Dr Markus Hagenbuchner CSCI319. Distributed Systems

Size: px
Start display at page:

Download "Dr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems"

Transcription

1 Dr Markus Hagenbuchner CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61

2 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know and explain the various failure models. Explain fault tolerant mechanisms such as TMR, and Byzantine method Understand the effects of client side and server side crashes. Explain the various commit strategies and reliable multicast strategies. Explain strategies to recover from failures CSCI319 Chapter 8 Page: 2 of 61

3 Basic concepts Failure models Content Failure recovery strategies Such as agreement in faulty systems, reliable communication, server crashes, client crashes, etc Implementation issues CSCI319 Chapter 8 Page: 3 of 61

4 Fault Tolerance Basic Concepts Being fault tolerant is strongly related to what is called dependable systems Dependability implies the following: 1. Availability 2. Reliability 3. Safety 4. Maintainability CSCI319 Chapter 8 Page: 4 of 61

5 Failure Models Some types of possible failures. CSCI319 Chapter 8 Page: 5 of 61

6 Failure Masking by Redundancy Example: Triple modular redundancy (TMR). CSCI319 Chapter 8 Page: 6 of 61

7 Flat Groups versus Hierarchical Groups (a) Communication in a flat group. (b) Communication in a simple hierarchical group. System can not recover from a failure of the coordinator in case (b), but finding an agreement is harder in case (a) CSCI319 Chapter 8 Page: 7 of 61

8 Agreement in Faulty Systems (1) Possible cases: 1. Synchronous versus asynchronous systems. 2. Communication delay is bounded or not. 3. Message delivery is ordered or not. 4. Message transmission is done through unicasting or multicasting. CSCI319 Chapter 8 Page: 8 of 61

9 Agreement in Faulty Systems (2) Circumstances under which distributed agreement can be reached. CSCI319 Chapter 8 Page: 9 of 61

10 Agreement in Faulty Systems (3) Example: Byzantine agreement problem Given: N processes, which send messages possibly concurrently. Goal is to let each process construct a vector V of length N such that if process i is nonfaulty V[i]=v i, otherwise V[i] is undefined. CSCI319 Chapter 8 Page: 10 of 61

11 Agreement in Faulty Systems (4) The Byzantine agreement algorithm Goal is to obtain an agreed response among non-faulty nodes. Assumptions made: Processes are synchronous. Messages are send unicast and ordered. Delay is bounded. The algorithm can deal with up to n faulty nodes in a system containing 2n+1 non-faulty nodes. CSCI319 Chapter 8 Page: 11 of 59

12 Agreement in Faulty Systems (5) Byzantine agreement algorithm: 1.) Every nonfaulty node sends v i (i.e. v i =i) to every other node. Faulty nodes may send anything. 2.) Each nodes forms vector V k [i]= v i 3.) Every nodes passes vector V k to all other nodes. 4.) Each process examines the i-th element of the received vectors. CSCI319 Chapter 8 Page: 12 of 61

13 Agreement in Faulty Systems (6) The Byzantine agreement problem for three nonfaulty and one faulty process. (a) Each process sends their value to the others. CSCI319 Chapter 8 Page: 13 of 61

14 Agreement in Faulty Systems (7) The Byzantine agreement problem for three nonfaulty and one faulty process. (b) The vectors that each process assembles based on (a). (c) The vectors that each process receives in step 3. CSCI319 Chapter 8 Page: 14 of 61

15 Agreement in Faulty Systems (8) The same as previous case, except now with two correct process and one faulty process. CSCI319 Chapter 8 Page: 15 of 61

16 Failure Detection How to detect when a member of a group of processes has failed? E.g. Pinging, Timeout, Periodic gossip How to distinguish between node failure and network failure? E.g Route request via neighbors (try alternate com. path). What to do with a failing member? E.g. Remove from group, keep trying to contact node. CSCI319 Chapter 8 Page: 16 of 61

17 Reliable Client-Server Communication Specifically addresses communication failures How can reliable client-server communication be achieved? Illustrated on Remote Procedure Call (RPC) situation. Are there client-server strategies that can be taken to achieve reliable RPC? CSCI319 Chapter 8 Page: 17 of 61

