DeepAI AI Chat
Log In Sign Up

The Impact of RDMA on Agreement

by   Marcos K. Aguilera, et al.
Carnegie Mellon University

Remote Direct Memory Access (RDMA) is becoming widely available in data centers. This technology allows a process to directly read and write the memory of a remote host, with a mechanism to control access permissions. In this paper, we study the fundamental power of these capabilities. We consider the well-known problem of achieving consensus despite failures, and find that RDMA can improve the inherent trade-off in distributed computing between failure resilience and performance. Specifically, we show that RDMA allows algorithms that simultaneously achieve high resilience and high performance, while traditional algorithms had to choose one or another. With Byzantine failures, we give an algorithm that only requires n ≥ 2f_P + 1 processes (where f_P is the maximum number of faulty processes) and decides in two (network) delays in common executions. With crash failures, we give an algorithm that only requires n ≥ f_P + 1 processes and also decides in two delays. Both algorithms tolerate a minority of memory failures inherent to RDMA, and they provide safety in asynchronous systems and liveness with standard additional assumptions.


page 1

page 2

page 3

page 4


Revisiting Optimal Resilience of Fast Byzantine Consensus

It is a common belief that Byzantine fault-tolerant solutions for consen...

Better Sooner Rather Than Later

This article unifies and generalizes fundamental results related to n-pr...

Recoverable Consensus in Shared Memory

Herlihy's consensus hierarchy is one of the most widely cited results in...

Multi-Valued Connected Consensus: A New Perspective on Crusader Agreement and Adopt-Commit

Algorithms to solve fault-tolerant consensus in asynchronous systems oft...

Fully Anonymous Shared Memory Algorithms

Process anonymity has been studied for a long time. Memory anonymity is ...

An Adaptive Approach to Recoverable Mutual Exlcusion

Mutual exclusion (ME) is one of the most commonly used techniques to han...

Seamless Paxos Coordinators

The Paxos algorithm requires a single correct coordinator process to ope...