Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/42027
DC FieldValue
dc.titleControlling gossip protocol infection pattern using adaptive fanout
dc.contributor.authorVerma, S.
dc.contributor.authorOoi, W.T.
dc.date.accessioned2013-07-04T08:41:34Z
dc.date.available2013-07-04T08:41:34Z
dc.date.issued2005
dc.identifier.citationVerma, S.,Ooi, W.T. (2005). Controlling gossip protocol infection pattern using adaptive fanout. Proceedings - International Conference on Distributed Computing Systems : 665-674. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/42027
dc.description.abstractWe propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossip-based protocol using adaptive fanout. We model three versions of gossip-based protocols: the Synchronous Protocol, the PseudoSynchronous Protocol and the Asynchronous Protocol. Our objective is to ensure that the members of a group receive a desired message within a bounded latency with very high probability. We argue that the most important parameter that controls the latency of message delivery is the fanout used during gossiping, i.e., the number of gossip targets chosen in a particular instance of gossip. We formally analyze the three protocols and provide expressions for fanout. We introduce the idea of using variable fanouts in different rounds in the Synchronous Protocol. We define fanout as a function of time for the Asynchronous Protocol such that an expected infection pattern is observed with high probability. For a better understanding of the theoretical model, we develop a PseudoSynchronous Protocol to highlight the modelling done in order to derive time dependent fanout. We show that our protocols generate θ(n log n) messages, which is optimal for gossip protocols. We aim to use the gossiping mechanism for large-scale group communication with soft real time constraints. This would alleviate the dependence on tree-based deterministic protocols which usually lack scalability. © 2005 IEEE.
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.sourcetitleProceedings - International Conference on Distributed Computing Systems
dc.description.page665-674
dc.description.codenPICSE
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.