Administration and Autonomy In A Replication-Transparent Distributed DBMS

Size: px
Start display at page:

Download "Administration and Autonomy In A Replication-Transparent Distributed DBMS"

Transcription

1 Administration and Autonomy In A Repication-Transparent Distributed DBMS Kenneth R. Abbott, Dennis R. McCarthy Computer Corporation of America Four Cambridge Center, Cambridge, MA Abstract Administrative issues are of vita importance to organizations adopting distributed database technoogy. Most research systems and emerging commercia DDBMSs have assumed site autonomy as a guiding principe. This paper presents some genera probems associated with autonomy and administration in a DDBMS, and discusses the incompatibiity between repication transparency and site autonomy. In a DDBMS which supports repication transparency, the degree of site autonomy in a system shoud propery be a poicy decision made by system administrators. Parameterization of the degree of site autonomy in a DDBMS invoves carefu design of a mechanism invoving storage structures, operations, and authorization. A mechanism which extends the ANSI SQL authorization mode is described, and exampes of how users can use the mechanism to impement both centraized and decentraized administration poicies are presented. 1. Introduction As distributed DBMS technoogy becomes more widey avaiabe in commercia systems, issues reated to administration, configuration, and operation of distributed systems are becoming increasingy important. Pragmaticay, administrative issues wi probaby be the hardest probems faced by organizations attempting to adopt distributed database technoogy. Research in distributed DBMS has focused on the probem of access to distributed data (the probem of transating and decomposing a database update or query into oca updates or retrievas at a set of communicating sites), but has not paid much attention to administration of distributed data. A few papers have discussed genera organizationa probems of administering a distributed system [] [2], but itte attention has been paid to the technica aspects of Permission to copy without fee a or pt Of this rmtaia is granted provided that the copies are not made or diiwed for direct commercia advantage, the VLDB cowright rotice cud the tite of the pubication and its date apear, md notice ir given that copying is by permission of the Very Large Data Base Endowment. To copy othexwise. or to repubish, requites a fee and/or specia permission from the Endowment. DBMS functionaity that are usefu for impementing distributed administration poicies [33. Lack of work in the area may refect a bias that administrative and operationa probems are not technicay interesting, and may aso be a consequence of the fact that the probems are not evident or important in an R&D environment where most work on distributed systems has occurred. Singe-site DBMS soutions to administrative probems have evoved but they do not readiy scae up to the distributed case for severa reasons:. Administration is compicated by fragmentation. repication, and aocation of data to sites. Cear hierarchica ines of contro at a singe site do not exist in a distributed system.. In the distributed case, operations such as resource aocation and backup/recovery decompose into distinct goba and oca components that are not distinguished in the singe-site case. As was recognized eary on in the R* project, the issue of site autonomy [4] is a semina issue for the designer of a distributed DBMS. The degree of site autonomy has a profound effect on both the data access and administrative aspects of the DBMS. R* and emerging commercia systems (Ingres/Star and Orace*) adopt site autonomy as a basic design principe. Whie the assumption of site autonomy makes sense as a basis for migrating existing centraized databases into a confederated distributed system, it affects the abiity of the system to hide distribution and repication. Furthermore, the strong identification of autonomy with sites obscures a usefu distinction between the ogica concept of autonomy and the physica concept of site. In fact, considerations of repication transparency force a distinction between ogica and physica concepts of autonomy and administration. Logica eve administrative operations such as naming, backup, and reorganization of tabes necessariy invove cooperation (and hence oss of autonomy) of sites which store repicated data. Loca, physica-eve administrative operations (such as resource aocation at a site) may be performed autonomousy even in the presence of repicated data. Proceedings of the 14th VLDB Conference Los Angees, Caifornia

