Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/42027
DC Field | Value | |
---|---|---|
dc.title | Controlling gossip protocol infection pattern using adaptive fanout | |
dc.contributor.author | Verma, S. | |
dc.contributor.author | Ooi, W.T. | |
dc.date.accessioned | 2013-07-04T08:41:34Z | |
dc.date.available | 2013-07-04T08:41:34Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Verma, S.,Ooi, W.T. (2005). Controlling gossip protocol infection pattern using adaptive fanout. Proceedings - International Conference on Distributed Computing Systems : 665-674. ScholarBank@NUS Repository. | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/42027 | |
dc.description.abstract | We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossip-based protocol using adaptive fanout. We model three versions of gossip-based protocols: the Synchronous Protocol, the PseudoSynchronous Protocol and the Asynchronous Protocol. Our objective is to ensure that the members of a group receive a desired message within a bounded latency with very high probability. We argue that the most important parameter that controls the latency of message delivery is the fanout used during gossiping, i.e., the number of gossip targets chosen in a particular instance of gossip. We formally analyze the three protocols and provide expressions for fanout. We introduce the idea of using variable fanouts in different rounds in the Synchronous Protocol. We define fanout as a function of time for the Asynchronous Protocol such that an expected infection pattern is observed with high probability. For a better understanding of the theoretical model, we develop a PseudoSynchronous Protocol to highlight the modelling done in order to derive time dependent fanout. We show that our protocols generate θ(n log n) messages, which is optimal for gossip protocols. We aim to use the gossiping mechanism for large-scale group communication with soft real time constraints. This would alleviate the dependence on tree-based deterministic protocols which usually lack scalability. © 2005 IEEE. | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.sourcetitle | Proceedings - International Conference on Distributed Computing Systems | |
dc.description.page | 665-674 | |
dc.description.coden | PICSE | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.