Recap Consistent cuts. CS514: Intermediate Course in Operating Systems. What time is it? But what does time mean? Drawing time-line pictures:
|
|
- Steven Reynolds
- 5 years ago
- Views:
Transcription
1 CS514: Interediate Course in Oerating Systes Professor Ken iran Vivek Vishnuurthy: T Reca Consistent cuts On Monday we saw that sily gathering the state of a syste isn t enough Often the state includes tricky relationshis Consistent cuts are a way of collecting state that could have arisen concurrently in real-tie What tie is it? In distributed syste we need ractical ways to deal with tie E.g. we ay need to agree that udate occurred before udate Or offer a lease on a resource that exires at tie 1:1.15 Or guarantee that a tie critical event will reach all interested arties within 1s ut what does tie ean? Tie on a global clock? E.g. with GPS receiver or on a achine s local clock ut was it set accurately? nd could it drift, e.g. run fast or slow? What about faults, like stuck bits? or could try to agree on tie Laort s aroach rawing tie-line ictures: Leslie Laort suggested that we should reduce tie to its basics Tie lets a syste ask Which cae first: event or event? In effect: tie is a eans of labeling events so that If haened before, TIME() < TIME() If TIME() < TIME(), haened before snd () 1
2 rawing tie-line ictures: rawing tie-line ictures: snd () snd () C,, C and are events. Could be anything eaningful to the alication So are snd() and rcv() and deliv() What ordering clais are eaningful? haens before, and C before Local ordering at a single rocess Write C and C rawing tie-line ictures: rawing tie-line ictures: snd () snd () C C snd () also haens before rcv () istributed ordering introduced by a essage Write M snd ( ) rcv ( ) haens before Transitivity: haens before snd ( ), which haens before rcv (), which haens before rawing tie-line ictures: snd () C and are concurrent Looks like haens first, but has no way to know. No inforation flowed Haens before relation We ll say that haens before, written, if 1. P according to the local ordering, or 2. is a snd and is a rcv and M, or 3. and are related under the transitive closure of rules (1) and (2) So far, this is just a atheatical notation, not a systes tool 2
3 Logical clocks sile tool that can cature arts of the haens before relation First version: uses just a single integer esigned for big (64-bit or ore) counters Each rocess aintains LT, a local counter essage will carry LT Rules for anaging logical clocks When an event haens at a rocess it increents LT. ny event that atters to Norally, also snd and rcv events (since we want receive to occur after the atching send) When sends, set LT = LT When receives, set LT = ax(lt, LT )+1 Tie-line with LT annotations snd () LT C LT LT() = 1, LT(snd ()) = 2, LT() = 2 LT(rcv ( ))=ax(1,2)+1=3, etc Logical clocks If haens before,, then LT()<LT() ut converse ight not be true: If LT()<LT() can t be sure that This is because rocesses that don t counicate still assign tiestas and hence events will see to have an order Can we do better? One otion is to use vector clocks Here we treat tiestas as a list One counter for each rocess Rules for anaging vector ties differ fro what did with logical clocks Vector clocks Clock is a vector: e.g. VT()=[1, ] We ll just assign index and index 1 Vector clocks reuire either agreeent on the nubering, or that the actual rocess id s be included with the vector Rules for anaging vector clock When event haens at, increent VT [index ] Norally, also increent for snd and rcv events When sending a essage, set VT()=VT When receiving, set VT =ax(vt, VT()) 3
4 Tie-line with VT annotations Rules for coarison of VTs VT 1 snd () We ll say that VT = VT if I, VT [i] = VT [i] nd we ll say that VT < VT if VT()=[2,] C VT Could also be [1,] if we decide not to increent the clock on a sndevent. ecision deends on how the tiestas will be used. 2 4 VT = VT but VT? VT That is, for soe i, VT [i] < VT [i] Exales? [2,4] = [2,4] [1,3] < [7,3] [1,3] is incoarable to [3,1] Tie-line with VT annotations snd () VT VT()=[2, ] C VT VT()=[1,]. VT()=[2,4]. So VT()<VT() VT()=[3,]. So VT() and VT() are incoarable Vector tie and haens before If, then VT()<VT() Write a chain of events fro to Ste by ste the vector clocks get larger If VT()<VT() then Two cases: if and both haen at sae rocess, trivial If haens at and at, can trace the ath back by which learned VT [] Otherwise and haened concurrently Consistent cuts If we had tie, we could revisit these using logical and vector clocks In fact there are algoriths that find a consistent cut by Ileenting soe for of clock sking everyone to record their state at tie now+δ (for soe large δ) nd this can be ade to work well Relication nother use of tie arises when we talk about relicating data in distributed systes The reason is that: We relicate data by ulticasting udates over a set of relicas They need to aly these udates in the sae order nd order is a teoral notion 4
