31 results on '"group communication"'
Search Results
2. A scalable and hierarchical P2P architecture based on Pancake graph for group communication.
- Author
-
Hacini, Abdelhalim, Amad, Mourad, and Fouzi, Semchedine
- Subjects
- *
PEER-to-peer architecture (Computer networks) , *DISTRIBUTED computing , *SCALABILITY , *GRAPH theory , *PATHS & cycles in graph theory - Abstract
P2P network is characterized by several important aspects: scalability, decentralization and dynamicity. One of the major problems posed by decentralization and dynamicity of P2P network is how to discover and access to a resource, since it is very difficult to get an overall view of all resources in the P2P community. The most important concern is how to locate a particular resource and identifying the optimized path, that reaches the peer responsible for this requested resource, with a minimum number of hops and an optimized delay. In this paper, we propose a new scalable and hierarchical P2P architecture for lookup acceleration and optimization based on Pancake graph. This architecture can supports many type of applications such as: file sharing, collaborative work and asynchronous distributed group communication, etc. The performance evaluation shows that results are globally satisfactory. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
3. An efficient causal ordering algorithm for multicast communication channels.
- Author
-
Hernandez, Saul Eduardo Pomares, Morales Rosales, Luis Alberto, and Fanchon, Jean
- Subjects
- *
ALGORITHMS , *MULTICASTING (Computer networks) , *COMPUTER networks , *DISTRIBUTED computing , *ELECTRIC network topology - Abstract
In this paper, we present an efficient causal algorithm that can be used in multicast communication environments, in particular the overlapping multi-channel case, where a participant can belong to and communicate through more than one multicast channel. The causal algorithm is built on the paradigm of group communication. The groups are established according to the participant channel subscription. In order to reduce the amount of control information (CI), we propose an extension of the immediate dependency relation (IDR), which was introduced by Peterson in the context of one group. This IDR extension allows us to define necessary and sufficient CI to ensure causal delivery in a multi-group environment. We show that through the use of the IDR extension, we reduce the amount of CI sent per message without imposing restrictions on interaction or execution (e.g. network topology, rediffusion servers, execution models, etc.). These characteristics allow our algorithm to be suitable for use in large distributed decentralised systems. We show the efficiency of our causal algorithm in terms of the overhead timestamped per message. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
4. A classification of total order specifications and its application to fixed sequencer-based implementations
- Author
-
Baldoni, Roberto, Cimmino, Stefano, and Marchetti, Carlo
- Subjects
- *
DISTRIBUTED computing , *COMMUNICATION , *COMMUNICATION education , *TECHNICAL specifications - Abstract
Abstract: During the last two decades the design and development of total order (TO) communications has been one of the main research topics in dependable distributed computing. The huge amount of research work has produced several TO specifications and a wide variety of TO implementations with different guarantees whose differences are often left hidden or unclear. This paper presents a systematic classification of six distinct TO specifications based on a well-defined formal framework. The classification allows us (i) to define in a formal way the differences among the behaviors of faulty and correct processes admitted by each specification, and (ii) to easily match TO implementations with respect to their enforced specification. The classification is applied to study the properties of eight variations of TO implementations based on a fixed sequencer given in a well-known context, namely primary component group communication systems. [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
5. Effective data collection scheme for real-spatial group communication over hybrid infra-ad hoc wireless networks
- Author
-
Akira Nagata, Kazuya Tsukamoto, Yuji Oie, Hitomi Fuji, and Katsuichi Nakamura
- Subjects
Scheme (programming language) ,Data collection ,Vehicular ad hoc network ,Wireless network ,Computer science ,Wireless ad hoc network ,Distributed computing ,effecive data collection ,infra-ad hoc network ,Ad hoc wireless distribution service ,Key distribution in wireless sensor networks ,group communication ,Communication in small groups ,computer ,computer.programming_language - Abstract
This paper presents an effective data collection scheme to provide group communications among appropriate members selected by each user’s geographic situation and preference (real-spatial information). When each user directly notifies central servers of user’s information via wireless network infrastructure (Wi-infra), message delivery latency and losses drastically increase due to the network congestion. Therefore, we employ representative nodes (RNs) selected in a distributed manner. The RN first collects the real-spatial information from neighboring nodes via an ad hoc network and then notifies the server via Wi-infra. From simulation experiments, our scheme can drastically reduce both message delivery latency and losses.
