SlideShare a Scribd company logo
Voting protocols and Dynamic voting protocols
Distributed Operating System
By:
P. Gayathri
I M.Sc CS
Department of computer science
Nadar Saraswathi college of arts and science
Voting Protocols
Voting-based consensus algorithms achieve consensus on
transactions (and sometimes network decisions) by
tallying the number of votes cast by nodes on a distributed
ledger network.
Static voting
This static voting is proposed by Gifford . Replicating data
at many sites is the common approach in the fault tolerance in
distributed systems. Data can still be obtained from the other
copies if the original fails.
Algorithm
 Site i issues a Lock_Request to its local lock manager.
 2. When the lock request is granted, site i sends a
Vote_Request message to all the sites.
 3. When a site j receives a Vote_Request message, it
issues a Lock_Request to its local lock manager. If the
local request is granted, then it returns the version
number of the replica (VNj) and the number of the
votes assigned to the replica (Vj) to site i.
Site i decide whether it has the quorum or not,
based on the replicas received within a timeout
period as follows (P denotes the set of sites which
have replied).
 If the request issued was a read, Vr=∑Vk b.
 If the request issued was a write, Vw=∑Vk c.
 Where the set of sites Q is determined as follows:
i. M=max{VNj : j€P} ii. Q={j€P : VNj=M}
Majority Based Dynamic Voting
This protocol is proposed by Jajodia and Mutchler .
Version number: The version number of a replica at a site i is an
integer that counts the number of successful updates to the
replica at i. VNi is initially set at zero and is incremented b one
at every successful updates to the replica at i. VNi is
Number of Replicas updated:
It is an integer that almost always reflects the number of replicas the
number of replicas participating in the most recent update RUi is initially
equal to the number of replicas.
Distinguished sites list:
The distinguished sites list [5] at a site i is a variable that stores ID’s of
one or more sites. The contents of DSi depend on RUi . When RUi is
even, DSi identifies the replica that is greater than all the other replicas
that participated in the most recent update of the replica at site i. When
RUi is odd, DSi is nil except when RUi =3, in which case DSi lists the
three replicas that participated in the most recent update from which a
majority is needed to allow access to data.
Protocol P1.
Vote increasing. The initiator (node i) 1. Send the new
vote value along with [15,16] Vi and Ni to the rest of the
nodes with which node i can communicate. 2. Wait for a
majority of acknowledgments to arrive (whether or not a
majority of votes has been received by node i is
determined by following protocol P2 [16] ), and then
install the change in the local voting vector, that is update
Vi[i] and increase the version number Ni[i] by 1.
Protocol P2.
Vote Collecting Assume node i is collecting votes to
decide upon an event. In this case, each voting 11 node j
will send i two vectors, the voting vector Vj and a
version vector Nj . Another vector vi is maintained where
vi[j] indicates the votes of j as determined b site i upon
the collection of votes. An entry Ni[j] represents the
version number for the value Vi[j] at site i
Protocol P3.
Vote Decreasing The same as P1, except
that: The initiator sends Vi and Ni along
with its vote decrease. Upon successfully
12 collecting a majority of votes, the
initiator increases Ni[i] by one and sets
the Vi[i] to the new value.
Group Based Voting
This voting mechanism is proposed by Agarwal and Jalote [6]. In the
previous voting algorithm, the site initiating the operation has to communicate
with all the nodes incurring high communication costs. In this algorithm [6] the
sites are divided into intersecting or overlapping groups. In the absence of
failures the site initiating the operation communicates with the sites of its group
thus reducing the communication costs. This algorithm suggests a method for
constructing such logical groups and show that the message overhead of any
operation in a system of N nodes is O (√n), when there are no or few failures in
the system.
THANK YOU

More Related Content

What's hot

Introduction to MPI
Introduction to MPI Introduction to MPI
Introduction to MPI
Hanif Durad
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Punnya Babu
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
 
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introductionACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
Project ACRN
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
Sou Jana
 
Threads ppt
Threads pptThreads ppt
Threads ppt
panchaldev1
 
Election algorithms
Election algorithmsElection algorithms
Election algorithmsAnkush Kumar
 
Android Secure Coding
Android Secure CodingAndroid Secure Coding
Android Secure Coding
JPCERT Coordination Center
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
Vidulatiwari
 
RC 4
RC 4 RC 4
RC 4
Sovan Paul
 
Message Passing Interface (MPI)-A means of machine communication
Message Passing Interface (MPI)-A means of machine communicationMessage Passing Interface (MPI)-A means of machine communication
Message Passing Interface (MPI)-A means of machine communication
Himanshi Kathuria
 