5 and relication is owerful! Relicate data or a service for high availability Relicate data so that grou ebers can share loads and irove scalability Relicate locking or synchronization state Relicate ebershi inforation in a data center so that we can route reuests Relicate anageent inforation or araeters to tune erforance Let s look at tie vis-à-vis udates Maybe logical notions of tie can hel us understand when one udate coes before another udate Then we can think about building relicated udate algoriths that are otiized to run as fast as ossible while reserving the needed ordering r s t rill down: Life of a grou If tries to reliably ulticast to s, it won t get an ack and will wait indefinitely. Q does an udate. ut how It needs can to be sure that s has failed? If reach the three is ebers wrong, s will be issing an udate! Initial grou ebershi Now is {r, s s, goes t} u offline for a while. Maybe it crashed u 1 Here, Here two we dates see the occur udate concurrently: ordering r issue sees again u followed by in a u ure 1, but t for. sees u Which 1 first, then cae u first,. Process s s is still offline; udate it sees Now neither. or s is back one This fro online illustrates? and two issues: udate resuably order and grou should ebershi receive the udate is sending. Questions to ask about order Who should receive an udate? What udate ordering to use? How exensive is the ordering roerty? Questions to ask about order elivery order for concurrent udates Issue is ore subtle than it looks! We can fix a syste-wide order, but Soeties nobody notices out of order delivery Syste-wide ordering is exensive If we care about seed we ay need to look closely at cost of ordering Ordering exale Syste relicates variables x, y Process sends x = x/2 Process sends x = 83 Process r sends y = 17 Process s sends z = x/y To what degree is ordering needed? 5
6 Ordering exale x=x/2 x=83 These clearly conflict If we execute x=x/2 first, then x=83, x will have value 83. In oosite order, x is left eual to 41.5 Ordering exale x=x/2 y=17 These don t see to conflict fter the fact, nobody can tell what order they were erfored in Ordering exale z=x/y This conflicts with udates to x, udates to y and with other udates to z Coutativity We say that oerations coute if the final effect on soe syste is the sae even if the order of those oerations is swaed In general, a syste worried about ordering concurrent events need not worry if the events coute Single udater In any systes, there is only one rocess that can udate a given tye of data For exale, the variable ight be sensor values for a teerature sensor Only the rocess onitoring the sensor does udates, although erhas any rocesses want to read the data and we relicate it to exloit arallelis Here the only ordering that atters is the FIFO ordering of the udates eitted by that rocess r s t Single udater If is the only udate source, the need is a bit like the TCP fifo ordering 6
7 Mutual exclusion nother iortant case we ll study closely rises in systes that use locks to control access to shared data This is very coon, for exale in transactional systes (we ll discuss the next week) Very often without locks, a syste raidly becoes corruted Mutual exclusion Suose that before erforing conflicting oerations, rocesses ust lock the variables This eans that there will never be any true concurrency nd it silifies our ordering reuireent r s t Mutual exclusion ark blue when holding the lock How is this case siilar to FIFO with one sender? How does it differ? Mutual exclusion re these udates in FIFO order? No, the sender isn t always the sae ut yes in the sense that there is a uniue ath through the syste (corresonding to the lock) and the udates are ordered along that ath Here udates are ordered by Laort s haened before relation: Tyes of ordering we ve seen Tyes of ordering we ve seen cheaest Still chea More costly Most costly eliver udates in an order atching the FIFO order in which they were sent eliver udates in an order atching the order in which they were sent For conflicting concurrent udates, ick an order and use that order at all relicas eliver an udate to all ebers of a grou according to ebershi view deterined by ordering udates wrt view changes fbcast cbcast abcast gbcast eliver udates in an order atching the FIFO order in which they were sent eliver udates in an order atching the order in which they were sent For conflicting concurrent udates, ick an order and use that order at all relicas eliver an udate to all ebers of a grou according to ebershi view deterined by ordering udates wrt view changes 7
8 Recoended readings In the textbook, we re at the beginning of Part III (Chater 14) We ll build u the virtual synchrony relication odel in the next lecture and see how it can be built with 2PC, 3PC, consistent cuts and ordering 8
A Fail-Aware Datagram Service
A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess to know that another
More informationA Fail-Aware Datagram Service
A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess Ô to know that
More informationOn-Chip Interconnect Implications of Shared Memory Multicores
On-Chi Interconnect Ilications of Shared Meory Multicores Srini Devadas Couter Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology 1 Prograing 1000 cores MPI has
More informationEXTENDED SVD FLATNESS CONTROL. Per Erik Modén and Markus Holm ABB AB, Västerås, Sweden
EXTENDED SVD FLATNESS CONTROL Per Erik Modén and Markus Hol ABB AB, Västerås, Sweden ABSTRACT Cold rolling ills soeties do not see able to control flatness as well as exected, taking into account the nuber
More informationChapter 6 Synchronization (1)
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 6 Synchronization (1) With material from Ken Birman Tanenbaum & Van Steen, Distributed Systems:
More informationNew method of angle error measurement in angular artifacts using minimum zone flatness plane
Alied Mechanics and Materials Subitted: 04-05-4 ISSN: 66-748, Vols. 599-60, 997-004 Acceted: 04-06-05 doi:0.408/www.scientific.net/amm.599-60.997 Online: 04-08- 04 Trans Tech Publications, Switzerland
More informationI n many cases, the SPRT will come to a decision with fewer samples than would have been required for a fixed size test.
