Proceedings of the 1997 ACM Symposium on Applied Computing - SAC '97 1997
DOI: 10.1145/331697.332329
|View full text |Cite
|
Sign up to set email alerts
|

Fault-containing network protocols

Abstract: Self-stabilization is a simple and elegant approach towards designing fault-tolerant network protocols. While self-stabilization provides automatic recovery from arbitrary transient faults, self-stabilizing systems do not incorporate any optimization for more efficient recovery from limited transient faults, even though such limited faults are more likely to occur in practice than arbitrary faults. Fault-containing self-stabilizing protocols are proposed to efficiently contain the effects of more frequent, lim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(34 citation statements)
references
References 17 publications
0
34
0
Order By: Relevance
“…Further, it allows higher scalability of the proactive protocols with increased network size. [22], TBRPF [5]) PP+BP (FSR [21], IARP [12]) PP+BT (WRP [19], STAR [7]) PP+B (BFST [9], SS-SPST [11]) Table 2 Symbols and Definitions. Table 5 Variation of β opt and ϕ opt ('↑', '↓', and '−' mean "increase", "decrease", & "no change" respectively).…”
Section: Discussionmentioning
confidence: 99%
“…Further, it allows higher scalability of the proactive protocols with increased network size. [22], TBRPF [5]) PP+BP (FSR [21], IARP [12]) PP+BT (WRP [19], STAR [7]) PP+B (BFST [9], SS-SPST [11]) Table 2 Symbols and Definitions. Table 5 Variation of β opt and ϕ opt ('↑', '↓', and '−' mean "increase", "decrease", & "no change" respectively).…”
Section: Discussionmentioning
confidence: 99%
“…We consider a subclass of fault-containing protocols Π such that each ffault-containing protocol P ∈ Π satisfies Assumption 2, 3, 4, and 5. Many existing fault-containing protocols satisfy Assumption 2, 3, 4, and 5 [15], [17], [18], [21].…”
Section: Assumption 1: Corruption By Faultsmentioning
confidence: 99%
“…We can obtain a more accurate value of the inconsistency range by analyzing the behavior of the protocol. In many 1-fault-containing protocols [15], [17], [18], [21], inconsistency range is 1: in theses protocols, in a 1-faulty configuration the faulty process or its neighbors may suspect it is faulty and exchange the local information with neighbors. If a correct process finds the faulty process, the process waits until the faulty process changes its variables.…”
Section: Assumption 5: Inconsistency Rangementioning
confidence: 99%
See 1 more Smart Citation
“…Self-stabilization property needs then to be completed. This has been studied in [21,15,23,30]. In this paper, we propose another way by adding the notion of continuity to the self-stabilization.…”
Section: Introductionmentioning
confidence: 99%