SlideShare a Scribd company logo
NANDAKUMAR P
AP/CSE
CAHCET
Contents
Naming Entities
Names, Identifiers and Address
Name Spaces
Name Resolution
Closure Mechanism
Linking and Mounting
Implementation of Name Space
Implementation of Resolution
Conclusion
Why naming is important?
Names are used to
Share resources
Uniquely identify entities
To refer locations, and so on…
Name resolution allows a process to access the named
entity
Naming Entities
Name  string of characters used to refer to an
entity
Entity in DS can be anything, e.g., hosts, printers, disks,
files, mailboxes, web pages, etc
Access Point  To access an entity
Address  name of access point
Access points of an entity may change
Identifier and True Identifiers
We need
single name of entity independent from the address of
that entity  location independent
Identifiers  name that uniquely identifies an
entity
True Identifier has three properties
Refers to at most one entity
Each entity is referred to by at most one identifier
Never reused
 Differentiating point for Address and Identifier
Name Space
Names in DS are organized into Name Spaces
Name Space represented as labeled, directed
graph
Leaf node  no outgoing edges
Directory node  number of labeled outgoing
edges
Stores directory table containing entries for each
outgoing edge as a pair (edge label, node identifier)
Root Node  only outgoing edges
Path Name sequence of labels
Absolute Path  first node in path name is root
Relative Path  the opposite case
General Naming Graph
Name Resolution
The process of looking up a name
Closure Mechanism  Knowing how and where to start
name resolution
Mounting  transparent way for name resolution with
different name spaces
Mounted File System  letting a directory node store
the identifier of a directory node from a different name
space (foreign name space)
Mount point  directory node storing the node
identifier
Mounting point  directory node in the foreign name
space
Normally the mounting point is root
Mounted File System
During resolution, mounting point is looked up &
resolution proceeds by accessing its directory
table
Mounting requires at least
Name of an access protocol (for communication)
Name of the server (resolved to address)
Name of mounting point in foreign name space (resolved
to node identifier in foreign NS)
Each of these names needs to be resolved
Three names can be represented as URL
nfs://oslab.khu.ac.kr/home/faraz
Mounted File System
Global Name Service (GNS)
Another way to merge different name spaces
Mechanism  add a new root node and make the
exiting root node its children
Problem
Existing names need to be changed. E.g.,
home/faraz  people/home/faraz
Expansion is generally hidden from user
Has a significant performance overhead when
merging 100s or 1000s of name spaces
Global Name Service (GNS)
Implementation of Name Space
For large scale DS, name spaces are organized
hierarchically
Name Spaces are partitioned into three logical layers
Global Layer  formed by highest-level nodes
Administration Layer  formed by directory nodes
managed within a single organization
Managerial Layer  formed by nodes that may
typically change regularly
Implementation of Name Space
Implementation of Name Space
Item Global Administrational Managerial
Geographical scale of network Worldwide Organization Department
Total number of nodes Few Many Vast numbers
Responsiveness to lookups Seconds Milliseconds Immediate
Update propagation Lazy Immediate Immediate
Number of replicas Many None or few None
Is client-side caching applied? Yes Yes Sometimes
Implementation of Name Resolution
Assumptions
No replication of name servers
No client side caching
Each client has access to a local name server
Two possible implementations
Iterative Name Resolution
 Server will resolve the path name as far as it can, and return
each intermediate result to the client
Recursive Name Resolution
 A name server passes the result to the next name server found
by it
Iterative Name Resolution
Advantage
 Less burden on name sever
Disadvantage
 More communication cost
Recursive Name Resolution
Advantages
 Caching result is more effective
 Reduced communication cost
Disadvantage
 Demands high performance on each name server
Domain Name System (DNS)
An example implementation of name resolution
Primarily used for looking up host address and
mail servers
DNS name space is hierarchically organized as a
rooted tree
A label is a case sensitive string with max. length
of 63 characters
Max. length of complete path name is 255
characters
The root is represented by a dot
We generally omit this dot for readability
Naming versus Locating Entities
Entities are named for lookup and subsequent
access
Human-friendly Names
Identifiers
Addresses
Virtually all naming systems maintain mapping
from Human-friendly names to addresses
Partitioning of Name space
Global Level
Administrator Level
 Managerial Level
Naming versus Locating Entities
ftp.cs.vu.nl
cs.vu.nl cs.vu.nl
ftp.cs.vu.nl ftp.abc.cs.vu.nl
abc
cs.vu.nl
ftp.cs.vu.nl
ftp.khu.ac.kr
Naming versus Locating Entities
Possible Solutions
Record the address of new machine
 Lookup operation shall work
 Another update shall be required to database in case it changes
again
Record the name of the new machine
 Less efficient
 Find the name of new machine
 Lookup the address associated with the name
 Addition of step to lookup operation
For highly mobile entities, it becomes only worse
Naming versus Locating Entities
 Direct, single level mapping between names and addresses.
 T-level mapping using identities.
Simple solutions: Broadcasting and multicasting
A location service accepts an identifier as input and
returns the current address of the identified entity.
Simple solutions exist to work in local area network.
Address Resolution Protocol (ARP) to map the IP address
of a machine to its data-link address, which uses
broadcasting.
Multicasting can be used to locate entities in point-to-
point networks (such as the Internet).
Each multicasting address can be associated with multiple
replicated entities.
Forwarding Pointers (1)
• The principle of forwarding pointers using (proxy, skeleton)
pairs.
Forwarding Pointers (1)
Redirecting a forwarding pointer, by storing a
shortcut in a proxy.
Home-Based Approaches
Example: The principle of Mobile IP. (Perkins,
1997)
Hierarchical Approaches (1)
Hierarchical organization of a location service into
domains, each having an associated directory node.
Hierarchical Approaches (2)
An example of storing information of an entity
having two addresses in different leaf
domains.
Hierarchical Approaches (3)
Looking up a location in a hierarchically organized
location service.
Hierarchical Approaches (4)
a) An insert request is forwarded to the first node that
knows about entity E.
b) A chain of forwarding pointers to the leaf node is
created.
Pointer Caches (1)
Caching a reference to a directory node of the
lowest-level domain in which an entity will reside
most of the time.
Pointer Caches (2)
A cache entry that needs to be invalidated
because it returns a nonlocal address, while such
an address is available.
Scalability Issues
The scalability issues related to uniformly placing subnodes of a
partitioned root node across the network covered by a location
service.
The Problem of Unreferenced
Objects
An example of a graph representing objects
containing references to each other.
Reference Counting (1)
The problem of maintaining a proper reference
count in the presence of unreliable
communication.
Reference Counting (2)
a) Copying a reference to another process
and incrementing the counter too late
b) A solution.
Advanced Referencing Counting (1)
a) The initial assignment of weights in weighted
reference counting
b) Weight assignment when creating a new reference.
Advanced Referencing Counting (2)
c) Weight assignment when copying a
reference.
Advanced Referencing Counting (3)
Creating an indirection when the partial
weight of a reference has reached 1.
Advanced Referencing Counting (4)
Creating and copying a remote reference
in generation reference counting.
Reference Listing (1)
Skeleton Keeps track of Proxies
Instead of counting them maintain an explicit list of references
Adding/removing references to the list have no effect on the
fact the proxy is already exists/removed
Idempotent Operations
Repeatable without affecting the end result
Increment/decrement operation are clearly not
idempotent
Reference Listing (2)
Advantages
Don’t require reliable communication
Duplicate messages need not to be detected
Only insertion/deletion should be acknowledged
Easier to keep system consistent in case of process failures
Drawback
Scale badly
Solution
Leasing
Identifying Unreachable Entities
 Trace based garbage collection
 Scalability problems
 Naïve tracing
 Mark and sweep collectors
 White, Grey, Black marks
 Drawbacks
 Reachability graphs need to remain same during both
phases
 No process can run when GC is running
Tracing in Groups (1)
Initial marking of skeletons.
Tracing in Groups (2)
After local propagation in each process.
Tracing in Groups (3)
Final marking.
Conclusion
Naming, organization of names and name
resolution are key issue in any distributed systems
Locating entities is an open research issues. There
are few methods like Forwarding pointers,
hierarchical approaches, home based approaches
and pointer caches but each has its own short
comings
Reference counting, advanced reference counting
and Reference listing are few methods that can be
used for unreferenced objects
Thank you