- Published
- 2017
6. Total Order Broadcast and Multicast Algorithms: Taxonomy and Survey.
- Author
-
Défago, Xavier, Schiper, André, and Urbán, Péter
- Subjects
- *
DISTRIBUTED computing , *MULTICASTING (Computer networks) , *PUSH technology (Computer networks) , *FAULT-tolerant computing , *COMPUTER system failures , *COMPUTER security - Abstract
Total order broadcast and multicast (also called atomic broadcast/multicast) present an important problem in distributed systems, especially with respect to fault-tolerance. In short, the primitive ensures that messages sent to a set of processes are, in turn, delivered by all those processes in the same total order. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
7. Authenticated key agreement in dynamic peer groups
- Author
-
Yi, Xun
- Subjects
- *
ALGEBRA , *DISTRIBUTED computing , *COMPUTER conferencing , *MULTICHANNEL communication - Abstract
Abstract: Many group-oriented applications in distributed systems, such as teleconferencing and cooperative works, involve dynamic peer groups. In order to secure communications in dynamic peer groups, authenticated key agreement protocols are required. In this paper, we propose a new authenticated key agreement protocol, composed of a basic protocol and a dynamic protocol, for dynamic peer groups. With the basic protocol, a secret group key can be achieved in a peer group via group handshake, secret broadcast, key derivation and key confirmation phases. By the dynamic protocol, a new secret group key can be reached when member or mass join, group mergence, group division, member or mass quit occurs in a dynamic peer group. Security analysis shows that our protocol offers explicit group key authentication and prevents from both passive and active attacks. In our basic protocol, each group member equally contributes to the secret group key in parallel and guarantees key freshness. [Copyright &y& Elsevier]
- Published
- 2004
- Full Text
- View/download PDF
8. OCI-Based Group Communication Support in CORBA.
- Author
-
Dongman Lee, Michel, Nam, Dukyun, Hee Young Youn, Dukyun, and Chansu Yu
- Subjects
- *
DISCUSSION , *DISTRIBUTED computing , *CORBA (Computer architecture) , *COMPUTER architecture , *FAULT-tolerant computing - Abstract
Group communication is a useful mechanism guaranteeing consistency among replicated objects. The existing approaches do not allow transparent plug-in of group communication protocols into CORBA. They either require modification of CORBA or Os, or provide no room for incorporating group communication transport protocols into CORBA. We thus propose a generic group communication framework that allows transparent plug in of various group communication protocols with no modification of existing CORBA. We extend the Open Communications Interface (OCI) to support interoperability, reusability of existing group communication, and independency on ORB and QS. We also define the Group Communication Inter-ORB Protocol (GCIOP) as a group communication instantiation of the General Inter-ORB Protocol (GIOP) that encapsulates underlying group communication protocols. The propose scheme can be exploited for fault-tolerant CORBA (FT CORBA). [ABSTRACT FROM AUTHOR]
- Published
- 2003
- Full Text
- View/download PDF
9. Fighting fire with fire: using randomized gossip to combat stochastic scalability limits.
- Author
-
Gupta, Indranil, Birman, Kenneth P., and Van Renesse, Robbert
- Subjects
- *
COMPUTER networks , *SCALABILITY , *RELIABILITY in engineering , *DISTRIBUTED computing , *MULTICASTING (Computer networks) , *SYSTEMS engineering - Abstract
The mechanisms used to improve the reliability of distributed systems often limit performance and scalability. Focusing on one widely-used definition of reliability, we explore the origins of this phenomenon and conclude that it reflects a tradeoff arising deep within the typical protocol stack. Specifically, we suggest that protocol designs often disregard the high cost of infrequent events. When a distributed system is scaled, both the frequency and the overall cost of such events often grow with the size of the system. This triggers an O(
$n^{2}$ ) phenomenon, which becomes visible above some threshold sizes. Our findings suggest that it would be more effective to construct large-scale reliable systems where, unlike traditional protocol stacks, lower layers use randomized mechanisms, with probabilistic guarantees, to overcome low-probability events. Reliability and other end-to-end properties are introduced closer to the application. We employ a back-of-the-envelope analysis to quantify this phenomenon for a class of strongly reliable multicast problems. We construct a non-traditional stack, as described above, that implements virtually synchronous multicast. Experimental results reveal that virtual synchrony over a non-traditional, probabilistic stack helps break through the scalability barrier faced by traditional implementations of the protocol. Copyright © 2002 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]- Published
