Distributed Systems PPT On Consistency and Transistions
Distributed Systems PPT On Consistency and Transistions
Replication
vrsec sources
Chapter 6
1
Data-Centric Consistency
Models
• The general organization of a logical
data store, physically distributed and
replicated across multiple processes.
vrsec sources
2
3
vrsec sources
4
vrsec sources
5
vrsec sources
6
vrsec sources
Strict Consistency
vrsec sources
• Behavior of two processes, operating on the same data item.
• A strictly consistent store.
• A store that is not strictly consistent.
7
Linearizability and Sequential
Consistency (1)
vrsec sources
a) A sequentially consistent data store.
b) A data store that is not sequentially consistent.
8
Linearizability and Sequential
Consistency (2)
x = 1; y = 1; z = 1;
vrsec sources
print ( y, z); print (x, z); print (x, y);
vrsec sources
y = 1; print (x,z); print (x, y); z = 1;
print (x, z); print(y, z); print (x, z); print (x, z);
z = 1; z = 1; x = 1; print (y, z);
print (x, y); print (x, y); print (y, z); print (x, y);
vrsec sources
different order on different machines.
11
Casual Consistency (2)
vrsec sources
• This sequence is allowed with a casually-consistent store, but not
with sequentially or strictly consistent store.
12
FIFO Consistency (1)
• Necessary Condition:
Writes done by a single process are seen by all
other processes in the order in which they were
issued, but writes from different processes may
be seen in a different order by different
vrsec sources
processes.
13
FIFO Consistency (2)
vrsec sources
• A valid sequence of events of FIFO consistency
14
Weak Consistency (1)
• Properties:
• Accesses to synchronization variables
associated with a data store are
sequentially consistent
• No operation on a synchronization variable
vrsec sources
is allowed to be performed until all
previous writes have been completed
everywhere
• No read or write operation on data items
are allowed to be performed until all
previous operations to synchronization
variables have been performed. 15
Weak Consistency (2)
int a, b, c, d, e, x, y; /* variables */
int *p, *q; /* pointers */
int f( int *p, int *q); /* function prototype */
a = x * x; /* a stored in register */
b = y * y; /* b as well */
c = a*a*a + b*b + a * b; /* used later */
vrsec sources
d = a * a * c; /* used later */
p = &a; /* p gets address of a */
q = &b /* q gets address of b */
e = f(p, q) /* function call */
vrsec sources
a) A valid sequence of events for weak consistency.
b) An invalid sequence for weak consistency.
17
Release Consistency (1)
vrsec sources
• A valid event sequence for release consistency.
18
Release Consistency (2)
• Rules:
• Before a read or write operation on shared data is
performed, all previous acquires done by the process
must have completed successfully.
• Before a release is allowed to be performed, all previous
vrsec sources
reads and writes by the process must have completed
• Accesses to synchronization variables are FIFO
consistent (sequential consistency is not required).
19
Entry Consistency (1)
• Conditions:
• An acquire access of a synchronization variable is
not allowed to perform with respect to a process
until all updates to the guarded shared data have
been performed with respect to that process.
vrsec sources
• Before an exclusive mode access to a
synchronization variable by a process is allowed to
perform with respect to that process, no other
process may hold the synchronization variable, not
even in nonexclusive mode.
• After an exclusive mode access to a
synchronization variable has been performed, any
other process's next nonexclusive mode access to
that synchronization variable may not be 20
performed until it has performed with respect to
that variable's owner.
Entry Consistency (1)
vrsec sources
• A valid event sequence for entry consistency.
21
Summary of Consistency
Models
Consistency Description
Strict Absolute time ordering of all shared accesses matters.
Linearizability All processes must see all shared accesses in the same order. Accesses are furthermore
ordered according to a (nonunique) global timestamp
Sequential All processes see all shared accesses in the same order. Accesses are not ordered in
time
Causal All processes see causally-related shared accesses in the same order.
vrsec sources
FIFO All processes see writes from each other in the order they were used. Writes from
different processes may not always be seen in that order
(a)
Consistency Description
Weak Shared data can be counted on to be consistent only after a synchronization is done
Release Shared data are made consistent when a critical region is exited
Entry Shared data pertaining to a critical region are made consistent when a critical region is
entered.
(b)
22
a) Consistency models not using synchronization operations.
b) Models with synchronization operations.
vrsec sources
23
vrsec sources
24
Eventual Consistency(2)
vrsec sources
• The principle of a mobile user accessing different replicas of a 25
distributed database.
vrsec sources
26
vrsec sources
27
vrsec sources
28
vrsec sources
29
vrsec sources
30
vrsec sources
31
vrsec sources
32
Replica Placement
vrsec sources
• The logical organization of different kinds of copies of a
data store into three concentric rings.
33
Server-Initiated Replicas
• Counting access requests from different clients.
vrsec sources
34
Pull versus Push
Protocols
Issue Push-based Pull-based
Messages sent Update (and possibly fetch update later) Poll and update
vrsec sources
Response time at Immediate (or fetch-update time) Fetch-update time
client
vrsec sources
• Primary-based remote-write protocol with a fixed server to which 36
all read and write operations are forwarded.
Remote-Write Protocols
(2)
vrsec sources
• The principle of 37
primary-backup
protocol.
Local-Write Protocols (1)
vrsec sources
38
• Primary-based local-write protocol in which a single copy is migrated between
processes.
Local-Write Protocols (2)
vrsec sources
• Primary-backup protocol in which the primary migrates 39
to the process wanting to perform an update.
Active Replication (1)
vrsec sources
40
• The problem of replicated invocations.
Active Replication (2)
vrsec sources
a) Forwarding an invocation request from a replicated object. 41
b) Returning a reply to a replicated object.
Quorum-Based Protocols
vrsec sources
• Three examples of the voting algorithm:
a) A correct choice of read and write set
b) A choice that may lead to write-write conflicts
c) A correct choice, known as ROWA (read one, write all) 42
Orca
OBJECT IMPLEMENTATION stack;
top: integer; # variable indicating the top
stack: ARRAY[integer 0..N-1] OF integer # storage for the stack
OPERATION push (item: integer) # function returning nothing
BEGIN
GUARD top < N DO
stack [top] := item; # push item onto the stack
top := top + 1; # increment the stack pointer
OD;
END;
vrsec sources
OPERATION pop():integer; # function returning an integer
BEGIN
GUARD top > 0 DO # suspend if the stack is empty
top := top – 1; # decrement the stack pointer
RETURN stack [top]; # return the top item
OD;
END;
BEGIN
top := 0; # initialization
END;
vrsec sources
• Four cases of a process P performing an 44
operation on an object O in Orca.
Casually-Consistent Lazy
Replication
vrsec sources
45
• The general organization of a distributed data store. Clients are assumed to
also handle consistency-related communication.
Processing Read
Operations
• Performing a read operation at a local copy.
vrsec sources
46
Processing Write
Operations
vrsec sources
• Performing a write operation at a local copy. 47