Efficient at-most-once messages based on synchronized clocks

This paper describes a new at-most-once message passing protocol that provides guaranteed detection of duplicate messages even when the receiver has no state stored for the sender. It also discusses how to use at-most-once messages to implement higher-level primitives such as at-once-remote procedure calls and sequenced bytestream protocols. Our performance measurements indicate that at-most-once RPCs can provide at the same cost as less desirable forms of RPCs that do not guarantee at-most-once execution. Our method is based on the assumption that clocks throughout the system are loosely synchronized. Modern clock synchronization protocols provide good bounds on clock skew with high probability; our method depends on the bound for performance but not for correctness.

[1]  David L. Mills,et al.  Network Time Protocol (version 1) specification and implementation , 1988, RFC.

[2]  Lansing Sloan Mechanisms that enforce bounds on packet lifetimes , 1983, TOCS.

[3]  Andrew Birrell,et al.  Implementing remote procedure calls , 1984, TOCS.

[4]  Alfred Z. Spector,et al.  Distributed logging for transaction processing , 1987, SIGMOD '87.

[5]  Richard D. Schlichting,et al.  Fail-stop processors: an approach to designing fault-tolerant computing systems , 1983, TOCS.

[6]  Richard W. Watson,et al.  The Delta-t transport protocol: features and experience , 1989, [1989] Proceedings. 14th Conference on Local Computer Networks.

[7]  Richard W. Watson Timer-Based Mechanisms in Reliable Transport Protocol Connection Management , 1981, Comput. Networks.

[8]  Paul J. Leach,et al.  The network computing architecture and system: an environment for developing distributed applications , 1988, Digest of Papers. COMPCON Spring 88 Thirty-Third IEEE Computer Society International Conference.

[9]  Butler W. Lampson,et al.  Crash Recovery in a Distributed Data Storage System , 1981 .

[10]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[11]  David L. Mills,et al.  Network Time Protocol (Version 3) Specification, Implementation , 1992 .

[12]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[13]  Jon Postel,et al.  DOD standard transmission control protocol , 1980, CCRV.