AU2002334163A1 - State recovery - Google Patents
State recoveryInfo
- Publication number
- AU2002334163A1 AU2002334163A1 AU2002334163A AU2002334163A AU2002334163A1 AU 2002334163 A1 AU2002334163 A1 AU 2002334163A1 AU 2002334163 A AU2002334163 A AU 2002334163A AU 2002334163 A AU2002334163 A AU 2002334163A AU 2002334163 A1 AU2002334163 A1 AU 2002334163A1
- Authority
- AU
- Australia
- Prior art keywords
- state
- increment
- counter
- decrement
- requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000011084 recovery Methods 0.000 title description 9
- 238000000034 method Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 description 7
- 238000013499 data model Methods 0.000 description 1
Description
State recovery
The invention relates to a method of recovering the modelled state of a system
In many electronic systems it is necessary to provide a framework to facilitate the storage of state information derived from monitoring entities within an external system. An example where this might be required is in a transaction based system with a high request inter-arrival rate such as that of monitoring a number of users logged on to a computer network.
In such systems, the problems of modelling the system and the state of the system are non-trivial. One approach that is used is to model the system using state counters associated with individual entities within the system, representing for example, the usage of the entity at any one instant in time. The required operations on these counters simply comprise increment and decrement requests.
Typically, in transaction based systems which have a high request inter-arrival rate, the option of storing this data in non-volatile memory can be dismissed due to the lengthy access times. Therefore volatile memory is the only option. However, in using volatile memory there is the risk that all state information will be lost in the case of a system failure of the monitoring system.
One known approach to the recovery of state information in a transaction based system, where one or more counters represent the correct, instantaneous state of the monitored system, when a failure of the monitoring application occurs and the state counters are lost, is to reset all the counters to zero, implicitly accepting that all the previous state data is lost and unrecoverable. The monitoring operation then continues as before and the counters are adjusted in response to incoming transaction requests.
The known approach suffers from the problem that the system will receive decrement requests which relate to the initial state before failure. However, the appropriate counters should not be decremented as they will tend to a negative value, thus misrepresenting the correct, instantaneous state of the monitored system. This occurs
since there will be decrement requests received relating to increment requests received during the initial state. The problem with this is that the current state counters have no knowledge of what the state of the system was in the initial state. Therefore, any decrement requests received relating to increment requests received during the initial state will be deducted from the current state counters incorrectly.
The present invention seeks to provide a method of recovering the modelled state of a system.
According to the invention there is provided a method of recovering the state of a system, which system comprises at least one counter, which counter represents an instantaneous state of an element in the system, whereby the counter will increase in value in response to an increment request and decrease in value in response to a decrement request, wherein each increment request is paired with a decrement request.
The method of the invention advantageously pairs the increment and decrement requests. This permits the system in the recovery state to distinguish between known decrement requests, i.e. those corresponding to increment requests received in the recovery state, and unknown decrement requests, i.e. those corresponding to increment requests received in initial state. The unknown decrement requests can be discarded and hence have no effect on the recovery state. The counters will then tend to converge with the true state of the system.
In a preferred embodiment, the increment and decrement requests are paired using an index key shared between the increment and decrement requests. Preferably the system comprises a plurality of counters. Preferably the or each counter refers to a user session. Preferably, the state of the or each counter is held in volatile memory comprising a part of the system.
An exemplary embodiment will now be described in greater detail with reference to the drawing, in which:
Fig. 1 shows a graph of the state of a single counter
A typical application where the monitoring of the state of a system is in the field of concurrency control such as a connection to an internet service provider or online licensing and gaming applications. Figure 1 shows a graph showing the state of a single counter over a period of time. The counter can refer to a user session such as a dialled up connection to an internet service provider. However, it is also possible to group individual users if this is appropriate so that a counter refers to all users in a particular geographic region or all users belonging to the same organisation. The former is applicable in the case of a vISP and the latter in the case of a corporate contract.
The period from t=0 to represents the initial state of the system, where ti represents the time at which the monitoring system fails. t2 represents the time at which the system recovers and begins to process increment and decrement requests. t represents the time at which the recovery state represents the true state of the system being monitored, the time between t2 and t3 representing the recovery state. The thin line represents the true state of the system and the bold line represents the recovery state. The time t3 will be reached once all of the decrement requests relating to increments from the initial state have been processed.
One method of pairing increment and decrement requests is to use a shared index key between increment and decrement requests associated with the usage of a particular entity, which can be defined in the data model of the system. Other methods of pairing increment and decrement requests are possible depending on the language and data constructs used in the implementation.
In addition to user sessions, it is possible for the counters to refer to other forms of user activity such as number of accesses to a piece of content or to a certain application or the volume of data transferred.
Claims (5)
1. A method of recovering the state of a distributed networked system, which system comprises at least one counter, which counter represents an instantaneous state of an entity in a system, whereby the counter will increase in value in response to an increment request and decrease in value in response to a decrement request, wherein each increment request is paired with a decrement request.
2. A method according to Claim 1, wherein the increment and decrement requests are paired using an index key shared between the increment and decrement requests.
3. A method according to Claim 1 or Claim 2, wherein the system comprises a plurality of counters.
4. A method of recovering the state of a system according to any one of Claims 1 to 3, wherein the or each counter refers to a user session.
