The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Highly available services can be implemented by means of so-called quorum protocols. Unfortunately, applying quorum protocols in real-world physical networks turns out to be difficult since efficient quorum protocols often depend on a particular graph structure imposed on the replicas managed by it. In this paper, we show that the cost and availability predictions of the operations provided by quorum...
A key principle for optimizing network performances is to understand the relationship between network topology, configuration parameters, and their influence on the behavior of network protocols. While an attractive approach to this problem is to use formal models of protocols in combination with mathematical optimization, such methods are often limited by either poor scalability or approximations...
It is shown that the queuing delay involved in the congestion control algorithm is state-dependent and does not depend on the current time. Then, using an accurate formulation for buffers, networks with arbitrary topologies can be built. At equilibrium, our model reduces to the widely used setup by Paganini et al. Using this model, the delay-derivative is analyzed and it is proved that the delay time-derivative...
This work presents a study on the fault-tolerance of unstructured P2P overlays, modeled as complex networks. A framework is proposed to derive the peers' degree distribution, once the P2P system is described through the evolution laws characterizing the distributed protocol, the attachment and failure rates. From the degree distribution, estimations may be derived on the mean number of m-neighbors,...
One approach for information dissemination in large-scale communication systems is using epidemic protocols. Current epidemic protocols, however, adopt a constant fanout policy, which does not enable end users to control the information dissemination process. For distributed applications that need to compute a global function within a pre-determined response time, better procedures to control the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.