More Related Content

What's hot

Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Chapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.pptChapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.ppt
sirajmohammed35
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
Anamika Singh
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
Dilum Bandara
 
Design Goals of Distributed System
Design Goals of Distributed SystemDesign Goals of Distributed System
Design Goals of Distributed System
Ashish KC
 
Resource management
Resource managementResource management
Resource management
Dr Sandeep Kumar Poonia
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
Rajat Kumar
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusion
Neelamani Samal
 
Distributed System ppt
Distributed System pptDistributed System ppt
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
Kathirvel Ayyaswamy
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
File replication
File replicationFile replication
File replication
Klawal13
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
Md. Mashiur Rahman
 

What's hot (20)

Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Chapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.pptChapter 6-Consistency and Replication.ppt
Chapter 6-Consistency and Replication.ppt
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
 
Design Goals of Distributed System
Design Goals of Distributed SystemDesign Goals of Distributed System
Design Goals of Distributed System
 
Resource management
Resource managementResource management
Resource management
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusion
 
4. system models
4. system models4. system models
4. system models
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
File replication
File replicationFile replication
File replication
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 

Similar to Naming in Distributed Systems

DS_Unit_05.pptx
DS_Unit_05.pptxDS_Unit_05.pptx
DS_Unit_05.pptx
SandeshThapamagar1
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
AschalewAyele2
 
Chapter 4-Naming.ppt
Chapter 4-Naming.pptChapter 4-Naming.ppt
Chapter 4-Naming.ppt
sirajmohammed35
 
DNS
DNS DNS
The Application Layer
The Application LayerThe Application Layer
The Application Layer
MSharmilaDeviITDEPT
 
D.N.S
D.N.SD.N.S
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
Pratik Tambekar
 
Naming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile EntitiesNaming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile Entities
Rajat Kumar
 
CSE dns ppt.pptx
CSE dns ppt.pptxCSE dns ppt.pptx
CSE dns ppt.pptx
Pandajangal
 
Domain Name System ppt
Domain Name System pptDomain Name System ppt
Dns
DnsDns
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
DHIVYADEVAKI
 
DNS ( Domain Name System)
DNS ( Domain Name System)DNS ( Domain Name System)
DNS ( Domain Name System)
Prakhar Rastogi
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
Akshay Tiwari
 
DNS AND DDNS
DNS AND DDNSDNS AND DDNS
DNS AND DDNS
Virendra thakur
 
Domainnamesystem
DomainnamesystemDomainnamesystem
3-Application Layer.pptx
3-Application Layer.pptx3-Application Layer.pptx
3-Application Layer.pptx
SachinDUpadhye
 

Similar to Naming in Distributed Systems (20)

DS_Unit_05.pptx
DS_Unit_05.pptxDS_Unit_05.pptx
DS_Unit_05.pptx
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
 
Chapter 4-Naming.ppt
Chapter 4-Naming.pptChapter 4-Naming.ppt
Chapter 4-Naming.ppt
 
DNS
DNS DNS
DNS
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
D.N.S
D.N.SD.N.S
D.N.S
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
Naming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile EntitiesNaming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile Entities
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Dns And Snmp
Dns And SnmpDns And Snmp
Dns And Snmp
 
CSE dns ppt.pptx
CSE dns ppt.pptxCSE dns ppt.pptx
CSE dns ppt.pptx
 
Domain Name System ppt
Domain Name System pptDomain Name System ppt
Domain Name System ppt
 
Dns
DnsDns
Dns
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
 
DNS ( Domain Name System)
DNS ( Domain Name System)DNS ( Domain Name System)
DNS ( Domain Name System)
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
DNS AND DDNS
DNS AND DDNSDNS AND DDNS
DNS AND DDNS
 
Domainnamesystem
DomainnamesystemDomainnamesystem
Domainnamesystem
 
3-Application Layer.pptx
3-Application Layer.pptx3-Application Layer.pptx
3-Application Layer.pptx
 

More from Nandakumar P

UNIT - 5: Data Warehousing and Data Mining
UNIT - 5: Data Warehousing and Data MiningUNIT - 5: Data Warehousing and Data Mining
UNIT - 5: Data Warehousing and Data Mining
Nandakumar P
 
UNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data MiningUNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data Mining
Nandakumar P
 
UNIT 3: Data Warehousing and Data Mining
UNIT 3: Data Warehousing and Data MiningUNIT 3: Data Warehousing and Data Mining
UNIT 3: Data Warehousing and Data Mining
Nandakumar P
 
UNIT 2: Part 2: Data Warehousing and Data Mining
UNIT 2: Part 2: Data Warehousing and Data MiningUNIT 2: Part 2: Data Warehousing and Data Mining
UNIT 2: Part 2: Data Warehousing and Data Mining
Nandakumar P
 
UNIT 2: Part 1: Data Warehousing and Data Mining
UNIT 2: Part 1: Data Warehousing and Data MiningUNIT 2: Part 1: Data Warehousing and Data Mining
UNIT 2: Part 1: Data Warehousing and Data Mining
Nandakumar P
 
UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
Nandakumar P
 
UNIT - 1 : Part 1: Data Warehousing and Data Mining
UNIT - 1 : Part 1: Data Warehousing and Data MiningUNIT - 1 : Part 1: Data Warehousing and Data Mining
UNIT - 1 : Part 1: Data Warehousing and Data Mining
Nandakumar P
 
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONUNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
Nandakumar P
 
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONUNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
Nandakumar P
 
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
Nandakumar P
 
Python Course for Beginners
Python Course for BeginnersPython Course for Beginners
Python Course for Beginners
Nandakumar P
 
CS6601-Unit 4 Distributed Systems
CS6601-Unit 4 Distributed SystemsCS6601-Unit 4 Distributed Systems
CS6601-Unit 4 Distributed Systems
Nandakumar P
 
Unit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in EngineeringUnit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in Engineering
Nandakumar P
 
Unit-3 Professional Ethics in Engineering
Unit-3 Professional Ethics in EngineeringUnit-3 Professional Ethics in Engineering
Unit-3 Professional Ethics in Engineering
Nandakumar P
 
Unit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File SystemUnit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File System
Nandakumar P
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
Nandakumar P
 
Professional Ethics in Engineering
Professional Ethics in EngineeringProfessional Ethics in Engineering
Professional Ethics in Engineering
Nandakumar P
 

More from Nandakumar P (17)

UNIT - 5: Data Warehousing and Data Mining
UNIT - 5: Data Warehousing and Data MiningUNIT - 5: Data Warehousing and Data Mining
UNIT - 5: Data Warehousing and Data Mining
 
UNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data MiningUNIT - 4: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data Mining
 
UNIT 3: Data Warehousing and Data Mining
UNIT 3: Data Warehousing and Data MiningUNIT 3: Data Warehousing and Data Mining
UNIT 3: Data Warehousing and Data Mining
 
UNIT 2: Part 2: Data Warehousing and Data Mining
UNIT 2: Part 2: Data Warehousing and Data MiningUNIT 2: Part 2: Data Warehousing and Data Mining
UNIT 2: Part 2: Data Warehousing and Data Mining
 
UNIT 2: Part 1: Data Warehousing and Data Mining
UNIT 2: Part 1: Data Warehousing and Data MiningUNIT 2: Part 1: Data Warehousing and Data Mining
UNIT 2: Part 1: Data Warehousing and Data Mining
 
UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
 
UNIT - 1 : Part 1: Data Warehousing and Data Mining
UNIT - 1 : Part 1: Data Warehousing and Data MiningUNIT - 1 : Part 1: Data Warehousing and Data Mining
UNIT - 1 : Part 1: Data Warehousing and Data Mining
 
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONUNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
 
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHONUNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
 
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
 
Python Course for Beginners
Python Course for BeginnersPython Course for Beginners
Python Course for Beginners
 
CS6601-Unit 4 Distributed Systems
CS6601-Unit 4 Distributed SystemsCS6601-Unit 4 Distributed Systems
CS6601-Unit 4 Distributed Systems
 
Unit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in EngineeringUnit-4 Professional Ethics in Engineering
Unit-4 Professional Ethics in Engineering
 
