• Title/Summary/Keyword: Primary-copy

Search Result 37, Processing Time 0.028 seconds

Floating Primary Copy Method for Replica Control of Spatial Data (공간 데이터베이스의 중복 제어를 위한 Floating Primary Copy 기법)

  • 최진오
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.68-72
    • /
    • 2002
  • CIS 응용에서 공간 객체들이 여러 사이트에 걸쳐 중복 저장되어 있다면, 이 객체들의 수정 시 일관성 제어를 위한 중복 제어 기법이 필요하다. 그러나, 일반적인 비즈니스 데이터를 위한 정통적인 중복 제어기법은 공간 데이터에는 그대로 사용될 수 없다. 공간 데이터의 수정은 긴 트랜 션을 필요로 하며, 또한 일반 데이터와 달리 데이터간의 공간 종속성을 지니기 때문이다. 본 논문은 기존의 Primary Copy 중복 제어 기법을 확장하며, time-stamp에 기반하여 Primary Copy 사이트가 변경되는 Floating Primary Copy 기법을 제안한다. 본 논문에서 제안하는 중복 제어 기법은 Primary Copy 사이트를 동적으로 변경함으로써, 긴 트랜 션의 중복 일관성 제어를 지원할 수 있다.

  • PDF

Multi-level Consistency Control Techniques in P2P Multiplayer Game Architectures with Primary Copy (기본 사본을 갖는 P2P 멀티플레이어 게임 구조의 수준별 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.135-143
    • /
    • 2015
  • A Multiplayer Online Game(MOG) is a game capable of supporting hundreds or thousands of players and is mostly played using the Internet. P2P(peer-to-peer) architectures for MOGs can potentially achieve high scalability, low cost, and good performance. The basic idea of many P2P-based games is to distribute the game state among peers and along with it processing, network, and storage tasks. In a primary-copy based replication scheme where any update to the object has to be first performed on the primary copy, this means distributing primary copies of objects among peers. Most multiplayer games use a primary-copy model in order to provide strong consistency control over an object. Games consist of various types of actions that have different levels of sensitivity and can be categorized according to their consistency requirements. With the appropriate consistency level of each action type within a game, this paper allows developers to choose the right trade-off between performance and consistency. The performance for P2P game architecture with the primary-copy model is evaluated through simulation experiments and analysis.

Replication and Consistency Control in Hybrid Architectures for Multiplayer Online Games (멀티플레이어 온라인 게임을 위한 하이브리드 구조의 복제와 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.73-80
    • /
    • 2016
  • Multiplayer Online Games(MOG) using the Internet are typically organized based on a CS(client-server) or P2P(peer-to-peer) architecture. We then propose a method that combines a P2P architecture with a CS architecture in order to utilize their advantages. Most MOGs use a primary-copy replication approach that provides strong consistency control over an object. For each object and character there exists an authoritative copy, called primary copy and all other copies are secondary copies or replicas. Any update to the object has to be first performed on the primary copy. In the proposed hybrid architecture, primary copies may reside on the server or be held by clients. In this architecture, load balancing between a server and clients can be achieved by reducing the number of objects maintained by the server. Games consist of various types of actions with different consistency requirements. A multi-level approach to game consistency is sensible as it provides the best trade-off between consistency and performance. The performance for the hybrid game architecture with the primary-copy model is evaluated through simulation experiments and analysis in this paper.