2 During the design of Adapex [5], a homogeneous, repication transparent DBMS, repication transparency 1 and site autonomy were found to be antagonistic goas. The goa of fuy transparent distribution and repication of data strongy affects administrative DBMS functions as we as data access functions2. Our work on Adapex differs from other systems because we began with the assumption of repication transparency and investigated the impications of this assumption on administration and autonomy. Our approach was to parameterize the degree of autonomy in the distributed system and aow database administrators to trade-off between autonomy and repication transparency on a per-instaation basis. The key components of our pammeterized approach are:. introduction of the database storage structure (the ogica and administrative unit of autonomy) which may be mapped to physica sites in various ways, depending on the degree of site autonomy or repication transparency desired, definition of intermediate storage structures and operations which support a cear deineation between ogica eve (site-independent) administration and physica eve (site-specific) administration;. extension of the ANSI SQL authorization mecha- For the purposes of this paper, we adopt the definitions of distribution and repication transparency appied in [5]:. Users see a ogicay centraized view of the cataog (data dictionary) and the database. Names of objects share a goba namespace, and site names do not appear in object names. Users are not associated with sites. Users may og in to the DBMS and access data without regard for their ocation (ogin site) or the ocation of data.. When a user accesses a fragmented tabe, the DBMS automaticay decomposes the query into accesses to fragments of the tabe. For retrievas, the DBMS merges the resuts so that the user sees a singe, ogicay integrated tabe.. When a user accesses repicated data, the DBMS automaticay transforms the access into an access to a particuar copy of the data item at some site. On updates, the DBMS automaticay propagates and merges updates to a copies so as to maintain onecopy seriaizabiity. *It is interesting to note in this context that R* researchers originay intended to support repicated data, but eventuay abandoned the effort 161. nism to encompass these storage structures and operations Even with this fexibe approach, it is necessary to make a base assumption about the trustworthiness of the DBMS: with fu, paranoid site autonomy, the DBMS at one site never trusts the DBMS at another site. However, many agorithms and protocos for impementing transparent repication must impicity trust DBMS software at mutipe sites. Therefore, the parameterized mechanisms described here cannot achieve paranoid site autonomy (because users must trust DBMS software at remote sites) but the mechanisms can achieve functiona site autonomy (users can issue commands and perform operations just as they woud in a fuy autonomous system). In section 2, we wi motivate and enumerate some of the major technica issues in distributed database administration. In section 3, the roe of operations, storage structures, and authorization in database administration are discussed in genera terms. Section 4 describes the design of the Adapex storage structures and authorization mechanism, and section 5 gives exampes of how the Adapex mechanism can be used to impement a variety of administrative poicies. 2. Issues in Distributed Administration Techniques for administering a singe-site DBMS have become we estabished as DBMS has become an essentia eement of data processing. A key eement in administration is identification of various administrative roes and the association of various capabiities with them: DBMS operators can perform DBMS operations that reguar users can t; system administrators can do things that operators can t; etc. A common feature of singe-site administration schemes is that there is an impicit or expicit hierarchy of roes - there is usuay one roe - that subsumes a others. However, in a distributed system, roes that are bunded in the singe-site case become unraveed. Responsibiity for the ogica structure and integrity of the distributed database is a system-wide roe, whie responsibiity for detaied administration tends to be distributed to ocaized roes at individua sites [2]. What was a hierarchy in the singe-site case is better understood as a baance of powers between spheres of contro [7] scattered throughout the distributed system. Notice that a distributed system can be administered in either a centraized or decentraized fashion. However, singe-site administration techniques are not directy appicabe even in a centray administered distributed system. The foowing paragraphs summarize some of the major administrative issues which come into pay in a distributed system. 196

3 Repication Transparency vs Site Autonomy In a distributed system, it is desirabe to consider distribution and repication as physica detais of an object s representation. In the query anguage, ogica objects (e.g. tabes) are manipuated without regard for their physica representation. Repication transparency means that the user is unaware that a ogica object may be represented by mutipe physica copies. Some administrative impications of repication transparency confict with site autonomy:... Access contro - with site autonomy, sites can contro a user s abiity to access individua copies of data. This vioates transparency because a user may be abe to access some, but not a, copies of a data item, and the behavior of a query may vary depending on the copy seected. Furthermore, the DBMS cannot guarantee mutua consistency of repicated data if it cannot update a copies in an identica fashion. Operation - autonomous operation of sites can cause inconsistencies between copies of a data item. For exampe, individua copies of a data item cannot be restored from tape, because the restored copy wi be out synch with other copies. Possibe soutions (prohibiting uncoordinated restores, or forcing a sites to restore simutaneousy) vioate site autonomy. Resource aocation - physica resources such as disks are controed by individua sites. In genera, the resources at a site wi be used in a variety of appications; the distributed DBMS wi be merey one activity among many being performed at a site. The need to contro aocation of site resources to the DBMS must be baanced against the DBMS need to maintain identica copies of data at different sites. Loca View vs The Big Picture In the distributed case, there is no a-seeing, a-powerfu person with tota authority over a detais of distributed system operation. In genera, designing, impementing, and using a distributed database invoves the interaction of severa peope in different roes. For exampe, the designer of a distributed database may have the big picture** in terms of the overa ogica design (e.g. goba access paths for distributed queries, system-wide requirements for avaiabiity and recovery, etc) but cannot be expected to have the detaied knowedge of particuar sites (e.g. names of disk units, fienames, etc) necessary to impement the design. Top Down vs Bottom Up Database Design Top-down design and impementation requires centraization of authority in the database designer. The designer is responsibe for defining the ogica structure of the database and aocating and repicating data at sites. Individua sites are treated as anonymous resources to be used as the goba design dictates. Bottom-up design and impementation is done in a decentraized fashion: individua pieces of the database are independenty created at various sites, and the system administrator is responsibe for passivey reacting to decisions made ocay at sites. Bottom-up design mode is compatibe with fu site autonomy. 3. Overview of Distributed Database Administration Athough the query anguage is often considered the ony important interface to a DBMS, most vita administrative DBMS functions are not accessibe from the query anguage. Consider the case of the SQL [81 anguage, which is purey a query anguage in the sense that it deas ony with the ogica objects presented by a DBMS: tabes, indexes, authorization ids, etc. It does not address the way in which a particuar DBMS maps these abstract reationa concepts to structures or faciities provided outside the DBMS, nor does it address issues pertaining to operating the DBMS in a faiure-prone environment (viz, the rea word). Commercia DBMS s based on SQL (e.g., DB2, Orace) have extended SQL to address these administrative aspects of database management. In fact, for most commercia DBMSs, more inear feet of documentation are dedicated to administrative functions than to data access functions. From the standpoint of an organization using a DBMS, easy and reiabe administration of the DBMS may be as important as accessibiity of data in the DBMS. In this paper, we wi focus on on the foowing aspects of DBMS administration:. Resource Aocation and Utiization - The issue of resource aocation refects the need to share physica resources such as disks, tapes, processors, etc between various functions, one of which is data management. There is a need to be abe to convenienty aocate needed resources to a DBMS and to be assured that the DBMS wi not exceed its aocation. The issue of resource utiization refects a reated need to exercise fine-grained contro over how the DBMS uses particuar resources. The pacement of data on disk, in particuar, can be an extremey important factor in DBMS performance. DBMS Operation - Administering a database invoves performing many operations. Some of these 197