18 RPC Semantics in the Presence of Failures Five different cases of failures that can occur in RPC systems: 1. The client is unable to locate the server. 2. The request message from the client to the server is lost. 3. The server crashes after receiving a request. 4. The reply message from the server to the client is lost. 5. The client crashes after sending a request. CSCI319 Chapter 8 Page: 18 of 61

19 Server Crashes (1) A server in client-server communication may crash at different times during an RPC: (a) The normal case. (b) Crash after execution (of procedure). (c) Crash before execution (of procedure). CSCI319 Chapter 8 Page: 19 of 61

20 Server Crashes (2) Lets work towards server side strategies to minimize the effects of a server side crash. Example: Client requests from server to print some text. The server is to acknowledge that text has been printed. Three events that can happen at the server: Send the completion message (M), Printing text (P), Crash (C). CSCI319 Chapter 8 Page: 20 of 61

21 Server Crashes (3) These events can occur in six different orderings: 1. M P C: A crash occurs after sending the completion message and printing the text. 2. M C ( P): A crash happens after sending the completion message, but before the text could be printed. 3. P M C: A crash occurs after sending the completion message and printing the text. 4. P C( M): The text printed, after which a crash occurs before the completion message could be sent. 5. C ( P M): A crash happens before the server could do anything. 6. C ( M P): A crash happens before the server could do anything. CSCI319 Chapter 8 Page: 21 of 61

22 Server Crashes (4) Different combinations of client and server strategies in the presence of server crashes. Therefore, there exists no client-server strategy that provides reliable RPC. CSCI319 Chapter 8 Page: 22 of 61

23 Client Crashes (1) Client makes a request but crashes before receiving response from server causing orphans. Problems arising out of orphans: Wasted CPU cycles Open file handles Lock up resources CSCI319 Chapter 8 Page: 23 of 61

24 Client Crashes (2) Strategies to handle orphan problems: Orphan extermination: Keep log, scan for orphans, then explicitly kill process. Very expensive! Reincarnation: A new process broadcasts its presence killing all remote computations (effectively removing orphans). Unreliable. Gentle reincarnation: Same as before but performs additional checks to locate process owners. More reliable. Expiration: Each process (or RPC) is given a fixed time T. Process is killed if time is exceeded. Requires additional communication when more time than T is needed. CSCI319 Chapter 8 Page: 24 of 61

25 Reliable group communication Reliable Multicasting: Task: Messages are to be sent to several receivers Goal: ensure all receivers receive the messages. One solution: Assign sequence number to each message. Receiver checks for missing numbers and contacts sender for retransmission. Another solution: Receivers send back acknowledgment upon receipt of a message. Sender resends message to receivers from which no acknowledgement was received. CSCI319 Chapter 8 Page: 25 of 61

26 Basic Reliable-Multicasting Schemes A simple solution to reliable multicasting when all receivers are known and are assumed not to fail. (a) Message transmission. (b) Reporting feedback. CSCI319 Chapter 8 Page: 26 of 61

27 Scalable Reliable-Multicasting If acknowledgements are send back to sender. Messages are re-sent to receivers which did not acknowledge. But this method is not efficient when the number of receivers is very large! Scalability of the previous approach can be improved: 1. Only negative acknowledgements (NACK) are send back to sender. When multiple receivers missed a package, only one NACK is returned (by broadcasting to all after a random waiting time). 2. Through parallelization, i.e. by using a hierarchical approach with several coordinators in which the coordinators are responsible over a subset of receivers. CSCI319 Chapter 8 Page: 27 of 59

28 Nonhierarchical Feedback Control Several receivers have scheduled a request for retransmission, but the first retransmission request leads to the suppression of others. CSCI319 Chapter 8 Page: 28 of 61

29 Hierarchical Feedback Control The essence of hierarchical reliable multicasting. Each local coordinator forwards the message to its children and later handles retransmission requests. CSCI319 Chapter 8 Page: 29 of 61

30 Virtual Synchrony (1) How to ensure that all receivers receive a message in case of a sender crash? This can be addressed by considering the logical organization of a distributed system. We can distinguish between message receipt and message delivery. CSCI319 Chapter 8 Page: 30 of 61

31 Virtual Synchrony (2) The principle of virtual synchronous multicast when realized using views : CSCI319 Chapter 8 Page: 31 of 61

