Recap Consistent cuts. CS514: Intermediate Course in Operating Systems. What time is it? But what does time mean? Drawing time-line pictures:

Size: px
Start display at page:

Download "Recap Consistent cuts. CS514: Intermediate Course in Operating Systems. What time is it? But what does time mean? Drawing time-line pictures:"

Transcription

1 CS514: Interediate Course in Oerating Systes Professor Ken iran Vivek Vishnuurthy: T Reca Consistent cuts On Monday we saw that sily gathering the state of a syste isn t enough Often the state includes tricky relationshis Consistent cuts are a way of collecting state that could have arisen concurrently in real-tie What tie is it? In distributed syste we need ractical ways to deal with tie E.g. we ay need to agree that udate occurred before udate Or offer a lease on a resource that exires at tie 1:1.15 Or guarantee that a tie critical event will reach all interested arties within 1s ut what does tie ean? Tie on a global clock? E.g. with GPS receiver or on a achine s local clock ut was it set accurately? nd could it drift, e.g. run fast or slow? What about faults, like stuck bits? or could try to agree on tie Laort s aroach rawing tie-line ictures: Leslie Laort suggested that we should reduce tie to its basics Tie lets a syste ask Which cae first: event or event? In effect: tie is a eans of labeling events so that If haened before, TIME() < TIME() If TIME() < TIME(), haened before snd () 1

2 rawing tie-line ictures: rawing tie-line ictures: snd () snd () C,, C and are events. Could be anything eaningful to the alication So are snd() and rcv() and deliv() What ordering clais are eaningful? haens before, and C before Local ordering at a single rocess Write C and C rawing tie-line ictures: rawing tie-line ictures: snd () snd () C C snd () also haens before rcv () istributed ordering introduced by a essage Write M snd ( ) rcv ( ) haens before Transitivity: haens before snd ( ), which haens before rcv (), which haens before rawing tie-line ictures: snd () C and are concurrent Looks like haens first, but has no way to know. No inforation flowed Haens before relation We ll say that haens before, written, if 1. P according to the local ordering, or 2. is a snd and is a rcv and M, or 3. and are related under the transitive closure of rules (1) and (2) So far, this is just a atheatical notation, not a systes tool 2

3 Logical clocks sile tool that can cature arts of the haens before relation First version: uses just a single integer esigned for big (64-bit or ore) counters Each rocess aintains LT, a local counter essage will carry LT Rules for anaging logical clocks When an event haens at a rocess it increents LT. ny event that atters to Norally, also snd and rcv events (since we want receive to occur after the atching send) When sends, set LT = LT When receives, set LT = ax(lt, LT )+1 Tie-line with LT annotations snd () LT C LT LT() = 1, LT(snd ()) = 2, LT() = 2 LT(rcv ( ))=ax(1,2)+1=3, etc Logical clocks If haens before,, then LT()<LT() ut converse ight not be true: If LT()<LT() can t be sure that This is because rocesses that don t counicate still assign tiestas and hence events will see to have an order Can we do better? One otion is to use vector clocks Here we treat tiestas as a list One counter for each rocess Rules for anaging vector ties differ fro what did with logical clocks Vector clocks Clock is a vector: e.g. VT()=[1, ] We ll just assign index and index 1 Vector clocks reuire either agreeent on the nubering, or that the actual rocess id s be included with the vector Rules for anaging vector clock When event haens at, increent VT [index ] Norally, also increent for snd and rcv events When sending a essage, set VT()=VT When receiving, set VT =ax(vt, VT()) 3

