Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/516966.845050guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Replica Management in Object-based Systems

Published: 31 January 2001 Publication History

Abstract

In object-based systems, objects are encapsulations of data and procedures named methods and methods are invoked in a nested manner. We discuss how to lock replicated objects by using the quorum-based scheme. If a pair of methods op1 and op2 are compatible, each method is surely performed on some replica, but both of them may not be performed on a same replica. Compatible methods are exchanged between the replicas if both the methods are not performed on any of the replicas in our protocol. If a method op1 is invoked on multiple replicas and each instance of the method op1 invokes a method op2, op2 is performed multiple times on an object, i.e. redundant invocation. In addition, since each instance of op1 issues a request op2 to its quorum, more number of the replicas are locked than the quorum number of op1. This is quorum explosion. We discuss how to resolve these redundant invocations and quorum explosion.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICOIN '01: Proceedings of the The 15th International Conference on Information Networking
January 2001
ISBN:0769509517

Publisher

IEEE Computer Society

United States

Publication History

Published: 31 January 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media