Fault-tolerant and scalable protocols for replicated services in mobile agent systems

JinHo Ahn, Sung-Gi Min

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To enhance scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems, we present a new strategy to apply an appropriate passive replication protocol to each replicated service according to its execution behavior because deterministic services require weaker constraints to ensure their consistency than non-deterministic ones. For this goal, two passive replication protocols are introduced for non-deterministic services and for deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute on any node performing a service agent, not necessarily the primary agent. Especially, in case of the protocol for deterministic services, after a backup service agent has received a mobile agent request and obtained the delivery sequence number of the request from the primary service agent, the backup agent, not the primary one, is responsible for processing the request and coordinating with the other replica service agents.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsV.S. Sunderam, G.D. Albada, P.M.A. Sloot, J.J. Dongarra
Pages679-686
Number of pages8
Volume3516
EditionIII
Publication statusPublished - 2005
Event5th International Conference on Computational Science - ICCS 2005 - Atlanta, GA, United States
Duration: 2005 May 222005 May 25

Other

Other5th International Conference on Computational Science - ICCS 2005
CountryUnited States
CityAtlanta, GA
Period05/5/2205/5/25

Fingerprint

Mobile agents
Network protocols
Scalability
Processing

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Ahn, J., & Min, S-G. (2005). Fault-tolerant and scalable protocols for replicated services in mobile agent systems. In V. S. Sunderam, G. D. Albada, P. M. A. Sloot, & J. J. Dongarra (Eds.), Lecture Notes in Computer Science (III ed., Vol. 3516, pp. 679-686)

Fault-tolerant and scalable protocols for replicated services in mobile agent systems. / Ahn, JinHo; Min, Sung-Gi.

Lecture Notes in Computer Science. ed. / V.S. Sunderam; G.D. Albada; P.M.A. Sloot; J.J. Dongarra. Vol. 3516 III. ed. 2005. p. 679-686.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ahn, J & Min, S-G 2005, Fault-tolerant and scalable protocols for replicated services in mobile agent systems. in VS Sunderam, GD Albada, PMA Sloot & JJ Dongarra (eds), Lecture Notes in Computer Science. III edn, vol. 3516, pp. 679-686, 5th International Conference on Computational Science - ICCS 2005, Atlanta, GA, United States, 05/5/22.
Ahn J, Min S-G. Fault-tolerant and scalable protocols for replicated services in mobile agent systems. In Sunderam VS, Albada GD, Sloot PMA, Dongarra JJ, editors, Lecture Notes in Computer Science. III ed. Vol. 3516. 2005. p. 679-686
Ahn, JinHo ; Min, Sung-Gi. / Fault-tolerant and scalable protocols for replicated services in mobile agent systems. Lecture Notes in Computer Science. editor / V.S. Sunderam ; G.D. Albada ; P.M.A. Sloot ; J.J. Dongarra. Vol. 3516 III. ed. 2005. pp. 679-686
@inproceedings{a82f06a3e5fb46299a8201d77edffa08,
title = "Fault-tolerant and scalable protocols for replicated services in mobile agent systems",
abstract = "To enhance scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems, we present a new strategy to apply an appropriate passive replication protocol to each replicated service according to its execution behavior because deterministic services require weaker constraints to ensure their consistency than non-deterministic ones. For this goal, two passive replication protocols are introduced for non-deterministic services and for deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute on any node performing a service agent, not necessarily the primary agent. Especially, in case of the protocol for deterministic services, after a backup service agent has received a mobile agent request and obtained the delivery sequence number of the request from the primary service agent, the backup agent, not the primary one, is responsible for processing the request and coordinating with the other replica service agents.",
author = "JinHo Ahn and Sung-Gi Min",
year = "2005",
language = "English",
volume = "3516",
pages = "679--686",
editor = "V.S. Sunderam and G.D. Albada and P.M.A. Sloot and J.J. Dongarra",
booktitle = "Lecture Notes in Computer Science",
edition = "III",

}

TY - GEN

T1 - Fault-tolerant and scalable protocols for replicated services in mobile agent systems

AU - Ahn, JinHo

AU - Min, Sung-Gi

PY - 2005

Y1 - 2005

N2 - To enhance scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems, we present a new strategy to apply an appropriate passive replication protocol to each replicated service according to its execution behavior because deterministic services require weaker constraints to ensure their consistency than non-deterministic ones. For this goal, two passive replication protocols are introduced for non-deterministic services and for deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute on any node performing a service agent, not necessarily the primary agent. Especially, in case of the protocol for deterministic services, after a backup service agent has received a mobile agent request and obtained the delivery sequence number of the request from the primary service agent, the backup agent, not the primary one, is responsible for processing the request and coordinating with the other replica service agents.

AB - To enhance scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems, we present a new strategy to apply an appropriate passive replication protocol to each replicated service according to its execution behavior because deterministic services require weaker constraints to ensure their consistency than non-deterministic ones. For this goal, two passive replication protocols are introduced for non-deterministic services and for deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute on any node performing a service agent, not necessarily the primary agent. Especially, in case of the protocol for deterministic services, after a backup service agent has received a mobile agent request and obtained the delivery sequence number of the request from the primary service agent, the backup agent, not the primary one, is responsible for processing the request and coordinating with the other replica service agents.

UR - http://www.scopus.com/inward/record.url?scp=25144502832&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=25144502832&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:25144502832

VL - 3516

SP - 679

EP - 686

BT - Lecture Notes in Computer Science

A2 - Sunderam, V.S.

A2 - Albada, G.D.

A2 - Sloot, P.M.A.

A2 - Dongarra, J.J.

ER -