4 Tie-line with VT annotations Rules for coarison of VTs VT 1 snd () We ll say that VT = VT if I, VT [i] = VT [i] nd we ll say that VT < VT if VT()=[2,] C VT Could also be [1,] if we decide not to increent the clock on a sndevent. ecision deends on how the tiestas will be used. 2 4 VT = VT but VT? VT That is, for soe i, VT [i] < VT [i] Exales? [2,4] = [2,4] [1,3] < [7,3] [1,3] is incoarable to [3,1] Tie-line with VT annotations snd () VT VT()=[2, ] C VT VT()=[1,]. VT()=[2,4]. So VT()<VT() VT()=[3,]. So VT() and VT() are incoarable Vector tie and haens before If, then VT()<VT() Write a chain of events fro to Ste by ste the vector clocks get larger If VT()<VT() then Two cases: if and both haen at sae rocess, trivial If haens at and at, can trace the ath back by which learned VT [] Otherwise and haened concurrently Consistent cuts If we had tie, we could revisit these using logical and vector clocks In fact there are algoriths that find a consistent cut by Ileenting soe for of clock sking everyone to record their state at tie now+δ (for soe large δ) nd this can be ade to work well Relication nother use of tie arises when we talk about relicating data in distributed systes The reason is that: We relicate data by ulticasting udates over a set of relicas They need to aly these udates in the sae order nd order is a teoral notion 4

5 and relication is owerful! Relicate data or a service for high availability Relicate data so that grou ebers can share loads and irove scalability Relicate locking or synchronization state Relicate ebershi inforation in a data center so that we can route reuests Relicate anageent inforation or araeters to tune erforance Let s look at tie vis-à-vis udates Maybe logical notions of tie can hel us understand when one udate coes before another udate Then we can think about building relicated udate algoriths that are otiized to run as fast as ossible while reserving the needed ordering r s t rill down: Life of a grou If tries to reliably ulticast to s, it won t get an ack and will wait indefinitely. Q does an udate. ut how It needs can to be sure that s has failed? If reach the three is ebers wrong, s will be issing an udate! Initial grou ebershi Now is {r, s s, goes t} u offline for a while. Maybe it crashed u 1 Here, Here two we dates see the occur udate concurrently: ordering r issue sees again u followed by in a u ure 1, but t for. sees u Which 1 first, then cae u first,. Process s s is still offline; udate it sees Now neither. or s is back one This fro online illustrates? and two issues: udate resuably order and grou should ebershi receive the udate is sending. Questions to ask about order Who should receive an udate? What udate ordering to use? How exensive is the ordering roerty? Questions to ask about order elivery order for concurrent udates Issue is ore subtle than it looks! We can fix a syste-wide order, but Soeties nobody notices out of order delivery Syste-wide ordering is exensive If we care about seed we ay need to look closely at cost of ordering Ordering exale Syste relicates variables x, y Process sends x = x/2 Process sends x = 83 Process r sends y = 17 Process s sends z = x/y To what degree is ordering needed? 5

6 Ordering exale x=x/2 x=83 These clearly conflict If we execute x=x/2 first, then x=83, x will have value 83. In oosite order, x is left eual to 41.5 Ordering exale x=x/2 y=17 These don t see to conflict fter the fact, nobody can tell what order they were erfored in Ordering exale z=x/y This conflicts with udates to x, udates to y and with other udates to z Coutativity We say that oerations coute if the final effect on soe syste is the sae even if the order of those oerations is swaed In general, a syste worried about ordering concurrent events need not worry if the events coute Single udater In any systes, there is only one rocess that can udate a given tye of data For exale, the variable ight be sensor values for a teerature sensor Only the rocess onitoring the sensor does udates, although erhas any rocesses want to read the data and we relicate it to exloit arallelis Here the only ordering that atters is the FIFO ordering of the udates eitted by that rocess r s t Single udater If is the only udate source, the need is a bit like the TCP fifo ordering 6

7 Mutual exclusion nother iortant case we ll study closely rises in systes that use locks to control access to shared data This is very coon, for exale in transactional systes (we ll discuss the next week) Very often without locks, a syste raidly becoes corruted Mutual exclusion Suose that before erforing conflicting oerations, rocesses ust lock the variables This eans that there will never be any true concurrency nd it silifies our ordering reuireent r s t Mutual exclusion ark blue when holding the lock How is this case siilar to FIFO with one sender? How does it differ? Mutual exclusion re these udates in FIFO order? No, the sender isn t always the sae ut yes in the sense that there is a uniue ath through the syste (corresonding to the lock) and the udates are ordered along that ath Here udates are ordered by Laort s haened before relation: Tyes of ordering we ve seen Tyes of ordering we ve seen cheaest Still chea More costly Most costly eliver udates in an order atching the FIFO order in which they were sent eliver udates in an order atching the order in which they were sent For conflicting concurrent udates, ick an order and use that order at all relicas eliver an udate to all ebers of a grou according to ebershi view deterined by ordering udates wrt view changes fbcast cbcast abcast gbcast eliver udates in an order atching the FIFO order in which they were sent eliver udates in an order atching the order in which they were sent For conflicting concurrent udates, ick an order and use that order at all relicas eliver an udate to all ebers of a grou according to ebershi view deterined by ordering udates wrt view changes 7

