What about asynchronous systems? The Game of Paxos. Quorum Systems. The Game of Paxos

Size: px
Start display at page:

Download "What about asynchronous systems? The Game of Paxos. Quorum Systems. The Game of Paxos"

Transcription

1 What about asynhronous systems? FLP says onsensus annot be solved... For benign failures, Paos provides net best thing always safe And for Byzantine failures? The Game of Paos Proesses are ompeting to write a value in a write-one register 1. Push the read button and eamine the token that falls into the tray 2. value of the register is stamped on the token! 3. If the token is red and stamped with a value, plae the token in the slot, set the dial to the same value, and push the write button value Read Value dial Write The Game of Paos Quorum Systems Proesses are ompeting to write a value in a write-one register 1. Push the read button and eamine the token that falls into the tray 2. value of the register is stamped on the token! 3. If the token is red and stamped with a value, plae the token in the slot, set the dial to the same value, and push the write button 4. If the token is red and not stamped, plae the token in the slot, set the dial to any value, and push the write button Read Value dial Write Given a set of servers U, U = n a quorum system is a set Q 2 U suh that Q 1,Q 2 Q : Q 1 Q 2 Eah Q in Q is a quorum

2 A R/W Register A R/W Register servers } store at eah server a (v, ts) pair store at eah server a (v, ts) pair Write (, d) Ask servers in some Q for their ts Set ts > ma({ts} any previous ts ) Update some Q with (d, ts ) Semantis A R/W Register *387 A read not onurrent with any write returns the most reently written value store at eah server a (v, ts) pair )79G>3D Safe + a read that overlaps with a write obtains either the old or the new value FA?;5 Write (, d) Read () Ask servers in some Q for their ts Set ts > ma({ts} any previous ts ) Update some Q with (d, ts ) Ask servers in some Q for their (v, ts) Selet most reent (v, ts) Reads and writes are totally ordered so that values returned by reads are the same as if the operations had been performed with no overlapping

3 System Model Universe U of servers, U = n Byzantine faulty servers modeled as a non-empty fail-prone system B 2 U no B B is ontained in another some B B ontains all faulty servers Clients are orret (an be weakened) Point-to-point authentiated and reliable hannels A orret proess q reeives a message from another orret proess p if and only if p sent it Masking Quorum System [Malkhi and Reiter, 1998] A quorum system Q is a masking quorum system for a fail-prone system B if the M-Consisteny Q 1,Q 2 Q B 1,B 2 B :(Q 1 Q 2 ) \ B 1 B 2 M-Availability B B Q Q : B Q = Dissemination Quorum System A masking quorum system for self-verifying data D-Consisteny Q 1,Q 2 Q B B :(Q 1 Q 2 ) B D-Availability B B Q Q : B Q = f-threshold Masking Quorum Systems M-Consisteny Q 1,Q 2 Q : Q 1 Q 2 2f +1 M-Availability Q n f { Q } n +2f +1 Q = Q U : Q = 2 B = {B U : B = f} D-Consisteny Q 1,Q 2 Q : Q 1 Q 2 f +1 D-Availability Q n f { Q } n + f +1 Q = Q U : Q = 2 n n n 4f +1 n 3f +1

4 A safe read/write protool Tradeoffs Write(d) Ask all servers for their urrent timestamp t Wait for answer from Q different servers Set ts > ma( {t} any previous ts) Send (d,ts) to all servers Wait for Q aknowledgments Best known n. self-verifying generi 3f +1 4f +1 Read() Ask all servers for latest value/timestamp pair Wait for answer from Q different servers Selet most reent (v,ts) for whih at least f + 1 answers agree (if any) verifiable self-verifying and generi Tradeoffs Best known n. 3f +1 A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! fast! PBFT uses MACs instead of publi key ryptography uses proative reovery to tolerate more failures over f window BASE (RCL 01) uses abstration to redue orrelated faults

