Academia.eduAcademia.edu

Reliable Broadcast

description252 papers
group0 followers
lightbulbAbout this topic
Reliable broadcast is a communication protocol in distributed systems that ensures messages are delivered to all intended recipients accurately and in the same order, despite failures or network issues. It aims to maintain consistency and fault tolerance, enabling effective coordination among distributed processes.
lightbulbAbout this topic
Reliable broadcast is a communication protocol in distributed systems that ensures messages are delivered to all intended recipients accurately and in the same order, despite failures or network issues. It aims to maintain consistency and fault tolerance, enabling effective coordination among distributed processes.
This paper describes a simulation study of an Intersection Collision Warning System. For the study, an Inter-Vehicle Communication (IVC) Simulator has been developed. The IVC simulator is composed of vehicle traffic and wireless... more
This letter presents new results obtained with a novel MAC scheme designed to be reliable and maximize the throughput of a single-hop network. Contrarily to the IEEE 802.11 MAC scheme, all nodes adopt a common optimal contention window... more
Typically, protocols for Byzantine agreement (BA) are designed to run in either a synchronous network (where all messages are guaranteed to be delivered within some known time ∆ from when they are sent) or an asynchronous network (where... more
We study the problem of achieving global broadcast in a radio network where a node can multicast messages to all of its neighbors (that is, nodes within some given distance r), and up to t nodes in any single neighborhood may be... more
We consider the problem of perfect (information-theoretically) secure message transmission (PSMT) from a sender S to a receiver R in asynchronous directed networks tolerating dual adversary. The adversary can control at most t p nodes in... more
We consider the problem of perfect (information-theoretically) secure message transmission (PSMT) from a sender $S$ to a receiver $R$ in asynchronous directed networks tolerating dual adversary. The adversary can control at most $t_p$... more
Orca is a language for programming parallel applications on distributed computing systems. Although processors in such systems communicate only through message passing and not through shared memory, Orca provides a communication model... more
We propose group communication as an efficient mechanism to support fault tolerance. Our approach is based on an efficient reliable broadcast protocol that requires on average only two messages per broadcast. To illustrate our approach we... more
With the advent of large-scale parallel computing systems, making parallel programs fault-tolerant becomes an important problem, be- cause the probability of a failure increases with the number of proces- sors. In this paper, we describe... more
This technical report presents a new and flexible unreliable failure detector, denoted Impact Failure Detector (FD), whose output gives the trust level of a set of processes. By expressing the relevance of each node by an impact factor... more
We consider source coding over Aref networks. In particular we consider the following two problems: (i) multicasting correlated sources to a set of receivers, (ii) broadcasting sources to their respective receivers. For the first problem... more
We consider source coding over Aref networks. In particular we consider the following two problems: (i) multicasting correlated sources to a set of receivers, (ii) broadcasting sources to their respective receivers. For the first problem... more
Causal consistency has been introduced to increase wait-free concurrent accesses to a shared memory. Contrarily to sequential consistency, causal consistency allows independent write operations, with respect to the causality relation, to... more
La provisión de calidad de servicio (QoS) en redes inalámbricas ad hoc requiere el soporte de mecanismos de acceso al medio para gestionar eficientemente el acceso al sistema y conseguir un elevado reúso de los recursos. El estándar IEEE... more
Unlike many other operating systems, Amoeba is a distributed operating system that provides group communication (i.e., one-to-many communication). We will discuss design issues for group communication, Amoeba's group system calls, and the... more
Digital signatures are one of the most important cryptographic primitives. In this work we construct an information-theoretically secure signature scheme which, unlike prior schemes, enjoys a number of advantageous properties such as... more
Broadcasting in Ad hoc networks is prone to broadcast storm problem and ACK implosion problem. These problems create the necessity to carefully designate some nodes in the 1-hop neighborhood of sender as forwarding nodes and reduce... more
This work investigates reliable wireless broadcast with asynchronous data access. A wireless broadcast system based on LT-codes, a realization of the recently introduced Fountain codes, is introduced. We review the traditional problem... more
In this paper we show a small but fast popularitybased front-end cache can provide provable DDOS prevention for randomly partitioned cluster services with replication. To achieve this, we first give the best strategy for an adversary to... more
We present in this paper a general garbage collection scheme that reduces the "noise" in gossip-based broadcast algorithms. In short, our garbage collection scheme uses a simple heuristic to trade "useless" messages with "useful" ones.... more
Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the... more
This paper deals with the problem of reliable group communication for distributed applications, in the context of the Reliable Broadcast class of protocols. An atomic multicast protocol for token passing Lans is presented. The actual... more
Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the... more
This is a repository copy of On the network connectivity of platoon-based vehicular cyber-physical systems.