8 Recoended readings In the textbook, we re at the beginning of Part III (Chater 14) We ll build u the virtual synchrony relication odel in the next lecture and see how it can be built with 2PC, 3PC, consistent cuts and ordering 8

A Fail-Aware Datagram Service

A Fail-Aware Datagram Service A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess to know that another

More information

A Fail-Aware Datagram Service

A Fail-Aware Datagram Service A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess Ô to know that

More information

On-Chip Interconnect Implications of Shared Memory Multicores

On-Chip Interconnect Implications of Shared Memory Multicores On-Chi Interconnect Ilications of Shared Meory Multicores Srini Devadas Couter Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology 1 Prograing 1000 cores MPI has

More information

EXTENDED SVD FLATNESS CONTROL. Per Erik Modén and Markus Holm ABB AB, Västerås, Sweden

EXTENDED SVD FLATNESS CONTROL. Per Erik Modén and Markus Holm ABB AB, Västerås, Sweden EXTENDED SVD FLATNESS CONTROL Per Erik Modén and Markus Hol ABB AB, Västerås, Sweden ABSTRACT Cold rolling ills soeties do not see able to control flatness as well as exected, taking into account the nuber

More information

Chapter 6 Synchronization (1)

Chapter 6 Synchronization (1) DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 6 Synchronization (1) With material from Ken Birman Tanenbaum & Van Steen, Distributed Systems:

More information

New method of angle error measurement in angular artifacts using minimum zone flatness plane

New method of angle error measurement in angular artifacts using minimum zone flatness plane Alied Mechanics and Materials Subitted: 04-05-4 ISSN: 66-748, Vols. 599-60, 997-004 Acceted: 04-06-05 doi:0.408/www.scientific.net/amm.599-60.997 Online: 04-08- 04 Trans Tech Publications, Switzerland

More information

I n many cases, the SPRT will come to a decision with fewer samples than would have been required for a fixed size test.

I n many cases, the SPRT will come to a decision with fewer samples than would have been required for a fixed size test. STATGRAPHICS Rev. 9/6/3 Sequential Saling Suary... Data Inut... 3 Analysis Otions... 3 Analysis Suary... 5 Cuulative Plot... 6 Decision Nubers... 9 Test Perforance... O. C. Curve... ASN Function... Forulas...

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

cmd p p p cmd cmd ... cmd p p p command 1 command 2 command 3 cmd cmd ... cmd S M T W T F S command n cmd ... cmdn p p p cmd ...

cmd p p p cmd cmd ... cmd p p p command 1 command 2 command 3 cmd cmd ... cmd S M T W T F S command n cmd ... cmdn p p p cmd ... The Trials and Tribulations of Building an Adative User Interface Benjain Korveaker & Russell Greiner fbenjain, greinerg@cs.ualberta.ca Deartent of Couter Science University of Alberta Edonton, Canada

More information

A Novel Architecture for Compiled-type Software CNC System

A Novel Architecture for Compiled-type Software CNC System Key Engineering Materials Online: 2007-05-15 ISSN: 1662-9795, ol. 339, 442-446 doi:10.4028/.scientific.net/kem.339.442 2007 rans ech Pulications, Sitzerland A Novel Architecture for Coiled-tye Softare

More information

Two hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book

Two hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book Two hours UNIVERSITY OF MANCHESTER Database Architecture Models and Design January 2004 Answer any THREE questions Answer each question in a separate book The use of electronic calculators is not peritted.

