SlideShare uma empresa Scribd logo
1 de 49
Shepherd: Node Monitors for Fault-Tolerant
Distributed Process Execution in OSIRIS
Nenad Stojnić
Databases & Information Systems Group
Outline
 Self-organizing properties in OSIRIS and
current limitations
 The Shepherd approach to fault-tolerance
 Novel migration algorithm
 Shepherd ring: herds, shepherd pools, routing
 Binding ring: Service lookup, late binding, load
balancing
 Summary
OSIRIS Open Service Infrastructure for Reliable and
Integrated process Support
 Decentralized P2P execution of processes
 Web Service Invocation
 Fault-tolerant, Self-* properties
 Late-binding & Load-balancing
 Safe continuation-passing (2PC)
 Pub/Sub Meta-data repositories
OSIRIS-Process execution
example
B CA
Process Definition
1
OSIRIS-Process migration
B CA
Process Definition
1
E
Service instances
OSIRIS
Layer
D
5Whiteboard
A
OSIRIS-Activity execution
B CA
Process Definition
1
AE
Service instances
OSIRIS
Layer
D
5Whiteboard
OSIRIS-Late binding
B CA
Process Definition
1
B
A
2
AE
Service instances
OSIRIS
Layer
D
5
D
B
4
OSIRIS-Late binding
B CA
Process Definition
1
B
A
2
AE
Service instances
OSIRIS
Layer
D
5
Whiteboard
D
B
4
OSIRIS-Successor failure
B CA
Process Definition
DC
3
1
B
A
2
C
E
6
AE
Service instances
OSIRIS
Layer
D
5
Whiteboard
D
B
4
OSIRIS-Successor failure
B CA
Process Definition
DC
3
1
B
A
2
C
E
6
AE
Service instances
OSIRIS
Layer
D
5
Whiteboard
D
B
4
X
OSIRIS-Successor failure
B CA
Process Definition
DC
3
1
B
A
2
C
E
6
AE
Service instances
OSIRIS
Layer
D
5
D
B
4
X
Whiteboard
OSIRIS-Migration failure
B CA
Process Definition
DC
3
1
B
A
2
C
E
6
AE
Service instances
OSIRIS
Layer
D
5
D
B
4
2PC
Whiteboard
X
OSIRIS-Predecessor failure
B CA
Process Definition
DC
3
1
B
A
2
C
E
6
AE
Service instances
OSIRIS
Layer
D
5
D
B
4
X
Whiteboard
OSIRIS
DC
3
1
B
A
2
C
E
6
D
B
4
AE
Service instances
OSIRIS
Layer
D
B CA
Process Definition
5
Whiteboard
OSIRIS-Current node failure
DC
3
B
A
2
C
E
6
Whiteboard
D
B
4
AE
Service instances
OSIRIS
Layer
D
B CA
Process Definition
X1
5
OSIRIS failure handling
Failure case Handling
Successor failure Late-binding
Migration failure 2PC abort
Predecessor failure No handling necessary
Temporary node failure Recovery from local
stable storage
Current node failure Process execution
stops/hangs
State is lost
No notification
Outline
 Self-organizing properties in OSIRIS and
current limitations
 The Shepherd approach to fault-tolerance
 Novel migration algorithm
 Shepherd ring: herds, shepherd pools, routing
 Binding ring: Service lookup, late binding, load
balancing
 Summary
Our solution: Shepherd
Shared Memory Layer
BA
OSIRIS Layer
Shepherd Layer
DC
3
E
D
1
B
A
2
D
B
4
D
A
5
2
EC
6
DC
7
Monitor
Read/Write
Shepherd Migration Algorithm
A
S1
K0
11
 Shepherd starts the
activity
 Picks a worker from
the herd
 Sends an activation
key K0
Shepherd Migration Algorithm
A
S1
K0
 Worker
acknowledges
supervision
 Resends the
activation key K0
 Start of monitoring
22