- 2002
- Full Text
- View/download PDF
10. Evaluation of a Causal Order Protocol in Broadcast Channel.
- Author
-
Fujii, Akihiro and Nemoto, Yoshiaki
- Subjects
MULTICASTING (Computer networks) ,WIDE area networks ,COMPUTER network protocols ,DISTRIBUTED computing ,BROADCASTING industry ,COMPUTER networks - Abstract
Group and multicast communication provide basic functions for many applications in distributed computing. In such a communication, the causal ordering property among messages should hold throughout distributed sites. Several communication protocols for this purpose have been designed so far. They are designed mostly under the strong assumptions: there is no loss of messages in the communication channel or the order of the messages is preserved or both. However, in WAN environment, it is desirable to design such a protocol without assuming these conditions from the efficiency point of view. In this paper, a protocol which provides the causal ordered broadcast in a non-FIFO network is investigated. The non-FIFO network is defined as the network in which there exists possibilities of loss and disorder of messages. The purpose of this paper is to perform experimental evaluations to a causal ordering protocol which is specially designed for a non-FIFO network. The protocol is implemented as a software system, and the performance evaluation of the system is done by experiments. In addition, a simple approximation of the queue length of the system is proposed. The applicability of the approximation also is investigated. [ABSTRACT FROM AUTHOR]
- Published
- 1995
- Full Text
- View/download PDF
11. Axiom - DTLS-based secure IoT group communication
- Author
-
Marco Tiloca, Shahid Raza, and Kirill Nikitin
- Subjects
Secure multicast ,Multicast ,Handshake ,Computer science ,computer.internet_protocol ,Computer Sciences ,Distributed computing ,Internet of Things ,020206 networking & telecommunications ,02 engineering and technology ,Datagram Transport Layer Security ,DTLS ,Datavetenskap (datalogi) ,Hardware and Architecture ,group communication ,020204 information systems ,Communication in small groups ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Security ,Adaptation (computer science) ,computer ,Software ,Axiom - Abstract
This article presents Axiom, a DTLS-based approach to efficiently secure multicast group communication among IoT-constrained devices. Axiom provides an adaptation of the DTLS record layer, relies on key material commonly shared among the group members, and does not require one to perform any DTLS handshake. We made a proof-of-concept implementation of Axiom based on the tinyDTLS library for the Contiki OS and used it to experimentally evaluate performance of our approach on real IoT hardware. Results show that Axiom is affordable on resource-constrained platforms and performs significantly better than related alternative approaches.
- Published
- 2017
12. A Novel Trust Model for Secure Group Communication in Distributed Computing.
- Author
-
Ramu, Naresh, Pandi, Vijayakumar, Lazarus, Jegatha Deborah, and Radhakrishnan, Sivakumar
- Subjects
DISTRIBUTED computing ,TRUST ,TELECOMMUNICATION systems - Abstract
Distributed networks are networks in which each node can act as a server or client and hence any node can provide service to any other node. In such a scenario, establishing a trust model between the service providing user and the service utilizing user is a challenging task. At present, only a few approaches are available in the past literature to provide this facility. Moreover, the existing approaches do not provide high trust accuracy. Therefore,a novel efficient trust model has been proposed in this article to support the secure dynamic group communication in distributed networks. The main advantage of the proposed work is that it provides higher trust accuracy. Moreover, the proposed work takes less memory for maintaining the trust values and increases the packet delivery ratio in comparison with other existing works which are in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Efficient HMAC-based secure communication for VANETs
- Author
-
Lucas C. K. Hui, Tat Wing Chim, Siu-Ming Yiu, Changhui Hu, and Victor O. K. Li
- Subjects
Authentication ,Vehicular ad hoc network ,Secure vehicular sensor network ,HMAC ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Group communication ,Symmetric cryptography ,Public key infrastructure ,Hash-based message authentication code ,Secure communication ,Symmetric-key algorithm ,Pairing ,Message authentication code ,business ,Computer network - Abstract
Vehicular Ad Hoc Network (VANET) is an emerging type of network which facilitates vehicles on roads to communicate for driving safety. It requires a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles which do not obey the rules. Most existing solutions either do not have an effective message verification scheme, or use the public key infrastructure (PKI). In this network, vehicles are able to broadcast messages to other vehicles and a group of known vehicles can also communicate securely among themselves. So group communication is necessary for the network. However, most existing solutions either do not consider this or use pairing operation to realize this. They are either not secure or not effective. In this paper, we provide a more comprehensive set of secure schemes with Hash-based Message Authentication Code (HMAC) in VANETs to overcome their shortcomings. Of course, we still need to use Pairing operation in some place. Our scheme is composed of three schemes: (1) Communications between Vehicles and Road-Side Units (RSUs), (2) One to One Communications within a Group, (3) One to One Communications without a Group. Based on our simulation study, we show that our schemes are effective and the delay caused is much lower. The average delay caused by our first scheme is nearly thousands of times lower than prior schemes. The average delay caused by our second scheme is 0.312 ms, while the delay caused by prior scheme is 12.3 ms. Meanwhile the average delay caused by our third scheme is 0.312 ms, and the delay caused by prior scheme is about 9 s. © 2012 Elsevier B.V. All rights reserved., postprint