Inter-process communication of Android
Inter-process communication of AndroidInter-process communication of Android
Inter-process communication of Android
Tetsuyuki Kobayashi
 
RSA
RSARSA
Ch5: Threads (Operating System)
Ch5: Threads (Operating System)Ch5: Threads (Operating System)
Ch5: Threads (Operating System)
Ahmar Hashmi
 
Chord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
Chord- A Scalable Peer-to-Peer Lookup Service for Internet ApplicationsChord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
Chord- A Scalable Peer-to-Peer Lookup Service for Internet ApplicationsChandan Thakur
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
Nilantha Piyasiri
 
Quick bcc
Quick bccQuick bcc
Quick bcc
Kyoungseok Yang
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 

What's hot (20)

Introduction to MPI
Introduction to MPI Introduction to MPI
Introduction to MPI
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introductionACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
ACRN vMeet-Up EU 2021 - shared memory based inter-vm communication introduction
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
4. system models
4. system models4. system models
4. system models
 
Threads ppt
Threads pptThreads ppt
Threads ppt
 
Election algorithms
Election algorithmsElection algorithms
Election algorithms
 
Android Secure Coding
Android Secure CodingAndroid Secure Coding
Android Secure Coding
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
RC 4
RC 4 RC 4
RC 4
 
Message Passing Interface (MPI)-A means of machine communication
Message Passing Interface (MPI)-A means of machine communicationMessage Passing Interface (MPI)-A means of machine communication
Message Passing Interface (MPI)-A means of machine communication
 
Inter-process communication of Android
Inter-process communication of AndroidInter-process communication of Android
Inter-process communication of Android
 
RSA
RSARSA
RSA
 
Ch5: Threads (Operating System)
Ch5: Threads (Operating System)Ch5: Threads (Operating System)
Ch5: Threads (Operating System)
 
Chord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
Chord- A Scalable Peer-to-Peer Lookup Service for Internet ApplicationsChord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
Chord- A Scalable Peer-to-Peer Lookup Service for Internet Applications
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Quick bcc
Quick bccQuick bcc
Quick bcc
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 

Similar to dos.pptx

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
ijasa
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
Anurag Dashputre
 
Data link layer
Data link layerData link layer
Data link layer
I World Tech
 
AnuuTech PoH.pdf
AnuuTech PoH.pdfAnuuTech PoH.pdf
AnuuTech PoH.pdf
AnuuTech
 
Public Key Cryptosystem Approach for P2P Botnet Detection and Prevention
Public Key Cryptosystem Approach for P2P Botnet Detection and PreventionPublic Key Cryptosystem Approach for P2P Botnet Detection and Prevention
Public Key Cryptosystem Approach for P2P Botnet Detection and Prevention
IJERA Editor
 

Similar to dos.pptx (7)

12EASApril-3412
12EASApril-341212EASApril-3412
12EASApril-3412
 
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
 
E voting
E votingE voting
E voting
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Data link layer
Data link layerData link layer
Data link layer
 
AnuuTech PoH.pdf
AnuuTech PoH.pdfAnuuTech PoH.pdf
AnuuTech PoH.pdf
 
Public Key Cryptosystem Approach for P2P Botnet Detection and Prevention
Public Key Cryptosystem Approach for P2P Botnet Detection and PreventionPublic Key Cryptosystem Approach for P2P Botnet Detection and Prevention
Public Key Cryptosystem Approach for P2P Botnet Detection and Prevention
 

More from GayathriP95

cloud computing.pptx
cloud computing.pptxcloud computing.pptx
cloud computing.pptx
GayathriP95
 
ML.pptx
ML.pptxML.pptx
ML.pptx
GayathriP95
 
women.pptx
women.pptxwomen.pptx
women.pptx
GayathriP95
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
GayathriP95
 
dip.pptx
dip.pptxdip.pptx
dip.pptx
GayathriP95
 
cloud computing.pptx
cloud computing.pptxcloud computing.pptx
cloud computing.pptx
GayathriP95
 
gayathrinosql.pptx
gayathrinosql.pptxgayathrinosql.pptx
gayathrinosql.pptx
GayathriP95
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
GayathriP95
 
python.pptx
python.pptxpython.pptx
python.pptx
GayathriP95
 
gayathri.p.pptx
gayathri.p.pptxgayathri.p.pptx
gayathri.p.pptx
GayathriP95
 
gayathri23.pptx
gayathri23.pptxgayathri23.pptx
gayathri23.pptx
GayathriP95
 
gayathri.pptx
gayathri.pptxgayathri.pptx
gayathri.pptx
GayathriP95
 

More from GayathriP95 (12)

cloud computing.pptx
cloud computing.pptxcloud computing.pptx
cloud computing.pptx
 