More information

Recap: Consensus. CSE 486/586 Distributed Systems Mutual Exclusion. Why Mutual Exclusion? Why Mutual Exclusion? Mutexes. Mutual Exclusion C 1

Recap: Consensus. CSE 486/586 Distributed Systems Mutual Exclusion. Why Mutual Exclusion? Why Mutual Exclusion? Mutexes. Mutual Exclusion C 1 Reca: Consensus Distributed Systems Mutual Exclusion Steve Ko Comuter Sciences and Engineering University at Buffalo On a synchronous system There s an algorithm that works. On an asynchronous system It

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering

An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering An Enseble of Adative euro-fuzzy Kohonen etworks for Online Data Strea Fuzzy Clustering Zhengbing Hu School of Educational Inforation Technology Central China oral University Wuhan China Eail: hzb@ail.ccnu.edu.cn

More information

Consensus a classic problem. Consensus, impossibility results and Paxos. Distributed Consensus. Asynchronous networks.

Consensus a classic problem. Consensus, impossibility results and Paxos. Distributed Consensus. Asynchronous networks. Consensus, impossibility results and Paxos Ken Birman Consensus a classic problem Consensus abstraction underlies many distributed systems and protocols N processes They start execution with inputs {0,1}

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks

An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks Zhou et al. EURASIP Journal on Wireless Counications and Networking 2014, 2014:163 htt://jwcn.eurasijournals.co/content/2014/1/163 RESEARCH Oen Access An energy-efficient rando verification rotocol for

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

a) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company.

a) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company. a) Figure shows a sall part of an Extended-Entity-Relationship odel describing the personnel departent of a research copany. GivenNae FailyNae relationship telephone NInuber NextOfKin contact Eployee d

More information

COMP 250. Lecture 4. Array lists. Sept. 15, 2017

COMP 250. Lecture 4. Array lists. Sept. 15, 2017 COMP 25 Lecture 4 Arra lists Set. 5, 27 Arras in Java int[ ] Ints = new int[5]; Ints[3] = -732; Arra whose eleents have a riitive te 2 Ints int[ ] Ints = new int[5]; Ints[3] = -732; 2 3 : 4-732 : Arras

More information

22. Swaping: Policies

22. Swaping: Policies 22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference

Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference Interactive Fuzzy Modeling by Evolutionary Multiobjective Otiization with User Preference Yusue ojia, Hisao Ishibuchi Deartent of Couter Science and Intelligent Systes, Osaa Prefecture University - Gauen-cho,

More information

Distributed Systems. 7. Coordination and Agreement

Distributed Systems. 7. Coordination and Agreement Distributed Systems 7. Coordination and Agreement Werner Nutt 1 Co-ordination Algorithms are fundamental in distributed systems: to dynamically re-assign the role of master choose rimary server after crash

More information

Compiling an Honest but Curious Protocol

Compiling an Honest but Curious Protocol 6.876/18.46: Advanced Cryptography May 7, 003 Lecture 1: Copiling an Honest but Curious Protocol Scribed by: Jonathan Derryberry 1 Review In previous lectures, the notion of secure ultiparty coputing was

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

Measuring Bottleneck Bandwidth of Targeted Path Segments

Measuring Bottleneck Bandwidth of Targeted Path Segments Measuring Bottleneck Bandwidth of Targeted Path Segents Khaled Harfoush Deartent of Couter Science North Carolina State University Raleigh, NC 27695 harfoush@cs.ncsu.edu Azer Bestavros Couter Science Deartent

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Lecture 7: Logical Time

Lecture 7: Logical Time Lecture 7: Logical Time 1. Question from reviews a. In protocol, is in- order delivery assumption reasonable? i. TCP provides it b. In protocol, need all participants to be present i. Is this a reasonable

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK.

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK. Iage Processing for fmri John Ashburner Wellcoe Trust Centre for Neuroiaging, 12 Queen Square, London, UK. Contents * Preliinaries * Rigid-Body and Affine Transforations * Optiisation and Objective Functions

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan

More information

Single Degree-of-Freedom Rigidly Foldable Cut Origami Flashers

Single Degree-of-Freedom Rigidly Foldable Cut Origami Flashers Robert J. Lang Lang Origai, Alao, CA 9507 e-ail: robert@langorigai.co Sencer Magleby Deartent of Mechanical Engineering, Brigha Young University, Provo, UT 860 e-ail: agleby@byu.edu Larry Howell Deartent

More information

CLOUD computing is quickly becoming an effective and

CLOUD computing is quickly becoming an effective and IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 203 087 Otial Multiserver Configuration for Profit Maxiization in Cloud Couting Junwei Cao, Senior Meber, IEEE, Kai Hwang, Fellow,

More information

BGP Path visibility issues.