5 The Setup Crypto System Model Asynhronous system Unreliable hannels Servie Byzantine lients Up to f Byzantine servers N > 3f total servers Publi/Private key pairs MACs Collision-resistant hashes Unbreakable System Goals Always safe Live during periods of synhrony What ould possibly go wrong? The ould be faulty! ould ignore ommands; assign same sequene number to different requests; skip sequene numbers; et Bakups monitor primary s behavior and trigger view hanges to replae faulty primary Bakups ould be faulty! ould inorretly store ommands forwarded by a orret primary use dissemination Byzantine quorum systems [MR98] Faulty replias ould inorretly respond to the lient! The General Idea -bakup + quorum system eeutions are sequenes of views lients send signed ommands to primary of urrent view primary assigns sequene number to lient s ommand primary writes sequene number to the register implemented by the quorum system 67S@76 4K 3>> F:7 E7DH7DE (primary inluded) What ould possibly go wrong? The ould be faulty! ould ignore ommands; assign same sequene number to different requests; skip sequene numbers; et Bakups monitor primary s behavior and trigger view hanges to replae faulty primary Bakups ould be faulty! ould inorretly store ommands forwarded by a orret primary use dissemination Byzantine quorum systems [MR98] Faulty replias ould inorretly respond to the lient! Client waits for f +1 mathing replies before aepting response

6 Me, or your lying eyes? Sets (quorums) of signed messages from distint replias proving that a property of interest holds With quorums of size at least 2f +1 Any two quorums interset in at least one orret replia Always one quorum ontains only non-faulty replias Normal operation How the protool works in the absene of failures - hopefully, the ommon ase View hanges How to depose a faulty primary and elet a new one Garbage olletion Reovery How to make a faulty replia behave orretly again Normal Operation Pre-prepare assigns sequene number to request Prepare ensures fault-tolerant onsistent ordering of requests within views Commit ensures fault-tolerant onsistent ordering of requests aross views i Servie state A message log with all messages sent or reeived An integer representing i s urrent view Bakup 1 Bakup 2 Bakup 3 Client issues request <REQUEST,o,t, > σ

7 Client issues request <REQUEST,o,t, > σ state mahine operation Client issues request <REQUEST,o,t, timestamp > σ Bakup 1 Bakup 1 Bakup 2 Bakup 3 Bakup 2 Bakup 3 Client issues request <REQUEST,o,t, > σ lient id Client issues request <REQUEST,o,t, > σ lient signature Bakup 1 Bakup 1 Bakup 2 Bakup 3 Bakup 2 Bakup 3

8 Pre-prepare Pre-prepare View multiasts <<PRE-PREPARE,v,n,d>, m> σ p multiasts <<PRE-PREPARE,v,n,d>, m> σ p Bakup 1 Bakup 1 Bakup 2 Bakup 3 Bakup 2 Bakup 3 Pre-prepare Sequene number multiasts <<PRE-PREPARE,v,n,d>, m> σ p Pre-prepare lient s request multiasts <<PRE-PREPARE,v,n,d>, m> σ p Bakup 1 Bakup 1 Bakup 2 Bakup 3 Bakup 2 Bakup 3

9 Pre-prepare digest of m multiasts <<PRE-PREPARE,v,n,d>, m> σ p Pre-prepare multiasts <<PRE-PREPARE,v,n,d>, m> σ p Bakup 1 Bakup 1 Bakup 2 Bakup 2 Bakup 3 Bakup 3 Corret bakup i aepts PRE-PREPARE PRE-PREPARE is well formed i is in view v i has not aepted another PRE-PREPARE for v, n with a different d n is between two water-marks L and H (to prevent sequene number ehaustion) Pre-prepare Prepare multiasts <<PRE-PREPARE,v,n,d>, m> σ p Bakup i multiasts <PREPARE,v,n,d,i> σ i Bakup 1 Bakup 1 Bakup 2 Bakup 2 Bakup 3 Eah aepted PRE-PREPARE message is stored in the aepting replia s message log (inluding the s) Bakup 3 Pre-prepare phase Corret replia i aepts PREPARE PREPARE is well formed i is in view v n is between two water-marks L and H

