Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
A Reservation-Based Extended Transaction Protocol, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith
A Reservation-Based Extended Transaction Protocol, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith
Electrical and Computer Engineering Faculty Publications
With the advent of the new generation of Internet-based technology, in particular, web services, the automation of business activities that are distributed across multiple enterprises becomes possible. Business activities are different from traditional transactions in that they are typically asynchronous, loosely coupled, and long running. Therefore, extended transaction protocols are needed to coordinate business activities that span multiple enterprises. Existing extended transaction protocols typically rely on compensating transactions to handle exceptional conditions. In this paper, we identify a number of issues with compensation-based extended transaction protocols and describe a reservation-based extended transaction protocol that addresses those issues. Moreover, we define …
Unification Of Transactions And Replication In Three-Tier Architectures Based On Corba, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Unification Of Transactions And Replication In Three-Tier Architectures Based On Corba, Wenbing Zhao, Louise E. Moser, P. Michael Melliar-Smith
Electrical and Computer Engineering Faculty Publications
In this paper, we describe a software infrastructure that unifies transactions and replication in three-tier architectures and provides data consistency and high availability for enterprise applications. The infrastructure uses transactions based on the CORBA object transaction service to protect the application data in databases on stable storage, using a roll-backward recovery strategy, and replication based on the fault tolerant CORBA standard to protect the middle-tier servers, using a roll-forward recovery strategy. The infrastructure replicates the middle-tier servers to protect the application business logic processing. In addition, it replicates the transaction coordinator, which renders the two-phase commit protocol nonblocking and, thus, …