32 Interactive slide What is virtual synchrony? If a sender crashes during a multicast then a strategy is in place which guarantees that either: All intended receiver receive the message None of the intended receivers receive the message. How can virtual synchrony be realized: For example by using views. Each receiver is assigned to be in the same group in which each node has a complete view of other nodes in the group. This requires that the views are updated synchronously. CSCI319 Chapter 8 Page: 32 of 61

33 Interactive slide What is virtual synchrony? A guarantee (in case of a sender crash during a multicast) that either: a. All intended receiver receive the message b. None of the intended receivers receive the message. How can virtual synchrony be realized: One possible solution is to use views : Each receiver is assigned to be in the same group in which each node has a complete view of other nodes in the group. This requires that the views are updated synchronously. This turns out to be a non-trivial task. CSCI319 Chapter 8 Page: 33 of 61

34 Message Ordering (1) Virtual synchrony allows a DS developer to think about the ordering of messages in a multicast. Four different orderings are distinguished: Unordered multicasts Messages may be received in any order by any receiver. FIFO-ordered multicasts Messages from the same sender must be received in the same order by all receivers. Causally-ordered multicasts Messages that are potentially causally related are received in the same order. Totally-ordered multicasts Any of the previous three, and all processes receive messages from any sender in the same order. CSCI319 Chapter 8 Page: 34 of 61

35 Message Ordering (2) Three communicating processes in the same group. The ordering of events per process is shown along the vertical axis. CSCI319 Chapter 8 Page: 35 of 61

36 Interactive slide Given the example below, answer the associated question with yes or no: The example complies with the ordering scheme: Unordered multicast. yes FIFO-ordered multicast. no Causally ordered multicast. no Totally-ordered multicast. no CSCI319 Chapter 8 Page: 36 of 61

37 Interactive slide Given the example below, answer the associated question with yes or no: The example complies with the ordering scheme: Unordered multicast. yes FIFO-ordered multicast. no Causally ordered multicast. no Totally-ordered multicast. no CSCI319 Chapter 8 Page: 37 of 61

38 Message Ordering (3) Four processes in the same group with two different senders. Assume that the multicast is to P2 and P3 only. CSCI319 Chapter 8 Page: 38 of 61

39 Interactive slide Given the example below where P2 and P3 are the sole receivers, answer the associated question with yes or no: The example complies with the ordering scheme: Unordered multicast. yes FIFO-ordered multicast. yes Causally ordered multicast. yes Totally-ordered multicast. no CSCI319 Chapter 8 Page: 39 of 61

40 Interactive slide Given the example below where P2 and P3 are the sole receivers, answer the associated question with yes or no: The example complies with the ordering scheme: Unordered multicast. yes FIFO-ordered multicast. yes Causally ordered multicast. yes Totally-ordered multicast. no CSCI319 Chapter 8 Page: 40 of 61

41 Virtual Synchrony (3) Implementation of ordered multicast is non-trivial. One solution: Sender keeps a copy of a sent message which is marked stable only if all receivers acknowledged receipt. Otherwise message remains labeled unstable. Only stable messages are allowed to be delivered (to the application) Unstable messages are discarded in the event of a view change. The underlying procedure is visualized in the following: CSCI319 Chapter 8 Page: 41 of 61

42 Virtual Synchrony (4) A node in a group G may crash during a multicast. This means that: 1. Not all intended receivers may have received a message. 2. All members need to apply a view change of G. Questions to be addressed: How can a member know that a message (which it may have received) has not yet been delivered to all nodes due to a crash? How can all members agree atomically on a view change? The underlying procedure is visualized in the following: CSCI319 Chapter 8 Page: 42 of 61

43 Virtual Synchrony (4) Example step (a): Process 4 notices that process 7 has crashed and sends a view change. CSCI319 Chapter 8 Page: 43 of 61

44 Virtual Synchrony (5) Step (b): Processes exchange information about unstable messages. Example: Process 6 sends out all its unstable messages, followed by a flush message (no further unstable messages). CSCI319 Chapter 8 Page: 44 of 61

45 Virtual Synchrony (6) Step (c): Processes install new view. Example: Process 6 installs the new view when it has received a flush message from everyone else. CSCI319 Chapter 8 Page: 45 of 61