10 Prepare Prepare Bakup i multiasts <PREPARE,v,n,d,i> σ i ensure total order within views Bakup 1 Bakup 2 Bakup 3 Pre-prepare phase Replias that send PREPARE aept seq.# n for m in view v Eah aepted PREPARE message is stored in the aepting replia s message log Prepare Prepare ensure total order within views (m,v,n) The request m A PRE-PREPARE for m in view v with sequene number n 2f PREPARE from different bakups that math the preprepare ensure total order within views (m,v,n) The request m A PRE-PREPARE for m in view v with sequene number n 2f PREPARE from different bakups that math the preprepare (m,v,n) assigning sequene number n to m in view v (m 1,v,n) (m 2,v,n)

11 are not enough Commit replia i multiasts <COMMIT,v,n,d,i> σ i orret replias has agreed on a sequene number for a lient s request leader eleted in a view hange Bakup 1 Bakup 2 Bakup 3 Pre-prepare phase Prepare phase Commit phase Commit ensure total order aross views Reply After eeuting request, replia i replies with <REPLY,v,t,,i,r > σi A replia has a (m,v,n) Bakup 1 (m,v,n) log ontains 2f +1 mathing COMMIT from different replias (inluding itself) Replia eeutes a request after it gets C- with smaller sequene numbers Bakup 2 Bakup 3 Pre-prepare phase Prepare phase Commit phase Reply phase

12 Au armes les bakups! stops aepting messages (but for VIEW-CHANGE & NEW-VIEW) multiasts <VIEW-CHANGE,v+1, P > σi P i A bakup joins mutiny after seeing distint VIEW-CHANGE messages f +1 Mutiny sueeds if new primary ollets a, V indiating support from 2f +1 distint replias (inluding itself) v+1 the new primary The primary elet ˆp (replia v+1 mod N ) V the highest sequene number h of any message V v+1 the new primary The primary elet ˆp (replia v+1 mod N ) V the highest sequene number h of any message V h v+1 the new primary The primary elet ˆp (replia v+1 mod N ) V the highest sequene number h of any message V two sets O and N n,m in V, n h O = O <PRE-PREPARE,v+1,n,m> n h N = N <PRE-PREPARE,v+1,n,null > σ ˆp σ ˆp

13 FA H;7I v+1 the new primary The primary elet p (replia v+1 mod N ) V 7JFD35FE 8DA? H;7I 57DF;S53F7 the highest sequene number h of any message V 8AD I:;5: 5A@F3;@E 3 ' 57DF;S53F7 two sets O and N "8 F:7D7 ;E 3 ' 57DF;S53F7 8AD n,m in V, n h O = O <PRE-PREPARE,v+1,n,m>σp n h &F:7DI;E7 ;8 ' 57DF;S53F7 N = N <PRE-PREPARE,v+1,n,null >σp p multiasts <NEW-VIEW,v+1,V,O, N>σp &@ FA H;7I v+1 the bakup Bakup aepts NEW-VIEW message for v+1 if it is signed properly it ontains in V a valid VIEW-CHANGE messages for v+1 it an verify loally that O is orret (repeating the primary s omputation) Adds all entries in O to its log (so did p!) Multiasts a PREPARE for eah message in O Adds all PREPARE to log and enters new view Why then another BFT protool? Yes Zyzzyva PBFT Yes HQ High ontention? Yes # Replias 5f+1? No Low lateny? No No PBFT Q/U Comple deision tree hampers BFT adoption

14 Simplify, simplify H.D. Thoreau Yes PBFT Yes High ontention? Yes # Replias 5f+1? HQ Simplify, simplify H.D. Thoreau No Low lateny? No BFT? Yes No Zyzzyva PBFT Q/U One protool that mathes or tops its ompetitors in lateny Replia oordination All orret replias eeute the same sequene of ommands throughput ost of repliation How it is done now Voter Command For eah reeived ommand, 5ADD75F D7B>;53E Agree on s position in the sequene Eeute in the agreed upon order Replies to the lient Agreement Eeution

