COTERIE JOIN ALGORITHM

被引:24
作者
NEILSEN, ML
MIZUNO, M
机构
[1] Department of Computing and Information Sciences, Kansas State University, Manhattan, KS
关键词
CONCURRENCY; COTERIES; DISTRIBUTED COMPUTING; FAULT TOLERANCE; MUTUAL EXCLUSION; QUORUMS; REPLICA CONTROL;
D O I
10.1109/71.159041
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given a set of nodes in a distributed system, a coterie is a collection of subsets of the set of nodes such that any two subsets have a nonempty intersection and are not properly contained in one another. A subset of nodes in a coterie is called a quorum. Coteries may be used to implement a distributed mutual exclusion algorithm which gracefully tolerates node and communication line failures. Two types of coteries exist: dominated and nondominated. In this paper, we introduce an algorithm, called the join algorithm, which takes nonempty coteries, as input, and returns a new, larger coterie. The new coterie is called a composite coterie. We prove that a composite coterie is nondominated if and only if the input coteries are nondominated. Using the algorithm, dominated or nondominated coteries may be easily constructed for a large number of nodes. Then, we present an efficient method for determining whether a given set of nodes contains a quorum of a composite coterie. The test does not require that the quorums of a composite coterie be computed in advance. As an example, we generalize tree coteries, using the join algorithm, and prove that tree coteries are nondominated. Finally, we show that the join algorithm may be used to generate read and write quorums which may be used by a replica control protocol.
引用
收藏
页码:582 / 590
页数:9
相关论文
共 10 条
  • [1] EXPLOITING LOGICAL-STRUCTURES IN REPLICATED DATABASES
    AGRAWAL, D
    ELABBADI, A
    [J]. INFORMATION PROCESSING LETTERS, 1990, 33 (05) : 255 - 260
  • [2] AGRAWAL D, 1989, 8TH P ACM S PRINC DI, P193
  • [3] MUTUAL EXCLUSION IN PARTITIONED DISTRIBUTED SYSTEMS
    BARBARA, D
    GARCIAMOLINA, H
    [J]. DISTRIBUTED COMPUTING, 1986, 1 (02) : 119 - 132
  • [4] THE VULNERABILITY OF VOTE ASSIGNMENTS
    BARBARA, D
    GARCIAMOLINA, H
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1986, 4 (03): : 187 - 213
  • [5] Bernstein Philip A., 1987, CONCURRENCY CONTROL
  • [6] HOW TO ASSIGN VOTES IN A DISTRIBUTED SYSTEM
    GARCIAMOLINA, H
    BARBARA, D
    [J]. JOURNAL OF THE ACM, 1985, 32 (04) : 841 - 860
  • [7] GIFFORD DK, 1979, 7TH P S OP SYST PRIN, P150
  • [8] A QUORUM-CONSENSUS REPLICATION METHOD FOR ABSTRACT-DATA-TYPES
    HERLIHY, M
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1986, 4 (01): : 32 - 53
  • [9] TIME, CLOCKS, AND ORDERING OF EVENTS IN A DISTRIBUTED SYSTEM
    LAMPORT, L
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (07) : 558 - 565
  • [10] A SQUARE-ROOT-N ALGORITHM FOR MUTUAL EXCLUSION IN DECENTRALIZED SYSTEMS
    MAEKAWA, M
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1985, 3 (02): : 145 - 159