1978
DOI: 10.1007/3-540-08755-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Notes on data base operating systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
447
0
2

Year Published

1984
1984
2014
2014

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,128 publications
(450 citation statements)
references
References 12 publications
1
447
0
2
Order By: Relevance
“…An endto-end acknowledgement is still required for applications in which the action requested of the target host should be done only if similar actions requested of other hosts are successful. This kind of application requires a two-phase commit protocol [5,10,15], which is a sophisticated endto-end acknowledgement. Also, if the target application may either fail or refuse to do the requested action, and thus a negative acknowledgement is a possible outcome, an end-to-end acknowledgement may still be a requirement.…”
Section: Delivery Guaranteesmentioning
confidence: 99%
See 1 more Smart Citation
“…An endto-end acknowledgement is still required for applications in which the action requested of the target host should be done only if similar actions requested of other hosts are successful. This kind of application requires a two-phase commit protocol [5,10,15], which is a sophisticated endto-end acknowledgement. Also, if the target application may either fail or refuse to do the requested action, and thus a negative acknowledgement is a possible outcome, an end-to-end acknowledgement may still be a requirement.…”
Section: Delivery Guaranteesmentioning
confidence: 99%
“…The two-phase-commit data update protocols of Gray [5], Lampson and Sturgis [10] and Reed [13] all use a form of end-to-end argument to justify their existence; they are end-to-end protocols that do not depend for correctness on reliability, FIFO sequencing, or duplicate suppression within the communication system, since all of these problems may also be introduced by other system component failures as well. Reed makes this argument explicitly in the second chapter of his Ph.D. thesis on decentralized atomic actions [14].…”
Section: History and Application To Other System Areasmentioning
confidence: 99%
“…A transaction's effects become permanent when it commits, its effects are discarded if it ubsorts, and a transaction that has neither committed nor aborted is uctiue. A standard commitment protocol (e.g., [15,311) aborts transactions interrupted by failures, and stable storage [26] ensures that the effects of committed transactions are not undone by later failures.…”
Section: Distributedmentioning
confidence: 99%
“…Distributed INGRES uses a two phase commit protocol [GRAY78,LAMP76]. Slaves send a "ready" message to the master when they are prepared to commit an update.…”
Section: Distributed Ingresmentioning
confidence: 99%