Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/566726.566757acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article
Free access

An algorithm for stabilising multiple stores

Published: 17 September 2000 Publication History

Abstract

The algorithm for stabilising multiple stores, which we present in this paper, was developed in the process of designing the global stability and resilience mechanism for Grasshopper, an operating system explicitly designed for experimentation in persistence. Grasshopper's persistent store is divided into multiple logical partitions (local stores) with arbitrary data interdependencies. A global asynchronous checkpoint mechanism is used to ensure the resilience of the store as a whole. In order to eliminate the known deficiencies of such an approach our algorithm takes advantage of the hardware techniques originally developed for fault tolerant systems, ie. mirrored disks and an uninterruptible power source (UPS). We show that these two techniques complement each other resulting in a simple and efficient algorithm where the main cost is the cost of additional hardware. Although developed in the context of the Grasshopper system, the algorithm can be applied to multiple persistent stores in general.

References

[1]
Bem, E. Z., "Global Stability and Resilience in a Persistent Operating System", PhD Thesis, University of Sydney, 1999
[2]
Challis, M. F. "Database Consistency and Integrity in a Multiuser Environment" Databases: Improving Useability and resposiveness, Academic press, pp. 245-270, 1978
[3]
Dearle, A., et al "Grasshopper: An Orthogonally Persistent Operating System", Computer Systems, Vol 7(3), Summer 1994
[4]
Hardy, N. "The KeyKOS Architecture" Operating System Review, 1985
[5]
Landau, C. R., "The Checkpoint Mechanism in KeyKOS" Proceedings of the 2nd International Workshop on Object Orientation in Operating Systems, IEEE, 1992
[6]
Liedtke, J., "A Persistent System in Real Use --- Experiences of the First 13 Years" Proceedings of the 3rd International Workshop on Object-Orientation in Operating Systems, North Carolina, 1993
[7]
Lindström, A., A. Dearle, R. di Bona, S. Norris, J. Rosenberg, F. Vaughan "Persistence in the Grasshopper Kernel" Proceedings of the Eighteenth Australasian Computer Science Conference, ACSC-18, ed. Ramamohanarao Kotagiri, Glenelg, South Australia, February 1995
[8]
Lorie, R. A. "Physical Integrity in a Large Segmented Database" ACM Transactions on Database Systems, vol.2 no 1, pp.91-104, 1976
[9]
Morrison, R., A. L. Brown, R. C. H. Conor, A. Dearle "The Napier88 Reference Manual" Technical report PPRR-77-89 University of St Andrew, St Andrew, 1989
[10]
Rosenberg, J. "The MONADS Architecture: A Layered View" The Fourth International Workshop on Persistent Object Systems, eds A. Dearle, G. M. Shaw and S. B. Zdonik, Morgan Kaufmann, 1990
[11]
Soltis, F. G. "Inside AS/400" Duke Press, Loveland, Colorado, 1995

Cited By

View all
  • (2018)Persistent systems techniques in forensic acquisition of memoryDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2008.02.0014:3-4(129-137)Online publication date: 20-Dec-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
EW 9: Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
September 2000
249 pages
ISBN:9781450373562
DOI:10.1145/566726
  • General Chair:
  • Marc Shapiro
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 September 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fault tolerance
  2. global checkpoint
  3. multiple stores
  4. persistence
  5. stability

Qualifiers

  • Article

Conference

EW00
Sponsor:

Acceptance Rates

Overall Acceptance Rate 37 of 37 submissions, 100%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Persistent systems techniques in forensic acquisition of memoryDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2008.02.0014:3-4(129-137)Online publication date: 20-Dec-2018

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media