- Published
- 2012
14. QoS-constrained core selection for group communication
- Author
-
Ayse Karaman, Hossam S. Hassanein, Işık Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü, Işık University, Faculty of Engineering, Department of Computer Engineering, and Karaman, Ayşe
- Subjects
Multipoint communication ,Mathematical optimization ,Information theory ,Source-core ,Computer Networks and Communications ,Computer science ,Multicast trees ,Distributed computing ,Group communication ,Communications system ,Span (engineering) ,IP networks ,Trees (mathematics) ,Multicast communication ,Multicast algorithms ,SPAN/COST ,Quality of service ,Core-receiver pairs ,Component (UML) ,SPAN/ADJUST ,Telecommunication network routing ,Simulation ,Routing ,Internet ,Space exploration ,QoS-constrained core selection ,Routers ,Multicast ,Constrained optimization ,Multicasting ,Core selection component ,Range (mathematics) ,Cost function ,Intra-domain routing ,Metric (mathematics) ,Communication in small groups ,Minification ,Routing (electronic design automation) ,Telecommunication computing ,Protocols ,Algorithms - Abstract
The core-based approach in multipoint communication enhances the solution space in terms of QoS-efficiency of solutions in inter- and intra-domain routing. In an earlier work [A. Karaman, H.S. Hassanein, Extended QoS-framework for Delay-constrained Group Communication, International Journal of Communication Systems, in press.], we showed that the constrained cost minimization solutions in core-based approach proposed to date are restrictive in their search to a subrange of solutions, and we proposed SPAN, a generic framework to process in our identified extended solution space. In this paper, we study the core selection component of SPAN and propose two novel algorithms, SPAN/COST and SPAN/ADJUST, which define the core-selection component of SPAN. SPAN/COST mainly optimizes the cost distances to be traveled between the source-core and core-receiver pairs on the multicast trees, while SPAN/ADJUST selects the cores based on the numbers of nodes they dominate and adjusting the set based on cost. Our algorithms consistently outperform their counterparts proposed to date and can be considered pioneering in their optimization range of multiple metrics and processing in the extended solution space.
- Published
- 2007
15. Dynamic group communication
- Author
-
André Schiper
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,Distributed computing ,Context (language use) ,Dynamic group ,Distributed systems ,Theoretical Computer Science ,Atomic broadcast ,group membership ,Server ,Computer Science::Networking and Internet Architecture ,Special case ,implementation ,Computer Science::Information Theory ,Fault tolerance ,atomic broadcast ,fault-tolerance ,specification ,Computational Theory and Mathematics ,group communication ,Hardware and Architecture ,Reliable multicast ,Communication in small groups ,Theory of computation ,reliable broadcast - Abstract
Group communication is the basic infrastructure for implementing fault-tolerant replicated servers. While group communication is well understood in the context of static groups (in which the membership does not change), current specifications of dynamic group communication (in which processes can join and leave groups during the computation) have not yet reached the same level of maturity.The paper proposes new specifications -- in the primary partition model -- for dynamic reliable broadcast (simply called "reliable multicast"), dynamic atomic broadcast (simply called "atomic multicast") and group membership. In the special case of a static system, the new specifications are identical to the well known static specifications. Interestingly, not only are these new specifications "syntactically" close to the static specifications, but they are also "semantically" close to the dynamic specifications proposed in the literature. We believe that this should contribute to clarify a topic that has always been difficult to understand by outsiders. Finally, the paper shows how to solve atomic multicast, group membership and reliable broadcast. The solution of atomic multicast is close to the (static) atomic broadcast solution based on reduction to consensus. Group membership is solved using atomic multicast. Reliable multicast can be efficiently solved by relying on a thrifty generic multicast algorithm.
- Published
- 2005
16. Comparison of database replication techniques based on total order broadcast
- Author
-
André Schiper and M. Wiesmann
- Subjects
Distributed databases ,Distributed database ,Computer science ,Performance ,Distributed computing ,Group communication ,Replication (computing) ,Synchronization ,Computer Science Applications ,Atomic broadcast ,Broadcasting (networking) ,Computational Theory and Mathematics ,Serializability ,Total order broadcast ,Information Systems ,Network model - Abstract
In this paper, we present a performance comparison of database replication techniques based on total order broadcast. While the performance of total order broadcast-based replication techniques has been studied in previous papers, this paper presents many new contributions. First, it compares with each other techniques that were presented and evaluated separately, usually by comparing them to a classical replication scheme like distributed locking. Second, the evaluation is done using a finer network model than previous studies. Third, the paper compares techniques that offer the same consistency criterion (one-copy serializability) in the same environment using the same settings. The paper shows that, while networking performance has little influence in a LAN setting, the cost of synchronizing replicas is quite high. Because of this, total order broadcast-based techniques are very promising as they minimize synchronization between replicas.