15 How Zyzzyva does it Stability Command Voter A ommand is stable at a replia one its position in the sequene annot hange RSM Safety RSM Liveness Agreement Eeution Corret lients only proess replies to stable ommands All ommands issued by orret lients eventually beome stable and eliit a reply Enforing safety Corret lients only proess replies to stable ommands Corret replias only eeute and reply to ommands that are stable Servie performs an output ommit with eah reply Trust, but Verify Insight output ommit at the lient, not at the servie! Replias eeute and reply to a ommand without knowing whether it is stable trust order provided by primary no epliit replia agreement! that it orresponds to stable ommand if not, lient takes ation to ensure liveness

16 Verifying stability Command History A ommand an beome stable only if a majority of orret replias agree on its position in the sequene a majority of orret replias agrees on s position the set of replies is inompatible, for all possible future eeutions, with a majority of orret replias agreeing on a different ommand holding s urrent position H i,k k ommands eeuted by replia i On reeipt of a ommand from the primary, replia appends to its ommand history the appliation-level response the orresponding ommand history r 1,H 1,k Voter A majority of orret replias agrees on s position (all do!), k, k, k r 2,H 2,k r 3,H 3,k r 4,H 4,k New primary determines k-th ommand by asking n f replias for their H r 1 =...= r 4 H 1,k =...= H 4,k

17 A majority of orret replias agrees on s position (all do!) New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position (all do!) New primary determines k-th ommand by asking n f replias for their H orret replias agree A majority of orret replias agrees on s position (all do!) r 1,H 1,k Voter New primary determines s position by asking n f replias for their H It is impossible for a majority of orret replias to agree on a different ommand for s position, k r 2,H 2,k, k r 3,H 3,k, k At least 2f +1 replies math

18 A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H

19 A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s position New primary determines k-th ommand by asking n f replias for their H

20 orret replias agree A majority of orret replias agrees on s position r i,h i,k Voter CC H 1,k,...,H 4,k New primary determines k-th ommand by asking n f replias for their H, k Not safe! Client sends to all a ontaining 2f +1 mathing histories orret replias agree r 1,H 1,k, k CC Voter aks Client proesses response if it reeives at least 2f +1 aks replias agreed on s position New primary determines k-th ommand by ontating n f replias This set ontains at least one orret Inompatible with a majority baking a different ommand for that position

21 Stability and ommand histories Stability depends on mathing ommand histories Stability is If a ommand with sequene number n is stable, then so is every ommand with sequene number n <n Voter r 1,H 1,k, k r 2,H 2,k, k, k Fewer than 2f +1 replies math Clients retransmits to all replias-hinting primary may be faulty Zyzzyva reap The Case of the Missing Phase Output ommit at the lient, not the servie Replias eeute requests without epliit agreement stable ommand At most 2 phases within a view to make ommand stable Command Pre-prepare Prepare Commit Client proesses response if it reeives at least f +1 mathing replies after ommit phase Voter

22 The Case of the Missing Phase The Case of the Missing Phase Voter Voter Command Command Pre-prepare Unanimity Pre-prepare Prepare Majority it The Case of the Missing Phase replaing the primary Command BFT Voter In PBFT, a replia that suspets primary is faulty goes unilaterally on strike Stops proessing messages in the view Third Commit phase needed for liveness Pre-prepare Prepare Commit Where did the third phase go? Why was it there to begin with?

23 replaing the primary In PBFT, a replia that suspets primary is faulty goes unilaterally on strike Stops proessing messages in the view Third Commit phase needed for liveness In Zyzzyva, the replia goes on Tehnion strike Broadasts I hate the primary and keeps on working Stops when sees enough hate mail to ensure all orret replia will stop as well Etra phase is moved to the unommon ase Faulty lients an t affet safety Faulty lients annot reate inonsistent Clients annot fabriate ommand histories, as they are signed by replias It is impossible to generate a valid ommit any stable request Olly Olly Oen Free! or, faulty lients an t affet liveness Olly Olly Oen Free! or, faulty lients an t affet liveness Faulty lient omits to send CC for Replias ommit histories are unaffeted! Later orret lient who establishes > stable frees as well is

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00) PBFT: A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) first to be safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! The Setup Crypto System Model Asynhronous

More information

Why then another BFT protocol? Zyzzyva. Simplify, simplify. Simplify, simplify. Complex decision tree hampers BFT adoption. H.D. Thoreau. H.D.