BGP Path visibility issues. BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

An Architecture for a Distributed Deductive Database System

An Architecture for a Distributed Deductive Database System IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA

More information

Markov Analysis for Optimum Caching as an Alternative to Belady s Algorithm

Markov Analysis for Optimum Caching as an Alternative to Belady s Algorithm arov Analysis for Otiu Caching as an Alternative to Belady s Algorith, Deutsche Teleo, Darstadt, Gerany gerhard.hasslinger@teleo.de Analytic Results on LRU, LFU, Otiu Caching Belady s Princile for Otiu

More information

Consensus, impossibility results and Paxos. Ken Birman

Consensus, impossibility results and Paxos. Ken Birman Consensus, impossibility results and Paxos Ken Birman Consensus a classic problem Consensus abstraction underlies many distributed systems and protocols N processes They start execution with inputs {0,1}

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide Vodafone MachineLink Port Forwarding / DMZ Configuration Guide Docuent history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Arranging lunch value of preserving the causal order. a: how about lunch? meet at 12? a: <receives b then c>: which is ok?

Arranging lunch value of preserving the causal order. a: how about lunch? meet at 12? a: <receives b then c>: which is ok? Lamport Clocks: First, questions about project 1: due date for the design document is Thursday. Can be less than a page what we re after is for you to tell us what you are planning to do, so that we can

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

Lecture 7: Objects (Chapter 15) CS 1110 Introduction to Computing Using Python

Lecture 7: Objects (Chapter 15) CS 1110 Introduction to Computing Using Python htt://www.cs.cornell.edu/courses/cs1110/2018s Lecture 7: Objects (Chater 15) CS 1110 Introduction to Comuting Using Python [E. Andersen, A. Bracy, D. Gries, L. Lee, S. Marschner, C. Van Loan, W. White]

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Clock Synchronization. Synchronization. Clock Synchronization Algorithms. Physical Clock Synchronization. Tanenbaum Chapter 6 plus additional papers

Clock Synchronization. Synchronization. Clock Synchronization Algorithms. Physical Clock Synchronization. Tanenbaum Chapter 6 plus additional papers Clock Synchronization Synchronization Tanenbaum Chapter 6 plus additional papers Fig 6-1. In a distributed system, each machine has its own clock. When this is the case, an event that occurred after another

More information

Slides for Chapter 12: Coordination and Agreement

Slides for Chapter 12: Coordination and Agreement Slides for hater : oordination and greement rom oulouris, ollimore and Kindberg istributed Systems: oncets and esign dition, ailure ssumtions and ailure etectors reliable communication channels rocess

More information

Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks

Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks ect o Redundancy on Mean Tie to Failure o Wireless Sensor Networks Anh Phan Speer Ing-Ray Chen Abstract Virginia Tech Departent o Coputer Science {nphan, irchen}@vt.edu In uery-based wireless sensor networks

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Near Light Correction for Image Relighting and 3D Shape Recovery

Near Light Correction for Image Relighting and 3D Shape Recovery Near Light Correction for Iage Relighting and 3D Shae Recovery Anonyous for Review Abstract In this aer, we roose a near-light illuination odel for iage relighting and 3D shae recovery Classic ethods such

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

Essential Question What conjectures can you make about a figure reflected in two lines?

