skip to main content
article
Free Access

Grapevine: an exercise in distributed computing

Published:01 April 1982Publication History
Skip Abstract Section

Abstract

Grapevine is a multicomputer system on the Xerox research internet. It provides facilities for the delivery of digital messages such as computer mail; for naming people, machines, and services; for authenticating people and machines; and for locating services on the internet. This paper has two goals: to describe the system itself and to serve as a case study of a real application of distributed computing. Part I describes the set of services provided by Grapevine and how its data and function are divided among computers on the internet. Part II presents in more detail selected aspects of Grapevine that illustrate novel facilities or implementation techniques, or that provide insight into the structure of a distributed system. Part III summarizes the current state of the system and the lesson learned from it so far.

References

  1. 1 Boggs, D.R., Shoch, J.F., Taft, E.A., and Metcalfe, R.M. PUP: An internetwork architecture. IEEE Trans. on Communications 28, 4 (April 1980), 612-634.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2 Dawes, N., Harris, S., Magoon, M., Maveety, S., and Petty, D. The design and service impact of COCOS--An electronic office system. In Computer Message Systems. R.P. Uhlig (Ed.) North- Holland, New York, 1981, pp 373-384.Google ScholarGoogle Scholar
  3. 3 Gifford, D.K. Weighted voting for replicated data. In Proc. 7th Symposium on Operating Systems Principles. (Dec. 1979), ACM Order No. 534 790, pp 150-162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Lampson, B.W., and Redell, D.D. Experience with processes and monitors in Mesa. Comm. ACM 23, 2 (Feb. 1980), 105-117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Levin, R., and Schroeder, M.D. Transport of electronic messages through a network. Telelnformatics 79, North Holland, 1979, pp. 29- 33; also available as Xerox Palo Alto Research Center Technical Report CSL-79-4.Google ScholarGoogle Scholar
  6. 6 Metcalfe, R.M., and Boggs, D.R. Ethernet: Distributed packet switching for local computer networks. Comm. A CM 19, 7 (July 1976), 395-404. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Mitchell, J.G., Maybury, W., and Sweet, R. Mesa language manual (Version 5.0) Technical Report CSL-79-3, Xerox Palo Alto Research Center, 1979.Google ScholarGoogle Scholar
  8. 8 National Bureau of Standards, Data encryption standard. Federal Information Processing Standards 46, Jan. 1977.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9 Needham, R.M., and Schroeder, M.D. Using encryption for authentication in large networks of computers. Comm. A CM 21, 12 (Dec. 1978), 993-999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Rothnie, J.B., Goodman, N., and Bernstein, P.A. The redundant update methodology of SDD-1: A system for distributed databases (The fully redundant case). Computer Corporation of America, June 1977.Google ScholarGoogle Scholar
  11. 11 Shoch, J.F. Internetwork naming, addressing and routing. In Proc. 17th IEEE Computer Society International Conference, Sept. 1978, IEEE Cat. No. 78 CH 1388-8C, pp 72-79.Google ScholarGoogle Scholar
  12. 12 Thacker, C.P., McCreight, E.M., Lampson, B.W., SprouU, R.F., and Boggs, D.R. Alto: A personal computer. In D.P. Siewiorek, C.G. Bell, and A. Newell, Computer Structures: Principles and Examples. (2nd Ed.) McGraw-Hill, New York 1981.Google ScholarGoogle Scholar
  13. 13 Thomas, R.H. A solution to the update problem for multiple copy data base which used distributed control. Bolt, Beranek and Newman Technical Report #3340, July 1976.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Grapevine: an exercise in distributed computing

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Communications of the ACM
                      Communications of the ACM  Volume 25, Issue 4
                      April 1982
                      65 pages
                      ISSN:0001-0782
                      EISSN:1557-7317
                      DOI:10.1145/358468
                      Issue’s Table of Contents

                      Copyright © 1982 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 April 1982

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader