Distributed Computing

, Volume 6, Issue 4, pp 211–219 | Cite as

Practical uses of synchronized clocks in distributed systems

  • Barbara Liskov


Synchronized clocks are interesting because they can be used to improve performance of a distributed system by reducing communications. Since they have only recently become a reality in distributed systems, their use in distributed algorithms has received relatively little attention. This paper discusses a number of distributed algorithms that make use of synchronized clocks and analyzes how clocks are used in these algorithms

Key words

Distributed computing Synchronized clocks Distributed algorithms 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alsberg P, Day J: A principle for resilient sharing of distributed resources. Proc 2nd International Conference on Software Engineering. 1976, pp. 627–644Google Scholar
  2. 2.
    El-Abbadi A, Toueg S: Maintaining availability in partitioned replicated databases. Proc 5th Symposium on Principles of Database Systems. ACM 1986, pp 240–251Google Scholar
  3. 3.
    El-Abbadi A, Skeen D, Cristian F.: An efficient fault-tolerant protocol for replicated data management. Proc 4th Symposium on Principles of Database Systems. ACM 1985, pp. 215–229Google Scholar
  4. 4.
    Gifford DK: Information storage in a decentralized computer system. Tech Rep CSL-81-8, Xerox Corporation 1983Google Scholar
  5. 5.
    Gray C, Cheriton D: Leases: an efficient fault-tolerant mechanism for distributed file cache consistency. Proc 11th ACM Symposium on Operating Systems Principles 1989, pp. 202–210Google Scholar
  6. 6.
    Kleiman S: Vnodes: an architecture for multiple file system types in sun UNIX. USENIX Summer '86 Conference Proceedings 1986, pp 238–247Google Scholar
  7. 7.
    Kung HT, Robinson JT: On optimistic methods for concurrency control. ACM Trans Database Syst 6, 2: 213–226 (1981)Google Scholar
  8. 8.
    Lamport L: Using time instead of timeout for fault-tolerant distributed systems. ACM Trans Prog Lang Syst 6, 2: 254–280 (1984)Google Scholar
  9. 9.
    Lampson BW, Sturgis HE: Crash recovery in a distributed data storage system. Xerox Research Center, Palo Alto Ca 1979Google Scholar
  10. 10.
    Liskov B: Preliminary design of the Thor Object-Oriented Database System. Proc Software Technology Conference 1992. Also: Programming Methodology Group Memo 74, MIT Laboratory for Computer Science, Cambridge MA 1992Google Scholar
  11. 11.
    Liskov B, Ghemawat S, Gruber R, Johnson P, Shrira L, Williams M: Replication in the Harp file system. Proc 13th ACM Symposium on Operating Systems Principles 1991Google Scholar
  12. 12.
    Liskov B, Gruber R, Johnson P, Shrira L: A highly available object repository for use in a heterogeneous distributed system. Proc 4th Int Workshop on Persistent Object Systems Design, Implementation and Use, Martha's Vineyard MA 1990Google Scholar
  13. 13.
    Liskov B, Shrira L, Wroclawski J: Efficient at-most-once messages based on synchronized clocks. ACM Trans Comput Syst 9, 2: 125–142 (1991)Google Scholar
  14. 14.
    Mann T, Hisgen A, Swart G: An algorithm for data replication. Rep 46, DEC Systems Research Center, Palo Alto CA 1989Google Scholar
  15. 15.
    Mills DL: Network time protocol (Version 1) specification and implementation. DARPA-Internet Report RFC 1059 1988Google Scholar
  16. 16.
    National Bureau of Standards: Data encryption standard. Government Printing Office, Washington DC 1977Google Scholar
  17. 17.
    Needham R, Schroeder M: Using encryption for authentication in large networks of computers. Commun ACM 21, 12: 993–999, (1978)Google Scholar
  18. 18.
    Oki BM, Liskov B: Viewstamped replication: a new primary copy method to support highly-available distributed systems. Proc 7th ACM Symposium on Principles of Distributed Computing. ACM 1988Google Scholar
  19. 19.
    Oki BM: Viewstamped replication for highly available distributed systems. Tech Rep MIT/LCS/TR-423, MIT Laboratory for Computer Science, Cambridge MA 1988Google Scholar
  20. 20.
    Postel J: DoD standard transmition control protocol. DARPA-Internet RFC-793 1981Google Scholar
  21. 21.
    Sandberg R.: Design and implementation of the Sun network filesystem. Proc Summer 1985 USENIX Conf 1985, pp 119–130Google Scholar
  22. 22.
    Simons B, Welch J, Lynch N: An overview of clock synchronization. Res Rep RJ 6505, IBM Almaden Research Center 1988Google Scholar
  23. 23.
    Steiner JG, Neuman C, Schiller J: Kerberos: An authentication service for open network systems. Project Athena, MIT, Cambridge MA 1988Google Scholar
  24. 24.
    Sun Microsystems Inc: NFS: network file system protocol specification. Tech Rep RFC 1094, Newtork Information Center, SRI International 1989Google Scholar
  25. 25.
    Xerox Corp: The Xerox network systems architecture: general information manual. XNSG068504 1985Google Scholar
  26. 26.
    Xerox Corp: Authentication Protocol. XSIS098404 1984Google Scholar

Copyright information

© Springer-Verlag 1993

Authors and Affiliations

  • Barbara Liskov
    • 1
  1. 1.MIT Laboratory for Computer ScienceCambridgeUSA

Personalised recommendations