Shepherd Migration Algorithm
A
S1
<K0
,W0
>
 Worker reads the
whiteboard with the
activation key K0
33
Shepherd Migration Algorithm
(K1
,B)
A
S1
 Worker finishes
execution
 Generates a new
activation key K1
 Determines the
service type to
continue the
execution
44
Shepherd Migration Algorithm
A
S1
<K1
,W1
>
 Worker writes the
whiteboard with the
activation key K1
55
Shepherd Migration Algorithm
Wa c k
A
S1
66
 Worker
acknowledges write
of whiteboard
 Supervision ends
Shepherd Migration Algorithm
A
S1
S2
K1
,B
77
 Shepherd migrates to
another shepherd
 Passes on the
activation key K1
and
following service type
Shepherd Migration Algorithm
(K1
,B)
Wa c k
A
S1
B
S2
C
S3
<K0
,W0
> <K1
,W1
> <K2
,W2
>
K0
K1
,B
K1
K2
,C
K2
K2
<K3
,W3
>
11
33 55
44
66
77
(K2
,C)
Wa c k
(K3
,...)
Wa c k
22K0 K1 K1
K2
Shepherd failure cases
 Failure of worker nodes
 Failure of shepherds
 Failures in the shared memory
Failure of worker nodes
 Replacement node
from the herd
 Same service type
 Fail-safe services
 BUT undo side
effects on Shared
Memory
Wa c k
S1
A''
S2
<K0
,W0
> <K1
,W1
>
K0
33 55
A'
K0
...
AX
Failure of shepherds
 Shepherds organized
in pools, state shared
 WN speaks to the pool
 Transactional writes →
consistency guaranteed
 New leader learns
current state from the
pool A
S1X S2
Wa c k
...
Failures in shared memory
 Chord-based
 Replicated
transactional storage
 Successful writes
persistent
 failed read/write can
be always retried
A
S1
<K0
,W0
> <K1
,W1
>
X
Shepherd ring
 Used for:
 Worker node to shepherd assignment
 Routing of messages from WN to shepherds
 Pools construction
 Based on Chord structured overlay
 Indentifier circle of Shepherd node IDs and Worker
node Ids (Consistent hashing)
 Efficient routing: Log(NSh
)
Shepherd ring
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
WN
deliver(96.76.89.12,join
())
 Worker requests an
assignment to a
shepherd
 Submits a join
message to any
known shepherd
 If a shepherd
leaves the ring the
subsequent one
takes over the herd
Shepherd ring
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
h(96.76.89.12) = ID17
IP16
=98.x.x.x
deliver(96.76.89.12,join())
 Shepherd hashes
worker Id
 Routs the join
message another
shepherd
 Routing until the
responsible is found
Shepherd ring
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
IP16
=98.x.x.x
deliver(96.76.89.12,join())
IP17
=96.76.89.12
 Worker joins the
herd
 Exchanges
heartbeats with its
shepherd
Shepherd pools
 Symmetric replication strategy:
 Node ID congruence-modulo equivalence classes
 Responsible for x “knows” entire class of x
 Pool = all responsibles for a class
 Transactional guarantees
 Paxos consensus
Shepherd pools
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
Equivalence class: ID1
, ID9
, ID17
Congruence modulo: 8
Pool: S2
, S3
, S5
Pool size : 3
Shepherd pools
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
Equivalence class: ID1
, ID9
, ID17
Congruence modulo: 8
Pool: S2
, S3
, S5