ML.pptx
ML.pptxML.pptx
ML.pptx
 
women.pptx
women.pptxwomen.pptx
women.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
dip.pptx
dip.pptxdip.pptx
dip.pptx
 
cloud computing.pptx
cloud computing.pptxcloud computing.pptx
cloud computing.pptx
 
gayathrinosql.pptx
gayathrinosql.pptxgayathrinosql.pptx
gayathrinosql.pptx
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
python.pptx
python.pptxpython.pptx
python.pptx
 
gayathri.p.pptx
gayathri.p.pptxgayathri.p.pptx
gayathri.p.pptx
 
gayathri23.pptx
gayathri23.pptxgayathri23.pptx
gayathri23.pptx
 
gayathri.pptx
gayathri.pptxgayathri.pptx
gayathri.pptx
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

dos.pptx

  • 1. Voting protocols and Dynamic voting protocols Distributed Operating System By: P. Gayathri I M.Sc CS Department of computer science Nadar Saraswathi college of arts and science
  • 2. Voting Protocols Voting-based consensus algorithms achieve consensus on transactions (and sometimes network decisions) by tallying the number of votes cast by nodes on a distributed ledger network. Static voting This static voting is proposed by Gifford . Replicating data at many sites is the common approach in the fault tolerance in distributed systems. Data can still be obtained from the other copies if the original fails.
  • 3. Algorithm  Site i issues a Lock_Request to its local lock manager.  2. When the lock request is granted, site i sends a Vote_Request message to all the sites.  3. When a site j receives a Vote_Request message, it issues a Lock_Request to its local lock manager. If the local request is granted, then it returns the version number of the replica (VNj) and the number of the votes assigned to the replica (Vj) to site i.
  • 4. Site i decide whether it has the quorum or not, based on the replicas received within a timeout period as follows (P denotes the set of sites which have replied).  If the request issued was a read, Vr=∑Vk b.  If the request issued was a write, Vw=∑Vk c.  Where the set of sites Q is determined as follows: i. M=max{VNj : j€P} ii. Q={j€P : VNj=M}
  • 5. Majority Based Dynamic Voting This protocol is proposed by Jajodia and Mutchler . Version number: The version number of a replica at a site i is an integer that counts the number of successful updates to the replica at i. VNi is initially set at zero and is incremented b one at every successful updates to the replica at i. VNi is
  • 6. Number of Replicas updated: It is an integer that almost always reflects the number of replicas the number of replicas participating in the most recent update RUi is initially equal to the number of replicas. Distinguished sites list: The distinguished sites list [5] at a site i is a variable that stores ID’s of one or more sites. The contents of DSi depend on RUi . When RUi is even, DSi identifies the replica that is greater than all the other replicas that participated in the most recent update of the replica at site i. When RUi is odd, DSi is nil except when RUi =3, in which case DSi lists the three replicas that participated in the most recent update from which a majority is needed to allow access to data.
  • 7. Protocol P1. Vote increasing. The initiator (node i) 1. Send the new vote value along with [15,16] Vi and Ni to the rest of the nodes with which node i can communicate. 2. Wait for a majority of acknowledgments to arrive (whether or not a majority of votes has been received by node i is determined by following protocol P2 [16] ), and then install the change in the local voting vector, that is update Vi[i] and increase the version number Ni[i] by 1.
  • 8. Protocol P2. Vote Collecting Assume node i is collecting votes to decide upon an event. In this case, each voting 11 node j will send i two vectors, the voting vector Vj and a version vector Nj . Another vector vi is maintained where vi[j] indicates the votes of j as determined b site i upon the collection of votes. An entry Ni[j] represents the version number for the value Vi[j] at site i
  • 9. Protocol P3. Vote Decreasing The same as P1, except that: The initiator sends Vi and Ni along with its vote decrease. Upon successfully 12 collecting a majority of votes, the initiator increases Ni[i] by one and sets the Vi[i] to the new value.
  • 10. Group Based Voting This voting mechanism is proposed by Agarwal and Jalote [6]. In the previous voting algorithm, the site initiating the operation has to communicate with all the nodes incurring high communication costs. In this algorithm [6] the sites are divided into intersecting or overlapping groups. In the absence of failures the site initiating the operation communicates with the sites of its group thus reducing the communication costs. This algorithm suggests a method for constructing such logical groups and show that the message overhead of any operation in a system of N nodes is O (√n), when there are no or few failures in the system.