5. A method of recovering the state of a system according to any one of Claims 1 to 4, wherein the state of the or each counter is held in volatile memory comprising a part of the system.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0124702.2 | 2001-10-15 | ||
| GB0124702A GB2381088B (en) | 2001-10-15 | 2001-10-15 | State recovery |
| PCT/GB2002/004667 WO2003034223A2 (en) | 2001-10-15 | 2002-10-15 | State recovery |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| AU2002334163A1 true AU2002334163A1 (en) | 2003-07-03 |
| AU2002334163B2 AU2002334163B2 (en) | 2007-04-05 |
Family
ID=9923843
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2002334163A Ceased AU2002334163B2 (en) | 2001-10-15 | 2002-10-15 | State recovery |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US7580997B2 (en) |
| EP (1) | EP1436702A2 (en) |
| JP (1) | JP2005505852A (en) |
| KR (1) | KR20040044552A (en) |
| AU (1) | AU2002334163B2 (en) |
| CA (1) | CA2463606A1 (en) |
| GB (1) | GB2381088B (en) |
| IL (1) | IL161376A0 (en) |
| WO (1) | WO2003034223A2 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9152400B2 (en) * | 2013-04-18 | 2015-10-06 | Facebook, Inc. | Eliminating redundant reference count operations in intermediate representation of script code |
| US8990789B2 (en) | 2013-04-18 | 2015-03-24 | Facebook, Inc. | Optimizing intermediate representation of script code by eliminating redundant reference count operations |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS61134852A (en) * | 1984-12-06 | 1986-06-21 | Nec Corp | Microcomputer |
| US4716524A (en) * | 1985-04-04 | 1987-12-29 | Texas Instruments Incorporated | Apparatus and method removing increment/decrement pairs to decimate a block reference stream |
| DE3804266A1 (en) * | 1988-02-11 | 1989-09-14 | Leitz Wild Gmbh | GRAY CODE CONVERTER WITH ERROR SIGNAL |
| GB2252475A (en) * | 1990-11-21 | 1992-08-05 | Motorola Inc | Recording error events particularly in radiotelephones |
| US5289460A (en) * | 1992-07-31 | 1994-02-22 | International Business Machines Corp. | Maintenance of message distribution trees in a communications network |
| ES2103402T3 (en) * | 1992-08-21 | 1997-09-16 | Siemens Ag | PROCEDURE FOR TEMPORARY SUPERVISION OF THE IMPLEMENTATION OF A PROGRAM. |
| GB2281986B (en) * | 1993-09-15 | 1997-08-06 | Advanced Risc Mach Ltd | Data processing reset |
| JP2916420B2 (en) * | 1996-09-04 | 1999-07-05 | 株式会社東芝 | Checkpoint processing acceleration device and data processing method |
| US5987621A (en) * | 1997-04-25 | 1999-11-16 | Emc Corporation | Hardware and software failover services for a file server |
| US6157955A (en) * | 1998-06-15 | 2000-12-05 | Intel Corporation | Packet processing system including a policy engine having a classification unit |
| US6625750B1 (en) * | 1999-11-16 | 2003-09-23 | Emc Corporation | Hardware and software failover services for a file server |
-
2001
- 2001-10-15 GB GB0124702A patent/GB2381088B/en not_active Expired - Fee Related
-
2002
- 2002-10-15 KR KR10-2004-7005490A patent/KR20040044552A/en not_active Withdrawn
- 2002-10-15 AU AU2002334163A patent/AU2002334163B2/en not_active Ceased
- 2002-10-15 WO PCT/GB2002/004667 patent/WO2003034223A2/en not_active Ceased
- 2002-10-15 JP JP2003536886A patent/JP2005505852A/en active Pending
- 2002-10-15 EP EP02801407A patent/EP1436702A2/en not_active Withdrawn
- 2002-10-15 IL IL16137602A patent/IL161376A0/en unknown
- 2002-10-15 US US10/492,551 patent/US7580997B2/en not_active Expired - Fee Related
- 2002-10-15 CA CA002463606A patent/CA2463606A1/en not_active Abandoned
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9489268B2 (en) | System and method to proactively maintain a consistent recovery point objective (RPO) across data centers | |
| US7412520B2 (en) | Systems and methods for recoverable workflow | |
| CN111314238A (en) | Token management method and device, storage medium and electronic device | |
| US8606407B2 (en) | Energy management application server and processes | |
| US7536356B2 (en) | Distributed run-time licensing | |
| US7818621B2 (en) | Data center boot order control | |
| JP4089427B2 (en) | Management system, management computer, management method and program | |
| US20090235109A1 (en) | Hybrid computer security clock | |
| CN111353150B (en) | Trusted boot method, trusted boot device, electronic equipment and readable storage medium | |
| CA2428285A1 (en) | Method and/or system and/or apparatus for multiple interface remotely configurable power supply | |
| AU2005222564A1 (en) | Method to Chain Events in a System Event Log | |
| US6954791B2 (en) | Time-based network connections | |
| US20050044239A1 (en) | State recovery | |
| AU2002334163A1 (en) | State recovery | |
| US10198317B1 (en) | Computation refinement in a data storage system | |
| CN107395450A (en) | Using the monitoring method and device, storage medium, electronic installation of the situation of login | |
| CN118034994A (en) | Data processing method, device, electronic device and storage medium | |
| US7240090B2 (en) | Data queueing | |
| JP2009116678A (en) | Web server | |
| CN111367878A (en) | IPFS node monitoring method and device | |
| CN115712518B (en) | Method for processing memory fault and related equipment | |
| EP4468762A1 (en) | A communication system and method for enabling inactivity timeout based on terminal timer | |
| CN108900604A (en) | Information dispensing method, device, branch office service end and storage medium | |
| CN111367466B (en) | Disk retirement method and device | |
| JP2018181012A (en) | Business collaboration system and business collaboration method |