Why then another BFT protocol? Zyzzyva. Simplify, simplify. Simplify, simplify. Complex decision tree hampers BFT adoption. H.D. Thoreau. H.D. Why then another BFT protool? Yes No Zyzzyva Yes No Yes No Comple deision tree hampers BFT adoption Simplify, simplify H.D. Thoreau Simplify, simplify H.D. Thoreau Yes No Yes No Yes Yes No One protool

More information

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00) PBFT: A Byzantine Renaissance Practical Byzantine Fault-Tolerance (CL99, CL00) first to be safe in asynchronous systems live under weak synchrony assumptions -Byzantine Paxos! The Setup Crypto System Model

More information

Zyzzyva: Speculative Byzantine Fault Tolerance By Ramakrishna Kotla,* Allen Clement, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin

Zyzzyva: Speculative Byzantine Fault Tolerance By Ramakrishna Kotla,* Allen Clement, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin : Speulative Byzantine Fault Tolerane By Ramakrishna Kotla,* Allen Clement, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin doi:10.1145/1400214.1400236 Abstrat A longstanding vision in distributed systems

More information

Zyzzyva. Speculative Byzantine Fault Tolerance. Ramakrishna Kotla. L. Alvisi, M. Dahlin, A. Clement, E. Wong University of Texas at Austin

Zyzzyva. Speculative Byzantine Fault Tolerance. Ramakrishna Kotla. L. Alvisi, M. Dahlin, A. Clement, E. Wong University of Texas at Austin Zyzzyva Speculative Byzantine Fault Tolerance Ramakrishna Kotla L. Alvisi, M. Dahlin, A. Clement, E. Wong University of Texas at Austin The Goal Transform high-performance service into high-performance

More information

Speeding up Consensus by Chasing Fast Decisions

Speeding up Consensus by Chasing Fast Decisions Speeding up Consensus by Chasing Fast Deisions Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran ECE, Virginia Teh, USA {balajia,peluso,robertop,giuliano.losa,binoy}@vt.edu

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Distributed Algorithms Practical Byzantine Fault Tolerance

Distributed Algorithms Practical Byzantine Fault Tolerance Distributed Algorithms Practical Byzantine Fault Tolerance Alberto Montresor University of Trento, Italy 2017/01/06 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

EECS 591 DISTRIBUTED SYSTEMS. Manos Kapritsos Fall 2018

EECS 591 DISTRIBUTED SYSTEMS. Manos Kapritsos Fall 2018 EECS 591 DISTRIBUTED SYSTEMS Manos Kapritsos Fall 2018 THE GENERAL IDEA Replicas A Primary A 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 PBFT: NORMAL OPERATION Three phases: Pre-prepare Prepare Commit assigns sequence

More information

Failure models. Byzantine Fault Tolerance. What can go wrong? Paxos is fail-stop tolerant. BFT model. BFT replication 5/25/18

Failure models. Byzantine Fault Tolerance. What can go wrong? Paxos is fail-stop tolerant. BFT model. BFT replication 5/25/18 Failure models Byzantine Fault Tolerance Fail-stop: nodes either execute the protocol correctly or just stop Byzantine failures: nodes can behave in any arbitrary way Send illegal messages, try to trick

More information

Distributed Storage Systems: Data Replication using Quorums

Distributed Storage Systems: Data Replication using Quorums Distributed Storage Systems: Data Replication using Quorums Background Software replication focuses on dependability of computations What if we are primarily concerned with integrity and availability (and

More information

Distributed Algorithms Practical Byzantine Fault Tolerance

Distributed Algorithms Practical Byzantine Fault Tolerance Distributed Algorithms Practical Byzantine Fault Tolerance Alberto Montresor Università di Trento 2018/12/06 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

