Replication and Consistency (3). Reference r Automated Hoarding for Mobile Computers by G. Kuenning and G. Popek.

Slides:



Advertisements
Similar presentations
Chapter 7: Deadlocks.
Advertisements

Sorting Really Big Files Sorting Part 3. Using K Temporary Files Given  N records in file F  M records will fit into internal memory  Use K temp files,
Hierarchical Clustering. Produces a set of nested clusters organized as a hierarchical tree Can be visualized as a dendrogram – A tree-like diagram that.
Mr Greenhalgh S4 Computing Int 1 Things you could do with knowing before the Exam…
Lecture 11: Operating System Services. What is an Operating System? An operating system is an event driven program which acts as an interface between.
Automating Hoarding Prasun Dewan Department of Computer Science University of North Carolina
Advanced Topics in Algorithms and Data Structures An overview of the lecture 2 Models of parallel computation Characteristics of SIMD models Design issue.
Coda file system: Disconnected operation By Wallis Chau May 7, 2003.
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
Models of Parallel Computation Advanced Algorithms & Data Structures Lecture Theme 12 Prof. Dr. Th. Ottmann Summer Semester 2006.
G Robert Grimm New York University Bayou: A Weakly Connected Replicated Storage System.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Computers They're Not Magic! (for the most part)‏ Adapted from Ryan Moore.
Chapter 3: Cluster Analysis  3.1 Basic Concepts of Clustering  3.2 Partitioning Methods  3.3 Hierarchical Methods The Principle Agglomerative.
PETAL: DISTRIBUTED VIRTUAL DISKS E. K. Lee C. A. Thekkath DEC SRC.
Introduction to. What is Office 365 Office 365 is the same Office you already know and use every day. Office 365 is powered by “the cloud” which is a.
Types of Operating System
Computer Memory Chips Vs. Human Memory Computer Memory Chips Vs. Human Memory Agenda.Introduction.What does ( memory ) mean ?.Brain memory V.S computer.
MULTIMEDIA What is Multimedia? The word MULTIMEDIA is made up from two words, MULTI meaning more than one and MEDIA meaning a way of displaying or passing.
Input/OUTPUT [I/O Module structure].
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
Types of Computers Mainframe/Server Two Dual-Core Intel ® Xeon ® Processors 5140 Multi user access Large amount of RAM ( 48GB) and Backing Storage Desktop.
CISC105 General Computer Science Class 1 – 6/5/2006.
Replication for Mobile Computing Prasun Dewan Department of Computer Science University of North Carolina
WindowsXP Explorer The Explorer is a used to organize and control the files and folders of the different storage systems such as the hard drive, floppy.
Business Computer Information Systems I.  Knowing how to use a computer is a basic skill necessary to succeed in business or to function effectively.
Memory Hierarchy and Cache Memory Jennifer Tsay CS 147 Section 3 October 8, 2009.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Faculty of Computer & Information
1 Mobile File Systems: Disconnected and Weakly Connected File Systems 3/29/2004 Richard Yang.
Chapter 7 – Deadlock (Pgs 283 – 306). Overview  When a set of processes is prevented from completing because each is preventing the other from accessing.
1 Shared Files Sharing files among team members A shared file appearing simultaneously in different directories Share file by link File system becomes.
Networking Relationships What is a computer network?
Feb 27, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Computer Memory Chips Vs. Human Memory Computer Memory Chips Vs. Human Memory Agenda Introduction What does ( memory ) mean ? Brain memory V.S computer.
Computer Basic Vocabulary
COMPUTER CONCEPTS Unit A: Computer and Internet Basics 1.
The Computer System CS 103: Computers and Application Software.
Chapter 1: Overview of SAS System Basic Concepts of SAS System.
What is Web Information retrieval from web Search Engine Web Crawler Web crawler policies Conclusion How does a web crawler work Synchronization Algorithms.
“Read Only Memory” a class of storage media used in computers and other electronic devices. This tells the computer how to load the operating system.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
 A computer is an electronic device that receives data (input), processes data, stores data, and produces a result (output).  It performs only three.
REGISTER TRANSFER LANGUAGE (RTL) INTRODUCTION TO REGISTER Registers1.
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
The Anatomy of a Large-Scale Hypertextual Web Search Engine S. Brin and L. Page, Computer Networks and ISDN Systems, Vol. 30, No. 1-7, pages , April.
Introducing Windows 95 Session Two. Today’s Agenda u Formatting Disks u Copying Disks u Mapping Network Drives u Connecting to Network Printers.
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
Technology Applications Mr. Moses
Jonathan Walpole Computer Science Portland State University
Resource Management IB Computer Science.
REGISTER TRANSFER LANGUAGE (RTL)
MICROCOMPUTER HARDWARE (CONTINUED)
Architecture Concept Documents
Unified Modeling Language
Software Architecture
Interaction of Hardware
CSE 451: Operating Systems Winter Module 22 Distributed File Systems
Types of Computers Mainframe/Server
Information Technology Ms. Abeer Helwa
Distributed File Systems
Distributed File Systems
CSE 451: Operating Systems Spring Module 21 Distributed File Systems
Distributed File Systems
CSE 451: Operating Systems Winter Module 22 Distributed File Systems
Distributed File Systems
Some Graph Algorithms.
Distributed File Systems
Presentation transcript:

Replication and Consistency (3)

Reference r Automated Hoarding for Mobile Computers by G. Kuenning and G. Popek

Hoarding r Prefetching and storing objects for access when the network is disconnected or weakly-connected r Example: Internet Explorer lets you browse web pages offline.

Problem r Local storage space is limited. How do I hoard all the data that I need so that I can continue to work, while I’m offline? m Suppose I have 80 GB worth of files in the connected machine. I have a 20 GB hard drive in the mobile computer, how can I copy files such that I can continue to work without disruption? m Suppose I have 80 GB hard drive in the mobile device, hoarding profile is not necessary. r The difficult challenge is selecting which files should be stored locally.

Problem r User input is necessary. m Users should say what they want to be hoarded for disconnected access. But, users do not know what files they really need. They can tell that they need Powerpoint. But they can’t say that they also need some.dll file that is needed to print the presentation onto a laser printer.

SEER System Overview r Observer m Observes user behavior in the form of high-level file accesses (e.g. open). r Correlator m Computes relation between files (called semantic distance). r Clustering Algorithm m Clusters related files to projects r Replication System m Takes care of the replication of the files r External Investigators m Can add additional file-relation data

Flow Diagram r Observing user behavior r Computing semantic distance r User wishes to disconnect r Clustering the files into projects r Storing whole projects on local disk until maximum hoard size is reached. r Disconnect

Semantic Distance r Relationship between two file references. r Assumption: m Semantic locality correlates with temporal locality. r Definition 1: m Semantic distance is equal to the elapsed clock cycles. m Phone calls, disparity between human/computer time scales. r Definition 2: m Semantic distance is equal to number of intervening references. m Lifetimes are more important then point-in-times.

Semantic Distance r Definition 3: m Semantic distance between opening of the file A and opening of file B equals 0 if A is still open while B is opened. m Otherwise the semantic distance is equal to number of intervening references. r Not symmetric!

Semantic Distance r Example: m Reference Sequence ABBCCADD m The first appearance is open, the second is close  A => B,C,D = 0,0,3B => C,D = 1,2 C => D = 1 All other distances are undefined AD B C

Semantic Distance r O(N²) space complexity (N is the number files) r O(N) time complexity for update m N is the number of tracked files r Improvement m Only the n (=20) nearest distances are tracked m Update only distances from files within less then M (=100) m Exchanges in the n nearest files use priority and aging system

Data Reduction r File relation is wanted, not reference relation. r Can use the average of distances computed, but doesn’t always work well. m Example:If three event pairs produce distances of 1,1, and 1498 the arithmetic mean would be 500 which is what you would get if you had 500,500 and 500. r Geometric mean is computed.

Other Measures r Files in the same directory r Files with related filenames r Hot links m Example: #include in C/C++ programs r External investigators m Provide additional information about file relationship m Example: Parses C-source files for #include m Information is used during clustering.

Agglomerative Algorithm r Bottom-up algorithm m Compute n nearest neighbors m Intersect the nearest neighbor lists of all file pairs m Intersection has more than k members -> join clusters m Parameters: n,k m Transitive r O(N) space complexity r O(N²) time complexity

Modified Agglomerative Algorithm r Use Correlator list as n nearest neighbors r Use k-near and k-far instead of k m Combine clusters using k-near instead of k m Share files having k-near and k-far shared neighbors. x is number of shared neighbors and is modified by external investigators O(N) time complexity RelationshipAction k-near <= xClusters merged k-far <= x < k-nearFiles inserted; clusters not merged x < k-farNo action

Issues r Meaningless activitites r Shared libraries r Critical files r Detecting hoard misses r Temporary files and directories r Non-files r Simultaneous accesses r Non-open references r Parameter settings r Avoiding deadlock r Tracing system calls

Conclusion r SEER provides a high level of automation r SEER allows disconnected computing without user interaction r SEER has had almost no hoard misses in tests r SEER uses too much memory