STATGRAPHICS Rev. 9/6/3 Sequential Saling Suary... Data Inut... 3 Analysis Otions... 3 Analysis Suary... 5 Cuulative Plot... 6 Decision Nubers... 9 Test Perforance... O. C. Curve... ASN Function... Forulas...
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationcmd p p p cmd cmd ... cmd p p p command 1 command 2 command 3 cmd cmd ... cmd S M T W T F S command n cmd ... cmdn p p p cmd ...
The Trials and Tribulations of Building an Adative User Interface Benjain Korveaker & Russell Greiner fbenjain, greinerg@cs.ualberta.ca Deartent of Couter Science University of Alberta Edonton, Canada
More informationA Novel Architecture for Compiled-type Software CNC System
Key Engineering Materials Online: 2007-05-15 ISSN: 1662-9795, ol. 339, 442-446 doi:10.4028/.scientific.net/kem.339.442 2007 rans ech Pulications, Sitzerland A Novel Architecture for Coiled-tye Softare
More informationTwo hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book
Two hours UNIVERSITY OF MANCHESTER Database Architecture Models and Design January 2004 Answer any THREE questions Answer each question in a separate book The use of electronic calculators is not peritted.
More informationRecap: Consensus. CSE 486/586 Distributed Systems Mutual Exclusion. Why Mutual Exclusion? Why Mutual Exclusion? Mutexes. Mutual Exclusion C 1
Reca: Consensus Distributed Systems Mutual Exclusion Steve Ko Comuter Sciences and Engineering University at Buffalo On a synchronous system There s an algorithm that works. On an asynchronous system It
More informationTrees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]
CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority
More informationAn Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering
An Enseble of Adative euro-fuzzy Kohonen etworks for Online Data Strea Fuzzy Clustering Zhengbing Hu School of Educational Inforation Technology Central China oral University Wuhan China Eail: hzb@ail.ccnu.edu.cn
More informationConsensus a classic problem. Consensus, impossibility results and Paxos. Distributed Consensus. Asynchronous networks.
Consensus, impossibility results and Paxos Ken Birman Consensus a classic problem Consensus abstraction underlies many distributed systems and protocols N processes They start execution with inputs {0,1}
More informationWeeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10
Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationREAL NUMBERS. 1.1 Introduction
REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationAn energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
Zhou et al. EURASIP Journal on Wireless Counications and Networking 2014, 2014:163 htt://jwcn.eurasijournals.co/content/2014/1/163 RESEARCH Oen Access An energy-efficient rando verification rotocol for
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationa) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company.