46 Distributed Commit (1) Distributed commit is a category of algorithms that generalize the concept of virtual synchrony. It allows the realization of many data centric consistency models among replica servers. A commit refers to an irreversible operation i.e. execution of a distributed command, distributed read or write operations, realization of totally ordered multi-casts. Distributed commits allow a distributed operation to occur atomically (Either all processes in a group perform a commit, or none do). CSCI319 Chapter 8 Page: 46 of 61

47 Distributed Commit (2) A generalization of virtual synchrony: Distributed Commit Either all processes in a group perform a commit, or none do. Uses targeted primitives (VOTE_REQUEST, GLOBAL_ABORT,...) Often realized by means of a coordinator These primitives are Implemented in the middleware layer Accessible by processes in a distributed system CSCI319 Chapter 8 Page: 47 of 61

48 Distributed Commit (3) Three approaches to realizing distributed commit: One-phase commit Coordinator tells all participating processes to commit. not robust to failure of any one participant. Two-phase commit Most common scheme but can not handle all types of failure of the coordinator. Three-phase commit Can handle (any type of) failure of coordinator. CSCI319 Chapter 8 Page: 48 of 61

49 Two-phase Commit (1) Protocol consists of two phases, each consisting of two steps. Phase 1: Voting phase Phase 2: Decision Phase Requires that a reliable point-to-point communication strategy is in place. These phases are realized as follows: CSCI319 Chapter 8 Page: 49 of 61

50 Two-phase Commit (2) Phase 1: Voting phase Step 1: Coordinator sends a VOTE_REQUEST to all participants Step 2: If message received, each participant replies with a VOTE_COMMIT or VOTE_ABORT depending on the local situation. CSCI319 Chapter 8 Page: 50 of 61

51 Two-phase Commit (3) Phase 2: Decision Phase Step 1: Coordinator collects votes, then sends to all either GLOBAL_COMMIT or GLOBAL_ABORT depending on reply received from step 2. Step 2: If participant receives GLOBAL_COMMIT message, then it commits transaction, otherwise it locally aborts the transaction. CSCI319 Chapter 8 Page: 51 of 61

52 Two-Phase Commit (4) The finite state diagram of the two-phase commit protocol for (a) the coordinator, and (b) for a participant. The diagram shows the states in which a coordinator and participant can be in. CSCI319 Chapter 8 Page: 52 of 61

53 Two-phase Commit (5) Robustness: The 2-phase commit strategy can be made robust to almost all possible faults in the coordinator or the participants. Only exception: If coordinator is in the WAIT state, and all participants are in READY state, then no fail save strategy exists. This is because WAIT and READY are blocking states Is a rare situation Can be overcome by using the three-phased commit strategy which avoids mutually blocking processes through the introduction of a pre-commit state (see book for algorithm). CSCI319 Chapter 8 Page: 53 of 61

54 Recovery (1) Recover a failed process to a correct state: Not always possible as some operations are irreversible. Strategies depend on the type of the affected component (storage, process, ) Strategies include: Checksum, check-pointing, logging,. Recovery requires that information required has been stored safely. CSCI319 Chapter 8 Page: 54 of 61

55 Stable Storage (1) We differentiate between three types of storage: 1. RAM, wiped out when machine crashes 2. Disk storage, can be lost when disk head crashes. 3. Stable storage designed to survive any type of crash other than acts of God. E.g. ROM or WORM storage. Fail save disc storage. CSCI319 Chapter 8 Page: 55 of 61

56 Stable Storage (2) RAID: Redundant Array of Independent Disks. RAID 0: Striping across multiple disks. No redundancy RAID 1: Mirrored disks. Reduces capacity by at least 50% RAID 2: Adds parity disk(s) to striped array (hamming code). RAID 3: Striped with (one) dedicated parity disk. Parity disk is a bottle neck. RAID 4: Block level striping of parity (instead of byte level) RAID 5: Distributed striped set of disks. Read as fast as RAID 0 Reduces capacity by at most 50% RAID 6: Dual parity disks. Can deal with two concurrent disk failures. RAID Z: Extends RAID 5 to avoid write holes and performance issues. CSCI319 Chapter 8 Page: 56 of 61