Unit-3 Professional Ethics in Engineering
Unit-3 Professional Ethics in EngineeringUnit-3 Professional Ethics in Engineering
Unit-3 Professional Ethics in Engineering
 
Unit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File SystemUnit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File System
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
Professional Ethics in Engineering
Professional Ethics in EngineeringProfessional Ethics in Engineering
Professional Ethics in Engineering
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Naming in Distributed Systems

  • 2. Contents Naming Entities Names, Identifiers and Address Name Spaces Name Resolution Closure Mechanism Linking and Mounting Implementation of Name Space Implementation of Resolution Conclusion
  • 3. Why naming is important? Names are used to Share resources Uniquely identify entities To refer locations, and so on… Name resolution allows a process to access the named entity
  • 4. Naming Entities Name  string of characters used to refer to an entity Entity in DS can be anything, e.g., hosts, printers, disks, files, mailboxes, web pages, etc Access Point  To access an entity Address  name of access point Access points of an entity may change
  • 5. Identifier and True Identifiers We need single name of entity independent from the address of that entity  location independent Identifiers  name that uniquely identifies an entity True Identifier has three properties Refers to at most one entity Each entity is referred to by at most one identifier Never reused  Differentiating point for Address and Identifier
  • 6. Name Space Names in DS are organized into Name Spaces Name Space represented as labeled, directed graph Leaf node  no outgoing edges Directory node  number of labeled outgoing edges Stores directory table containing entries for each outgoing edge as a pair (edge label, node identifier) Root Node  only outgoing edges Path Name sequence of labels Absolute Path  first node in path name is root Relative Path  the opposite case
  • 8. Name Resolution The process of looking up a name Closure Mechanism  Knowing how and where to start name resolution Mounting  transparent way for name resolution with different name spaces Mounted File System  letting a directory node store the identifier of a directory node from a different name space (foreign name space) Mount point  directory node storing the node identifier Mounting point  directory node in the foreign name space Normally the mounting point is root
  • 9. Mounted File System During resolution, mounting point is looked up & resolution proceeds by accessing its directory table Mounting requires at least Name of an access protocol (for communication) Name of the server (resolved to address) Name of mounting point in foreign name space (resolved to node identifier in foreign NS) Each of these names needs to be resolved Three names can be represented as URL nfs://oslab.khu.ac.kr/home/faraz
  • 11. Global Name Service (GNS) Another way to merge different name spaces Mechanism  add a new root node and make the exiting root node its children Problem Existing names need to be changed. E.g., home/faraz  people/home/faraz Expansion is generally hidden from user Has a significant performance overhead when merging 100s or 1000s of name spaces
  • 13. Implementation of Name Space For large scale DS, name spaces are organized hierarchically Name Spaces are partitioned into three logical layers Global Layer  formed by highest-level nodes Administration Layer  formed by directory nodes managed within a single organization Managerial Layer  formed by nodes that may typically change regularly
  • 15. Implementation of Name Space Item Global Administrational Managerial Geographical scale of network Worldwide Organization Department Total number of nodes Few Many Vast numbers Responsiveness to lookups Seconds Milliseconds Immediate Update propagation Lazy Immediate Immediate Number of replicas Many None or few None Is client-side caching applied? Yes Yes Sometimes
  • 16. Implementation of Name Resolution Assumptions No replication of name servers No client side caching Each client has access to a local name server Two possible implementations Iterative Name Resolution  Server will resolve the path name as far as it can, and return each intermediate result to the client Recursive Name Resolution  A name server passes the result to the next name server found by it
  • 17. Iterative Name Resolution Advantage  Less burden on name sever Disadvantage  More communication cost
  • 18. Recursive Name Resolution Advantages  Caching result is more effective  Reduced communication cost Disadvantage  Demands high performance on each name server
  • 19. Domain Name System (DNS) An example implementation of name resolution Primarily used for looking up host address and mail servers DNS name space is hierarchically organized as a rooted tree A label is a case sensitive string with max. length of 63 characters Max. length of complete path name is 255 characters The root is represented by a dot We generally omit this dot for readability
  • 20.