Equivalence class: ID2
, ID10
, ID18
Pool: S2
, S3
, S5
Pool size : 3
Shepherd pools
S2
S5
S3
S4
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
Equivalence class: ID1
, ID9
, ID17
Congruence modulo: 8
Pool: S2
, S3
, S5
Equivalence class: ID2
, ID10
, ID18
Pool: S2
, S3
, S5
Equivalence class: ID3
, ID11
, ID19
Pool: S2
, S3
, S1
Pool size : 3
Late binding
 Locate a shepherd providing service type T
 Shepherd provides type T if it monitors instances of
type T
 Binding ring
 Physical nodes & service types (resources)
 Distributed “multimap” data structure
 Service type → List of shepherds
Binding ring
O3
O7
O5
O6
S8
O4
T1
T0
T2
T3
T4
T5
T6
T7
T8
T9
T10
T11T12
T23
T21
T22
T19
T20
T17
T18
T15
T16
T13
T14
store(T,S5
)
O1
O8
O2
rnd[1, Nfrag]? → 2
Tfrag 3
 Storing shepherd S5
providing service
type T
 Query for number of
fragments of type T
Binding ring
O3
O7
O5
O6
S8
O4
T1
T0
T2
T3
T4
T5
T6
T7
T8
T9
T10
T11T12
T23
T21
T22
T19
T20
T17
T18
T15
T16
T13
T14
store(T,S5
)
O1
O8
O2
Tfrag3
S2
S3
Tfrag1
S1
Tfrag2
S4
Cfrag=3
 Fragments of
service type T in the
ring
 Each fragment is a
multimap
Binding ring
O3
O7
O5
O6
S8
O4
T1
T0
T2
T3
T4
T6
T7
T8
T9
T10
T11T12
T23
T21
T22
T19
T20
T17
T18
T15
T16
T13
T14
store(T,S5
)
O1
O8
O2
Tfrag3
S2
S3
Tfrag1
S1
Tfrag2
S4
S5
rnd[1, Nfrag]? → 2
storefrag(Tfrag2
,S5
)
T5
 Random selection
of fragment for
storage
 If storage is full,
create a new
fragment and add to
it
Load balancing
 Optimize performance
 Extended binding ring
 Shepherd average load
 Publish/subscribe of load information
Load balancing
S3
S7
S5
ID1
ID0
ID2
ID3
ID4
ID5
ID6
ID7
ID8
ID9
ID10
ID11ID12
ID23
ID21
ID22
ID19
ID20
ID17
ID18
ID15
ID16
ID13
ID14
S1
WN3
Load = 40%
WN5
Load = 60%
11
11
22
22
 Shepherd ring
 Worker nodes
publish load to their
shepherd
Load balancing
O3
O7
O5
O6
S8
O4
T1
T0
T2
T3
T4
T5
T6
T7
T8
T9
T10
T11T12
T23
T21
T22
T19
T20
T17
T18
T15
T16
T13
T14
O1
O8
O2
S3
75%
S2
60%
Cfrag2
S1
70%
Cfrag1
S1
70%
S4
55%
Afrag1
Cfrag2Cbest
 Binding ring
 Avg. load of a
shepherd for a
service type
 Avg. load lists
sorted in fragments
Load balancing
O3
O7
O5
O6
S8
O4
ID9
T21
T22
ID15
O1
O8
O2
Cfrag1Cbest
Cbest
= < Cfrag1
, 50% >
T1
T0T23
T2
T3
T4
T5
T6
T7
T8
T10
T11T12
T13
T14
T19
T20
T17
T18
T16
S4
55%
S1
50%
Afrag1
S3
75%
S2
60%
Cfrag2
S1
50%
Cfrag1
 Start contest
 Least loaded type
fragment becomes
the best fragment
Outline
 Self-organizing properties in OSIRIS and
current limitations
 The Shepherd approach to fault-tolerance
 Novel migration algorithm
 Shepherd ring: herds, shepherd pools, routing
 Binding ring: Service lookup, late binding, load
balancing
 Summary
Summary
 Shepherd:
 Improved self-* properties in OSIRIS
 Novel completely decentralized architecture
 Future Work:
 Implementation & Experimental evaluation
 Extend to Stream-enabled services
 Customize transactional protocols for efficiency
 Economical cost-model (trade-off performance vs.
robustness)
Thank you for your attention!
Questions ?

