期刊文献+

Research on Distributed Dynamic Replication Management Policy 被引量:1

Research on Distributed Dynamic Replication Management Policy
下载PDF
导出
摘要 This paper introduces replication management policies in distributed file system, and presents a novel decentralized dynamic replication management mechanism based on accessing frequency detecting named FDRM. In FDRM, in order to provide better system performance and reduce network traffic, system nodes scan their local replicas to monitor replicas’ access pattern, and makes decision independently to add, delete or migrate replicas. In addition, the scanning interval of a replica is variable according to the accessing frequency to that replica, which makes FDRM more sensitive to the change of system behaviors, so that one can get better performance with less system overhead. Experiments show the efficiency and performance improvement of FSRM. This paper introduces replication management policies in distributed file system, and presents a novel decentralized dynamic replication management mechanism based on accessing frequency detecting named FDRM. In FDRM, in order to provide better system performance and reduce network traffic, system nodes scan their local replicas to monitor replicas’ access pattern, and makes decision independently to add, delete or migrate replicas. In addition, the scanning interval of a replica is variable according to the accessing frequency to that replica, which makes FDRM more sensitive to the change of system behaviors, so that one can get better performance with less system overhead. Experiments show the efficiency and performance improvement of FSRM.
出处 《Journal of Electronic Science and Technology of China》 2005年第2期97-102,共6页 中国电子科技(英文版)
基金 Supported by the Electronic Industry Development Fund of MII "Multi-Function Network Server"
关键词 DISTRIBUTED replica management DYNAMIC FREQUENCY ADAPTIVE distributed replica management dynamic frequency adaptive
  • 相关文献

同被引文献11

  • 1CORREIA M, N'EVES N F, VERISSIMO E How to tolerate half less one byzantine nodes in practical distributed systems[C]//Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianpolis, Brazil: IEEE Press, 2004: 174-183.
  • 2REITER M K. A secure group membership protocol[J]. IEEE Transactions on Sottware Engineering, 1996, 22(1): 31-42.
  • 3LUNG L C, CORREIA M, NEVES N E A simple intrusion-tolerant reliable multicast protocol using the TTCB[-EB/OL]. [2007-09-11]. http://www.di.fc.ul.pt/- nuno /PAPERS/SBRC03.pdf.
  • 4SANDER W H. Mobius[CP/OL]. [2007-06-10]. http ://www.mobius.uiuc.cdu.
  • 5GUPTA V, LAM V, RAMASAMY H V, et al. Dependability and performance evaluation of intrusiontolerant server architectures[C]//Proceedings of the 1st Latin-American Symposium on Dependable Computing. Sao Paulo, Brazil: Springer, 2003: 81-101.
  • 6CORREIA M, NEVES N F, LUNG L C. Byzantine-resistant consensus based on a novel approach to intrusion toleranee[C]//Fast Abstract in Supplement of the 10th Pacific Rim International Symposium on Dependable Computing. Tahiti, French: IEEE Press, 2004.
  • 7MONIZ H, N-EVES N F, CORREIA M. Randomized intrusion-tolerant asynchronous services[C]//DSN'06: Proceedings of the International Conference on Dependable Systems and Networks. Philadelphia, PA: ACM Press, 2006.
  • 8CORREIA M, VERISSIMO P, NEVES N E Thc design of a COTS real-time distributed security kcmcl (extended version) [R]. DI/FCUL TR-01-12. Portugal, 2001.
  • 9VERISSIMO P, CASIMIRO A. The timely computing base model and architecture[J]. IEEE Transactions on Computers, 2002, 51(8): 916-930.
  • 10CORREIA M, NEVES N F, LUNG L C, et al. Worm-IT--A wormhole-based intrusion-tolerant group communication system[I]. Journal of Systems and Software, 2007, 80(2): 178-197.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部