57 Recovery of processes I.e. realized through check-pointing. A recovery line defines to which state a system has to be reverted to in order to recover from a failed process. Note that in this example, the last check-point of P2 can not serve as a recovery point in this DS. CSCI319 Chapter 8 Page: 57 of 61

58 Independent Checkpointing Finding a recovery line in a DS can be difficult as it can lead to a domino effect as is illustrated here. The domino effect can be avoided by using: Synchronizing check-pointing across processes (difficult). Logging messages: CSCI319 Chapter 8 Page: 58 of 61

59 Message-Logging The domino-effect can be avoided by logging (and replaying) messages rather than processes. The difficulty here is that an incorrect replay of messages after recovery can lead to an orphan process. CSCI319 Chapter 8 Page: 59 of 61

60 Recovery oriented computing Recovery can be achieved by simply starting over again (i.e. rebooting) Problem: This may re-produce the cause of a crash, and hence, a solution is never obtained. Alternatively: Apply checkpointing to redundant algorithms, then recover to an algorithm which has not failed. Robust but hard to implement. CSCI319 Chapter 8 Page: 60 of 61

61 Summary on fault tolerance Fault tolerance Failure models Failure recovery strategies Scalability issues Reliable multicasting Virtual Synchrony and distributed commits Recovery CSCI319 Chapter 8 Page: 61 of 61

(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps

(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps (Pessimistic) stamp Ordering Another approach to concurrency control: Assign a timestamp ts(t) to transaction T at the moment it starts Using Lamport's timestamps: total order is given. In distributed

More information

Chapter 10: Distributed DBMS Reliability

Chapter 10: Distributed DBMS Reliability Chapter 10: Distributed DBMS Reliability Definitions and Basic Concepts Local Recovery Management In-place update, out-of-place update Distributed Reliability Protocols Two phase commit protocol Three

More information

Distributed systems Lecture 6: Elec3ons, consensus, and distributed transac3ons. Dr Robert N. M. Watson

Distributed systems Lecture 6: Elec3ons, consensus, and distributed transac3ons. Dr Robert N. M. Watson Distributed systems Lecture 6: Elec3ons, consensus, and distributed transac3ons Dr Robert N. M. Watson 1 Last 3me Saw how we can build ordered mul3cast Messages between processes in a group Need to dis3nguish

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network

More information

Distributed Architectures. Distributed Databases. Distributed Databases. Distributed Databases

Distributed Architectures. Distributed Databases. Distributed Databases. Distributed Databases Distributed Architectures Distributed Databases Simplest: client-server Distributed databases: two or more database servers connected to a network that can perform transactions independently and together

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

Chapter 14: Recovery System

Chapter 14: Recovery System Chapter 14: Recovery System Chapter 14: Recovery System Failure Classification Storage Structure Recovery and Atomicity Log-Based Recovery Remote Backup Systems Failure Classification Transaction failure

More information

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization. Cooperation and Coordination in Distributed Systems Communication Mechanisms for the communication between processes Naming for searching communication partners Synchronization in Distributed Systems But...

More information

Outline. Failure Types

Outline. Failure Types Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

How To Understand The Concept Of A Distributed System

How To Understand The Concept Of A Distributed System Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz ens@ia.pw.edu.pl, akozakie@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of

More information

Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA

Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA Wenbing Zhao, L. E. Moser and P. M. Melliar-Smith Index Terms: Fault tolerance, transaction processing, replication,

More information

Chapter 6 External Memory. Dr. Mohamed H. Al-Meer

Chapter 6 External Memory. Dr. Mohamed H. Al-Meer Chapter 6 External Memory Dr. Mohamed H. Al-Meer 6.1 Magnetic Disks Types of External Memory Magnetic Disks RAID Removable Optical CD ROM CD Recordable CD-R CD Re writable CD-RW DVD Magnetic Tape 2 Introduction

More information

Practical issues in DIY RAID Recovery

Practical issues in DIY RAID Recovery www.freeraidrecovery.com Practical issues in DIY RAID Recovery Based on years of technical support experience 2012 www.freeraidrecovery.com This guide is provided to supplement our ReclaiMe Free RAID Recovery

More information

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls Last Class: Communication in Distributed Systems Structured or unstructured? Addressing? Blocking/non-blocking? Buffered or unbuffered? Reliable or unreliable? Server architecture Scalability Push or pull?