Mais conteúdo relacionado

Semelhante a Shepherd: Node Monitors for Fault-Tolerant Distributed Process Execution in OSIRIS

ksqlDB Workshop
ksqlDB WorkshopksqlDB Workshop
ksqlDB Workshopconfluent
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelayCYBERINTELLIGENTS
 
IDOC_handy_document.pdf
IDOC_handy_document.pdfIDOC_handy_document.pdf
IDOC_handy_document.pdfVimalArasan1
 
Introduction to KSQL: Streaming SQL for Apache Kafka®
Introduction to KSQL: Streaming SQL for Apache Kafka®Introduction to KSQL: Streaming SQL for Apache Kafka®
Introduction to KSQL: Streaming SQL for Apache Kafka®confluent
 
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...Amazon Web Services
 
Delta Lake OSS: Create reliable and performant Data Lake by Quentin Ambard
Delta Lake OSS: Create reliable and performant Data Lake by Quentin AmbardDelta Lake OSS: Create reliable and performant Data Lake by Quentin Ambard
Delta Lake OSS: Create reliable and performant Data Lake by Quentin AmbardParis Data Engineers !
 
OSCON Data 2011 -- NoSQL @ Netflix, Part 2
OSCON Data 2011 -- NoSQL @ Netflix, Part 2OSCON Data 2011 -- NoSQL @ Netflix, Part 2
OSCON Data 2011 -- NoSQL @ Netflix, Part 2Sid Anand
 
Concepts and Patterns for Streaming Services with Kafka
Concepts and Patterns for Streaming Services with KafkaConcepts and Patterns for Streaming Services with Kafka
Concepts and Patterns for Streaming Services with KafkaQAware GmbH
 
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2Shriram Pore
 
AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.Splunk
 
Dissecting Open Source Cloud Evolution: An OpenStack Case Study
Dissecting Open Source Cloud Evolution: An OpenStack Case StudyDissecting Open Source Cloud Evolution: An OpenStack Case Study
Dissecting Open Source Cloud Evolution: An OpenStack Case StudySalman Baset
 
Presentation deploying cloud based services
Presentation   deploying cloud based servicesPresentation   deploying cloud based services
Presentation deploying cloud based servicesxKinAnx
 
Experiences in ELK with D3.js for Large Log Analysis and Visualization
Experiences in ELK with D3.js  for Large Log Analysis  and VisualizationExperiences in ELK with D3.js  for Large Log Analysis  and Visualization
Experiences in ELK with D3.js for Large Log Analysis and VisualizationSurasak Sanguanpong
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream csching
 
AWS 클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트
AWS  클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트AWS  클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트
AWS 클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트Amazon Web Services Korea
 
ACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectSleek International
 
Delta Lake: Open Source Reliability w/ Apache Spark
Delta Lake: Open Source Reliability w/ Apache SparkDelta Lake: Open Source Reliability w/ Apache Spark
Delta Lake: Open Source Reliability w/ Apache SparkGeorge Chow
 

Semelhante a Shepherd: Node Monitors for Fault-Tolerant Distributed Process Execution in OSIRIS (20)

ksqlDB Workshop
ksqlDB WorkshopksqlDB Workshop
ksqlDB Workshop
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelay
 
IDOC_handy_document.pdf
IDOC_handy_document.pdfIDOC_handy_document.pdf
IDOC_handy_document.pdf
 
Introduction to KSQL: Streaming SQL for Apache Kafka®
Introduction to KSQL: Streaming SQL for Apache Kafka®Introduction to KSQL: Streaming SQL for Apache Kafka®
Introduction to KSQL: Streaming SQL for Apache Kafka®
 
Day 20.3 frame relay
Day 20.3 frame relay Day 20.3 frame relay
Day 20.3 frame relay
 
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...
 
Delta Lake OSS: Create reliable and performant Data Lake by Quentin Ambard
Delta Lake OSS: Create reliable and performant Data Lake by Quentin AmbardDelta Lake OSS: Create reliable and performant Data Lake by Quentin Ambard
Delta Lake OSS: Create reliable and performant Data Lake by Quentin Ambard
 
OSCON Data 2011 -- NoSQL @ Netflix, Part 2
OSCON Data 2011 -- NoSQL @ Netflix, Part 2OSCON Data 2011 -- NoSQL @ Netflix, Part 2
OSCON Data 2011 -- NoSQL @ Netflix, Part 2
 
Concepts and Patterns for Streaming Services with Kafka
Concepts and Patterns for Streaming Services with KafkaConcepts and Patterns for Streaming Services with Kafka
Concepts and Patterns for Streaming Services with Kafka
 
Xbfs HPDC'2019
Xbfs HPDC'2019Xbfs HPDC'2019
Xbfs HPDC'2019
 
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2
Object Striping In Swift_OpenStack HongKong Summit 2013_v2.2
 
AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.AWS security monitoring and compliance validation from Adobe.
AWS security monitoring and compliance validation from Adobe.
 