4 operations invove interaction with both the DBMS and the host system. Many of these operations do not directy invove ogica data objects such as tabes. Some major categories of DBMS operations are: instaation, system and site contro, routine maintenance, and recovery. 3.1 The Roe Of Storage Structures in Administration To support administrative DBMS functions, most commercia DBMSs introduce intermediate storage structures into their storage architecture (e.g. DB2 has databases, tabe spaces, and storage groups [9]; Orace has partitions, spaces, and custers,[o etc.). Administrative operations work on intermediate storage structures rather than ogica objects. In effect, intermediate structures are the objects of administrative design of the database, just as physica structure are objects of physica design. In a distributed DBMS, the issues reated to intermediate storage structures are quite compex. The mapping from ogica objects to physica storage has an additiona ayer of compexity introduced by the need to ocate data at sites. Aso, the physica representation of an object may span site boundaries. Support of fuy transparent distribution and repication of data further compicates the roe of intermediate storage structures. There are needs both for distributed intermediate structures (to faciitate administration of ogica objects - e.g. groups of reated tabes) and for ocaized structures (to faciitate pacement of data on disk at a particuar site.) 3.2 Authorization And Administration To taior the configuration of a DBMS to conform to a particuar organization s needs, an authorization mechanism is providedthis mechanism aows administrators to seectivey contro a user s abiity to access data and/or to perform administrative operations. SQL defines an authorization mechanism based on the granting and revoking of privieges on objects which is derived from the System R authorization mechanism [ 111. The SQL authorization mechanism supports access contro to data in tabes and indexes. When administrative functions are factored into a DBMS, there is a parae need to contro access to and operations on objects which are not visibe in the query anguage. To serve these needs, the basic SQL authorization mechanism must be extended [ 121. In extending the SQL mechanism, the DBMS designer must make design choices aong severa dimensions :. How are users and data identified and named for purposes of authorization [3] [ 13]? What intermediate storage structures does the DBMS provide and what primitive operations are aowed on them?. How are are various administrative roes represented for purposes of authorization? There are innumerabe subteties in design choices aong any dimension, and there are often unexpected connections between superficiay unreated design choices3 To achieve the goa of designing a fexibe mechanism that works we in many different situations, it is necessary to make compromises aong a dimensions. The measure of success is not in making the mechanism optima for any particuar appication, but in making it cose to optima for a spectrum of anticipated appications. 4. The Adapex Administrative Concepts and Mechanisms The Adapex authorization mode and mechanisms were designed to aow impementation of poicies with the foowing requirements: Aow a database designer the abiity to specify a ogica and physica design without requiring detaied knowedge of sites that may eventuay store data. Aow a naive user to perform simpe operations (e.g. CREATE TABLE without fancy options) without intervention of site or database administrators. Aow an indifferent site administrator to permit the system to pace data at the site by issuing simpe commands, without requiring knowedge of the overa database design. Aow a concerned site administrator to have fmegrained fexibiity and contro over physica pacement of data at the site, but deny him the abiity to override ogica or physica design decisions made by a database designer. Notice that it is a poicy decision (at each instaation) to aow or deny the capabiities impied by these requirements. 3 An exampe of an unexpected connection between design decisions was the discovery that impementation of protection views in R* was significanty compicated by considerations of site autonomy [14] [15]. F rotection views are objects of authorization which can be used to provide users with a restricted view of tabes which they woud not otherwise be authorized to access. 198