- Published
- 2005
17. Flexible unicast-based group communication for CoAP-enabled devices
- Author
-
Piet Demeester, Ingrid Moerman, Isam Ishaq, Jen Rossey, Floris Van den Abeele, and Jeroen Hoebeke
- Subjects
Technology and Engineering ,Smart objects ,Computer science ,Reliability (computer networking) ,Distributed computing ,Internet of Things ,02 engineering and technology ,lcsh:Chemical technology ,sensors ,01 natural sciences ,Biochemistry ,Article ,Analytical Chemistry ,Constrained Application Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,wireless sensor networks ,Instrumentation ,Flexibility (engineering) ,Multicast ,business.industry ,010401 analytical chemistry ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,WEB ,0104 chemical sciences ,entities ,group communication ,Embedded system ,Communication in small groups ,CoAP ,IBCN ,Unicast ,business - Abstract
Smart embedded objects will become an important part of what is called the Internet of Things. Applications often require concurrent interactions with several of these objects and their resources. Existing solutions have several limitations in terms of reliability, flexibility and manageability of such groups of objects. To overcome these limitations we propose an intermediately level of intelligence to easily manipulate a group of resources across multiple smart objects, building upon the Constrained Application Protocol (CoAP). We describe the design of our solution to create and manipulate a group of CoAP resources using a single client request. Furthermore we introduce the concept of profiles for the created groups. The use of profiles allows the client to specify in more detail how the group should behave. We have implemented our solution and demonstrate that it covers the complete group life-cycle, i.e., creation, validation, flexible usage and deletion. Finally, we quantitatively analyze the performance of our solution and compare it against multicast-based CoAP group communication. The results show that our solution improves reliability and flexibility with a trade-off in increased communication overhead.
- Published
- 2014
18. Group Communication in Constrained Environments Using CoAP-based Entities
- Author
-
Piet Demeester, Isam Ishaq, Floris Van den Abeele, Ingrid Moerman, and Jeroen Hoebeke
- Subjects
Technology and Engineering ,Multicast ,Resource Reservation Protocol ,computer.internet_protocol ,Smart objects ,Inter-domain ,Computer science ,business.industry ,Distributed computing ,Internet of Things ,sensors ,entities ,Constrained Application Protocol ,group communication ,Internet Group Management Protocol ,CoAP ,IP multicast ,IBCN ,wireless sensor networks ,business ,computer ,Protocol (object-oriented programming) ,Computer network - Abstract
The Constrained Application Protocol (CoAP) is a new Internet protocol that is currently being standardized. CoAP allows access to the drastically increasing number of smart objects and their sensing resources from virtually anywhere. It is a light-weight protocol designed to cope with the restrictions imposed by the limited resources (CPU, memory, power,...) of many smart objects. Depending on the application, information from individual objects might not be sufficient, reliable, or useful. An application may need to aggregate and/or compare data from a group of objects in order to obtain accurate results. Although multicast may be used to transmit the same request to several objects, multicast communication with smart objects has some disadvantages. Programming individual requests is another solution but lacks flexibility and opportunities for reusability. In this paper we propose a novel CoAP-based approach for communication with a group of resources across multiple smart objects. This approach organizes the group of resources that should be accessed into a new CoAP resource, called an entity, and nicely integrates several important aspects of entity management: creation, validation, usage and manipulation. In order to demonstrate the feasibility of this approach we present an implementation and experimental validation.
- Published
- 2013
19. LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks
- Author
-
Hani Alzaid, Mohamed Abid, Gianluca Dini, Anis Koubâa, and Omar Cheikhrouhou
- Subjects
Multicast ,Computer science ,business.industry ,Node (networking) ,Distributed computing ,Wireless sensor networks (WSNs) ,Group communication ,020206 networking & telecommunications ,02 engineering and technology ,Key distribution in wireless sensor networks ,Base station ,020204 information systems ,Sensor node ,0202 electrical engineering, electronic engineering, information engineering ,Mobile wireless sensor network ,Rekeying ,Security ,General Earth and Planetary Sciences ,business ,Wireless sensor network ,General Environmental Science ,Computer network ,Secure group management - Abstract
Secure group management is an important issue in Wireless Sensor Networks (WSNs). The most of previous works consider the whole network as a single group managed by a central, powerful node (e.g., the base station) capable of supporting heavy communication, computation and storage cost. However, typical WSNs applications may benefit from being designed and implemented as a collection of multiple logical groups, each one is maintained by a sensor node (the group controller) with constrained resources. Furthermore, previous schemes require multicast support at the routing level to deliver rekeying messages. Unfortunately, multicast may cause a storage and communication overhead that are not a_ordable in a WSN. In order to go beyond these two limitations, we propose a new secure group management scheme with a lightweight re-keying process. The scheme allows multiple logical groups, each one is maintained and rekeyed separately by a resource-constrained sensor node without requiring multicast routing support. We prove that the scheme is secure and we evaluate its performance from several view points. Actually, we show that our scheme outperforms some previous well-known schemes such as LKH.