Dissecting Open Source Cloud Evolution: An OpenStack Case Study
Dissecting Open Source Cloud Evolution: An OpenStack Case StudyDissecting Open Source Cloud Evolution: An OpenStack Case Study
Dissecting Open Source Cloud Evolution: An OpenStack Case Study
 
Presentation deploying cloud based services
Presentation   deploying cloud based servicesPresentation   deploying cloud based services
Presentation deploying cloud based services
 
Experiences in ELK with D3.js for Large Log Analysis and Visualization
Experiences in ELK with D3.js  for Large Log Analysis  and VisualizationExperiences in ELK with D3.js  for Large Log Analysis  and Visualization
Experiences in ELK with D3.js for Large Log Analysis and Visualization
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 
AWS 클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트
AWS  클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트AWS  클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트
AWS 클라우드 기반 서버리스 컴퓨팅 패턴과 사례 ::: KRNET 2017 - 윤석찬, 테크에반젤리스트
 
ACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems InterconnectACIT Mumbai - Open Systems Interconnect
ACIT Mumbai - Open Systems Interconnect
 
ACIT Mumbai - OSI Model
ACIT Mumbai - OSI ModelACIT Mumbai - OSI Model
ACIT Mumbai - OSI Model
 
Delta Lake: Open Source Reliability w/ Apache Spark
Delta Lake: Open Source Reliability w/ Apache SparkDelta Lake: Open Source Reliability w/ Apache Spark
Delta Lake: Open Source Reliability w/ Apache Spark
 

Mais de Achille Peternier

Hardware-aware thread scheduling: the case of asymmetric multicore processors
Hardware-aware thread scheduling: the case of asymmetric multicore processorsHardware-aware thread scheduling: the case of asymmetric multicore processors
Hardware-aware thread scheduling: the case of asymmetric multicore processorsAchille Peternier
 
MVisio: A Computer Graphics Platform for Virtual Reality, Science and Education
MVisio: A Computer Graphics Platform for Virtual Reality, Science and EducationMVisio: A Computer Graphics Platform for Virtual Reality, Science and Education
MVisio: A Computer Graphics Platform for Virtual Reality, Science and EducationAchille Peternier
 
Brainstorming on Web Technologies and the Pipeorgan Database
Brainstorming on Web Technologies and the Pipeorgan DatabaseBrainstorming on Web Technologies and the Pipeorgan Database
Brainstorming on Web Technologies and the Pipeorgan DatabaseAchille Peternier
 
S: a Scripting Language for High-Performance RESTful Web Services
S: a Scripting Language for High-Performance RESTful Web ServicesS: a Scripting Language for High-Performance RESTful Web Services
S: a Scripting Language for High-Performance RESTful Web ServicesAchille Peternier
 
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...Achille Peternier
 
Overseer: Low-Level Hardware Monitoring and Management for Java
Overseer: Low-Level Hardware Monitoring and Management for JavaOverseer: Low-Level Hardware Monitoring and Management for Java
Overseer: Low-Level Hardware Monitoring and Management for JavaAchille Peternier
 
Cost-Optimal Outsourcing of Applications into the Clouds
Cost-Optimal Outsourcing of Applications into the CloudsCost-Optimal Outsourcing of Applications into the Clouds
Cost-Optimal Outsourcing of Applications into the CloudsAchille Peternier
 

Mais de Achille Peternier (7)

Hardware-aware thread scheduling: the case of asymmetric multicore processors
Hardware-aware thread scheduling: the case of asymmetric multicore processorsHardware-aware thread scheduling: the case of asymmetric multicore processors
Hardware-aware thread scheduling: the case of asymmetric multicore processors
 