5 The remainder of this section is organized as foows. First we introduce a generaization of the notion of site autonomy. Then we discuss administrative roes. Finay, we describe the authorization mechanism used to impement these roes. 4.1 Storage Structures In Adapex, a database the unit of administrative autonomy. It is a sef-contained subset of the distributed DBMS with a unique system-wide name. A database encapsuates a namespace which contains tabes, users, indexes, etc. A database contains both user data and the cataogs which describe the data. Cataogs for a database are physicay repicated at every site which stores any data stored in the database. There is no hard-wired association between sites and databases: a site may store data from zero, one, or many databases. However, it is usefu the think of a database as the ogica anaog of a site, in the foowing senses: Each database contains a disjoint namespace. References from one database to another must be quaified by database name. Users are vaidated reative to a database (i.e. a user is named object within a database s name space).. Databases are decouped from each other - activity in one database cannot affect data or users in another databas. Thus the database abstracts the various ogica notions of autonomy (e.g., independent operation, separate namespace) without impications about physica representation. Using databases, users have considerabe fexibiity in configuring a distributed DBMS. If a data is paced in a singe database, then the system acts ike a ogicay centraized DBMS with a singe namespace and gobay repicated metadata. If each site is associated with exacty one database, then the system acts ike a oose federation of autonomous sites, where each site maintains its own namespace, users, and data. It is aso possibe to define intermediate configurations where mutipe databases are stored at mutipe cooperating sites. A tabe exists within a database and can be fragmented and repicated (within the containing database) as described in [5]. A copy of a fragment of a tabe is stored at a site in a pagespace, which is the Adapex intermediate storage structure that represents actua physica storage at a site. The foowing tabe summarizes the intermediate structures used to represent and store tabe and index data: The configuration of a distributed DBMS is determined by contro over pagespaces as we as by the use of databases. Sites can maintain a degree of autonomy by retaining contro over their pagespaces. To centraize database administration, sites must give up contro of pagespaces. Adapex provides fexibe contro over pagespaces through its authorization mechanism. Storage Structure Database Fragment Fragment Group Description A sef-contained environment (virtua DBMS) in which users, tabes, etc. are defmed. A database can exist at one or more sites, and a site may store one or more databases. A horizonta partition or sice of a tabe. A fragment is defined by a predicate defined on coumns within a singe tabe. A set of ogicay reated fragments which am distributed, repicated, and recovered as a unit. A set of disk pages at a site used to store fragments with simiar characteristics. A pagespace is defined in terms of host system fies, which may have been created outside of Adapex. Figure 1. A&pex Storage Structures 199

6 4.2 Administrative Roes In a centraized DBMS, the roes payed by various casses of DBMS users and operators are fairy we understood and estabished. In DB2, there is a hierarchy of roes, with the system administrator being a-seeing and a-powerfu. In a distributed DBMS, the roes are more differentiated and are no onger hierarchica. In particuar, the centraized system administrator roe bifurcates into two roes: a goba administration roe and a site administration roe [2]. The foowing ist summarizes administrative roes iden t&d for Adapex:. Goba - This roe is responsibe for managing a distributed Adapex system. The roe has compete contro over a ogica objects in the system, but does not directy contro aocation of resources at a particuar site. Responsibiities incude system-wide instaation and configuration.. Database - This roe is responsibe for a singe database. The roe has contro over a objects in the database. Responsibiities incude database design, maintenance of tabes and indexes, and fragmentation and repication of data.. Site - This roe is responsibe for managing a singe site. The roe has compete contro over physica resources at the site, but may have imited contro over the mapping of ogica structures to physica structures. Responsibiities incude site-specific instaation and configuration, creation and maintenance of oca storage structures, and oca operations. The impementor of an authorization poicy has the option of assigning mutipe administrative roes to a singe user or may choose to assign different administrative roes to different users. In the atter case, administration of the DBMS requires active cooperation among the various administrators. The authorization mechanism makes it possibe for non-cooperating administrators to effectivey veto operations that might impinge on his or her sphere of contro. For exampe, data may not be stored at a site unti the proper physica structures have been initiaized at the site. If the authorization poicy separates the site and database administration roes, then a site administrator may bock the storage of data at his site by refusing to create the requisite structures. However, if the site administrator does create the structures, the site administrator sti does not have any contro over the stored data since contro over the ogica data remains vested in the database administrator. 4.3 Authorization Mechanism The Adapex authorization mechanism is based on the ANSI GRANT/REVOKE mode [81, and is strongy infu- enced by (but not identica to) the DB2 mechanism [12]. In the simpest form of this mechanism, users perform operations on objects. A priviege is a ternary reation between a user, an operation, and an object which represents that the user is authorized to perform the operation on the object. There are numerous extensions to this basic mode, some of which have been impemented in DB2 (e.g. aggregate privieges), and some of which have been proposed (e.g. casses or groups of users [16]). Adapex provides aggregate privieges to support the administrative roes described above. Wims and Lindsay [16] briefy discusses the issue of authorization in a distributed, site autonomous system. The approach taken by Adapex differs from that approach because authorization is aso site transparent. The basic user/priviege/object mechanism has the drawback that a privieges must be attached to DBMS objects. This eads to bootstrapping probems: instaing or configuring the DBMS requires authorization, but the DBMS may not be functiona or may contain no objects. DB2 soves this probem by imprinting itsef with the host operating system id of the superuser who initiay configured the DBMS, and recognizing that id as a specia one. This technique is very awkward in the distributed case, because the same user can access the DBMS from many different sites with different host system ids. To generaize this notion, the concept of an authority was introduced. The appropriate priviege or authority is required to perform an operation. Authorities are authenticated using passwords, without reference to a database. They are hardwired into the DBMS, and cannot be granted or revoked. Adapex recognizes two authorities: system and site. System Authority corresponds to goba administrator roe. It contros addition and deetion of sites, creation and repication of databases. Site Authority corresponds to the site administrator roe. It contros oca storage structures and operations at a site. A user may gain site authority over his ogin site if he knows the password for the site. (The password for the site is stored at the site during the instaation procedure.) Notice that Adapex wi ony grant site authority to users actuay ogged in at the site. Using the site authority, privieges to perform operations on pagespaces can be granted to users in databases. In this manner, contro over oca resources can be transferred from the site administrator to a database administrator. 5. Impementing Administrative Poicies In designing the authorization mechanism, it became cear that there is an unavoidabe confict between the administrative roes described above. Site administrators want 200