- Published
- 2011
20. Middleware for adaptive group communication in wireless sensor networks
- Author
-
Sam Michiels, Klaas Thoelen, Wouter Joosen, and Thoelen, Klaas
- Subjects
Middleware ,Wi-Fi array ,Multicast ,Context-awareness ,business.industry ,Computer science ,Distributed computing ,Group communication ,Control reconfiguration ,Wireless sensor networks ,Key distribution in wireless sensor networks ,ODMRP ,Communication in small groups ,business ,Wireless sensor network ,Computer network - Abstract
While the size and heterogeneity of wireless sensor networks confirm the need and benefit of group communication, an intelligent ap- proach that exploits the interaction pattern and network context is still missing. This paper introduces sensor middleware to dynamically select the most efficient alternative from a set of group communication mech- anisms. The proposed solution leverages on an empirical analysis of the ODMRP multicast protocol and was evaluated by a proof-of-concept pro- totype running on the SunSPOT platform. Results show that network overhead is considerably reduced when using the sensor middleware for software deployment, reconfiguration and periodic data monitoring. ispartof: pages:59-74 ispartof: Proceedings of the 2nd International ICST conference on Sensor Systems and Software vol:57 pages:59-74 ispartof: S-Cube location:Miami, Florida, USA date:13 Dec - 14 Dec 2010 status: published
- Published
- 2010
21. Probabilistic atomic broadcast
- Author
-
Fernando Pedone and Pascal Felber
- Subjects
large-scale systems ,Asynchronous system ,business.industry ,Computer science ,Probabilistic protocols ,Distributed computing ,Message passing ,Liveness ,Probabilistic logic ,atomic broadcast ,Atomic broadcast ,Terminating Reliable Broadcast ,Broadcasting (networking) ,group communication ,Scalability ,business ,epidemic protocols ,Computer network - Abstract
Reliable distributed protocols, such as consensus and atomic broadcast, are known to scale poorly with large number of processes. Recent research has shown that algorithms providing probabilistic guarantees are a promising alternative for such environments. In this paper, we propose a specification of atomic broadcast with probabilistic liveness and safety guarantees. We present an algorithm that implements this specification in a truly asynchronous system (i.e., without assumptions about process speeds and message transmission times).
- Published
- 2003
22. Efficient group communication with guaranteed quality of service
- Author
-
G. Ventre, C. Szyperski, C., Szyperski, and Ventre, Giorgio
- Subjects
Collaborative software ,Computer science ,business.industry ,Distributed computing ,Quality of service ,Group communication ,IP Multimedia Subsystem ,Telecommunications network ,multimedia application ,Communication in small groups ,quality of service ,Multi-frequency network ,computer networks ,Isolation (database systems) ,business ,Interactive media ,Computer network - Abstract
A specific class of multimedia applications is expected to be of importance for future communication networks: multi-party interactive multimedia (MIM). Based on the isolation and characterization of MIM applications, concrete network support requirements are derived. The varying degree of connectivity, the vastly different sizes in terms of participants and the reliance on a guaranteed quality of service make MIM support a difficult problem. Starting with the definition of multimedia communication abstractions, principles of solutions are sketched. For an important subclass of applications, a particularly efficient and practicable alternative implementation based on half-duplex channels is introduced. Interfaces at both the transport and network layers are also considered. >
- Published
- 2002
23. A tool for testing of parallel and distributed programs in message-passing environments
- Author
-
Alessio Bechini, Cosimo Antonio Prete, and J. Cutajar
- Subjects
Tracing/forcing of distributed programs ,Computer science ,White-box testing ,Distributed computing ,Message passing ,Context (computing) ,Group communication ,Analysis of program synchronisations ,System testing ,Phase (combat) ,Synchronization ,Task (project management) ,Communication in small groups - Abstract
Due to the non-deterministic behavior of some parallel and distributed programs, addressing the problem of testing in such context is a non-trivial task. A proficient testing phase must be done using tools which record information about a single execution, and which are able to force a concurrent program to exercise a given execution. This paper describes a tool for testing of programs based on the Horus system. Our approach is novel in dealing with events connected to process group handling and group communication. Moreover, we show that using the capabilities of the Horus run-time system can be really helpful in solving testing problems. Our approach has the advantages of requiring no modifications neither in the program nor in the operating system, and to avoid a centralized solution through the use of partial orders of synchronization events.
- Published
- 2002
24. Active multicast core migration
- Author
-
E. Fleury, H. Koubaa, Software Tools for Telecommunications and Distributed Systems (RESEDAS), INRIA Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
computer.internet_protocol ,Computer science ,Distributed computing ,multicast ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,Distance Vector Multicast Routing Protocol ,arbre partagé ,050801 communication & media studies ,02 engineering and technology ,Multimedia Broadcast Multicast Service ,migration de core ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,Multicast address ,Xcast ,Pragmatic General Multicast ,Multicast ,Protocol Independent Multicast ,business.industry ,Inter-domain ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,java ,020206 networking & telecommunications ,active% networks ,réseaux actifs ,Source-specific multicast ,group communication ,Internet Group Management Protocol ,Reliable multicast ,core migration ,IP multicast ,business ,computer ,communication de groupe ,shared tree ,Computer network ,Active networking - Abstract
Colloque avec actes et comité de lecture. internationale.; International audience; Efficient multicast communication provides a good opportunity for scaling bandwidth intensive application. Current multicast routing involves selection of a \emph{core} also known as rendez-vous point through which most of the multicast communication is routed. The purpose of this paper is to study the performance impact of migration techniques. Several studies were performed on heuristics to choose a good core but none of them presents and implements the migration itself. Moreover, by using active networking architecture, we are able to adapt our multicast protocol to the application needs. Indeed, the application may provide the cost function used to evaluate the "quality" of the multicast tree. Experimental results reveal that active multicast routing with migration performs well and uses network resources in a very efficient way.