a) Figure shows a sall part of an Extended-Entity-Relationship odel describing the personnel departent of a research copany. GivenNae FailyNae relationship telephone NInuber NextOfKin contact Eployee d
More informationCOMP 250. Lecture 4. Array lists. Sept. 15, 2017
COMP 25 Lecture 4 Arra lists Set. 5, 27 Arras in Java int[ ] Ints = new int[5]; Ints[3] = -732; Arra whose eleents have a riitive te 2 Ints int[ ] Ints = new int[5]; Ints[3] = -732; 2 3 : 4-732 : Arras
More information22. Swaping: Policies
22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationInteractive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference
Interactive Fuzzy Modeling by Evolutionary Multiobjective Otiization with User Preference Yusue ojia, Hisao Ishibuchi Deartent of Couter Science and Intelligent Systes, Osaa Prefecture University - Gauen-cho,
More informationDistributed Systems. 7. Coordination and Agreement
Distributed Systems 7. Coordination and Agreement Werner Nutt 1 Co-ordination Algorithms are fundamental in distributed systems: to dynamically re-assign the role of master choose rimary server after crash
More informationCompiling an Honest but Curious Protocol
6.876/18.46: Advanced Cryptography May 7, 003 Lecture 1: Copiling an Honest but Curious Protocol Scribed by: Jonathan Derryberry 1 Review In previous lectures, the notion of secure ultiparty coputing was
More informationGrading Results Total 100
University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal
More informationMeasuring Bottleneck Bandwidth of Targeted Path Segments
Measuring Bottleneck Bandwidth of Targeted Path Segents Khaled Harfoush Deartent of Couter Science North Carolina State University Raleigh, NC 27695 harfoush@cs.ncsu.edu Azer Bestavros Couter Science Deartent
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationLecture 7: Logical Time
Lecture 7: Logical Time 1. Question from reviews a. In protocol, is in- order delivery assumption reasonable? i. TCP provides it b. In protocol, need all participants to be present i. Is this a reasonable
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationImage Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK.
Iage Processing for fmri John Ashburner Wellcoe Trust Centre for Neuroiaging, 12 Queen Square, London, UK. Contents * Preliinaries * Rigid-Body and Affine Transforations * Optiisation and Objective Functions
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationPerformance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory
International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan
More informationSingle Degree-of-Freedom Rigidly Foldable Cut Origami Flashers
Robert J. Lang Lang Origai, Alao, CA 9507 e-ail: robert@langorigai.co Sencer Magleby Deartent of Mechanical Engineering, Brigha Young University, Provo, UT 860 e-ail: agleby@byu.edu Larry Howell Deartent
More informationCLOUD computing is quickly becoming an effective and
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 203 087 Otial Multiserver Configuration for Profit Maxiization in Cloud Couting Junwei Cao, Senior Meber, IEEE, Kai Hwang, Fellow,
More informationBGP Path visibility issues.
BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationThe Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*
The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully
More informationAn Architecture for a Distributed Deductive Database System
IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA
More informationMarkov Analysis for Optimum Caching as an Alternative to Belady s Algorithm
arov Analysis for Otiu Caching as an Alternative to Belady s Algorith, Deutsche Teleo, Darstadt, Gerany gerhard.hasslinger@teleo.de Analytic Results on LRU, LFU, Otiu Caching Belady s Princile for Otiu
More informationConsensus, impossibility results and Paxos. Ken Birman
Consensus, impossibility results and Paxos Ken Birman Consensus a classic problem Consensus abstraction underlies many distributed systems and protocols N processes They start execution with inputs {0,1}
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationVodafone MachineLink. Port Forwarding / DMZ Configuration Guide
Vodafone MachineLink Port Forwarding / DMZ Configuration Guide Docuent history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone
More informationQoS and Sensible Routing Decisions
QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationArranging lunch value of preserving the causal order. a: how about lunch? meet at 12? a: <receives b then c>: which is ok?
Lamport Clocks: First, questions about project 1: due date for the design document is Thursday. Can be less than a page what we re after is for you to tell us what you are planning to do, so that we can
More informationhas been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE
This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with
More informationLecture 7: Objects (Chapter 15) CS 1110 Introduction to Computing Using Python
htt://www.cs.cornell.edu/courses/cs1110/2018s Lecture 7: Objects (Chater 15) CS 1110 Introduction to Comuting Using Python [E. Andersen, A. Bracy, D. Gries, L. Lee, S. Marschner, C. Van Loan, W. White]
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationClock Synchronization. Synchronization. Clock Synchronization Algorithms. Physical Clock Synchronization. Tanenbaum Chapter 6 plus additional papers
Clock Synchronization Synchronization Tanenbaum Chapter 6 plus additional papers Fig 6-1. In a distributed system, each machine has its own clock. When this is the case, an event that occurred after another
More informationSlides for Chapter 12: Coordination and Agreement
Slides for hater : oordination and greement rom oulouris, ollimore and Kindberg istributed Systems: oncets and esign dition, ailure ssumtions and ailure etectors reliable communication channels rocess
More informationEffect of Redundancy on Mean Time to Failure of Wireless Sensor Networks
ect o Redundancy on Mean Tie to Failure o Wireless Sensor Networks Anh Phan Speer Ing-Ray Chen Abstract Virginia Tech Departent o Coputer Science {nphan, irchen}@vt.edu In uery-based wireless sensor networks
More informationDistributed Systems (5DV147)
Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new
More informationEUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD
EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationTruth Trees. Truth Tree Fundamentals
Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth
More informationNear Light Correction for Image Relighting and 3D Shape Recovery
Near Light Correction for Iage Relighting and 3D Shae Recovery Anonyous for Review Abstract In this aer, we roose a near-light illuination odel for iage relighting and 3D shae recovery Classic ethods such
More informationsearch(i): Returns an element in the data structure associated with key i
CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture
More informationEssential Question What conjectures can you make about a figure reflected in two lines?
