo e quais os factores determinantes. Ainda, foi dada atenção Ă  influĂȘncia do formato hĂ­brido no produto festival de filme, nomeadamente na atmosfera e experiĂȘncia do festival. Para responder a estas questĂ”es de pesquisa, realizaram-se seis entrevistas em profundidade com os organizadores. Estes geriram sete diferentes festivais, cuja informação secundĂĄria foi tambĂ©m complementarmente analisada. A anĂĄlise demonstrou que os factores internos influenciaram a reação dos organizadores Ă  crise pandĂ©mica, enquanto os factores externos tambĂ©m determinaram fortemente a estratĂ©gia a seguir pelo festival. A necessidade de ter tecnologia digital e a forma hĂ­brida da prestação do serviço nĂŁo eliminaram a atmosfera do festival, mas criaram uma outra diferente. O estudo sugere que hĂĄ ramificaçÔes positivas e oportunidades pelo formato hĂ­brido, mas, enquanto a crise persiste, Ă©, contudo, preciso perceber como o sector de festivais de filmes usarĂĄ o novo know-how na era post-covid

    Mediated Bordering: Eurosur, the Refugee Boat, and the Construction of an External EU Border

    Get PDF
    The external border of the EU remains under permanent construction. The author engages with two of its primary building sites - the European Border Surveillance System (Eurosur) and the Refugee Boat. She analyzes how the function and quality of the EU's current political border is crafted, shaped, produced and eventually stabilized through these two mediators. Eurosur and the Refugee Boat mediate a level of Europeanization which has hitherto - and would otherwise have - been impossible. While Eurosur mobilizes the limits of border policing in various ways, the Refugee Boat functions as the vacillating European Other to legitimize both control and humanitarian interventions. The study shows the specific, if not constitutive, ambivalences of EU border policies, and explores the emergence of viapolitics

    Vulnerability modelling and mitigation strategies for hybrid networks

    Get PDF
    Hybrid networks nowadays consist of traditional IT components, Internet of Things (IoT) and industrial control systems (ICS) nodes with varying characteristics, making them genuinely heterogeneous in nature. Historically evolving from traditional internet-enabled IT servers, hybrid networks allow organisations to strengthen cybersecurity, increase flexibility, improve efficiency, enhance reliability, boost remote connectivity and easy management. Though hybrid networks offer significant benefits from business and operational perspectives, this integration has increased the complexity and security challenges to all connected nodes. The IT servers of these hybrid networks are high-budget devices with tremendous processing power and significant storage capacity. In contrast, IoT nodes are low-cost devices with limited processing power and capacity. In addition, the ICS nodes are programmed for dedicated functions with the least interference. The available cybersecurity solutions for hybrid networks are either for specific node types or address particular weaknesses. Due to these distinct characteristics, these solutions may place other nodes in vulnerable positions. This study addresses this gap by proposing a comprehensive vulnerability modelling and mitigation strategy. This proposed solution equally applies to each node type of hybrid network while considering their unique characteristics. For this purpose, the industry-wide adoption of the Common Vulnerability Scoring System (CVSS) has been extended to embed the distinct characteristics of each node type in a hybrid network. To embed IoT features, the ‘attack vectors’ and ‘attack complexity vectors’ are modified and another metric “human safety index”, is integrated in the ‘Base metric group’ of CVSS. In addition, the ICS related characteristics are included in the ‘Environmental metric group’ of CVSS. This metric group is further enhanced to reflect the node resilience capabilities when evaluating the vulnerability score. The resilience of a node is evaluated by analysing the complex relationship of numerous contributing cyber security factors and practices. The evolved CVSSR-IoT-ICS framework proposed in the thesis measures the given vulnerabilities by adopting the unique dynamics of each node. These vulnerability scores are then mapped in the attack tree to reveal the critical nodes and shortest path to the target node. The mitigating strategy framework suggests the most efficient mitigation strategy to counter vulnerabilities by examining the node’s functionality, its locality, centrality, criticality, cascading impacts, available resources, and performance thresholds. Various case studies were conducted to analyse and evaluate our proposed vulnerability modelling and mitigation strategies on realistic supply chain systems. These analyses and evaluations confirm that the proposed solutions are highly effective for modelling the vulnerabilities while the mitigation strategies reduce the risks in dynamic and resource-constrained environments. The unified vulnerability modelling of hybrid networks minimises ambiguities, reduces complexities and identifies hidden deficiencies. It also improves system reliability and performance of heterogeneous networks while at the same time gaining acceptance for a universal vulnerability modelling framework across the cyber industry. The contributions have been published in reputable journals and conferences.Doctor of Philosoph

    Enhancing the Use of the Mobile Infrastructure in Cameroon. The Case of Bayam Sellam

    Get PDF
    The expansion and the reliability of mobile technology in Sub-Sahara Africa - as well as elsewhere - opened up diverse opportunities. For instance, the access to learning material, conduction of commercial activities, promotion of agricultural activities, enhancement of governmental transparency, support of healthcare practices, etc. To harness the existing mobile infrastructure, diverse users are looking for effective and efficient ways, for instance, the Bayam Sellam in Cameroon. Bayam Sellam refers to people engaged in trade between rural and urban markets. This work analyses the usage and development of information and communication technology in Sub-Sahara Africa in general, and the mobile technology and its constraints in particular. An efficient use of the mobile technology depends on appropriate mobile services and applications. These should produce and use local digital content, so as to enhance the use of the existing mobile infrastructure and contribute to satisfy the users' needs. As a case study, we deal with a tailored mobile commerce solution for Bayam Sellam and other related stakeholders such as the governmental department for price regulation. The arising question is how Bayam Sellam can use the mobile devices to improve their business activities and, thereby, use the mobile infrastructure more efficiently. With a questionnaire, we investigate the wishes of 250 Bayam Sellam in Ngaoundere. The aim was to develop a tailored mobile commerce solution called Bayasella for Bayam Sellam. The solution is a hybrid application based on the approach of local data storage, web technologies and frameworks (HTML5, PhoneGap, etc.). Bayasella stores product details offline, and synchronises them with the online database whenever the user wants. The online activities (up/downloading offers) shall be very short so as to minimise charges. Another key issue is: if the provided architecture can be applied to other domains. We put our attention on a combined mobile weather application that impacts the mobile technology and the Bayam Sellam business activities. For this purpose, we combine endogenous qualitative weather data - from ethnic group Tpuri - with existing quantifiable data from established weather forecasting systems, such as World Weather Online

    The Department of Human Settlement’s policy on eradicating informal settlements in South Africa : a de- colonial feasibility analysis

    Get PDF
    This thesis is a decolonial feasibility study on the National Department of Housing’s (now National Department of Human Settlement) policy of eradicating informal settlements by 2014. In this thesis I argue that the policy intent of eradicating informal settlements by the proposed date of 2014 cannot be feasible without transcending the structure that produce these informal settlements in the first place. This is why even though we are towards the end of 2014 there is not yet clear evidence that the informal settlements are being eradicated or will be eradicated in the near future. In this dissertation, I argue that informal settlements are a product of a global power structure of coloniality (multiple forms of colonialisms that survive the demise of apartheid) that produces inequalities among human beings including the habitat sphere. I deploy the experience of Mshenguville informal settlement to demonstrate that the experience of informal settlement is just but a marker or sign of inequality among human beings in the age of Western-centred modernity. Thus those in informal settlement are considered to exist on the darker side of modernity as opposed to those in splashy suburb who experience the brighter side of modernity.Development StudiesM.A. (Development Studies
    • 

    corecore