2008 Symposium on Reliable Distributed Systems 2008
DOI: 10.1109/srds.2008.21
|View full text |Cite
|
Sign up to set email alerts
|

Extending Paxos/LastVoting with an Adequate Communication Layer for Wireless Ad Hoc Networks

Abstract: Most papers addressing consensus in wireless ad

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 16 publications
(36 reference statements)
0
10
0
Order By: Relevance
“…Current centralized scheduling methods jPinedo, 2008], usually require that the system has a clear idea about resources usage patterns whereas distributed scheduling methods [Liu et ah, 2008, Zhou et ah, 2010, Sharma et al, 2010 seldom provide guarantees to exclusive allocations during communication failures. Mutual exclusion use either token- [Chang et al, 1990, Naumann et al, 2002 or permissionbased [Maekawa, 1985, Wu et al, 2008, Borran et al, 2008a, Attiya et al, 2010 methods. Dynamic participation makes the management of tokens more challenging, while limited knowledge of the number of nodes prevents consensus in permission-based approaches.…”
Section: Same-time Eventsmentioning
confidence: 99%
See 1 more Smart Citation
“…Current centralized scheduling methods jPinedo, 2008], usually require that the system has a clear idea about resources usage patterns whereas distributed scheduling methods [Liu et ah, 2008, Zhou et ah, 2010, Sharma et al, 2010 seldom provide guarantees to exclusive allocations during communication failures. Mutual exclusion use either token- [Chang et al, 1990, Naumann et al, 2002 or permissionbased [Maekawa, 1985, Wu et al, 2008, Borran et al, 2008a, Attiya et al, 2010 methods. Dynamic participation makes the management of tokens more challenging, while limited knowledge of the number of nodes prevents consensus in permission-based approaches.…”
Section: Same-time Eventsmentioning
confidence: 99%
“…Another approach is to specifying upper lower bounds on entity numbers performing coor dination, for instance, Borran et al |2008a] assumes that the number of nodes is between an upper bound, n, and a lower bound, for their quorum based Last Voting algorithm.…”
Section: -Upper Lower-boundsmentioning
confidence: 99%
“…Borran et al [24] address consensus under the heard-of model (HO) [25], which permits a fine-grained specification of the patterns of message delivery allowed for the problem to be solvable. This work uses the HO model to express the Paxos algorithm [26] and extend it with a communication layer for wireless networks, which provides a leader election service.…”
Section: Related Workmentioning
confidence: 99%
“…In LOCK phases (φ i (mod 2) = 2) the proposal value v i is updated the following way (lines [22][23][24][25][26][27]: if there are more than n+f 2 messages of the form * , φ, v, * in V i with φ = φ i and the same value v, then v i is set to v (lines [23][24], otherwise it is set to a special value ⊥ / ∈ {0, 1} indicating a lack of preference (lines [25][26]. This step ensures that in the following phase φ i + 1 every node either proposes the same value v ∈ {0, 1} or ⊥.…”
Section: Turquois: Byzantine K-consensusmentioning
confidence: 99%
“…As observed in [7] the models for wired networks are often strongly biased towards node failures to the detriment of link failures. Yet, mobile ad hoc networks -including opportunistic networks-require a model that admits both transient process and link faults, and that considers such faults as benign failures.…”
Section: Introductionmentioning
confidence: 98%