Sequencing computation steps in a network
It is sometimes necessary in the course of a distributed computation to arrange that a certain set of operations is carried out in the correct order and the correct number of times (typically once). If several sets of operations are performed on different machines on the network there is no obvious...
Gespeichert in:
Veröffentlicht in: | Operating systems review 1981-12, Vol.15 (5), p.59-63 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 63 |
---|---|
container_issue | 5 |
container_start_page | 59 |
container_title | Operating systems review |
container_volume | 15 |
creator | Herbert, A. J. Needham, R. M. |
description | It is sometimes necessary in the course of a distributed computation to arrange that a certain set of operations is carried out in the correct order and the correct number of times (typically once). If several sets of operations are performed on different machines on the network there is no obvious mechanism for enforcing such ordering constraints in a fully distributed way. This lack basically stems from the difficulty of preventing copying and repetition of messages by machines and from the impossibility of constraining externally the actions of machines in response to messages that come into their hands.
This paper presents a possible method for ensuring the integrity of sequences of operations on different machines. The technique may be thought of as a means of enabling machines to ensure that requests made of them are valid and timely, not as means of centralized control of services. |
doi_str_mv | 10.1145/1067627.806592 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_1067627_806592</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>29447739</sourcerecordid><originalsourceid>FETCH-LOGICAL-c709-23f5abbce7589e6b095b92089bcb37f6c451013ab1dfaf81c9c068c9b85bbe673</originalsourceid><addsrcrecordid>eNotkE1LxDAURQMqOI6zdd2V4KL1vab5eEsZdBQGXDj7kMRUqm1amxbx31uZWd3FvVwOh7EbhAKxEvcIUslSFRqkoPKMbUhp0KRoKUo4ZytAyXNBGi7ZVUqfAKhR4ordvYXvOUTfxI_M990wT3Zq-pilKQwpa2Jmsximn378umYXtW1T2JxyzQ5Pj4ftc75_3b1sH_a5V0B5yWthnfNBCU1BOiDhqFxQnHdc1dJXAgG5dfhe21qjJw9Se3JaOBek4mt2e7wdxn4hS5PpmuRD29oY-jmZkqpKKU7LsDgO_dinNIbaDGPT2fHXIJh_KeYkxRyl8D9AmlM0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>29447739</pqid></control><display><type>article</type><title>Sequencing computation steps in a network</title><source>ACM Digital Library</source><creator>Herbert, A. J. ; Needham, R. M.</creator><creatorcontrib>Herbert, A. J. ; Needham, R. M.</creatorcontrib><description>It is sometimes necessary in the course of a distributed computation to arrange that a certain set of operations is carried out in the correct order and the correct number of times (typically once). If several sets of operations are performed on different machines on the network there is no obvious mechanism for enforcing such ordering constraints in a fully distributed way. This lack basically stems from the difficulty of preventing copying and repetition of messages by machines and from the impossibility of constraining externally the actions of machines in response to messages that come into their hands.
This paper presents a possible method for ensuring the integrity of sequences of operations on different machines. The technique may be thought of as a means of enabling machines to ensure that requests made of them are valid and timely, not as means of centralized control of services.</description><identifier>ISSN: 0163-5980</identifier><identifier>ISBN: 9780897910620</identifier><identifier>ISBN: 0897910621</identifier><identifier>DOI: 10.1145/1067627.806592</identifier><language>eng</language><ispartof>Operating systems review, 1981-12, Vol.15 (5), p.59-63</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c709-23f5abbce7589e6b095b92089bcb37f6c451013ab1dfaf81c9c068c9b85bbe673</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Herbert, A. J.</creatorcontrib><creatorcontrib>Needham, R. M.</creatorcontrib><title>Sequencing computation steps in a network</title><title>Operating systems review</title><description>It is sometimes necessary in the course of a distributed computation to arrange that a certain set of operations is carried out in the correct order and the correct number of times (typically once). If several sets of operations are performed on different machines on the network there is no obvious mechanism for enforcing such ordering constraints in a fully distributed way. This lack basically stems from the difficulty of preventing copying and repetition of messages by machines and from the impossibility of constraining externally the actions of machines in response to messages that come into their hands.
