Distributed system have shown its good robustness, extensibility and effectiveness in the processing, storage and transmission of large data. Now with the expansion of the amount of data and application, it has become...
详细信息
ISBN:
(纸本)9781509037100
Distributed system have shown its good robustness, extensibility and effectiveness in the processing, storage and transmission of large data. Now with the expansion of the amount of data and application, it has become a challenging task to ensure its transaction in a distributed and heterogeneous environment. The sub transactions of a distributed transaction not only need to be coordinated with the local other transactions, but also with other sub transactions that generated in the global manager. Based on the discussion of distributed transaction processing model and its transaction commitprotocol, the failure reasons with the model analysis of general distributed transaction processing in the practical application in our information database system are given, based on the interface in a relational database management system and super text pre-treatment language of distributed transaction processing implementation method. The research results show that this distributed transaction processing method is reliable, and can simplify the implementation of global program.
Service Oriented Architecture allows development of software with requirements of interoperability and weak coupling. Nowadays WS-* is the most used SOAP-based specification set for constructing web services. REST is ...
详细信息
Service Oriented Architecture allows development of software with requirements of interoperability and weak coupling. Nowadays WS-* is the most used SOAP-based specification set for constructing web services. REST is an architectural style that permits the development of services in a simpler way than WS-* and obeys the SOA's paradigm, however, it does not provide standardized support to address some non-functional requirements of services, such as, security, reliability, and transaction control. This article proposes a REST-based technique to support the web services transactional control implementation. The technique uses the timestamp method and two phase commit protocol to control distributed systems transactions. An example of application using the technique is implemented to show its feasibility.
Security threats in a distributed environment are one of the greatest threats in IT and big data on distributed infrastructure makes it more complex and difficult to implement a fool proof security framework. Network ...
详细信息
Security threats in a distributed environment are one of the greatest threats in IT and big data on distributed infrastructure makes it more complex and difficult to implement a fool proof security framework. Network provides the access path for both inside and outside attacks which makes it the key access point for any type of security threats. Securing distributed infrastructure is not an easy task as it is complex, it requires careful configuration and it is subject to human errors. Distributed environment should be open but with proper security framework in place. Testing security threats in this kind of a complex infrastructure, with huge and unstructured data is an on-going process. Hence we need a security testing model which is capable to identify any unauthenticated intrusion immediately. This paper presents a technique to test distributed environments against attacks on data integrity. (C) 2015 The Authors. Published by Elsevier B.V.
Security threats in a distributed environment are one of the greatest threats in IT and big data on distributed infrastructure makes it more complex and difficult to implement a fool proof security framework. Network ...
详细信息
Security threats in a distributed environment are one of the greatest threats in IT and big data on distributed infrastructure makes it more complex and difficult to implement a fool proof security framework. Network provides the access path for both inside and outside attacks which makes it the key access point for any type of security threats. Securing distributed infrastructure is not an easy task as it is complex, it requires careful configuration and it is subject to human errors. Distributed environment should be open but with proper security framework in place. Testing security threats in this kind of a complex infrastructure, with huge and unstructured data is an on-going process. Hence we need a security testing model which is capable to identify any unauthenticated intrusion immediately. This paper presents a technique to test distributed environments against attacks on data integrity.
In large scale, heavy workload systems, managing distributed transactions on multiple datasets becomes challenging and error prone task. Software systems based on service oriented architecture principles that manage c...
详细信息
ISBN:
(纸本)9780769543796
In large scale, heavy workload systems, managing distributed transactions on multiple datasets becomes challenging and error prone task. Software systems based on service oriented architecture principles that manage critical infrastructures are typical environments where robust transaction management is one of the essential goals to achieve. The aim of this paper is to provide a formal description of the solution for transaction management and individual service component behavior in a SOA-based control system, and prove the correctness of the proposed design with the SMV formal verification tool. Atomic commitment protocol is used as a basis for solving distributed transaction management problem. SMV language and verification tool are utilized for formal description of the problem and verification of the necessary properties. The case study describes an application of the proposed approach in commercial software system for electrical power distribution management. Verification of given model properties has shown that suggested solution is suitable for the described class of SOA-based systems.
Web services are emerging as an effective means for carrying out automated transactions between multiple business parties. While there are several specific protocols that have been discussed to address the problem of ...
详细信息
Web services are emerging as an effective means for carrying out automated transactions between multiple business parties. While there are several specific protocols that have been discussed to address the problem of coordinating web services-enabled business transactions, we consider the tentative hold protocol (THP) that allows the placement of tentative holds on business resources prior to actual transactions in order to provide increased flexibility in coordination. In this paper, we present a formal coordination framework for applying THP in conjunction with two phase commit protocol to the problem in which service providers independently manage resources and clients seek to acquire the resources from multiple providers as a single atomic transaction. The proposed framework facilitates the performance optimization of THP through effective parameterization with the notion of overhold size and hold duration. Subsequently, a detailed analysis is carried out to obtain an efficient method that can optimize the performance by adaptively determining the hold duration. The simulation results show that the proposed adaptive approach yields a significant improvement over other non-adaptive policies. (c) 2006 Elsevier B.V. All rights reserved.
The twophasecommit is an important protocol in distributed database systems. Much of the existing literature on the protocol is restricted to discussing and analyzing the protocol (and its variants) in the absence o...
详细信息
The twophasecommit is an important protocol in distributed database systems. Much of the existing literature on the protocol is restricted to discussing and analyzing the protocol (and its variants) in the absence of Failures. Very little, especially in quantitative terms, has been written about its performance in the presence of site failures. In this study, we use a simulation testbed of a distributed database system to quantify the differences in the performances of four widely known variants of the 2PC protocols (the generic 2PC, presumed commit, presumed abort, and early prepare). Our study covers both the no-failure case and the case of site failures. We present a number of interesting results based on our experiments. One is that the performance of these protocols is highly dependent on the message-processing latency at the transaction coordinator site. Another is that the presumed abort protocol does not necessarily yield better performance in the presence of site failures.
暂无评论