Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lorenzo Alvisi is active.

Publication


Featured researches published by Lorenzo Alvisi.


dependable systems and networks | 2002

Modeling the effect of technology trends on the soft error rate of combinational logic

Premkishore Shivakumar; Michael Kistler; Stephen W. Keckler; Doug Burger; Lorenzo Alvisi

This paper examines the effect of technology scaling and microarchitectural trends on the rate of soft errors in CMOS memory and logic circuits. We describe and validate an end-to-end model that enables us to compute the soft error rates (SER) for existing and future microprocessor-style designs. The model captures the effects of two important masking phenomena, electrical masking and latching-window masking, which inhibit soft errors in combinational logic. We quantify the SER due to high-energy neutrons in SRAM cells, latches, and logic circuits for feature sizes from 600 nm to 50 nm and clock periods from 16 to 6 fan-out-of-4 inverter delays. Our model predicts that the SER per chip of logic circuits will increase nine orders of magnitude from 1992 to 2011 and at that point will be comparable to the SER per chip of unprotected memory elements. Our result emphasizes that computer system designers must address the risks of soft errors in logic circuits for future designs.


symposium on operating systems principles | 2007

Zyzzyva: speculative byzantine fault tolerance

Ramakrishna Kotla; Lorenzo Alvisi; Michael Dahlin; Allen Clement; Edmund L. Wong

We present Zyzzyva, a protocol that uses speculation to reduce the cost and simplify the design of Byzantine fault tolerant state machine replication. In Zyzzyva, replicas respond to a clients request without first running an expensive three-phase commit protocol to reach agreement on the order in which the request must be processed. Instead, they optimistically adopt the order proposed by the primary and respond immediately to the client. Replicas can thus become temporarily inconsistent with one another, but clients detect inconsistencies, help correct replicas converge on a single total ordering of requests, and only rely on responses that are consistent with this total order. This approach allows Zyzzyva to reduce replication overheads to near their theoretical minimal.


symposium on operating systems principles | 2003

Separating agreement from execution for byzantine fault tolerant services

Jian Yin; Jean-Philippe Martin; Arun Venkataramani; Lorenzo Alvisi; Michael Dahlin

We describe a new architecture for Byzantine fault tolerant state machine replication that separates agreement that orders requests from execution that processes requests. This separation yields two fundamental and practically significant advantages over previous architectures. First, it reduces replication costs because the new architecture can tolerate faults in up to half of the state machine replicas that execute requests. Previous systems can tolerate faults in at most a third of the combined agreement/state machine replicas. Second, separating agreement from execution allows a general privacy firewall architecture to protect confidentiality through replication. In contrast, replication in previous systems hurts confidentiality because exploiting the weakest replica can be sufficient to compromise the system. We have constructed a prototype and evaluated it running both microbenchmarks and an NFS server. Overall, we find that the architecture adds modest latencies to unreplicated systems and that its performance is competitive with existing Byzantine fault tolerant systems.


symposium on operating systems principles | 2005

BAR fault tolerance for cooperative services

Amitanand S. Aiyer; Lorenzo Alvisi; Allen Clement; Michael Dahlin; Jean-Philippe Martin; Carl Porth

This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantine behaviors when broken, misconfigured, or malicious nodes arbitrarily deviate from their specification and rational behaviors when selfish nodes deviate from their specification to increase their local benefit. The paper makes three contributions: (1) It introduces the BAR (Byzantine, Altruistic, Rational) model as a foundation for reasoning about cooperative services; (2) It proposes a general three-level architecture to reduce the complexity of building services under the BAR model; and (3) It describes an implementation of BAR-B the first cooperative backup service to tolerate both Byzantine users and an unbounded number of rational users. At the core of BAR-B is an asynchronous replicated state machine that provides the customary safety and liveness guarantees despite nodes exhibiting both Byzantine and rational behaviors. Our prototype provides acceptable performance for our application: our BAR-tolerant state machine executes 15 requests per second, and our BAR-B backup service can back up 100MB of data in under 4 minutes.


