1983
DOI: 10.1145/357436.357439
|View full text |Cite
|
Sign up to set email alerts
|

The clearinghouse

Abstract: AgentThe problem of naming and locating objects in a distributed environment is considered, and the clearinghouse, a decentralized agent for supporting the naming of these "network-visible" objects, is described. The objects "known" to the clearinghouse are of many types and include workstations, file servers, print servers, mail servers, clearinghouse servers, and human user. All objects known to the clearinghouse are named using the same convention, and the clearinghouse provides information about objects in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

1985
1985
2006
2006

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 133 publications
(29 citation statements)
references
References 7 publications
0
29
0
Order By: Relevance
“…Such services are often designed as a part of a single 'name server' which becomes responsible for mapping user supplied names of objects to their locations (e.g., [21]). However, these two services provide logically distinct functions related to applications.…”
Section: Naming and Binding Modulesmentioning
confidence: 99%
“…Such services are often designed as a part of a single 'name server' which becomes responsible for mapping user supplied names of objects to their locations (e.g., [21]). However, these two services provide logically distinct functions related to applications.…”
Section: Naming and Binding Modulesmentioning
confidence: 99%
“…Alternatively, a clock of sufficient resolution can be used to generate unique names. Somewhat more general naming schemes can also be used, for example, as described in [23] and [28].…”
Section: Distributed Database Systemsmentioning
confidence: 99%
“…The office information environment presents many new information management challenges [8,28,351. In particular, the types of information and the patterns of information access are quite different from those of application l D. Heimbigner and D. McLeod environments for which conventional database management technology and systems are intended.…”
Section: Introductionmentioning
confidence: 99%
“…Prior solutions to detecting when to delete dead resources involve two way commit protocols [12][13][14] to either agree on the when to add machines to a network, or when to safely collect resources marked for deletion. Solutions in replication systems, such as, Clearinghouse [15], NTFRS and other replications systems use a timeout based collection of tombstones: If a record has been marked as tombstone for 30 or 60 days, simply delete it from the database. Fig.…”
Section: Distributed Garbage Collectionmentioning
confidence: 99%