OO O earning tandard -O..5 -O..6. OTUTI VI UT To be proficient in ath, ou need to ae conjectures and justif our conclusions. ongruence and Transforations ssential uestion What conjectures can ou ae about
More informationDistributed Algorithms
Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms
More informationAnalysis of a Biologically-Inspired System for Real-time Object Recognition
Cognitive Science Online, Vol.3.,.-4, 5 htt://cogsci-online.ucsd.edu Analysis of a Biologically-Insired Syste for Real-tie Object Recognition Erik Murhy-Chutorian,*, Sarah Aboutalib & Jochen Triesch,3
More informationArchitectural Issues of JMS Compliant Group Communication
Architectural Issues of JMS opliant Group ounication Arnas Kupšys Richard Ekwall École Polytechnique Fédérale de Lausanne (EPFL) H-1015 Lausanne, Switzerland {arnas.kupsys, nilsrichard.ekwall}@epfl.ch
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationA Cache Coherence Protocol to Implement Sequential Consistency. Memory Consistency in SMPs
6.823, L20--1 A Cache Coherence rotocol to Ipleent Sequential Consistency Laboratory for Coputer Science M.I.T. http://www.csg.lcs.it.edu/6.823 Meory Consistency in SMs CU-1 CU-2 6.823, L20--2 A 100 cache-1
More informationVision Based Mobile Robot Navigation System
International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of
More informationSpatial interference encoding patterns based super resolved photoacoustic microscopy
Satial interference encoding atterns based suer resolved hotoacoustic icroscoy Aihai Meiri 1, Eric M. Stroh 2, Michael C. Kolios 2 and Zeev Zalevsky 1 1 Faculty of Engineering and the Nano Technology Center,
More informationThese are notes for the third lecture; if statements and loops.
These are notes for the third lecture; if statements and loops. 1 Yeah, this is going to be the second slide in a lot of lectures. 2 - Dominant language for desktop application development - Most modern
More informationElection Algorithms. has elected i. will eventually set elected i
Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server
More informationTIME AND SYNCHRONIZATION. I. Physical Clock Synchronization: Motivation and Challenges
TIME AND SYNCHRONIZATION In previous lectures, we discussed some important concepts and goals of distributed. One important concept is remote procedure calls, where we saw how failures creep up into semantics
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationcm3520 cm3525 Security Function
wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More information10. Multiprocessor Scheduling (Advanced)
10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationInteroperability/ Conformance Test dpmr Mode 2 Repeater
Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationM Software management
M Software anageent This docuent is part of the UCISA Inforation Security Toolkit providing guidance on the policies and processes needed to ipleent an organisational inforation security policy. To use
More informationBrian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi
A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationCS5412: TRANSACTIONS (I)
1 CS5412: TRANSACTIONS (I) Lecture XVII Ken Birman Transactions 2 A widely used reliability technology, despite the BASE methodology we use in the first tier Goal for this week: in-depth examination of
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationPredicting x86 Program Runtime for Intel Processor
Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given
More informationGearing Up for Honors Geometry!
Gearing Up for Honors Geoetr! Honors Geoetr is right around the corner and ou need to ake sure ou are read! Man of the concepts ou learned in Algebra I will be used in Geoetr and ou will be epected to
More informationPreprocessing I: Within Subject John Ashburner
Preprocessing I: Within Subject John Ashburner Pre-processing Overview Statistics or whatever fmri tie-series Anatoical MRI Teplate Soothed Estiate Spatial Nor Motion Correct Sooth Coregister 11 21 31
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationFeatures. 210 mm. relay outputs 64 mm. input. triac outputs
12 Mark Terinal Unit Controller (3 fan seed ) 12 LONMARK TERMINAL UNIT CONTROLLER (3 fan seed) Descrition The 12 is a terinal unit controller which can be networked using Works (). It can counicate with
More information