Lecture 6
Lecture 6
Main issue
To keep replicas consistent, we generally need to ensure that all conflicting
operations are done in the the same order everywhere
Conflicting operations
From the world of transactions:
Read–write conflict: a read operation and a write operation act
concurrently
Write–write conflict: two concurrent write operations
Issue
Guaranteeing global ordering on conflicting operations may be a costly operation,
downgrading scalability Solution: weaken consistency requirements so that
hopefully global synchronization can be avoided
Consistency model
A contract between a (distributed) data store and processes, in which the data
store specifies precisely what the results of read and write operations are in the
presence of concurrency.
Essential
A data store is a distributed collection of storages:
Process Process Process
Local copy
Continuous Consistency
Observation
We can actually talk a about a degree of consistency:
replicas may differ in their numerical value
replicas may differ in their relative staleness
there may be differences with respect to (number and order) of
performed update operations
Conit
Consistency unit => specifies the data unit over which consistency is to
be measured.
Example: Conit
Example: Conit
Sequential consistency
Definition
The result of any execution is the same as if the operations of all processes
were executed in some sequential order, and the operations of each
individual process appear in this sequence in the order specified by its
program.
P1: W(x)a P1: W(x)a
P2: W(x)b P2: W(x)b
P3: R(x)b R(x)a P3: R(x)b R(x)a
P4: R(x)b R(x)a P4: R(x)a R(x)b
(a) (b)
Causal consistency
Definition
Writes that are potentially causally related must be seen by all processes in
the same order. Concurrent writes may be seen in a different order by
different processes.
P1: W(x)a
P2: R(x)a W(x)b
P3: R(x)b R(x)a
P4: R(x)a R(x)b
(a)
P1: W(x)a
P2: W(x)b
P3: R(x)b R(x)a
P4: R(x)a R(x)b
(b)
Grouping operations
Definition
Accesses to synchronization variables are sequentially consistent.
No access to a synchronization variable is allowed to be performed
until all previous writes have completed everywhere.
No data access is allowed to be performed until all previous accesses
to synchronization variables have been performed.
Basic idea
You don’t care that reads and writes of a series of operations are
immediately known to other processes. You just want the effect of the
series itself to be known.
Grouping operations
Observation
Weak consistency implies that we need to lock and unlock data (implicitly
or not).
Overview
System model
Monotonic reads
Monotonic writes
Read-your-writes
Write-follows-reads
Goal
Show how we can perhaps avoid systemwide consistency, by concentrating
on what specific clients want, instead of what should be maintained by
servers.
Example
Consider a distributed database to which you have access through your
notebook. Assume your notebook acts as a front end to the database.
At location A you access the database doing reads and updates.
At location B you continue your work, but unless you access the same
server as the one at location A, you may detect inconsistencies:
your updates at A may not have yet been propagated to B
you may be reading newer entries than the ones available at A
your updates at B may eventually conflict with those at A
Note
The only thing you really want is that the entries you updated and/or read
at A, are in B the way you left them in A. In that case, the database will
appear to be consistent to you.
Basic architecture
Wide-area network
Monotonic reads
Definition
If a process reads the value of a data item x, any successive read operation
on x by that process will always return that same or a more recent value.
L1: WS( x 1) R( x 1)
L1: WS( x 1) R( x 1)
L2: WS( x 2) R( x 2)
Notation
WS(xi [t]) is the set of write operations (at Li ) that lead to version xi
of x (at time t)
WS(xi [t1 ]; xj [t2 ]) indicates that it is known that WS(xi [t1 ]) is part of
WS(xj [t2 ]).
Note: Parameter t is omitted from figures.
Monotonic reads
Example
Automatically reading your personal calendar updates from different
servers. Monotonic Reads guarantees that the user sees all updates, no
matter from which server the automatic reading takes place.
Example
Reading (not modifying) incoming mail while you are on the move. Each
time you connect to a different e-mail server, that server fetches (at least)
all the updates from the server you previously visited.
Monotonic writes
Definition
A write operation by a process on a data item x is completed before any
successive write operation on x by the same process.
L1: W( x 1)
L1: W( x 1)
L2: W(x 2 )
Monotonic writes
Example
Updating a program at server S2 , and ensuring that all components on
which compilation and linking depends, are also placed at S2 .
Example
Maintaining versions of replicated files in the correct order everywhere
(propagate the previous version to the server where the newest version is
installed).
Definition
The effect of a write operation by a process on data item x, will always be
seen by a successive read operation on x by the same process.
L1: W( x 1)
Example
L2: WS( x 1;x 2) R( x 2)
Updating your Web page and
guaranteeing that your Web
L1: W( x 1) browser shows the newest
L2: WS( x 2) R( x 2) version instead of its cached
copy.