MVisio: A Computer Graphics Platform for Virtual Reality, Science and Education
MVisio: A Computer Graphics Platform for Virtual Reality, Science and EducationMVisio: A Computer Graphics Platform for Virtual Reality, Science and Education
MVisio: A Computer Graphics Platform for Virtual Reality, Science and Education
 
Brainstorming on Web Technologies and the Pipeorgan Database
Brainstorming on Web Technologies and the Pipeorgan DatabaseBrainstorming on Web Technologies and the Pipeorgan Database
Brainstorming on Web Technologies and the Pipeorgan Database
 
S: a Scripting Language for High-Performance RESTful Web Services
S: a Scripting Language for High-Performance RESTful Web ServicesS: a Scripting Language for High-Performance RESTful Web Services
S: a Scripting Language for High-Performance RESTful Web Services
 
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...
Optimizing the Tradeoff between Discovery, Composition, and Execution Cost in...
 
Overseer: Low-Level Hardware Monitoring and Management for Java
Overseer: Low-Level Hardware Monitoring and Management for JavaOverseer: Low-Level Hardware Monitoring and Management for Java
Overseer: Low-Level Hardware Monitoring and Management for Java
 
Cost-Optimal Outsourcing of Applications into the Clouds
Cost-Optimal Outsourcing of Applications into the CloudsCost-Optimal Outsourcing of Applications into the Clouds
Cost-Optimal Outsourcing of Applications into the Clouds
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Shepherd: Node Monitors for Fault-Tolerant Distributed Process Execution in OSIRIS

Notas do Editor

  1. present on-going work aimed at improv- ing OSIRIS&amp;apos; fault tolerance capabilities
  2. processes can be imagined as programs that coordinate the invocation of distributed web services Late binding of service in- stances, in conjunction with load balancing strategies Offer alreadz self * properties Transactional garantees. the system is completely resilient to temporary node failures. Also, thanks to late binding, permanent failures of nodes participating to the execution of a process instance, but not involved in a computation at the moment of failure, do not affect the execution.
  3. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  4. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  5. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  6. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  7. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  8. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  9. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  10. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard Replacement node found (late binding)
  11. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  12. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  13. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  14. the node migrates the control for process execution to one or more successor nodes by delivering an activation token containing flow-control information and the whiteboard
  15. Hardware, network or service failures If the node becomes temporarily disconnected from the network, the system is still able to recover. node will keep retrying to pass on the results until it succeeds Works very well in controlled environnments
  16. present on-going work aimed at improv- ing OSIRIS&amp;apos; fault tolerance capabilities
  17. WN assigned to Shepherds (herds) Shepherds organized in pools Leader Shepherds in the pool share state Persistence of process state Triggering of process activity
  18. Leader of a pool communicates to a WN an activation key Ki Using Ki, WN gets the porcess state form SML WN writes the next process activity with a new key Ki+1 to SML WN sends the new activation key Ki+1 to the assigned pool of Shepherds Leader of the pool forwards the activation key to another pool of shepherds Another step that deltes entires from the shm
  19. Unique activation key provides indenpendance of process activities Temporarily failed WNs that have been replaced are terminated The side-effects created by B that are not stored on the shared memory cannot be undone
  20. DHT-like structured overlay Paxos commit protocol consistent information about the state of the activity it is supervising. Distributed transaction DHT fault detection mechanism to elect an appropriate shepherd replacement replica
  21. Beernet DHT implementation with respect to the migration algorithm, only a passive role
  22. Routing mechanism Failure-detection mechanism their state relative to the execution of the migration algorithm We use it to are assigned nodes to the herd of a shepherd several shepherds coordinate to form a pool how leader election within a pool proceeds Communication between a worker node and a pool of shepherds Shepherds are phisical nodes and Wns the reource to be stored Worker node ids in the circle lying inbetween 2 shepherd ids become the herd of the adjacent shepherd
  23. take into consideration other factors to improve porcess execution as explained above is sufficient to guarantee the correctness of the routing and enable Late-binding. Aggregate load
  24. present on-going work aimed at improv- ing OSIRIS&amp;apos; fault tolerance capabilities