Abstract
Objects are replicated in order to increase reliability and availability of an object-based system.We discuss how to invoke methods on replicas of objects in a nested manner. If a method t is invoked on multiple replicas and eachinstance of t on the replicas invokes a method u on another object y, u may be performed multiple times on some replica of y and then the replica gets inconsistent, i.e. redundant invocations. In addition, if eachinstance of t issues a request to a quorum, more number of the replicas are manipulated than the quorum number of the method u, i.e. quorum explosion.We discuss an invocation protocol to resolve the redundant invocation and quorum explosion. We evaluate the protocol on how many replicas are manipulated and requests are issued.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahamad, M., Dasgupta, P., LeBlanc R., and Wilkes, C., “Fault Tolerant Computing in Object Based Distributed Operating Systems,” Proc. 6th IEEE SRDS, 1987, pp. 115–125.
Barrett, P.A., Hilborne, A.M., Bond, P.G., and Seaton, D.T., “The Delta-4 Extra Performance Architecture,” Proc. 20th Int’l Symp. on FTCS, 1990, pp. 481–488.
Birman, K.P. and Joseph, T.A., “Reliable Communication in the Presence of Failures,” ACM TOCS, Vol. 5,No. 1, pp 1987, pp. 47–76.
Borg, A., Baumbach, J., and Glazer, S., “A Message System Supporting Fault Tolerance,” Proc. 9th ACM Symp. on OperatingSys. Principles, 1983,. 27–39.
Carey, J.M. and Livny, M., “Conflict Detection Tradeoffs for Replicated Data,” ACM TODS, Vol.16,No.4, 1991, pp. 703–746.
Chevalier, P.-Y., “A Replicated Object Server for a Distributed Object-Oriented System,” Proc. IEEE SRDS, 1992, pp.4–11.
Garcia-Molina, H. and Barbara, D., “How to Assign Votes in a Distributed System,” JACM, Vol 32,No.4, 1985, pp. 841–860.
Gifford, D.K., “Weighted Voting for Replicated Data,” Proc. 7th ACM Symp. On OperatingSystems Principles, 1979, pp. 150–159.
Hasegawa, K., Higaki, H., and Takizawa, M., “Object Replication Using Version Vector,” Proc. of the 6th IEEE Int’l Conf. on Parallel and Distributed Systems (ICPADS-98), 1998, pp. 147–154.
Jing, J., Bukhres, O., and Elmagarmid, A., “Distributed Lock Management for Mobile Transactions,” Proc. IEEE ICDCS-15, 1995, pp. 118–125.
Korth, H.F., “Locking Primitives in a Database System,” JACM, Vol. 30,No. 1, 1983, pp. 55–79.
Powell, D., Chereque, M., and Drackley, D., “Fault-Tolerance in Delta-4,” ACM OperatingSystem Review, Vol. 25,No. 2, 1991, pp. 121–125.
Silvano, M. and Douglas, C.S., “Constructing Reliable Distributed Communication Systems withCORBA,” IEEE Comm. Magazine, Vol.35,No.2, 1997, pp.56–60.
Tanaka, K., Hasegawa, K., and Takizawa, M., “Quorum-Based Replication in Object-Based Systems,” Journal of Information Science and Engineering (JISE), Vol. 16, 2000, pp. 317–331.
Tanaka, K. and Takizawa, M., “Quorum-Based Replication of Objects,” Proc. 3rd DEXA Int’l Workshop on Network-Based Information Systems (NBIS-3), 2000, pp. 33–37.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tanaka, K., Takizawa, M. (2001). Quorum-Based Locking Protocol in Nested Invocations of Methods. In: Mayr, H.C., Lazansky, J., Quirchmayr, G., Vogel, P. (eds) Database and Expert Systems Applications. DEXA 2001. Lecture Notes in Computer Science, vol 2113. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44759-8_83
Download citation
DOI: https://doi.org/10.1007/3-540-44759-8_83
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42527-4
Online ISBN: 978-3-540-44759-7
eBook Packages: Springer Book Archive