Object Replication and Consistency Control Techniques of P2P Structures for Multiplayer Online Games (멀티플레이어 온라인 게임을 위한 P2P 구조의 객체 복제와 일관성 제어 기법)

  • Kim, Jinhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.91-99
    • /
    • 2014
  • The main game architectures for multiplayer online games are the traditional client-server architectures, multi-server architectures and P2P(peer-to-peer) architectures. P2P architectures, due to their distributed and collaborative nature, have low infrastructure costs and can achieve high scalability as well as fast response time by creating direct connections between players. However, P2P architectures face many challenges. Distributing a game among peers makes maintaining control over the game more complex. These architectures also tend to be vulnerable to churn and cheating. Providing consistency control in P2P systems is also more difficult since conflicting updates might be executed at different sites resulting in inconsistency. In order to avoid or correct inconsistencies, most multiplayer games use a primary-copy replication approach where any update to the object has to be first performed on the primary copy. This paper presents the primary-copy model with the update dissemination mechanism that provides consistency control over an object in P2P architectures for multiplayer online games. The performance for this model is evaluated through simulation experiments and analysis.

Remote Procedure Call Scheme to Support Fault-Tolerance (결함 허용을 제공하는 원격 프로시듀어 호출 기법)

  • Han, Suk-Jin;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.453-465
    • /
    • 1995
  • RPC(Remote Procedure Call) has been studied for programmer to easily write distributed program of little bit higher efficiency and reliability. In this study, fault-tolerant remote procedure call for hardware failures is proposed. Fault-tolerance is supplied by replicated procedures with node group, so called chain, and copies along chains are linearly ordered. Calls for procedure are sent to primary copy along chains, and other copies are propagated internally. If failures happen, first copy in faultless chain returns the result to the caller, Especially, in this study processing of redundant call message and result message, while using limited ack message, are avoided. This method supplies efficient and reliable fault-tolerance compared with existing remote procedure call.

  • PDF

Lock-based Secure Protocol in Real-Time Databases (실시간 데이터베이스에서 로킹기반 보안 프로토콜)

  • 박수연;이승룡
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.211-213
    • /
    • 1998
  • 실시간 응용을 위한 데이터베이스 시스템은 시간 제약 조건을 만족시켜야 하며, 데이터 일관성을 유지해야 한다. 또한 다중레벨을 지원하는 보안 프로토콜은 cover channel의 생성을 방지하는 것이 중요하다. Son과 Mukkamala는 primary copy와 secondary copy를 사용한 SRT-2PL을 개발하였다. 이 프로토콜은 보안 레벨간의 불간섭(non-interference)을 지원하며, covert channel의 발생을 막을 수 있으며, 지연이 적고 취소가 적으므로 실시간 데이터베이스 시스템에서 보안을 유지하는데 사용될 수 있다. 그러나 secondary copy를 모든 데이터 오브젝트에 대해 항상 보존해야 하므로 작업공간의 낭비가 있고, 데이터의 갱신을 위해 update queue를 관리해야 하는 오버헤드와 그에 따른 예측성 결여가 문제점으로 나타난다. 따라서, 본 논문에서는 불간섭을 지원하여 covert channel의 발생을 방지하면서, 복사본의 유지 기간을 줄여 실시간 지원을 강화시키고, 예측성을 좀더 높인 개선된 SRT-2PL 실시간 데이터베이스 보안 프로토콜을 제안한다. 본 논문에서 제안하는 동적 복사 알고리즘은 트랜잭션의 동작에 따라 동적으로 복사본을 생성하여 레벨간의 불간섭을 제공함과 동시에, 복사본의 유지 기간을 줄여 작업공간의 낭비를 줄이고 예측성을 높일 수 있다.

A Dynamic Transaction Routing Algorithm with Primary Copy Authority (주사본 권한을 이용한 동적 트랜잭션 분배 알고리즘)

  • Kim, Ki-Hyung;Cho, Hang-Rae;Nam, Young-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1067-1076
    • /
    • 2003
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. In this paper, we propose a dynamic transaction routing algorithm to balance the load of each node in the DSS. The proposed algorithm is novel in the sense that it can support node-specific locality of reference by utilizing the primary copy authority assigned to each node; hence, it can achieve better cache hit ratios and thus fewer disk I/Os. Furthermore, the proposed algorithm avoids a specific node being overloaded by considering the current workload of each node. To evaluate the performance of the proposed algorithm, we develop a simulation model of the DSS, and then analyze the simulation results. The results show that the proposed algorithm outperforms the existing algorithms in the transaction processing rate. Especially the proposed algorithm shows better performance when the number of concurrently executed transactions is high and the data page access patterns of the transactions are not equally distributed.