7 tota contro over resources at their site; goba and database administrators want to be abe to commandeer resources from sites as dictated by the goba needs of the system. We attempt to resove this confict by division of abor and authority between administrative roes. In genera, configuring a site as part of a distributed Adapex system wi require the execution of some operations requiring authority at a site, some commands requiring authority on specific objects, and some commands requiring authority on both simutaneousy. 5.1 Site Administration When a copy of a fragment group is stored at a site, each fragment in the fragment group must be assigned to a pagespace at the site. Before the fragment group is stored, the pagespaces must be created, and the user pacing the fragments in the pagespaces must be granted privieges to use the pagespaces. A site administrator has contro over the creation and use of pagespaces at a site. Initiay, site authority is required to create a pagespace or to store a fragment in a pagespace. To retain oca contro, the site administrator creates pagespace (using site authority) and grants database administrators the priviege to store fragments in the pagespace. In this case, storing a copy of a fragment group at a site is a two stage process, with responsibiity divided between the site administrator and the database administrator. First the site administrator must create the pagespaces and grant privieges to use them. Then the database administrator stores a copy of the fragment group at the site in the pagespaces. The site administrator can veto the pacement of a fragment group at a site by refusing to set up the pagespaces. Loca contro of a site is desirabe from the standpoint of site autonomy, but is undesirabe because it requires frequent cose coaboration between database administrators and site administrators. Aternativey, the site administrator can grant privieges on the site to users in a database (that is repicated at the site). For exampe, granting the priviege to create pagespaces on the site makes it possibe for users to create pagespaces (in a singe database) at the site without expicit intervention by the site administrator. A ogicay centraized DBMS can be configured by granting privieges for site operations on a repication sites of a database to the database administrator. The database administrator then has contro over the ogica data as we as its physica pacement. 5.2 Distributed Database Design and Impementation A distributed database can be designed, impemented, and used in either a centraized fashion or a decentraized fashion. The activities of design, impementation, and use are independent in the sense that it is possibe (for exampe) to design a database centray, impement it in a decentraized manner, and use it in a centraized fashion. Since a DBMS does not usuay directy support database design (independent of impementation), in this section we focus on database impementation and usage, and describe schematicay how the authorization mechanism can accommodate both centraized and decentraized styes of administration. To iustrate how the authorization mechanism is used, we distinguish two usage modes and two resource contro modes for a distributed database. The usage modes are: 1. Interactive mode: In this mode, users can create and drop tabes and views. There is no singe database designer who has the universa view of a objects in the database. This mode of usage might occur within a department where the DBMS is used as a decision support too and ad hoc queries are common. 2. Production mode: In this mode, the schema for a database is designed and impemented specificay to support an appication. There is a database administrator for each database who has a universa view of database contents and who is responsibe for monitoring and impementing a changes to the database. This mode of usage might occur in a arge company deveoping MIS appications for in-house cients. Orthogona to the usage modes described above are resource contro modes for processors and disks in the distributed system: 1. Cooperative mode: Resources are used cooperativey and are aocated on an as-needed basis. A the resources in the distributed system are controed by the same organization, and can be used interchangeaby. This mode might correspond to a DBMS running on a sma LAN where a processors are controed by the same department in a company. 2. Autonomous mode: Resources are stricty aocated aong site boundaries and each site has strong contro over its own resources. This mode might correspond to a DBMS running a geographicay distributed network, where each site is controed by a different corporate organization. 201

