Rotational lease: Providing high availability in a shared storage file system

Byung Chul Tak, Yon Dohn Chung, Sun Ja Kim, Myoung Ho Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Shared storage file systems consist of multiple storage devices connected by dedicated data-only network and workstations that can directly access the storage devices. In this shared-storage environment, data consistency is maintained by lock servers which use separate control network to transfer the lock information. Furthermore, lease mechanism is applied to cope with control network failures. However, when the control network fails, participating work-stations can no longer make progress after the lease term expires. In this paper we address this limitation and present a method that enables network-partitioned workstations to continue file operations even after the control network is down. The proposed method works in a manner that each workstation is rotationally given a predefined lease term periodically. We also show that the proposed mechanism always preserves data consistency.

Original languageEnglish
Title of host publicationHigh Performance Computing and Communcations - First International Conference, HPCC 2005, Proceedings
Pages190-195
Number of pages6
DOIs
Publication statusPublished - 2005
Event1st International Conference on High Performance Computing and Communcations, HPCC 2005 - Sorrento, Italy
Duration: 2005 Sep 212005 Sep 23

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3726 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on High Performance Computing and Communcations, HPCC 2005
CountryItaly
CitySorrento
Period05/9/2105/9/23

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Rotational lease: Providing high availability in a shared storage file system'. Together they form a unique fingerprint.

Cite this