期刊文献+

一种基于有限编码的多副本分簇管理方法

A Multi-Replica Clustering Management Method Based on Limited-Coding
下载PDF
导出
摘要 针对大量数据副本所带来的资源管理问题,提出一种基于有限编码的多副本分簇管理方法.在该方法中,根据单副本复制产生新副本的过程对副本分级和分簇,通过定义“副本级别+副本顺序”的编码规则对划分后的副本进行编码和组织,并依据编码规则对由于副本的动态调整(增加或撤消)而引起的簇的动态变化进行有效管理.通过该方法,在大量副本之间建立局域集中、广域对等的管理模式,再结合定义的“最小更新传播时间”可以降低大量副本的一致性维护开销.讨论了方法中编码规则与副本规模之间的关系,以及副本失效和恢复时的解决方法.性能测试结果表明,该方法能够有效组织大规模的数据副本,具有较好的可扩展性,对适度的结点失效不敏感,适合更新频繁的应用. In this paper, according to the resource management problems brought by a large number of replicas, a multi-replica clustering management method based on limited-coding is proposed. In this method, according to the process of creating new replicas from existent single replica, replicas are partitioned into different hierarchies and clusters. Then replicas are coded and managed based on the user-defined limited-coding rule consisting of replica hierarchy and replica sequence, which can also dispose the alteration of clusters caused by dynamic adjustments on replicas (replica addition or replica removal) effectively. After that, a management model of centralization in local and peer to peer in wide area is adopted to organize replicas, and the cost of reconciling consistency can be greatly depressed combining with defined minimal-time of update propagation. The relevance between the coding rule and the number of replicas, and the solutions to replica failure and replica recover are discussed. The results of the performance evaluation show that the clustering method is an efficient way to manage a large number of replicas, achieving good scalability, not sensitive to moderate node failure, and adapting well to applications with frequent updates.
出处 《软件学报》 EI CSCD 北大核心 2007年第6期1456-1467,共12页 Journal of Software
基金 国家自然科学基金No.69903011 国家重点基础研究发展计划(973)No.2002CB312105 高等学校全国优秀博士学位论文作者专项资金No.200141~~
关键词 数据复制 P2P分布存储系统 分簇 数据一致性 data replication peer-to-peer distributed storage system clustering data consistency
  • 相关文献

参考文献16

  • 1Dahlin M,Gao L,Nayate A,Venkataramani A,Yalagandula P,Zheng J.PRACTI replication for large-scale systems.Technical Report,TR-04-28,Austin:University of Texas at Austin,2004.
  • 2Saito Y,Karamanoli C,Karlsson M,Mahalingam M.Taming aggressive replication in the pangaea wide-area file system.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation.New York:ACM Press,2002.15-30.http://portal.acm.org/ citation.cfm?id=844131
  • 3Kang BBH.S2D2:A framework for scalable and secure optimistic replication[Ph.D.Thesis].Berkeley:University of California,2004.
  • 4van Renesse R,Schneider FB.Chain replication for supporting high throughout and availability.In:Proc.of the 6th Symp.on Operating Systems Design & Implementation (OSDI 2004).2004.http://www.cs.cornell.edu/fbs/publications/ ChainReplicOSDI.pdf
  • 5Ranganathan K,Iamnitchi A,Foster I.Improving data availability through dynamic model-driven replication in large peer-to-peer communities.In:Proc.of the 2nd IEEE/ACM Int'l Symp.on Cluster Computing and the Grid (CCGRID).Washington:IEEE Computer Society,2002.376-381.http://citeseer.ist.psu.edu/ranganathan02improving.html
  • 6Hildrum K,Kubiatowicz JD,Rao S,Zhao BY.Distributed object location in a dynamic network.In:Proc.of the 14th Annual ACM Symp.on Parallel Algorithms and Architectures.New York:ACM Press,2004.41-52.http://portal.acm.org/citation.cfm?coll= GUIDE&dl=GUIDE&id=564877
  • 7Zhao BY,Huang L,Stribling J,Rhea SC,Joseph AD.Tapestry:A resilient global-scale overlay for service deployment.IEEE Journal on Selected Areas in Communications,2004,22(1):41-53.
  • 8Gray J,Helland P,O'Neil PE,Shasha D.The dangers of replication and a solution.In:Proc.of the ACM SIGMOD Int'l Conf.on Management of Data.Montreal,1996.173-182.http://portal.acm.org/citation.cfm?id=233330&coll=portal&dl=ACM
  • 9Kistler J,Satyanarayanan M.Disconnected operation in the coda file system.ACM Trans.on Computer Systems,1992,10(1):3-25.
  • 10Kubiatowicz J,Bindel D,Chen Y,Czerwinski S,Eaton P,Geels D,Gummadi R,Rhea S,Weatherspoon H,Weimer W,Wells C,Zhao B.OceanStore:An architecture for global-scale persistent storage.ACM SIGARCH Computer Architecture News,2000,28(5):190-201.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部