We study a well-known communication abstraction called Byzantine Reliable Broadcast (BRB). This abstraction is central in the design and implementation of fault-tolerant distributed systems, as many fault-tolerant distributed applications... more
This paper presents a new algorithm that reduces multivalued consensus to binary consensus in an asynchronous message-passing system made up of n processes where up to t may commit Byzantine failures. This algorithm has the following... more
RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently generalizable for solving the single-hop "reliable broadcast"... more
Dwork, Lynch, and Stockmeyer (1988) and Lamport (1998) showed that, in order to solve Consensus in a distributed system, it is sufficient that the system behaves well during a finite period of time. In sharp contrast, Chandra, Hadzilacos,... more
It makes a difference whether I am in touch with the neighbours of my neighbours or not. • Why? Because knowing that my neighbour will join if at least two other people join is not enough for me to be sure that he will join in. He can be... more
This paper presents an efficient and fault-tolerant distributed approach to monitoring the status of processors in a network. The Distributed System Monitor (DSMon) is a distributed, decentralized program that gathers processor... more
This paper presents an efficient and fault-tolerant distributed approach to monitoring the status of processors in a network. The Distributed System Monitor (DSMon) is a distributed, decentralized program that gathers processor... more
Byzantine consensus in asynchronous message-passing systems has been shown to require at least 3f + 1 processes to be solvable in several system models (e.g., with failure detectors, partial synchrony or randomization). Recently a couple... more
Byzantine consensus in asynchronous message-passing systems has been shown to require at least 3f + 1 processes to be solvable in several system models (e.g., with failure detectors, partial synchrony or randomization). Recently a couple... more
Birthday Paradox states that in a group of 23 people, the probability that there are at least two who share the same birthday is very close to 1 2 . This assertion is unacceptable for any scheme that proposes a vote storage method based... more
Replication protocols using an eager update propagation strategy commonly need a reliable broadcast service; i.e., a broadcast primitive with atomic delivery and, in some cases, also with total order. This communication service provides... more
The main goal of replication is to increase dependability. Recovery protocols are a critical building block for realizing this goal. In this survey, we present an analysis of recovery protocols proposed in recent years. In particular, we... more
RTS-CTS handshake based protocols achieve "reliable unicast" by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently generalizable for solving the single-hop "reliable broadcast"... more
Broadcasting concerns transmitting information from a node of a communication network to all other nodes. We consider this problem assuming that links and nodes of the network fail independently with given probabilities p < 1 and q < 1,... more
In mobile ad hoc networks, many routing protocols use broadcast mechanism to find route whereas one of the wireless network challenges is the bandwidth optimisation. This mechanism increases the control overhead and consumes bandwidth and... more
Unreliable failure detectors are oracles that give information about process failures. Chandra and Toueg were first to study such failure detectors for distributed systems, and they identified a number that enabled the solution of the... more
Solving the consensus problem requires in one way or another that the underlying system satisfies some synchrony assumption. Considering an asynchronous message-passing system of n processes where (a) up to t < n/3 may commit Byzantine... more
A Byzantine process is a process that-intentionally or not-behaves arbitrarily (Byzantine failures include crash and omission failures). Considering message-passing systems, this paper presents communication and agreement abstractions... more
This paper presents a new algorithm that reduces multivalued consensus to binary consensus in an asynchronous message-passing system made up of n processes where up to t may commit Byzantine failures. This algorithm has the following... more
Causal broadcast is a communication abstraction designed for asynchronous systems. It ensures that the messages broadcast by the processes are delivered in their broadcast causality order, namely, if the broadcast of a message m causally... more
Byzantine process Coin Crash failure Distributed algorithm k-Set agreement Message-passing system Randomized algorithm Signature-free algorithm k-Set agreement is a central problem of fault-tolerant distributed computing. Considering a... more
k-Set agreement is a central problem of fault-tolerant distibuted computing. Considering a set of n processes, where up to t may commit failures, let us assume that each process proposes a value. The problem consists in defining an... more
Birthday Paradox states that in a group of 23 people, the probability that there are at least two who share the same birthday is very close to 1 2. This assertion is unacceptable for any scheme that proposes a vote storage method based on... more
Birthday Paradox states that in a group of 23 people, the probability that there are at least two who share the same birthday is very close to 1 2 . This assertion is unacceptable for any scheme that proposes a vote storage method based... more
Database replication protocols based on a certification approach are usually the best ones for achieving good performance when an eager update everywhere technique is being considered. The weak voting approach achieves a slightly longer... more
Download research papers for free!