Essential Question What conjectures can you make about a figure reflected in two lines? OO O earning tandard -O..5 -O..6. OTUTI VI UT To be proficient in ath, ou need to ae conjectures and justif our conclusions. ongruence and Transforations ssential uestion What conjectures can ou ae about

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

Analysis of a Biologically-Inspired System for Real-time Object Recognition

Analysis of a Biologically-Inspired System for Real-time Object Recognition Cognitive Science Online, Vol.3.,.-4, 5 htt://cogsci-online.ucsd.edu Analysis of a Biologically-Insired Syste for Real-tie Object Recognition Erik Murhy-Chutorian,*, Sarah Aboutalib & Jochen Triesch,3

More information

Architectural Issues of JMS Compliant Group Communication

Architectural Issues of JMS Compliant Group Communication Architectural Issues of JMS opliant Group ounication Arnas Kupšys Richard Ekwall École Polytechnique Fédérale de Lausanne (EPFL) H-1015 Lausanne, Switzerland {arnas.kupsys, nilsrichard.ekwall}@epfl.ch

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

A Cache Coherence Protocol to Implement Sequential Consistency. Memory Consistency in SMPs

A Cache Coherence Protocol to Implement Sequential Consistency. Memory Consistency in SMPs 6.823, L20--1 A Cache Coherence rotocol to Ipleent Sequential Consistency Laboratory for Coputer Science M.I.T. http://www.csg.lcs.it.edu/6.823 Meory Consistency in SMs CU-1 CU-2 6.823, L20--2 A 100 cache-1

More information

Vision Based Mobile Robot Navigation System

Vision Based Mobile Robot Navigation System International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of

More information

Spatial interference encoding patterns based super resolved photoacoustic microscopy

Spatial interference encoding patterns based super resolved photoacoustic microscopy Satial interference encoding atterns based suer resolved hotoacoustic icroscoy Aihai Meiri 1, Eric M. Stroh 2, Michael C. Kolios 2 and Zeev Zalevsky 1 1 Faculty of Engineering and the Nano Technology Center,

More information

These are notes for the third lecture; if statements and loops.

These are notes for the third lecture; if statements and loops. These are notes for the third lecture; if statements and loops. 1 Yeah, this is going to be the second slide in a lot of lectures. 2 - Dominant language for desktop application development - Most modern

More information

Election Algorithms. has elected i. will eventually set elected i

Election Algorithms. has elected i. will eventually set elected i Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server

More information

TIME AND SYNCHRONIZATION. I. Physical Clock Synchronization: Motivation and Challenges

TIME AND SYNCHRONIZATION. I. Physical Clock Synchronization: Motivation and Challenges TIME AND SYNCHRONIZATION In previous lectures, we discussed some important concepts and goals of distributed. One important concept is remote procedure calls, where we saw how failures creep up into semantics

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

10. Multiprocessor Scheduling (Advanced)

10. Multiprocessor Scheduling (Advanced) 10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Interoperability/ Conformance Test dpmr Mode 2 Repeater

Interoperability/ Conformance Test dpmr Mode 2 Repeater Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

M Software management

M Software management M Software anageent This docuent is part of the UCISA Inforation Security Toolkit providing guidance on the policies and processes needed to ipleent an organisational inforation security policy. To use

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

CS5412: TRANSACTIONS (I)

CS5412: TRANSACTIONS (I) 1 CS5412: TRANSACTIONS (I) Lecture XVII Ken Birman Transactions 2 A widely used reliability technology, despite the BASE methodology we use in the first tier Goal for this week: in-depth examination of

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

Gearing Up for Honors Geometry!

Gearing Up for Honors Geometry! Gearing Up for Honors Geoetr! Honors Geoetr is right around the corner and ou need to ake sure ou are read! Man of the concepts ou learned in Algebra I will be used in Geoetr and ou will be epected to

More information

Preprocessing I: Within Subject John Ashburner

Preprocessing I: Within Subject John Ashburner Preprocessing I: Within Subject John Ashburner Pre-processing Overview Statistics or whatever fmri tie-series Anatoical MRI Teplate Soothed Estiate Spatial Nor Motion Correct Sooth Coregister 11 21 31

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Features. 210 mm. relay outputs 64 mm. input. triac outputs

Features. 210 mm. relay outputs 64 mm. input. triac outputs 12 Mark Terinal Unit Controller (3 fan seed ) 12 LONMARK TERMINAL UNIT CONTROLLER (3 fan seed) Descrition The 12 is a terinal unit controller which can be networked using Works (). It can counicate with

More information