Correctness of the Chord protocol

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Geo-Chord: Geographical Location based Chord Protocol in Grid Computing

Grid computing is a service for sharing computer resources and data storage capacity over the internet. As resource requirements of recent applications increased greatly, grid systems have gained importance in the last decade. Resource discovery is the essential job in Grid computing which provides searching and identifying necessary resources for given processes. There are various Resource Dis...

متن کامل

A Proof of Protocol Correctness

The paper présents a formai description of the medium access protocol used in the Cambridge Ring, and aproofthat the protocol recovers from transient transmission errors.

متن کامل

Description of the Chord Protocol using ASMs Formalism

This paper describes the overlay protocol Chord using the formalism of Abstract State Machines. The formalization concerns Chord actions that maintain ring topology and manipulate distributed keys. We define a class of runs and prove the correctness of our formalization with respect to it.

متن کامل

On Correctness of Dynamic Protocol Update

Replacing or adding network protocols at runtime is problematic – it must involve synchronization of the protocol switch with ongoing local and network communication. We define a formal mathematical model of dynamic protocol update (DPU) and use it to define two DPU algorithms. The algorithms are based on fully-synchronized and lazy strategies. The two strategies implement updates with respecti...

متن کامل

On the Correctness of an Intrusion-Tolerant Group Communication Protocol

Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Intrusion-tolerance is to preserve an acceptable, though possibly degraded, service of the overall system despite intrusions at some of its sub-parts. In this paper, we present a correctness proof of the Intrusion-tolera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science and Information Systems

سال: 2020

ISSN: 1820-0214,2406-1018

DOI: 10.2298/csis181115017m