Why then another BFT protocol? Zyzzyva. Simplify, simplify. Simplify, simplify. Complex decision tree hampers BFT adoption. H.D. Thoreau. H.D.
|
|
- Hilda McBride
- 6 years ago
- Views:
Transcription
1 Why then another BFT protool? Yes No Zyzzyva Yes No Yes No Comple deision tree hampers BFT adoption Simplify, simplify H.D. Thoreau Simplify, simplify H.D. Thoreau Yes No Yes No Yes Yes No One protool that mathes or tops its ompetitors in lateny throughput ost of repliation
2 Replia oordination How it is done now All orret replias eeute the same sequene of ommands Command For eah reeived ommand, orret replias: Agree on s in the sequene Eeute in the agreed upon order Replies to the lient Agreement Eeution How Zyzzyva does it Stability Command A ommand is stable at a replia one its in the sequene annot hange RSM Safety RSM Liveness Agreement Eeution Corret lients only proess replies to stable ommands All ommands issued by orret lients eventually beome stable and eliit a reply
3 Enforing safety RSM safety requires: Corret lients only proess replies to stable ommands...but RSM implementations enfore instead: Corret replias only eeute and reply to ommands that are stable Servie performs an output ommit with eah reply Speulative BFT: Trust, but Verify Insight: output ommit at the lient, not at the servie! Replias eeute and reply to a ommand without knowing whether it is stable trust order provided by primary no epliit replia agreement! Corret lient, before proessing reply, verifies that it orresponds to stable ommand if not, lient takes ation to ensure liveness Verifying stability Command History Neessary ondition for stability in Zyzzyva: A ommand an beome stable only if a majority of orret replias agree on its in the sequene Client an proess a response for iff: a majority of orret replias agrees on s the set of replies is inompatible, for all possible future eeutions, with a majority of orret replias agreeing on a different ommand holding s ur rent H i,k = a hash of the sequene of the first ommands eeuted by replia i On reeipt of a ommand from the primary, replia appends to its ommand history Replia reply for inludes: the appliation-level response the orresponding ommand history k
4 Case 1: Unanimity r 1,H 1,k A majority of orret replias agrees on s (all do!), k, k, k r 2,H 2,k r 3,H 3,k r 4,H 4,k New primary determines k-th ommand by asking n f replias for their H Client proesses response if all replies math: r 1 =...= r 4 H 1,k =...= H 4,k A majority of orret replias agrees on s (all do!) New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s (all do!) New primary determines k-th ommand by asking n f replias for their H
5 Case 2: A majority of orret replias agree A majority of orret replias agrees on s (all do!) r 1,H 1,k New primary determines s by asking n f replias for their H It is impossible for a majority of orret replias to agree on a different ommand for s, k, k, k r 2,H 2,k r 3,H 3,k At least 2f +1 replies math A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H
6 A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H
7 A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H A majority of orret replias agrees on s New primary determines k-th ommand by asking n f replias for their H Case 2: A majority of orret replias agree A majority of orret replias agrees on s r i,h i,k CC H 1,k,...,H 4,k New primary determines k-th ommand by asking n f replias for their H, k Not safe! Client sends to all a ommit ertifiate ontaining 2f +1 mathing histories
8 Case 2: A majority of orret replias agree, k r 1,H 1,k CC aks Client proesses response if it reeives at least 2f +1 aks Stability and ommand histories Certifiate proves that a majority of orret replias agreed on s New primary determines k-th ommand by ontating n f replias This set ontains at least one orret replia with a opy of the ertifiate Inompatible with a majority baking a different ommand for that Case 3: None of the above Stability depends on mathing ommand histories Stability is prefi-losed: If a ommand with sequene number n is stable, then so is every ommand with sequene number n <n r 1,H 1,k, k r 2,H 2,k, k, k Fewer than 2f +1 replies math Clients retransmits to all replias-hinting primary may be faulty
9 Zyzzyva reap Output ommit at the lient, not the servie Replias eeute requests without epliit agreement Command The Case of the Missing Phase Client verifies if response orresponds to stable ommand At most 2 phases within a view to make ommand stable Pre-prepare Prepare Commit Client proesses response if it reeives at least f +1 mathing replies after ommit phase The Case of the Missing Phase The Case of the Missing Phase Command Command Pre-prepare Pre-prepare Prepare Unanimity Majority