8 Roe Database Site SQL User Action Create user profies in the database for a interactive users. Grant privieges to a users which aow them to create tabes, indexes, and fragment groups. At each site where data wi be stored, create defaut pagespaces and grant interactive users the privieges to pace fragment groups in the pagespaces. As desired, define new tabes and indexes. Use defaut fragmentation and repication parameters so that data is automaticay paced in &faut pagespaces created by site administrators. Figure 2. Interactive Usage/Cooperative Resource Contro Scenario The foowing scenarios are constructed by considering combinations of usage modes and resource contro modes. In a of them, it is assumed that the goba administrator has aready created a database and repicated it at a of the sites where data is to be stored. Figure 2 describes the combination of interactive and cooperative modes. In this scenario, mtive interactive use is accommodated by heavy use of defaut vaues. Database and site administrators coaborate in setting up author-ization and storage structures so that defaut mechanisms work transparenty. Figure 3 describes the combination of interactive and autonomous modes. In this scenario, interactive usage is accommodated by iberay granting privieges on ogica objects (tabes) but imiting privieges to create pagespaces to site administrators. By NOT creating defaut pagespaces, site administrators force users to be expicit in specifying physica storage. If a user wants to store data at a site, the user must get the site administrator at the site to create pagespaces and/or grant privieges on pagespaces at that site. Roe Database Site SQL User Action Create user profies in the database for a interactive users. Grant privieges to a users which aow them to create tabes, indexes, and fragment groups. When a user wants to store data at a site, the user negotiates with the site administrator, who creates a pagespace at the site and grants the priviege to pace data in the pagespace to the user (and no other user). Create tabes and expicity specifies fragmentation, repication, and creation of fragment groups. For each fragment group, repicate it at sites by expicity pacing it in the pagespace created by the site administrator. Figure 3. Interactive Usage/Autonomous Resource Contro Scenario 202

9 Roe Site Action At each site which wi store data, grant the priviege on the site to aow the database administrator to act as site administrator. Database Design the ogica schema, and determine fragmentation, fragment grouping, and pacement of fragment groups at sites. Create pagespaces at sites as needed. Create tabes, fragments, and fragment groups, and expicity pace fragment groups in previousy defined pagespaces. Grant ordinary users privieges to access the ogica objects (tabes) but not the underying pagespaces. Figure 4. Production Usage/Cooperative Resource Scenario Figure 4 describes the combination of production and cooperative modes. In this scenario, a contro over resources is centraized by granting the site administrator priviege on each site to the database administrator. By NOT granting privieges on pagespaces to users, users are prevented from creating new tabes without coaboration with the databaseadministrator. Figure 5 describes the combination of production and autonomous modes. In this scenario, the database administrator and site administrators share responsibiity for designing and impementing the database. Coaboration is forced by NOT granting privieges on sites to the database administrator. 5.3 Operationa Exampe: Backup and Recovery Even routine DBMS operations (e.g. backup, software instaation, og maintenance, etc) can be compicated by distribution, autonomy, and repication. To iustrate this point, this section uses backup and recovery operations as exampes of a basic DBMS operations that are affected by these considerations. Backup and recovery must work on fragmented, distributed, repicated, and geographicay dispersed data. The obvious impementation (mount a tape and put a the data you want on it) is unwiedy for two reasons: I Roe Databuse Site Database Action Design the ogica schema, and determine fragmentation, fragment grouping, and pacement of fragment groups at sites. In cooperation with site adminstrators, determine pagespaces required to hod fragment groups at each site. At each site, create the pagespaces agreed on with the database administrator. Grant the priviege to pace fragment groups in each pagespace to the database administrator. Create tabes, fragments, and fragment groups, and expicity pace tiagment groups in previousy defined pagespaces. Grant ordinary users privieges to access the ogica objects (tabes) but not the underying pagespaces. Figure 5. Production Usage/Autonomous Resource Contro Scenario * 203