More information

Topics. Distributed Databases. Desirable Properties. Introduction. Distributed DBMS Architectures. Types of Distributed Databases

Topics. Distributed Databases. Desirable Properties. Introduction. Distributed DBMS Architectures. Types of Distributed Databases Topics Distributed Databases Chapter 21, Part B Distributed DBMS architectures Data storage in a distributed DBMS Distributed catalog management Distributed query processing Updates in a distributed DBMS

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

The Google File System

The Google File System The Google File System By Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung (Presented at SOSP 2003) Introduction Google search engine. Applications process lots of data. Need good file system. Solution:

More information

The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999

The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999 The ConTract Model Helmut Wächter, Andreas Reuter November 9, 1999 Overview In Ahmed K. Elmagarmid: Database Transaction Models for Advanced Applications First in Andreas Reuter: ConTracts: A Means for

More information

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Name: 1. CS372H: Spring 2009 Final Exam

Name: 1. CS372H: Spring 2009 Final Exam Name: 1 Instructions CS372H: Spring 2009 Final Exam This exam is closed book and notes with one exception: you may bring and refer to a 1-sided 8.5x11- inch piece of paper printed with a 10-point or larger

More information

RAID. Tiffany Yu-Han Chen. # The performance of different RAID levels # read/write/reliability (fault-tolerant)/overhead

RAID. Tiffany Yu-Han Chen. # The performance of different RAID levels # read/write/reliability (fault-tolerant)/overhead RAID # The performance of different RAID levels # read/write/reliability (fault-tolerant)/overhead Tiffany Yu-Han Chen (These slides modified from Hao-Hua Chu National Taiwan University) RAID 0 - Striping

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

How To Write A Network Operating System For A Network (Networking) System (Netware)

How To Write A Network Operating System For A Network (Networking) System (Netware) Otwarte Studium Doktoranckie 1 Adaptable Service Oriented Architectures Krzysztof Zieliński Department of Computer Science AGH-UST Krakow Poland Otwarte Studium Doktoranckie 2 Agenda DCS SOA WS MDA OCL

More information

Chapter 11 Distributed File Systems. Distributed File Systems

Chapter 11 Distributed File Systems. Distributed File Systems Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file

More information

DISTRIBUTED AND PARALLELL DATABASE

DISTRIBUTED AND PARALLELL DATABASE DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Data Storage - II: Efficient Usage & Errors

Data Storage - II: Efficient Usage & Errors Data Storage - II: Efficient Usage & Errors Week 10, Spring 2005 Updated by M. Naci Akkøk, 27.02.2004, 03.03.2005 based upon slides by Pål Halvorsen, 12.3.2002. Contains slides from: Hector Garcia-Molina

More information

Lecture 18: Reliable Storage

Lecture 18: Reliable Storage CS 422/522 Design & Implementation of Operating Systems Lecture 18: Reliable Storage Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of

More information

Chapter 18: Database System Architectures. Centralized Systems

Chapter 18: Database System Architectures. Centralized Systems Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and

More information

Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs

Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Dependable Systems 9. Redundant arrays of inexpensive disks (RAID) Prof. Dr. Miroslaw Malek Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Redundant Arrays of Inexpensive Disks (RAID) RAID is

More information

Disks and RAID. Profs. Bracy and Van Renesse. based on slides by Prof. Sirer

Disks and RAID. Profs. Bracy and Van Renesse. based on slides by Prof. Sirer Disks and RAID Profs. Bracy and Van Renesse based on slides by Prof. Sirer 50 Years Old! 13th September 1956 The IBM RAMAC 350 Stored less than 5 MByte Reading from a Disk Must specify: cylinder # (distance

More information

Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas

Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas 3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No

More information

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS

More information

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actions in the Xaction happen, or none happen. C onsistency: If each Xaction is consistent, and the DB starts consistent, it ends up consistent. I solation:

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

Advanced Computer Networks Project 2: File Transfer Application

Advanced Computer Networks Project 2: File Transfer Application 1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