- Published
- 2002
25. Beyond 1-Safety and 2-Safety for Replicated Databases: Group-Safety
- Author
-
André Schiper and M. Wiesmann
- Subjects
Classical group ,Database ,Computer science ,Group (mathematics) ,Distributed computing ,lazy replication ,safety criterion ,Communications system ,computer.software_genre ,Acid property ,Replication (computing) ,database safety ,Atomic broadcast ,group communication ,Communication in small groups ,Safety criteria ,database replication ,performance analysis ,computer ,total order broadcast - Abstract
In this paper, we study the safety guarantees of group communication-based database replication techniques. We show that there is a model mismatch between group communication and database, and because of this, classical group communication systems cannot be used to build 2-safe database replication. We propose a new group communication primitive called \emph{end-to-end atomic broadcast} that solves the problem, i.e., can be used to implement 2-safe database replication. We also introduce a new safety criterion, called \emph{group-safety}, that has advantages both over 1-safety and 2-safety. Experimental results show the gain of efficiency of group-safety over lazy replication, which ensures only 1-safety.
26. On the Specification of Partitionable Group Membership
- Author
-
André Schiper, S. Pleisch, and O. Rutti
- Subjects
Group membership ,Telecommunication network reliability ,Computer science ,Distributed computing ,Communication in small groups ,Reliable multicast ,Group Communication ,Partitionable systems ,Fault tolerance ,Multicast communication ,Partition (database) ,System model - Abstract
Group communication in partitionable systems has been the focus of many research activities over the last decade. Fault-tolerant applications in a partitionable system model generally rely on two basic services: a group membership service and a reliable multicast service. The paper considers two of the most prominent specifications for such services that appear in the literature. Based on these specifications, the paper shows that one specification can be satisfied by a trivial implementation and the other, which basically extends the first one, requires additional system assumptions, which are discussed in the paper. The paper shows that the specifications of group communication in partitionable systems has not yet reached the level of maturity of the so called primary partition specifications.
27. A Formal Analysis of the Deferred Update Technique
- Author
-
Rodrigo Schmidt and Fernando Pedone
- Subjects
Computer science ,Distributed computing ,Replica ,Serialization ,deferred update technique ,Systems ,Replication (computing) ,Serializability ,distributed transactions ,group communication ,Communication in small groups ,Deferred Procedure Call ,Distributed transaction ,database replication ,Protocol (object-oriented programming) ,Protocols - Abstract
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to any single database replica, providing good performance for workloads where transactions are mostly of this type. In this paper, we analyze the deferred update technique and show a number of characteristics and limitations common to any replication protocol based on it. Previous works on this replication method usually start from a protocol and then argue separately that it is based on the deferred update technique and satisfies serializability. Differently, ours starts from the abstract definition of a serializable database and gradually changes it into an abstract deferred update protocol. In doing that, we can formally characterize the deferred update technique and rigorously prove its properties. Moreover, our specification can be extended to create new protocols or used to prove existing ones correct.
28. Atum: Scalable Group Communication Using Volatile Groups
- Author
-
Dragos-Adrian Seredinschi, Matej Pavlovic, Anne-Marie Kermarrec, and Rachid Guerraoui
- Subjects
Hardware_MEMORYSTRUCTURES ,State machine replication ,Computer science ,Distributed computing ,Group communication ,020206 networking & telecommunications ,Gossip ,02 engineering and technology ,Distributed systems ,Byzantine fault tolerance ,File sharing ,Asynchronous communication ,020204 information systems ,Scalability ,Communication in small groups ,0202 electrical engineering, electronic engineering, information engineering ,Gossip protocol ,Dissemination - Abstract
This paper presents Atum, a group communication middleware for a large, dynamic, and hostile environment. At the heart of Atum lies the novel concept of volatile groups: small, dynamic groups of nodes, each executing a state machine replication protocol, organized in a flexible overlay. Using volatile groups, Atum scatters faulty nodes evenly among groups, and then masks each individual fault inside its group. To broadcast messages among volatile groups, Atum runs a gossip protocol across the overlay. We report on our synchronous and asynchronous (eventually synchronous) implementations of Atum, as well as on three representative applications that we build on top of it: A publish/subscribe platform, a file sharing service, and a data streaming system. We show that (a) Atum can grow at an exponential rate beyond 1000 nodes and disseminate messages in polylogarithmic time (conveying good scalability); (b) it smoothly copes with 18% of nodes churning every minute; and (c) it is impervious to arbitrary faults, suffering no performance decay despite 5.8% Byzantine nodes in a system of 850 nodes.