ACM Transactions on Computer Systems | 2011

Depot: Cloud Storage with Minimal Trust

Prince Mahajan; Srinath T. V. Setty; Sangmin Lee; Allen Clement; Lorenzo Alvisi; Michael Dahlin; Michael Walfish

This article describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First, Depot ensures that the updates observed by correct nodes are consistently ordered under Fork-Join-Causal consistency (FJC). FJC is a slight weakening of causal consistency that can be both safe and live despite faulty nodes. Second, Depot implements protocols that use this consistent ordering of updates to provide other desirable consistency, staleness, durability, and recovery properties. Our evaluation suggests that the costs of these guarantees are modest and that Depot can tolerate faults and maintain good availability, latency, overhead, and staleness even when significant faults occur.


IEEE Transactions on Knowledge and Data Engineering | 1999

Volume leases for consistency in large-scale systems

Jian Yin; Lorenzo Alvisi; Michael Dahlin; Calvin Lin

This article introduces volume leases as a mechanism for providing server-driven cache consistency for large-scale, geographically distributed networks. Volume leases retain the good performance, fault tolerance, and server scalability of the semantically weaker client-driven protocols that are now used on the Web. Volume leases are a variation of object leases, which were originally designed for distributed file systems. However, whereas traditional object leases amortize overheads over long lease periods, volume leases exploit spatial locality to amortize overheads across multiple objects in a volume. This approach allows systems to maintain good write performance even in the presence of failures. Using trace-driven simulation, we compare three volume lease algorithms against four existing cache consistency algorithms and show that our new algorithms provide strong consistency while maintaining scalability and fault-tolerance. For a trace-based workload of Web accesses, we find that volumes can reduce message traffic at servers by 40 percent compared to a standard lease algorithm, and that volumes can considerably reduce the peak load at servers when popular objects are modified.


IEEE Transactions on Dependable and Secure Computing | 2006

Fast Byzantine Consensus

Jean-Philippe Martin; Lorenzo Alvisi

We present the first protocol that reaches asynchronous Byzantine consensus in two communication steps in the common case. We prove that our protocol is optimal in terms of both number of communication steps and number of processes for two-step consensus. The protocol can be used to build a replicated state machine that requires only three communication steps per request in the common case. Further, we show a parameterized version of the protocol that is safe despite f Byzantine failures and, in the common case, guarantees two-step execution despite some number t of failures (t les f). We show that this parameterized two-step consensus protocol is also optimal in terms of both number of communication steps and number of processes


dependable systems and networks | 2003

A fault-tolerant java virtual machine

Jeff Napper; Lorenzo Alvisi; Harrick M. Vin

A method for providing a first JVM (30) with support for fault tolerance by using information maintained by the first JVM (30) to checkpoint objects that are created, modified, and/or deleted during the process of responding to an event of a transaction. The checkpointed objects are sent to and stored in a second JVM (40) such that the second JVM (40) is fully capable of continuing the processing of the transaction in the event


symposium on operating systems principles | 2009

Upright cluster services

Allen Clement; Manos Kapritsos; Sangmin Lee; Yang Wang; Lorenzo Alvisi; Michael Dahlin; Taylor L. Riché

The UpRight library seeks to make Byzantine fault tolerance (BFT) a simple and viable alternative to crash fault tolerance for a range of cluster services. We demonstrate UpRight by producing BFT versions of the Zookeeper lock service and the Hadoop Distributed File System (HDFS). Our design choices in UpRight favor simplifying adoption by existing applications; performance is a secondary concern. Despite these priorities, our BFT Zookeeper and BFT HDFS implementations have performance comparable with the originals while providing additional robustness.


ieee international symposium on fault tolerant computing | 1999

An analysis of communication induced checkpointing

Lorenzo Alvisi; Elmootazbellah Nabil Elnozahy; Sriram S. Rao; S.A. Husain; A. de Mel

Communication induced checkpointing (CIC) allows processes in a distributed computation to take independent checkpoints and to avoid the domino effect. This paper presents an analysis of CIC protocols based on a prototype implementation and validated simulations. Our result indicate that there is sufficient evidence to suspect that much of the conventional wisdom about these protocols is questionable.

Collaboration


Dive into the Lorenzo Alvisi's collaboration.

Top Co-Authors

Avatar

Michael Dahlin

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Allen Clement

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Keith Marzullo

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Harrick M. Vin

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Jean-Philippe Martin

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Edmund L. Wong

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Jian Yin

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Amitanand S. Aiyer

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Harry C. Li

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Natacha Crooks

University of Texas at Austin

View shared research outputs
Researchain Logo
Decentralizing Knowledge