More information

Reducing the Costs of Large-Scale BFT Replication

Reducing the Costs of Large-Scale BFT Replication Reducing the Costs of Large-Scale BFT Replication Marco Serafini & Neeraj Suri TU Darmstadt, Germany Neeraj Suri EU-NSF ICT March 2006 Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Zyzzyva: Speculative Byzantine Fault Tolerance

Zyzzyva: Speculative Byzantine Fault Tolerance : Speculative Byzantine Fault Tolerance Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong Dept. of Computer Sciences University of Texas at Austin {kotla,lorenzo,dahlin,aclement,elwong}@cs.utexas.edu

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Robust BFT Protocols

Robust BFT Protocols Robust BFT Protocols Sonia Ben Mokhtar, LIRIS, CNRS, Lyon Joint work with Pierre Louis Aublin, Grenoble university Vivien Quéma, Grenoble INP 18/10/2013 Who am I? CNRS reseacher, LIRIS lab, DRIM research

More information

Byzantine fault tolerance. Jinyang Li With PBFT slides from Liskov

Byzantine fault tolerance. Jinyang Li With PBFT slides from Liskov Byzantine fault tolerance Jinyang Li With PBFT slides from Liskov What we ve learnt so far: tolerate fail-stop failures Traditional RSM tolerates benign failures Node crashes Network partitions A RSM w/

More information

AS distributed systems develop and grow in size,

AS distributed systems develop and grow in size, 1 hbft: Speculative Byzantine Fault Tolerance With Minimum Cost Sisi Duan, Sean Peisert, Senior Member, IEEE, and Karl N. Levitt Abstract We present hbft, a hybrid, Byzantine fault-tolerant, ted state

More information

Key-value store with eventual consistency without trusting individual nodes

Key-value store with eventual consistency without trusting individual nodes basementdb Key-value store with eventual consistency without trusting individual nodes https://github.com/spferical/basementdb 1. Abstract basementdb is an eventually-consistent key-value store, composed

More information

A Lightweight Intrusion-Tolerant Overlay Network

A Lightweight Intrusion-Tolerant Overlay Network A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing A Novel Timestamp Ordering Approah for Co-existing Traditional and Cooperative Transation Proessing Author Sun, Chengzheng, Zhang, Y., Kambayashi, Y., Yang, Y. Published 1998 Conferene Title Proeedings

More information

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013 289 Disovery and Verifiation of Neighbor Positions in Mobile Ad Ho Networks Maro Fiore, Member, IEEE, Claudio Ettore Casetti, Member,

More information

Resource-efficient Byzantine Fault Tolerance. Tobias Distler, Christian Cachin, and Rüdiger Kapitza

Resource-efficient Byzantine Fault Tolerance. Tobias Distler, Christian Cachin, and Rüdiger Kapitza 1 Resource-efficient Byzantine Fault Tolerance Tobias Distler, Christian Cachin, and Rüdiger Kapitza Abstract One of the main reasons why Byzantine fault-tolerant (BFT) systems are currently not widely

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3 Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))

More information

Authenticated Agreement

Authenticated Agreement Chapter 18 Authenticated Agreement Byzantine nodes are able to lie about their inputs as well as received messages. Can we detect certain lies and limit the power of byzantine nodes? Possibly, the authenticity

More information

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Lateny Choose Two Debajyoti Das Purdue University, USA das48@purdue.edu Sebastian Meiser University College London, U s.meiser@ul.a.uk Esfandiar

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Practical Byzantine Fault

Practical Byzantine Fault Practical Byzantine Fault Tolerance Practical Byzantine Fault Tolerance Castro and Liskov, OSDI 1999 Nathan Baker, presenting on 23 September 2005 What is a Byzantine fault? Rationale for Byzantine Fault

More information

or? Paxos: Fun Facts Quorum Quorum: Primary Copy vs. Majority Quorum: Primary Copy vs. Majority

or? Paxos: Fun Facts Quorum Quorum: Primary Copy vs. Majority Quorum: Primary Copy vs. Majority Paxos: Fun Facts Quorum Why is the algorithm called Paxos? Leslie Lamport described the algorithm as the solution to a problem of the parliament on a fictitious Greek island called Paxos Many readers were