Definition
A write operation by a process on a data item x following a previous read
operation on x by the same process, is guaranteed to take place on the
same or a more recent value of x that was read.
Distribution protocols
Replica placement
Essence
Figure out what the best K places are out of N possible locations.
Replica placement
Essence
Figure out what the best K places are out of N possible locations.
Select best location out of N − K for which the average distance to
clients is minimal. Then choose the next best server. (Note: The
first chosen location minimizes the average distance to all clients.)
Computationally expensive.
Replica placement
Essence
Figure out what the best K places are out of N possible locations.
Select best location out of N − K for which the average distance to
clients is minimal. Then choose the next best server. (Note: The
first chosen location minimizes the average distance to all clients.)
Computationally expensive.
Select the K -th largest autonomous system and place a server at
the best-connected host. Computationally expensive.
Replica placement
Essence
Figure out what the best K places are out of N possible locations.
Select best location out of N − K for which the average distance to
clients is minimal. Then choose the next best server. (Note: The
first chosen location minimizes the average distance to all clients.)
Computationally expensive.
Select the K -th largest autonomous system and place a server at
the best-connected host. Computationally expensive.
Position nodes in a d-dimensional geometric space, where distance
reflects latency. Identify the K regions with highest density and place
a server in every one. Computationally cheap.
Content replication
Content replication
Server-initiated replication
Client-initiated replication
Permanent
replicas
Server-initiated replicas
Client-initiated replicas
Clients
Server-initiated replicas
C2
Server without
copy of file F
P
Client Server with
Q copy of F
C1
File F
Content distribution
Model
Consider only a client-server combination:
Propagate only notification/invalidation of update (often used for
caches)
Transfer data from one copy to another (distributed databases):
passive replication
Propagate the update operation to other copies: active replication
Note
No single approach is the best, but depends highly on available bandwidth
and read-to-write ratio at replicas.
Content distribution
Observation
We can dynamically switch between pulling and pushing using leases: A
contract in which the server promises to push updates to the client until
the lease expires.
Content distribution
Issue
Make lease expiration time dependent on system’s behavior (adaptive leases):
Content distribution
Issue
Make lease expiration time dependent on system’s behavior (adaptive leases):
Age-based leases: An object that hasn’t changed for a long time, will not
change in the near future, so provide a long-lasting lease
Content distribution
Issue
Make lease expiration time dependent on system’s behavior (adaptive leases):
Content distribution
Issue
Make lease expiration time dependent on system’s behavior (adaptive leases):
State-based leases: The more loaded a server is, the shorter the expiration
times become
Content distribution
Issue
Make lease expiration time dependent on system’s behavior (adaptive leases):
Age-based leases: An object that hasn’t changed for a long time, will not
change in the near future, so provide a long-lasting lease
Renewal-frequency based leases: The more often a client requests a
specific object, the longer the expiration time for that client (for that object)
will be
State-based leases: The more loaded a server is, the shorter the expiration
times become
Consistency protocols
Consistency protocol
Describes the implementation of a specific consistency model.
Continuous consistency
Primary-based protocols
Replicated-write protocols
Principal operation
Every server Si has a log, denoted as log (Si ).
Consider a data item x and let weight(W ) denote the numerical
change in its value after a write operation W . Assume that
∀W : weight(W ) > 0
Note
Actual value v (t) of x:
N
X
v (t) = vinit + TW [k, k]
k=1
value vi of x at replica i:
N
X
vi = vinit + TW [i, k]
k=1
Problem
We need to ensure that v (t) − vi < δi for every server Si .
Approach
Let every server Sk maintain a view TWk [i, j] of what it believes is the
value of TW [i, j]. This information can be gossiped when an update is
propagated.
Note
0 ≤ TWk [i, j] ≤ TW [i, j] ≤ TW [j, j]
Solution
Sk sends operations from its log to Si when it sees that TWk [i, k] is
getting too far from TW [k, k], in particular, when
Question
To what extent are we being pessimistic here: where does δi /(N − 1)
come from?
Note
Staleness can be done analogously, by essentially keeping track of what
has been seen last from Si (see book).
Primary-based protocols
Primary-backup protocol
Client Client
Primary server
for item x Backup server
W1 W5 R1 R2
W4 W4
W3 W3 Data store
W2 W3
W4
Primary-based protocols
Primary-based protocols
W5 W5
W4 W4 Data store
W5 W2
W4
Primary-based protocols
Replicated-write protocols
Quorum-based protocols
Ensure that each operation is carried out in such a way that a majority vote is
established: distinguish read quorum and write quorum:
Read quorum
A B C D A B C D A B C D
E F G H E F G H E F G H
I J K L I J K L I J K L
NR = 3, N W = 10 NR = 7, NW = 6 NR = 1, N W = 12
W