  • 21. Naming versus Locating Entities Entities are named for lookup and subsequent access Human-friendly Names Identifiers Addresses Virtually all naming systems maintain mapping from Human-friendly names to addresses Partitioning of Name space Global Level Administrator Level  Managerial Level
  • 22. Naming versus Locating Entities ftp.cs.vu.nl cs.vu.nl cs.vu.nl ftp.cs.vu.nl ftp.abc.cs.vu.nl abc cs.vu.nl ftp.cs.vu.nl ftp.khu.ac.kr
  • 23. Naming versus Locating Entities Possible Solutions Record the address of new machine  Lookup operation shall work  Another update shall be required to database in case it changes again Record the name of the new machine  Less efficient  Find the name of new machine  Lookup the address associated with the name  Addition of step to lookup operation For highly mobile entities, it becomes only worse
  • 24. Naming versus Locating Entities  Direct, single level mapping between names and addresses.  T-level mapping using identities.
  • 25. Simple solutions: Broadcasting and multicasting A location service accepts an identifier as input and returns the current address of the identified entity. Simple solutions exist to work in local area network. Address Resolution Protocol (ARP) to map the IP address of a machine to its data-link address, which uses broadcasting. Multicasting can be used to locate entities in point-to- point networks (such as the Internet). Each multicasting address can be associated with multiple replicated entities.
  • 26. Forwarding Pointers (1) • The principle of forwarding pointers using (proxy, skeleton) pairs.
  • 27. Forwarding Pointers (1) Redirecting a forwarding pointer, by storing a shortcut in a proxy.
  • 28. Home-Based Approaches Example: The principle of Mobile IP. (Perkins, 1997)
  • 29. Hierarchical Approaches (1) Hierarchical organization of a location service into domains, each having an associated directory node.
  • 30. Hierarchical Approaches (2) An example of storing information of an entity having two addresses in different leaf domains.
  • 31. Hierarchical Approaches (3) Looking up a location in a hierarchically organized location service.
  • 32. Hierarchical Approaches (4) a) An insert request is forwarded to the first node that knows about entity E. b) A chain of forwarding pointers to the leaf node is created.
  • 33. Pointer Caches (1) Caching a reference to a directory node of the lowest-level domain in which an entity will reside most of the time.
  • 34. Pointer Caches (2) A cache entry that needs to be invalidated because it returns a nonlocal address, while such an address is available.
  • 35. Scalability Issues The scalability issues related to uniformly placing subnodes of a partitioned root node across the network covered by a location service.
  • 36. The Problem of Unreferenced Objects An example of a graph representing objects containing references to each other.
  • 37. Reference Counting (1) The problem of maintaining a proper reference count in the presence of unreliable communication.
  • 38. Reference Counting (2) a) Copying a reference to another process and incrementing the counter too late b) A solution.
  • 39. Advanced Referencing Counting (1) a) The initial assignment of weights in weighted reference counting b) Weight assignment when creating a new reference.
  • 40. Advanced Referencing Counting (2) c) Weight assignment when copying a reference.
  • 41. Advanced Referencing Counting (3) Creating an indirection when the partial weight of a reference has reached 1.
  • 42. Advanced Referencing Counting (4) Creating and copying a remote reference in generation reference counting.
  • 43. Reference Listing (1) Skeleton Keeps track of Proxies Instead of counting them maintain an explicit list of references Adding/removing references to the list have no effect on the fact the proxy is already exists/removed Idempotent Operations Repeatable without affecting the end result Increment/decrement operation are clearly not idempotent
  • 44. Reference Listing (2) Advantages Don’t require reliable communication Duplicate messages need not to be detected Only insertion/deletion should be acknowledged Easier to keep system consistent in case of process failures Drawback Scale badly Solution Leasing
  • 45. Identifying Unreachable Entities  Trace based garbage collection  Scalability problems  Naïve tracing  Mark and sweep collectors  White, Grey, Black marks  Drawbacks  Reachability graphs need to remain same during both phases  No process can run when GC is running
  • 46. Tracing in Groups (1) Initial marking of skeletons.
  • 47. Tracing in Groups (2) After local propagation in each process.
  • 48. Tracing in Groups (3) Final marking.
  • 49. Conclusion Naming, organization of names and name resolution are key issue in any distributed systems Locating entities is an open research issues. There are few methods like Forwarding pointers, hierarchical approaches, home based approaches and pointer caches but each has its own short comings Reference counting, advanced reference counting and Reference listing are few methods that can be used for unreferenced objects

