We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing

by Artur Koçi, Betim Çiço
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 49
Year of Publication: 2018
Authors: Artur Koçi, Betim Çiço
10.5120/ijca2018917331

Artur Koçi, Betim Çiço . Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing. International Journal of Computer Applications. 180, 49 ( Jun 2018), 35-42. DOI=10.5120/ijca2018917331

@article{ 10.5120/ijca2018917331,
author = { Artur Koçi, Betim Çiço },
title = { Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 180 },
number = { 49 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 35-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number49/29571-2018917331/ },
doi = { 10.5120/ijca2018917331 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:04:03.366581+05:30
%A Artur Koçi
%A Betim Çiço
%T Performance Evaluation of the Asymmetric Distributed Lock Management in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 49
%P 35-42
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Lock management in distributed systems has been the focus for many researchers. The purpose of lock manager is to permit clients to synchronize their activities and agree about their environment. They are techniques used for increasing the availability and reliability of the distributed systems and maintain the consistency of shared files. Based on their behavior and characteristics, lock managers are categorized as centralized lock manger and distributed lock manager. In this paper we present a new distributed lock manager technique that is a fully lock manager. For maintaining file consistency, the lock manager needs to coordinate the tasks with other lock managers in the cloud. This leads to the additional communication that causes extra delays, which can play an important role in defining the quality of the cloud. We are going to analyze in detail these delays and measure the performance of our solution while its implementation is in a different cloud computing environment.

References
  1. Kishida, H., and Yamazaki, H.: ‘SSDLM: architecture of a distributed lock manager with high degree of locality for clustered file systems’, in Editor (Ed.)^(Eds.): ‘Book SSDLM: architecture of a distributed lock manager with high degree of locality for clustered file systems’ (IEEE, 2003, edn.), pp. 9-12
  2. Ghemawat, S., Gobioff, H., and Leung, S.-T.: ‘The Google file system’, SIGOPS Oper. Syst. Rev., 2003, 37, (5), pp. 29-43
  3. Burrows, M.: ‘The Chubby lock service for loosely-coupled distributed systems’, in Editor (Ed.)^(Eds.): ‘Book The Chubby lock service for loosely-coupled distributed systems’ (USENIX Association, 2006, edn.), pp. 335-350
  4. Lamport, L.: ‘The part-time parliament’, ACM Transactions on Computer Systems (TOCS), 1998, 16, (2), pp. 133-169
  5. Lamport, L.: ‘Paxos made simple’, ACM Sigact News, 2001, 32, (4), pp. 18-25
  6. Wu, S., and Wu, K.-L.: ‘An Indexing Framework for Efficient Retrieval on the Cloud’, IEEE Data Eng. Bull., 2009, 32, (1), pp. 75-82
  7. Terry, D.B., Theimer, M.M., Petersen, K., Demers, A.J., Spreitzer, M.J., and Hauser, C.H.: ‘Managing update conflicts in Bayou, a weakly connected replicated storage system’ (ACM, 1995. 1995)
  8. Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., and Wattenhofer, R.P.: ‘FARSITE: Federated, available, and reliable storage for an incompletely trusted environment’, ACM SIGOPS Operating Systems Review, 2002, 36, (SI), pp. 1-14
  9. Lakshman, A., and Malik, P.: ‘Cassandra: a decentralized structured storage system’, ACM SIGOPS Operating Systems Review, 2010, 44, (2), pp. 35-40
  10. Choi, S., Choi, M., Lee, C., and Youn, H.Y.: ‘Distributed lock manager for distributed file system in shared-disk environment’, in Editor (Ed.)^(Eds.): ‘Book Distributed lock manager for distributed file system in shared-disk environment’ (IEEE, 2010, edn.), pp. 2706-2713
  11. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., and Brandic, I.: ‘Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility’, Future Generation computer systems, 2009, 25, (6), pp. 599-616
  12. Tewari, S., and Kleinrock, L.: ‘Analysis of search and replication in unstructured peer-to-peer networks’, in Editor (Ed.)^(Eds.): ‘Book Analysis of search and replication in unstructured peer-to-peer networks’ (ACM, 2005, edn.), pp. 404-405
  13. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., and Ramchandran, K.: ‘Network coding for distributed storage systems’, IEEE transactions on information theory, 2010, 56, (9), pp. 4539-4551
  14. Dimakis, A.G., Ramchandran, K., Wu, Y., and Suh, C.: ‘A survey on network codes for distributed storage’, Proceedings of the IEEE, 2011, 99, (3), pp. 476-489
  15. Koçi, A., and Çiço, B.: ‘ADLMCC–Asymmetric distributed lock management in cloud computing’, Unpublished paper, 2018
Index Terms

Computer Science
Information Sciences

Keywords

Cloud data storage file consistency distributed systems lock manager voting algorithm file replication etc.