10 . To obtain a consistent snapshot of a tabe (for exampe) may require retrieving data from fragments at remote sites. Transmission of the arge voumes of data required for backups over the network woud swamp the network and woud cause backups to take a ong time (and hence be ess ikey to compete successfuy).. If recovery is required, then the backup tape may be at a different site from the recovery site. This not ony impies the data transmission probems mentioned above, but has the operationa probem of getting the correct tape mounted at the correct time at a remote site (which may be anywhere ese in the word!). Individua sites cannot be aowed to autonomousy backup oca data, because there is no way to ensure that backups taken independenty at different sites contain a consistent snapshot of the system. This is a probem when data at one site may refer to or depend on data at another site (even in the absence of repication). Therefore, even if backup operations ony put oca data on tape, there needs to be a goba synchronization of backup operations. Simiary, recover operations must be synchronized when there are inter-site data dependencies. Furthermore, recovery of repicated data must synchronize a copies of the data, not just the copy being recovered. Adapex impements distributed backups using the readony transaction mechanism [17]. The backup operation is performed in two phases: in the goba phase, a database administrator decares a backup and gives it a name; in the oca phase, individua site administrators attach to the backup and make tapes containing oca data which is consistent with data put on tape at other sites. Internay, Adapex starts a distributed read-ony transaction when the backup is decared. This transaction reserves a consistent snapshot of the database at a sites which wi participate in the backup. When individua sites attach to the backup, data is retrieved using the read-ony transaction and put on tape. Since the database snapshot is automaticay reserved unti transaction termination, there is no need for rea-time synchronization of oca backup operations. The distributed recovery operation has a simiar two phased structure. The recover operation is first decared, and then individua sites perform oca recover operations. To guarantee mutua consistency, Adapex wi not make the ogica object being recovered accessibe unti a oca operations have successfuy competed. 6. Concusions and Areas For Future Work Before distributed DBMS technoogy can be adopted, adequate soutions must be provided for the probems of administering a distributed DBMS. Existing soutions for singe-site DBMS s do not address the compications introduced by distribution. Database administrators must dea with fragmentation and repication; there are operations that span sites and must produce consistent resuts; the hierarchy of administrative roes in a singe-site DBMS breaks down in the distributed case. Site autonomy has been proposed as a guiding principa in distributed DBMS administration, but it is incompatibe with repication transparency. We propose a generaization of site autonomy in which the database is the unit of autonomous administration. Autonomy is raised to the ogica eve; sites are treated as physica resources. This aows a range of configurations for a distributed DBMS. At one extreme, functiona site autonomy can be achieved by imposing a one-to-one correspondence between sites and databases. At the other extreme, a system can be configured to behave ike a ogicay centraized DBMS by storing a data in a singe database which is present at a sites. Intermediate configurations are possibe with varying usage modes and resource contro modes. We describe intermediate storage structures and an authorization mechanism that provide fexibiity in configuring a distributed DBMS. Areas for future work incude: i E.. Distributed Resource Contro - this paper has routine DBMS administration. It is not cear how this techniques wi work in exceptiona cases. For exampe, suppose a disk at one site overfows when appying updates to a copy of a repicated data item. There are many possibe actions the system coud take: abort a update transactions unti the condition is fixed, take the copy offine, make the ogica data item unavaiabe, etc. It is not cear what toos are needed to diagnose such probems in a distributed system, nor is it cear who is responsibe for recognizing and fixing such probems. Distributed Security - the probems of providing security in a distributed system are we known. In the absence of reiaby secure networks and trusted security kernes, it is not cear to what extent sites in a distributed system can trust each other. References J. M. Gross, P. E. Jackson, J. Joyce, and F. A. McGuire, Distributed Database Design and Administration, Distributed Databases: An Advanced Course, Draffan and Pooe, eds., Cambridge University Press, H. Waker, Administering A Distributed Database Management System, ACM-SIGMOD Record, 12~

11 r31 [41 S. Ceri and G. Peagatti, Distributed Databases: Principes and Systems, McGraw-Hi, B. Lindsay and P. Seinger, Site Autonomy Issues in R*: A Distributed Database Management System, IBM Research Report RJ2927, IBM, San Jose, CA. U WI P. Seinger and B. W. Wade, An Authorization Mechanism For a Reationa Database System, ACM-TODS, 1:3, IBM Corp., IBM Database 2 System Panning and Administration Guide, SC , IBM Corp E E A. Chart, et a, Overview of An ADA Compatibe Distributed Database Manager*, ACM-SIGMOD Proceedings, San Jose, CA, B. Lindsay, A Retrospective of R*: A Distributed Database Management System*, Proceedings of the IEEE 75.5, Bray, IRM In A Decentraized/Distributed Environment, Database Engineering, 9:2,1986. ANSI, ANSI X Database Language SQL, American Nationa Standards Institute, WI B. G. Lindsay, Object Naming and Cataog Management For A Distributed Database Manager, Proceedings 2nd Internationa Conference On Distributed Computing Systems, Paris, D. Danies, et a, An Introduction To Distributed Query Compiation in R*, Proceedings of The 2nd internationa Symposium On Distributed Databases, Berin, E. Bertino. L. M. Haas, and B. G. Lindsay, View Management in Distributed Data Base Systems, IBM Research Report RJ3851, IBM Corp., San Jose, r91 DOI IBM Corp., IBM Database 2 Data Base Panning and Administration Guide, SC , IBM Carp, Orace Corp, Orace Database s Guide, 3601-V5.0, Orace Corp., Bemont, CA, m [17 P. F. Wims and B. G. Lindsay, A Database Authorization Mechanism Supporting Individua and Group Authorization, IBM Research Report RJ3137 (38514), IBM Research, San Jose, CA, A. Chan and R. Gray, Impementing Distributed Read-Ony Transactions, IEEE Transactions on Software Engineering, SE- 1:2, February,