Editor's Notes

  1. Fall-back mechanism for location services based on “Forwarding Pointers” Draw Backs: Increased Communication Latency: One has to Contact the Home even if the Host is present in Local network. Home location must always exist Solution: Two-Tiered Scheme, Locate the entity in local registry first, then contact the Entity’s Home location. (Mohan and Jain, 1994) applied it in Mobile Telephony. Home Location be kept at traditional Naming Service and let the client first look up the location of Home. That location can be cached.
  2. Global Location Service (Van Steen et al, 1998) representative of many Personal Communication Systems (Pitoura and Samaras, 2001, Wang 1993) Network is divided into Hierarchy of Domains similar as DNS Domain - Sub Domains  Leaf Domain (LAN/Cell) Each Entity present in a Domain D is represented by a Location Record in the directory node dir(D) Each Location record stores a pointer to the directory node of the next entity, where each location record stores a pointer to the directory node of next lower level sub-domain.
  3. Lookup operations exploit LOCALITY
  4. Insertion is Installing a Chain of Pointers in top-Down fashion Deletion is Analogous to Insertion. Delete process continues until a pointer is removed from a location record that remains nonempty afterwards
  5. Storing lookup results in traditional Location Services is highly effective because the entities are STATIONARY. For Mobile Entities, caching is not effective. But E moves in D regularly, then a reference to dir(D), can, in principal, be cached at every node along the path from the leaf node where the lookup was initiated Pointer Caching Approach is described by (Jain, 1996) Global Location Service (Van Steen, 1998); (Baggio et al, 2000) Improvements: By letting dir(D) store actual location of E, instead of a pointer to sub-domain. It shall make lookup operation in only two steps 1) get appropriate directory node 2) get the actual location of the E Open Questions: Which Domain pointer should be cached if E moves in two domains regularly. When to invalidate the cache entry
  6. Problem: Root node is required to store a location record for each entity and to process requests for entity Storage: Location record  1 KB, Billion records take on tera byte 10 100 GB disks Looup/update request processing: single root node becomes bottleneck Solution: Partition the root node/high-level directories into sub nodes. Each sub node is reponsible for a specific sub set of all entities. Question: Where to physically place each sub node in the network. Answer 1) centralized approach. Keep all at the same place. And root node is implemented by means of parallel computer
  7. Having a remote reference to an object doesn’t mean that the object will always be accessible Uni-processor systems VS distributed systems (Plainfosse and Shpiro, 1995) and (Abdullah and RingWood, 1998).
  8. Popular Method in Uni-processor systems. Problems: Unreliable Communication If no special measures are taken to detect duplicate messages then skeleton may falsely increment its reference counter again. When a remote reference is to be removed and message is lost again.
  9. Passing a reference requires three messages. That is performance impact in distributed systems.
  10. Only Decrement counting can be used to maintain reference integrity. Weighted Reference Counting
  11. Problem: Only a limited number of references can be made.
  12. Use of Indirection: This is similar to forwarding pointers and suffer from the same problems. Chains are performance degrading Chains are more Susceptible to failure
  13. Generation Reference Counting: Each remote reference is created as Proxy/Skeleton pair. (p, s) Each proxy has a generation number. When created it is set to zero. When reference is copied and new proxy is made, this number adds up. Skeleton maintains a table G in which G[i] denotes the outstanding copies of generation i. When a proxy is removed, the Copy Counter (n) and Generation number (k) is sent to Skeleton. Skeleton adjusts G by decrementing G[k] by one and incrementing G[k+1] by n Advantages: Handle duplicate references without the need to contact skeleton at proxy creation time
  14. Java RMI based on (Birrell et al, 1993)
  15. Naïve tracing in Distributed Systems: Emerald Systems, (jul et al, 1998)
  16. (Lang et al, 1992) Only for (proxy, skeleton) sets. Distributed GC. Address Scalability. Basic idea is to let low level groups collect garbage, and leave the analysis of inter group references
  17. Garbage Reclamation is actually be performed by the Local GC.