期刊文献+

基于Quorum系统容错技术综述 被引量:7

Survey of Fault Tolerant Technology Based on Quorum Systems
下载PDF
导出
摘要 Quorum系统是一种新型冗余拓扑的集合系统 在“冗余”设计的基础上 ,quorum通过交叉的结点把有效数据复制到其他quorum的结点中 ,增加了Quorum系统数据冗余性 当某些结点发生故障或者错误时 ,通过选举协议 ,从含有故障结点 quorum的有效结点中选举出有效数据 ;或者采用互斥协议 ,从不含故障或者错误结点的有效quorum的结点中获得有效数据 ,系统仍能可靠运行 分析了各种Quorum系统的容错方式、性能比较 ,探讨了Quorum系统发展中需要改进的关键问题 。 Quorum system is a novel set system with redundant topology Based on the redundancy design, a quorum duplicates its data to other intersected quorums by intersected points, which increases the data redundancy of Quorum systems Whenever any malfunctions or errors happen on any points of quorums, Quorum systems can run availably by executing voting protocol, whose valid data are voted from remaining valid points on one quorum, and mutual exclusion protocol, whose valid data are obtaioed from all points of one remaining valid quorum Various fault tolerant methods for different quorum systems are analyzed and their performances are compared, and some existing problems are explored Finally proposed are some key issues and possible research trend of the development of quorum systems in the future
出处 《计算机研究与发展》 EI CSCD 北大核心 2004年第4期513-523,共11页 Journal of Computer Research and Development
基金 道富浙江大学技术中心国际合作研究基金项目
关键词 QUORUM系统 冗余 容错 选举协议 互斥协议 Quorum system redundancy fault tolerant voting protocol mutual exclusion protocol
  • 相关文献

参考文献46

  • 1[1]D Gifford. Weighted voting for replicated data. The 7th ACM Symp on Oper Syst Principles, Pacific Crove, CA, 1979
  • 2[2]R H Thomas. A majority consensus approach to concurrency control for multiple copy databases. ACM Trans on Database Systems, 1979, 4(9):180~209
  • 3[3]D K Giifford. Weighted voting for replicated data. The 7th ACM Symp on Operating Sytems Principles, California, USA, 1979
  • 4[4]O Theel. A general framework for modeling data replication schemes. In: Proc of the Int'l Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'93). San Diego, CA: SCS and IEEE, 1993. 247~250
  • 5[5]Henning Koch, Oliver Thee. An efficient data replication management architecture exploiting the separation of policy and mechanism. Department of Computer Science, University of Darmstadt, Tech Rep: THD-BS-1994-01, 1994
  • 6[6]H Garcai-Molina, D Barbara. How to assign votes in a distributed system. J ACM, 1985, 32(4): 841~860
  • 7[7]A Fu, T Lau G Ng, M H Wong. Hypercube quorum consensus for mutual exclusion and replicated data management. Computers and Mathematics with Applications, An International Journal, 1998, 36(5): 45~59
  • 8[8]Mic Bowman, Peter B Danzig, Udi Manber et al. Harvest: A scalable, customizable discovery and access system. Department of Computer Science, University of Colorado, Boulder, Colorado, Tech Rep: CU-CS-732-94, 1995
  • 9[9]Song Ping. Non-stop Internet model based on circle quorum system. In: Proc of IEEE SMC2003. Washington: SMC Publisher, 2003. 3014~3019
  • 10[10]D Malkhi. Quorum systems. Encyclopedia of Distributed Computing, 1999, 3(1): 25~30

同被引文献47

  • 1王钰洁,王宝树.网络中心战概念及其体系结构模型[J].情报指挥控制系统与仿真技术,2005,27(6):30-34. 被引量:11
  • 2马建刚,黄涛,汪锦岭,徐罡,叶丹.面向大规模分布式计算发布订阅系统核心技术[J].软件学报,2006,17(1):134-147. 被引量:128
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Abrams M, LaPadula L, Eggers K, et al. A generalized frame-work for access control: An informal description[C]//The 13^th National Computer Security Conference. 1990.
  • 5ITU-T, Rec. X. 812, ISO/IEC 10181-3, The Security Frame - works for Open Systems: Access Control Framework, 1996.
  • 6Beznosov K, Deng Y. Engineering access control in distribution applications. 2000.
  • 7Thompson M, Johnston W, Mudumbai S, et al. Certificate-based access control for distributed resources[C]// Proceeding of Eightth USENIX Security Symposium ( Security ' 99 ). 1998 :215-228.
  • 8Park J S, Sandhu R, Ahn G. Role-based access control on the Web[J].ACM Transaction on Information and System Security. 2001,4(1) :37-71.
  • 9Woo T Y C, Lam S S. A framework for distributed authorization[C]//Proceedings of the 1^st ACM Conference on Computer and Communications Security. ACM Press, 1993:112-118.
  • 10Woo T, Lam S. Designing a Distributed Authorization Service[C]//Proceedings of 17^th Annual Joint conference of the IEEE Computer and Communications Societies, INFOCOM, IEEE. 1998:419-429.

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部