ICIMU 2011 : Proceedings of the 5th International Conference on Information Technology &Amp; Multimedia 2011
DOI: 10.1109/icimu.2011.6122724
|View full text |Cite
|
Sign up to set email alerts
|

Improved bully election algorithm in distributed systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…There are many variants of agreement protocols with small differences in their decision objectives. For instance, the participants may wish to decide on a single proposal [Lamport 1998[Lamport , 2006Mao et al 2008], an infinite sequence of proposals [Chandra et al 2007;Ongaro and Ousterhout 2014], or a finite set of leaders amongst themselves [Arghavani et al 2011;Garcia-Molina 1982]. Despite these variations, any correct agreement protocol is characterized by the following three guarantees [Lynch 1996]: (i) agreementÐall participants decide on the same set of proposals, (ii) validityÐevery proposal in the decided set of proposals must have been proposed by a participant, and (iii) terminationÐall participants eventually decide.…”
Section: Quicksilver Overviewmentioning
confidence: 99%
“…There are many variants of agreement protocols with small differences in their decision objectives. For instance, the participants may wish to decide on a single proposal [Lamport 1998[Lamport , 2006Mao et al 2008], an infinite sequence of proposals [Chandra et al 2007;Ongaro and Ousterhout 2014], or a finite set of leaders amongst themselves [Arghavani et al 2011;Garcia-Molina 1982]. Despite these variations, any correct agreement protocol is characterized by the following three guarantees [Lynch 1996]: (i) agreementÐall participants decide on the same set of proposals, (ii) validityÐevery proposal in the decided set of proposals must have been proposed by a participant, and (iii) terminationÐall participants eventually decide.…”
Section: Quicksilver Overviewmentioning
confidence: 99%
“…bully election algorithm in distributed systems presented by Arghavani in 2011, 27 (3) the modified bully election algorithm in distributed systems presented by Kordafshari et al, 28 (4) the ring algorithm, and (5) the modified ring algorithm. The original bully algorithm requires that every process knows the identity of every other process, with N 2 communication complexity.…”
Section: Leader Election Protocolmentioning
confidence: 99%
“…Usually, the asset with the lowest unique ID number is selected as the leader. According to Balhara and Khanna, 25 the five most prominent leader election algorithms are (1) the bully algorithm presented by Gracia-Molina in 1982, 26 (2) the improved bully election algorithm in distributed systems presented by Arghavani in 2011, 27 (3) the modified bully election algorithm in distributed systems presented by Kordafshari et al, 28 (4) the ring algorithm, and (5) the modified ring algorithm. The original bully algorithm requires that every process knows the identity of every other process, with N 2 communication complexity.…”
Section: Communication Protocolsmentioning
confidence: 99%
“…Bully algorithm [5] and Ring algorithm [48] are among the most used algorithms for solving the consensus problem. A hugely popular algorithm is the Paxos algorithm proposed by Lamport [30].…”
Section: Consensus Algorithmsmentioning
confidence: 99%