Cache Coherency Schemes for Database Sharing Systems with Primary Copy Authority (주사본 권한을 지원하는 공유 데이터베이스 시스템을 위한 캐쉬 일관성 기법)

  • Kim, Shin-Hee;Cho, Haeng-Rae;Kim, Byeong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1390-1403
    • /
    • 1998
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DB'\fS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be cnsured so that every node can always access the'latest version of pages. In this paper, we propose efficient cache consistency schemes in DSS, where the database is logically partitioned using primary copy authority to reduce locking overhead, The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency, Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

Characterization of rock bream (Oplegnathus fasciatus) fin cells and its susceptibility to different genotypes of megalocytiviruses

  • Jeong, Ye Jin;Kim, Young Chul;Min, Joon Gyu;Jeong, Min A;Kim, Kwang Il
    • Journal of fish pathology
    • /
    • v.34 no.2
    • /
    • pp.149-159
    • /
    • 2021
  • Genus Megalocytivirus cause red sea bream iridoviral disease (RSIVD) and scale drop disease (SDD). Based on the phylogeny of the major capsid protein (MCP) and adenosine triphosphatase (ATPase) genes, megalocytiviruses except for SDD virus (SDDV) could be three different genotypes, red sea bream iridovirus (RSIV), infectious spleen and kidney necrosis (ISKNV), and turbot reddish body iridovirus (TRBIV). In this study, primary cells derived from the caudal fin of rock bream (Oplegnathus fasciatus) grew at 25℃ in Leibovitz's medium supplemented with 10% (v/v) fetal bovine serum and primocin (100 ㎍/mL). Rock bream fin (RBF) cells exhibited susceptibility to infections by different genotypes of megalocytiviruses (RSIV, ISKNV and TRBIV) with the appearance of cytopathic effects with an increase in the viral genome copy number. Furthermore, compared to grunt fin (GF) cells, even though 10 times lower number of RSIV genome copies were inoculated in RBF cells, viral genome copy number produced on RBF cells were 44 times higher than that of GF cells at 7 d post-inoculation. As the isolated RBF cells are sensitive to different genotypes of megalocytiviruses (RSIV, ISKNV and TRBIV), they can be used for future studies regarding in vitro viral infection and subsequent diagnosis.

Comparison of the Genetic Alterations between Primary Colorectal Cancers and Their Corresponding Patient-Derived Xenograft Tissues

  • Yu, Sang Mi;Jung, Seung-Hyun;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.16 no.2
    • /
    • pp.30-35
    • /
    • 2018
  • Patient-derived xenograft (PDX) models are useful tools for tumor biology research and testing the efficacy of candidate anticancer drugs targeting the druggable mutations identified in tumor tissue. However, it is still unknown how much of the genetic alterations identified in primary tumors are consistently detected in tumor tissues in the PDX model. In this study, we analyzed the genetic alterations of three primary colorectal cancers (CRCs) and matched xenograft tissues in PDX models using a next-generation sequencing cancer panel. Of the 17 somatic mutations identified from the three CRCs, 14 (82.4%) were consistently identified in both primary and xenograft tumors. The other three mutations identified in the primary tumor were not detected in the xenograft tumor tissue. There was no newly identified mutation in the xenograft tumor tissues. In addition to the somatic mutations, the copy number alteration profiles were also largely consistent between the primary tumor and xenograft tissue. All of these data suggest that the PDX tumor model preserves the majority of the key mutations detected in the primary tumor site. This study provides evidence that the PDX model is useful for testing targeted therapies in the clinical field and research on precision medicine.