This paper presents a possible method for ensuring the integrity of sequences of operations on different machines. The technique may be thought of as a means of enabling machines to ensure that requests made of them are valid and timely, not as means of centralized control of services.</description><issn>0163-5980</issn><isbn>9780897910620</isbn><isbn>0897910621</isbn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1981</creationdate><recordtype>article</recordtype><recordid>eNotkE1LxDAURQMqOI6zdd2V4KL1vab5eEsZdBQGXDj7kMRUqm1amxbx31uZWd3FvVwOh7EbhAKxEvcIUslSFRqkoPKMbUhp0KRoKUo4ZytAyXNBGi7ZVUqfAKhR4ordvYXvOUTfxI_M990wT3Zq-pilKQwpa2Jmsximn378umYXtW1T2JxyzQ5Pj4ftc75_3b1sH_a5V0B5yWthnfNBCU1BOiDhqFxQnHdc1dJXAgG5dfhe21qjJw9Se3JaOBek4mt2e7wdxn4hS5PpmuRD29oY-jmZkqpKKU7LsDgO_dinNIbaDGPT2fHXIJh_KeYkxRyl8D9AmlM0</recordid><startdate>198112</startdate><enddate>198112</enddate><creator>Herbert, A. J.</creator><creator>Needham, R. M.</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>198112</creationdate><title>Sequencing computation steps in a network</title><author>Herbert, A. J. ; Needham, R. M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c709-23f5abbce7589e6b095b92089bcb37f6c451013ab1dfaf81c9c068c9b85bbe673</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1981</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Herbert, A. J.</creatorcontrib><creatorcontrib>Needham, R. M.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Operating systems review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Herbert, A. J.</au><au>Needham, R. M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sequencing computation steps in a network</atitle><jtitle>Operating systems review</jtitle><date>1981-12</date><risdate>1981</risdate><volume>15</volume><issue>5</issue><spage>59</spage><epage>63</epage><pages>59-63</pages><issn>0163-5980</issn><isbn>9780897910620</isbn><isbn>0897910621</isbn><abstract>It is sometimes necessary in the course of a distributed computation to arrange that a certain set of operations is carried out in the correct order and the correct number of times (typically once). If several sets of operations are performed on different machines on the network there is no obvious mechanism for enforcing such ordering constraints in a fully distributed way. This lack basically stems from the difficulty of preventing copying and repetition of messages by machines and from the impossibility of constraining externally the actions of machines in response to messages that come into their hands.
This paper presents a possible method for ensuring the integrity of sequences of operations on different machines. The technique may be thought of as a means of enabling machines to ensure that requests made of them are valid and timely, not as means of centralized control of services.</abstract><doi>10.1145/1067627.806592</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0163-5980 |
ispartof | Operating systems review, 1981-12, Vol.15 (5), p.59-63 |
issn | 0163-5980 |
language | eng |
recordid | cdi_crossref_primary_10_1145_1067627_806592 |
source | ACM Digital Library |
title | Sequencing computation steps in a network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T20%3A32%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sequencing%20computation%20steps%20in%20a%20network&rft.jtitle=Operating%20systems%20review&rft.au=Herbert,%20A.%20J.&rft.date=1981-12&rft.volume=15&rft.issue=5&rft.spage=59&rft.epage=63&rft.pages=59-63&rft.issn=0163-5980&rft.isbn=9780897910620&rft.isbn_list=0897910621&rft_id=info:doi/10.1145/1067627.806592&rft_dat=%3Cproquest_cross%3E29447739%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=29447739&rft_id=info:pmid/&rfr_iscdi=true |