ES-1 Elettronica dei Sistemi 1 Computer Architecture

ES-1 Elettronica dei Sistemi 1 Computer Architecture ES- Elettronica dei Sistemi Computer Architecture Lesson 7 Disk Arrays Network Attached Storage 4"» "» 8"» 525"» 35"» 25"» 8"» 3"» high bandwidth disk systems based on arrays of disks Decreasing Disk Diameters

More information

Hard Disk Drives and RAID

Hard Disk Drives and RAID Hard Disk Drives and RAID Janaka Harambearachchi (Engineer/Systems Development) INTERFACES FOR HDD A computer interfaces is what allows a computer to send and retrieve information for storage devices such

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Distributed Systems Lecture 1 1

Distributed Systems Lecture 1 1 Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison

More information

A Practical Approach of Storage Strategy for Grid Computing Environment

A Practical Approach of Storage Strategy for Grid Computing Environment A Practical Approach of Storage Strategy for Grid Computing Environment Kalim Qureshi Abstract -- An efficient and reliable fault tolerance protocol plays an important role in making the system more stable.

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1

Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1 Introduction - 8.1 I/O Chapter 8 Disk Storage and Dependability 8.2 Buses and other connectors 8.4 I/O performance measures 8.6 Input / Ouput devices keyboard, mouse, printer, game controllers, hard drive,

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability

Recovery and the ACID properties CMPUT 391: Implementing Durability Recovery Manager Atomicity Durability Database Management Systems Winter 2004 CMPUT 391: Implementing Durability Dr. Osmar R. Zaïane University of Alberta Lecture 9 Chapter 25 of Textbook Based on slides by Lewis, Bernstein and Kifer. University

More information

CORBA and object oriented middleware. Introduction

CORBA and object oriented middleware. Introduction CORBA and object oriented middleware Introduction General info Web page http://www.dis.uniroma1.it/~beraldi/elective Exam Project (application), plus oral discussion 3 credits Roadmap Distributed applications

More information

Distributed Database Management Systems

Distributed Database Management Systems Distributed Database Management Systems (Distributed, Multi-database, Parallel, Networked and Replicated DBMSs) Terms of reference: Distributed Database: A logically interrelated collection of shared data

More information

RAID Storage, Network File Systems, and DropBox

RAID Storage, Network File Systems, and DropBox RAID Storage, Network File Systems, and DropBox George Porter CSE 124 February 24, 2015 * Thanks to Dave Patterson and Hong Jiang Announcements Project 2 due by end of today Office hour today 2-3pm in

More information

HARD DRIVE CHARACTERISTICS REFRESHER

HARD DRIVE CHARACTERISTICS REFRESHER The read/write head of a hard drive only detects changes in the magnetic polarity of the material passing beneath it, not the direction of the polarity. Writes are performed by sending current either one

More information

RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters

RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters RADOS: A Scalable, Reliable Storage Service for Petabyte- scale Storage Clusters Sage Weil, Andrew Leung, Scott Brandt, Carlos Maltzahn {sage,aleung,scott,carlosm}@cs.ucsc.edu University of California,

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time

Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time Achour Mostéfaoui Hamouma Moumen Michel Raynal, LINA, Université de Nantes, 44322 Nantes Cedex,

More information

Chapter 12 Network Administration and Support

Chapter 12 Network Administration and Support Chapter 12 Network Administration and Support Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2 Managing

More information

Pronto: High Availability for Standard Off-the-shelf Databases

Pronto: High Availability for Standard Off-the-shelf Databases Pronto: High Availability for Standard Off-the-shelf Databases Fernando Pedone Svend Frølund University of Lugano (USI) Switzerland Gatehouse A/S Denmark Abstract Enterprise applications typically store

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Centralized Systems. A Centralized Computer System. Chapter 18: Database System Architectures

Centralized Systems. A Centralized Computer System. Chapter 18: Database System Architectures Chapter 18: Database System Architectures Centralized Systems! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types! Run on a single computer system and do

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

Review. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006

Review. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006 S 468 / S 2204 Review Lecture 2: Reliable, High Performance Storage S 469HF Fall 2006 ngela emke rown We ve looked at fault tolerance via server replication ontinue operating with up to f failures Recovery

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

How To Create A Multi Disk Raid

How To Create A Multi Disk Raid Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written