29. Assessing the Crash-Failure Assumption of Group Communication Protocols
- Author
-
S. Mena, A. Schiper, C. Basile, Zbigniew Kalbarczyk, and Ravishankar K. Iyer
- Subjects
Java ,Computer science ,Reliability (computer networking) ,Distributed computing ,Group communication ,Atomic broadcast ,Fault tolerance ,Fault injection ,Reliability engineering ,Crash-stop model ,Dependability ,Overhead (computing) ,Engineering design process ,computer ,computer.programming_language - Abstract
Designing and correctly implementing Group Communication Systems (GCSs) is notoriously difficult. Assuming that processes fail only by crashing provides a powerful means to simplify the theoretical development of these systems. When making this assumption, however, one should not forget that clean crash failures provide only a coarse approximation of the effects that errors can have in distributed systems. Ignoring such a discrepancy can lead to complex GCS-based applications that pay a large price in terms of performance overhead yet fail to deliver the promised level of dependability. This paper provides a thorough study of error effects in real systems by demonstrating a \emph{error-injection-driven design methodology}, where error injection is integrated in the core steps of the design process of a robust fault-tolerant system. The methodology is demonstrated for the \emph{Fortika} toolkit, a Java-based GCS. Error injection enables us to uncover subtle reliability bottlenecks both in the design of Fortika and in the implementation of Java. Based on the obtained insights, we enhance Fortika's design to reduce the identified bottlenecks. Finally, a comparison of the results obtained for Fortika with the results obtained for the OCAML-based Ensemble system in a previous work, allows us to investigate the reliability implications that the choice of the development platform (Java versus OCAML) can have.
30. Total Order Broadcast and Multicast Algorithms: Taxonomy and Survey
- Author
-
DEFAGO, XAVIER, Defago, Xavier, Schiper, André, and Urbán, Péter
- Subjects
Design ,General Computer Science ,Computer science ,computer.internet_protocol ,Distributed computing ,Multimedia Broadcast Multicast Service ,Distributed systems ,Theoretical Computer Science ,Atomic broadcast ,survey ,Xcast ,total ordering ,Broadcast radiation ,Pragmatic General Multicast ,Multicast ,Fault tolerance ,Reliability ,atomic broadcast ,fault-tolerance ,Source-specific multicast ,group communication ,agreement problems ,IP multicast ,Distributed algorithms ,computer ,Algorithms - Abstract
Total order broadcast and multicast (also called atomic broadcast or atomic multicast) is an important problem in distributed systems, especially with respect to fault-tolerance. In short, the primitive ensures that messages sent to a set of processes are delivered by all these processes in the same total order. The problem has inspired an abundant literature, with a plethora of proposed algorithms. This paper proposes a classification of total order broadcast and multicast algorithms based on their ordering mechanisms, and addresses a number of other important issues. The paper surveys about sixty algorithms, thus providing by far the most extensive study of the problem so far. The paper discusses algorithms for both the synchronous and the asynchronous system models, and studies the respective properties and behavior of the different algorithms., リサーチレポート(北陸先端科学技術大学院大学情報科学研究科)
31. A new look at atomic broadcast in the asynchronous crash-recovery model
- Author
-
André Schiper and Sergio Mena
- Subjects
crash-recovery model ,Computer science ,Distributed computing ,Message passing ,Crash ,Distributed systems ,atomic broadcast ,System model ,Atomic broadcast ,Broadcasting (networking) ,Nonlinear Sciences::Adaptation and Self-Organizing Systems ,Asynchronous communication ,group communication ,Fault tolerance} ,Stable storage ,State (computer science) ,fault tolerance ,Computer Science::Distributed, Parallel, and Cluster Computing - Abstract
Atomic broadcast in particular, and group communication in general, have mainly been specified and implemented in a system model where processes do not recover after a crash. The model is called crash-stop. The drawback of this model is its inability to express algorithms that tolerate the crash of a majority of processes. This has led to consider group communication in the so-called crash-recovery model, in which processes have access to stable storage, to log their state periodically. This allows them to recover a previous state after a crash. However, the existing specifications of atomic broadcast in the crash-recovery model are not satisfactory, and the paper explains why. The paper also proposes a new specification of atomic broadcast in the crash-recovery model that addresses these issues. Specifically, our new specification allows to distinguish between a uniform and a non-uniform version of atomic broadcast. The non-uniform version logs less information, and is thus more efficient. The uniform and non-uniform atomic broadcast have been implemented, and compared with a published atomic broadcast algorithm. Performance results are presented.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.