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

Oracle Data Relationship Management

Oracle Data Relationship Management Orace Data Reationship Management Orace Data Reationship Steward Orace Data Reationship Management for Orace Hyperion Enterprise Panning Suite Orace Data Reationship Management for Orace Hyperion Financia

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Distributed Hierarchical Control for Parallel Processing

Distributed Hierarchical Control for Parallel Processing Distributed Hierarchica Contro for Parae Processing Dror G. Feiteson and Larry Rudoph Hebrew University of Jerusaem T he deveopment of operating systems for parae computers has cosey foowed that for seria

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6 Links for mode 504058 (1-Port UTP/BNC Parae Pocket Print Server): Downoads & inks http://www.inteinet-network.com/htm/d-pserver.htm This manua http://inteinet-network.com/mk2/manuas/502993_manua.zip Instructions

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Avaya Interaction Center Client SDK Programmer Guide

Avaya Interaction Center Client SDK Programmer Guide Avaya Interaction Center Cient SDK Programmer Guide Reease 7.2 May 2013 Issue 1.1 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

Modeling of Problems of Projection: A Non-countercyclic Approach * Jason Ginsburg Osaka Kyoiku University

Modeling of Problems of Projection: A Non-countercyclic Approach * Jason Ginsburg Osaka Kyoiku University Modeing of Probems of Projection: A Non-countercycic Approach * Jason Ginsburg Osaka Kyoiku University Abstract This paper describes a computationa impementation of the recent Probems of Projection (POP)

More information

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance.

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance. Amazon Eastic Compute Coud Compute - The amount of computationa power required to fufi your workoad Instance - Virtua machines - Charged per hour whie running - Virtua Hardware - AMI - Software (appications,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Building a multi-pb Object Database for the LHC

Building a multi-pb Object Database for the LHC Buiding a muti-pb Database for the LHC Buiding a muti-pb Object Database for the LHC The RD45 Project Jamie Shiers Appication Software and Databases Group Information Technoogy Division Buiding a muti-pb

More information

PL/SQL, Embedded SQL. Lecture #14 Autumn, Fall, 2001, LRX

PL/SQL, Embedded SQL. Lecture #14 Autumn, Fall, 2001, LRX PL/SQL, Embedded SQL Lecture #14 Autumn, 2001 Fa, 2001, LRX #14 PL/SQL,Embedded SQL HUST,Wuhan,China 402 PL/SQL Found ony in the Orace SQL processor (sqpus). A compromise between competey procedura programming

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide Avaya Aura Ca Center Eite Mutichanne Configuration Server User Guide Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Supporting Top-k Join Queries in Relational Databases

Supporting Top-k Join Queries in Relational Databases Supporting Top-k Join Queries in Reationa Databases Ihab F. Iyas Waid G. Aref Ahmed K. Emagarmid Department of Computer Sciences, Purdue University West Lafayette IN 47907-1398 {iyas,aref,ake}@cs.purdue.edu

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

OF SCIENTIFIC DATABASES

OF SCIENTIFIC DATABASES CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Commentary Unit With Talkback And Dante Network Audio Interface

Commentary Unit With Talkback And Dante Network Audio Interface Network Audio Commentary Interface ensound Commentary Unit With Takback And Dante Network Audio Interface VITA Network Audio Commentary Interface Highights For Commentary Or Takback Two Assignabe 4 Wire

More information

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc.

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc. Simba MongoDB ODBC Driver with SQL Instaation and Configuration Guide Simba Technoogies Inc. Version 2.0.1 February 16, 2016 Instaation and Configuration Guide Copyright 2016 Simba Technoogies Inc. A Rights

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Causal Message Delivery in the Grasshopper Operating System

Causal Message Delivery in the Grasshopper Operating System Proceedings of the 1996 Hawaii Internationa Conference on System Sciences (HICSS-29) Proceedings of the 29th Annua Hawaii Internationa Conference on System Sciences - 1996 Causa Message Deivery in the

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

An improved distributed version of Han s method for distributed MPC of canal systems

An improved distributed version of Han s method for distributed MPC of canal systems Deft University of Technoogy Deft Center for Systems and Contro Technica report 10-013 An improved distributed version of Han s method for distributed MPC of cana systems M.D. Doan, T. Keviczky, and B.

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information