More information

How to choose the right RAID for your Dedicated Server

How to choose the right RAID for your Dedicated Server Overview of RAID Let's first address, "What is RAID and what does RAID stand for?" RAID, an acronym for "Redundant Array of Independent Disks, is a storage technology that links or combines multiple hard

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

Processing of Hadoop using Highly Available NameNode

Processing of Hadoop using Highly Available NameNode Processing of Hadoop using Highly Available NameNode 1 Akash Deshpande, 2 Shrikant Badwaik, 3 Sailee Nalawade, 4 Anjali Bote, 5 Prof. S. P. Kosbatwar Department of computer Engineering Smt. Kashibai Navale

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Vbam - Byzantine Atomic Multicast in LAN Based on Virtualization Technology

Vbam - Byzantine Atomic Multicast in LAN Based on Virtualization Technology Vbam - Byzantine Atomic Multicast in LAN Based on Virtualization Technology Marcelo Ribeiro Xavier Silva, Lau Cheuk Lung, Leandro Quibem Magnabosco, Luciana de Oliveira Rech 1 Computer Science Federal

More information

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006 CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell PowerVault storage solutions, based on the Microsoft

More information

Computer Networks. Data Link Layer

Computer Networks. Data Link Layer Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.

More information

Enterprise-class versus Desktopclass

Enterprise-class versus Desktopclass Enterprise-class versus Desktopclass Hard Drives April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial Release Modifications Disclaimers

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

High Performance Computing. Course Notes 2007-2008. High Performance Storage

High Performance Computing. Course Notes 2007-2008. High Performance Storage High Performance Computing Course Notes 2007-2008 2008 High Performance Storage Storage devices Primary storage: register (1 CPU cycle, a few ns) Cache (10-200 cycles, 0.02-0.5us) Main memory Local main

More information

! Volatile storage: ! Nonvolatile storage:

! Volatile storage: ! Nonvolatile storage: Chapter 17: Recovery System Failure Classification! Failure Classification! Storage Structure! Recovery and Atomicity! Log-Based Recovery! Shadow Paging! Recovery With Concurrent Transactions! Buffer Management!

More information

Distributed Software Systems

Distributed Software Systems Consistency and Replication Distributed Software Systems Outline Consistency Models Approaches for implementing Sequential Consistency primary-backup approaches active replication using multicast communication

More information

Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/]

Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/] Course: Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/] Middleware Technology: Middleware Applications and Distributed Systems Lecturer: Henry Muccini

More information

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

How To Build A Clustered Storage Area Network (Csan) From Power All Networks Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Middleware for Heterogeneous and Distributed Information Systems

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Middleware for Heterogeneous and Distributed Information Systems Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Architecture Chapter Outline Distributed transactions (quick

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Introduction. What is RAID? The Array and RAID Controller Concept. Click here to print this article. Re-Printed From SLCentral

Introduction. What is RAID? The Array and RAID Controller Concept. Click here to print this article. Re-Printed From SLCentral Click here to print this article. Re-Printed From SLCentral RAID: An In-Depth Guide To RAID Technology Author: Tom Solinap Date Posted: January 24th, 2001 URL: http://www.slcentral.com/articles/01/1/raid

More information

Chapter 16: Recovery System

Chapter 16: Recovery System Chapter 16: Recovery System Failure Classification Failure Classification Transaction failure : Logical errors: transaction cannot complete due to some internal error condition System errors: the database

More information

Outline. Database Management and Tuning. Overview. Hardware Tuning. Johann Gamper. Unit 12

Outline. Database Management and Tuning. Overview. Hardware Tuning. Johann Gamper. Unit 12 Outline Database Management and Tuning Hardware Tuning Johann Gamper 1 Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 12 2 3 Conclusion Acknowledgements: The slides are provided

More information

Transactional Support for SDN Control Planes "

Transactional Support for SDN Control Planes Transactional Support for SDN Control Planes Petr Kuznetsov Telecom ParisTech WTTM, 2015 Software Defined Networking An emerging paradigm in computer network management Separate forwarding hardware (data

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Availability Digest. MySQL Clusters Go Active/Active. December 2006

Availability Digest. MySQL Clusters Go Active/Active. December 2006 the Availability Digest MySQL Clusters Go Active/Active December 2006 Introduction MySQL (www.mysql.com) is without a doubt the most popular open source database in use today. Developed by MySQL AB of

More information