More information

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments Publish/Subsribe Systems on Node and Link Error Prone Mobile Environments Sangyoon Oh,, Sangmi Lee Pallikara, Sunghoon Ko, Jai-Hoon Kim,3, Geoffrey Fox, Community Grids Lab., Indiana University, Bloomington,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography

Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography Appears as Technical Memo MIT/LCS/TM-589, MIT Laboratory for Computer Science, June 999 Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography Miguel Castro and Barbara Liskov Laboratory

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments Publish/Subsribe Systems on Node and Link Error Prone Mobile Environments Sangyoon Oh,, Sangmi Lee Pallikara, Sunghoon Ko, Jai-Hoon Kim,3, and Geoffrey Fox, Community Grids Lab., Indiana University, Bloomington,

More information

Byzantine Fault Tolerance and Consensus. Adi Seredinschi Distributed Programming Laboratory

Byzantine Fault Tolerance and Consensus. Adi Seredinschi Distributed Programming Laboratory Byzantine Fault Tolerance and Consensus Adi Seredinschi Distributed Programming Laboratory 1 (Original) Problem Correct process General goal: Run a distributed algorithm 2 (Original) Problem Correct process

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Tradeoffs in Byzantine-Fault-Tolerant State-Machine-Replication Protocol Design

Tradeoffs in Byzantine-Fault-Tolerant State-Machine-Replication Protocol Design Tradeoffs in Byzantine-Fault-Tolerant State-Machine-Replication Protocol Design Michael G. Merideth March 2008 CMU-ISR-08-110 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Triangles. Learning Objectives. Pre-Activity

Triangles. Learning Objectives. Pre-Activity Setion 3.2 Pre-tivity Preparation Triangles Geena needs to make sure that the dek she is building is perfetly square to the brae holding the dek in plae. How an she use geometry to ensure that the boards

More information

Practical Byzantine Fault Tolerance. Miguel Castro and Barbara Liskov

Practical Byzantine Fault Tolerance. Miguel Castro and Barbara Liskov Practical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Outline 1. Introduction to Byzantine Fault Tolerance Problem 2. PBFT Algorithm a. Models and overview b. Three-phase protocol c. View-change

More information

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ) Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Distributed Algorithms (PhD course) Consensus SARDAR MUHAMMAD SULAMAN

Distributed Algorithms (PhD course) Consensus SARDAR MUHAMMAD SULAMAN Distributed Algorithms (PhD course) Consensus SARDAR MUHAMMAD SULAMAN Consensus (Recapitulation) A consensus abstraction is specified in terms of two events: 1. Propose ( propose v )» Each process has

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

G Distributed Systems: Fall Quiz II

G Distributed Systems: Fall Quiz II Computer Science Department New York University G22.3033-006 Distributed Systems: Fall 2008 Quiz II All problems are open-ended questions. In order to receive credit you must answer the question as precisely

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm

A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm Appears as Technical Memo MIT/LCS/TM-590, MIT Laboratory for Computer Science, June 1999 A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm Miguel Castro and Barbara Liskov

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1 Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Tolerating Latency in Replicated State Machines through Client Speculation

Tolerating Latency in Replicated State Machines through Client Speculation Tolerating Latency in Replicated State Machines through Client Speculation April 22, 2009 1, James Cowling 2, Edmund B. Nightingale 3, Peter M. Chen 1, Jason Flinn 1, Barbara Liskov 2 University of Michigan

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due

More information

Total 100

Total 100 CS331 SOLUTION Problem # Points 1 10 2 15 3 25 4 20 5 15 6 15 Total 100 1. ssume you are dealing with a ompiler for a Java-like language. For eah of the following errors, irle whih phase would normally

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Test I Solutions

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Test I Solutions Department of Eletrial Engineering and Computer iene MAACHUETT INTITUTE OF TECHNOLOGY 6.035 Fall 2016 Test I olutions 1 I Regular Expressions and Finite-tate Automata For Questions 1, 2, and 3, let the

