{"title":"基于对象系统中的副本管理","authors":"Katsuya Tanaka, M. Takizawa","doi":"10.1109/ICOIN.2001.905453","DOIUrl":null,"url":null,"abstract":"In object-based systems, objects are encapsulations of data and procedures named methods and methods are invoked in a nested manner. We discuss how to lock replicated objects by using the quorum-based scheme. If a pair of methods op/sub 1/ and op/sub 2/ are compatible each method is surely performed on some replica, but both of them may not be performed on the same replica. Compatible methods are exchanged between the replicas if both the methods are not performed on any of the replicas in our protocol. If a method op/sub 1/ is invoked on multiple replicas and each instance of the method op/sub 1/ invokes a method op/sub 2/, op/sub 2/ is performed multiple times on an object, i.e. redundant invocation. In addition since each instance of op/sub 1/ issues a request op/sub 2/ to its quorum, more number of the replicas are locked than the quorum number of op/sub 1/. This is quorum explosion. We discuss how to resolve these redundant invocations and quorum explosion.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Replica management in object-based systems\",\"authors\":\"Katsuya Tanaka, M. Takizawa\",\"doi\":\"10.1109/ICOIN.2001.905453\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In object-based systems, objects are encapsulations of data and procedures named methods and methods are invoked in a nested manner. We discuss how to lock replicated objects by using the quorum-based scheme. If a pair of methods op/sub 1/ and op/sub 2/ are compatible each method is surely performed on some replica, but both of them may not be performed on the same replica. Compatible methods are exchanged between the replicas if both the methods are not performed on any of the replicas in our protocol. If a method op/sub 1/ is invoked on multiple replicas and each instance of the method op/sub 1/ invokes a method op/sub 2/, op/sub 2/ is performed multiple times on an object, i.e. redundant invocation. In addition since each instance of op/sub 1/ issues a request op/sub 2/ to its quorum, more number of the replicas are locked than the quorum number of op/sub 1/. This is quorum explosion. We discuss how to resolve these redundant invocations and quorum explosion.\",\"PeriodicalId\":332734,\"journal\":{\"name\":\"Proceedings 15th International Conference on Information Networking\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 15th International Conference on Information Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2001.905453\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 15th International Conference on Information Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2001.905453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In object-based systems, objects are encapsulations of data and procedures named methods and methods are invoked in a nested manner. We discuss how to lock replicated objects by using the quorum-based scheme. If a pair of methods op/sub 1/ and op/sub 2/ are compatible each method is surely performed on some replica, but both of them may not be performed on the same replica. Compatible methods are exchanged between the replicas if both the methods are not performed on any of the replicas in our protocol. If a method op/sub 1/ is invoked on multiple replicas and each instance of the method op/sub 1/ invokes a method op/sub 2/, op/sub 2/ is performed multiple times on an object, i.e. redundant invocation. In addition since each instance of op/sub 1/ issues a request op/sub 2/ to its quorum, more number of the replicas are locked than the quorum number of op/sub 1/. This is quorum explosion. We discuss how to resolve these redundant invocations and quorum explosion.