More information

Replication in Distributed Systems

Replication in Distributed Systems Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0 Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Viewstamped Replication to Practical Byzantine Fault Tolerance. Pradipta De

Viewstamped Replication to Practical Byzantine Fault Tolerance. Pradipta De Viewstamped Replication to Practical Byzantine Fault Tolerance Pradipta De pradipta.de@sunykorea.ac.kr ViewStamped Replication: Basics What does VR solve? VR supports replicated service Abstraction is

More information

Practical Byzantine Fault Tolerance and Proactive Recovery

Practical Byzantine Fault Tolerance and Proactive Recovery Practical Byzantine Fault Tolerance and Proactive Recovery MIGUEL CASTRO Microsoft Research and BARBARA LISKOV MIT Laboratory for Computer Science Our growing reliance on online services accessible on

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

arxiv: v2 [cs.dc] 12 Sep 2017

arxiv: v2 [cs.dc] 12 Sep 2017 Efficient Synchronous Byzantine Consensus Ittai Abraham 1, Srinivas Devadas 2, Danny Dolev 3, Kartik Nayak 4, and Ling Ren 2 arxiv:1704.02397v2 [cs.dc] 12 Sep 2017 1 VMware Research iabraham@vmware.com

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq

Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq Vincent Rahli, Ivana Vukotic, Marcus Völp, Paulo Esteves-Verissimo SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg firstname.lastname@uni.lu

More information

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1 Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

Byzantine Fault Tolerant Raft

Byzantine Fault Tolerant Raft Abstract Byzantine Fault Tolerant Raft Dennis Wang, Nina Tai, Yicheng An {dwang22, ninatai, yicheng} @stanford.edu https://github.com/g60726/zatt For this project, we modified the original Raft design

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

checking for optimal egress point in ibgp routing

checking for optimal egress point in ibgp routing heking for optimal egress point in ibgp routing Mar Olivier Buob (CORE/CPN/NEO), Mikaël Meulle (CORE/CPN/RIV), Steve Uhlig (Delft Universit of Tehnolog) 0/0/07 agenda 2 3 introdution internet routing border

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming On Dynami Server Provisioning in Multi-hannel P2P Live Streaming Chuan Wu Baohun Li Shuqiao Zhao Department of Computer Siene Department of Eletrial Multimedia Development Group The University of Hong

More information

Practical Byzantine Fault Tolerance

Practical Byzantine Fault Tolerance Practical Byzantine Fault Tolerance Robert Grimm New York University (Partially based on notes by Eric Brewer and David Mazières) The Three Questions What is the problem? What is new or different? What

More information

Security (and finale) Dan Ports, CSEP 552

Security (and finale) Dan Ports, CSEP 552 Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too

More information

Simultaneous image orientation in GRASS

Simultaneous image orientation in GRASS Simultaneous image orientation in GRASS Alessandro BERGAMINI, Alfonso VITTI, Paolo ATELLI Dipartimento di Ingegneria Civile e Ambientale, Università degli Studi di Trento, via Mesiano 77, 38 Trento, tel.

More information

CS 138: Practical Byzantine Consensus. CS 138 XX 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

CS 138: Practical Byzantine Consensus. CS 138 XX 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. CS 138: Practical Byzantine Consensus CS 138 XX 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Scenario Asynchronous system Signed messages s are state machines It has to be practical CS 138

More information

Scalable P2P Search Daniel A. Menascé George Mason University

Scalable P2P Search Daniel A. Menascé George Mason University Saling the Web Salable P2P Searh aniel. Menasé eorge Mason University menase@s.gmu.edu lthough the traditional lient-server model irst established the Web s bakbone, it tends to underuse the Internet s

More information

PhysicsAndMathsTutor.com 12

PhysicsAndMathsTutor.com 12 PhysisAndMathsTutor.om M. (a) sin θ = or.33 sin θ =.47 sin44 or sin 0.768 () θ = 50.5, 50., 50.35 ( ) () answer seen to > sf (b) refrats towards normal () 44 shown () () (TIR) only when ray travels from

More information