10 The Case of the Missing Phase View-Change: replaing the primary Command BFT In PBFT, a replia that suspets primary is faulty goes unilaterally on strike Stops proessing messages in the view Third Commit phase needed for liveness Pre-prepare Prepare Commit Where did the third phase go? Why was it there to begin with? View-Change: replaing the primary In PBFT, a replia that suspets primary is faulty goes unilaterally on strike Stops proessing messages in the view Third Commit phase needed for liveness In Zyzzyva, the replia goes on Tehnion strike Broadasts I hate the primary and keeps on working Stops when sees enough hate mail to ensure all orret replia will stop as well Faulty lients an t affet safety Faulty lients annot reate inonsistent ommit ertifiates Clients annot fabriate ommand histories, as they are signed by replias It is impossible to generate a valid ommit ertifiate that onflits with the order of any stable request Stability is prefi losed! Etra phase is moved to the unommon ase
11 Olly Olly Oen Free! or, faulty lients an t affet liveness Olly Olly Oen Free! or, faulty lients an t affet liveness Faulty lient omits to send CC for Replias ommit histories are unaffeted! Later orret lient who establishes > is stable frees as well Stability is prefi losed Optimizations Bathing Chekpoint protool to garbage ollet histories Optimizations inlude: Replaing digital signatures with MAC Separating agreement from eeution Bathing requests for higher throughput Zyzzyva5: fast despite f failures
12 Bathing Throughput Only one history digest for all requests in the bath-amortizes rypto operations Throughput Paved with good intentions No BFT protool should rely on synhrony for safety FLP: No onsensus protool an be both safe and live in an asynhronous system! All one an guarantee is eventual progress
13 Paved with good intentions No BFT protool should rely on synhrony for safety FLP: No onsensus protool an be both safe and live in an asynhronous system! All one an guarantee is eventual progress Handle normal and worst ase separately as a rule, beause the requirements for the two are quite different: the normal ase must be fast; the worst ase must make some progress -- Butler Lampson, Hints for Computer System Design The Byzantine Empire under Justinian ( AD) Synhronous, no failures Asynhronous Synhronous, with faults! Reasting the problem Reasting the problem Misguided Maimize performane during graious eeutions where Dangerous the network is synhronous all lients and servers behave orretly Futile Misguided it enourages systems that fail to deliver BFT Dangerous Futile
14 Reasting the problem Reasting the problem Misguided it enourages systems that fail to deliver BFT Dangerous it enourages fragile optimizations Futile Misguided it enourages systems that fail to deliver BFT Dangerous it enourages fragile optimizations Futile it yields diminishing return on ommon ase A new approah BFT: From Z To A Build BFT systems around a mai-min priniple: maimize the system s performane during univil eeutions Definition An eeution is univil iff the eeution is synhronous Zyzzyva up to f servers and an arbitrary number of lients are Byzantine all remaining lients and servers are orret
15 BFT: From Z To A Throughput Aardvark Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults Revisiting onventional wisdom Signatures are epensive - use MACs View hanges are to be avoided Revisiting onventional wisdom Signatures are epensive - use MACs Faulty lients an use MACs to generate ambiguity Aardvark requires lients to sign requests View hanges are to be avoided Hardware multiast is a boon Hardware multiast is a boon
16 Revisiting onventional wisdom Signatures are epensive - use MACs Faulty lients an use MACs to generate ambiguity Aardvark requires lients to sign requests View hanges are to be avoided Aardvark uses regular view hanges to maintain high throughput despite faulty primaries Hardware multiast is a boon Revisiting onventional wisdom Signatures are epensive - use MACs Faulty lients an use MACs to generate ambiguity Aardvark requires lients to sign requests View hanges are to be avoided Aardvark uses regular view hanges to maintain high throughput despite faulty primaries Hardware multiast is a boon Aardvark uses separate work queues for lients and individual replias The Long Marh: taking stok BFT is too slow The Long Marh: taking stok BFT is too slow High performane BFT prototypes for both graious and univil eeutions BFT is too repliation intensive BFT is too repliation intensive
17 The Long Marh: taking stok BFT is too slow High performane BFT prototypes for both graious and univil eeutions BFT is too repliation intensive Separate agreement from eeution The Long Marh: taking stok BFT is too slow High performane BFT prototypes for both graious and univil eeutions BFT is too repliation intensive Separate agreement from eeution So why has no one yet built a large sale BFT system? A fork in the road When you ome to a fork in the road, take it Yogi Berra
PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)
PBFT: A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) first to be safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! The Setup Crypto System Model Asynhronous
More informationWhat about asynchronous systems? The Game of Paxos. Quorum Systems. The Game of Paxos
What about asynhronous systems? FLP says onsensus annot be solved... For benign failures, Paos provides net best thing always safe And for Byzantine failures? The Game of Paos Proesses are ompeting to
More informationZyzzyva: Speculative Byzantine Fault Tolerance By Ramakrishna Kotla,* Allen Clement, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin
: Speulative Byzantine Fault Tolerane By Ramakrishna Kotla,* Allen Clement, Edmund Wong, Lorenzo Alvisi, and Mike Dahlin doi:10.1145/1400214.1400236 Abstrat A longstanding vision in distributed systems
More informationZyzzyva. Speculative Byzantine Fault Tolerance. Ramakrishna Kotla. L. Alvisi, M. Dahlin, A. Clement, E. Wong University of Texas at Austin
Zyzzyva Speculative Byzantine Fault Tolerance Ramakrishna Kotla L. Alvisi, M. Dahlin, A. Clement, E. Wong University of Texas at Austin The Goal Transform high-performance service into high-performance
More informationDistributed Algorithms Practical Byzantine Fault Tolerance
Distributed Algorithms Practical Byzantine Fault Tolerance Alberto Montresor University of Trento, Italy 2017/01/06 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationDistributed Algorithms Practical Byzantine Fault Tolerance
Distributed Algorithms Practical Byzantine Fault Tolerance Alberto Montresor Università di Trento 2018/12/06 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
More informationPractical Byzantine Fault
Practical Byzantine Fault Tolerance Practical Byzantine Fault Tolerance Castro and Liskov, OSDI 1999 Nathan Baker, presenting on 23 September 2005 What is a Byzantine fault? Rationale for Byzantine Fault
More informationSpeeding up Consensus by Chasing Fast Decisions
Speeding up Consensus by Chasing Fast Deisions Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran ECE, Virginia Teh, USA {balajia,peluso,robertop,giuliano.losa,binoy}@vt.edu
More informationReducing the Costs of Large-Scale BFT Replication
Reducing the Costs of Large-Scale BFT Replication Marco Serafini & Neeraj Suri TU Darmstadt, Germany Neeraj Suri EU-NSF ICT March 2006 Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de
More informationTolerating Latency in Replicated State Machines through Client Speculation
Tolerating Latency in Replicated State Machines through Client Speculation April 22, 2009 1, James Cowling 2, Edmund B. Nightingale 3, Peter M. Chen 1, Jason Flinn 1, Barbara Liskov 2 University of Michigan
More informationKey-value store with eventual consistency without trusting individual nodes
basementdb Key-value store with eventual consistency without trusting individual nodes https://github.com/spferical/basementdb 1. Abstract basementdb is an eventually-consistent key-value store, composed
More informationData Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)
Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.
More informationConstructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center
Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the
More informationPBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)
PBFT: A Byzantine Renaissance Practical Byzantine Fault-Tolerance (CL99, CL00) first to be safe in asynchronous systems live under weak synchrony assumptions -Byzantine Paxos! The Setup Crypto System Model
More informationCA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1
Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationAS distributed systems develop and grow in size,
1 hbft: Speculative Byzantine Fault Tolerance With Minimum Cost Sisi Duan, Sean Peisert, Senior Member, IEEE, and Karl N. Levitt Abstract We present hbft, a hybrid, Byzantine fault-tolerant, ted state
More informationByzantine Fault Tolerance and Consensus. Adi Seredinschi Distributed Programming Laboratory
Byzantine Fault Tolerance and Consensus Adi Seredinschi Distributed Programming Laboratory 1 (Original) Problem Correct process General goal: Run a distributed algorithm 2 (Original) Problem Correct process
More informationPractical Byzantine Fault Tolerance. Miguel Castro and Barbara Liskov
Practical Byzantine Fault Tolerance Miguel Castro and Barbara Liskov Outline 1. Introduction to Byzantine Fault Tolerance Problem 2. PBFT Algorithm a. Models and overview b. Three-phase protocol c. View-change
More informationAuthenticated Agreement
Chapter 18 Authenticated Agreement Byzantine nodes are able to lie about their inputs as well as received messages. Can we detect certain lies and limit the power of byzantine nodes? Possibly, the authenticity
More informationPractical Byzantine Fault Tolerance (The Byzantine Generals Problem)
Practical Byzantine Fault Tolerance (The Byzantine Generals Problem) Introduction Malicious attacks and software errors that can cause arbitrary behaviors of faulty nodes are increasingly common Previous
More informationZyzzyva: Speculative Byzantine Fault Tolerance
: Speculative Byzantine Fault Tolerance Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong Dept. of Computer Sciences University of Texas at Austin {kotla,lorenzo,dahlin,aclement,elwong}@cs.utexas.edu
More informationFailure models. Byzantine Fault Tolerance. What can go wrong? Paxos is fail-stop tolerant. BFT model. BFT replication 5/25/18
Failure models Byzantine Fault Tolerance Fail-stop: nodes either execute the protocol correctly or just stop Byzantine failures: nodes can behave in any arbitrary way Send illegal messages, try to trick
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationRobust BFT Protocols
Robust BFT Protocols Sonia Ben Mokhtar, LIRIS, CNRS, Lyon Joint work with Pierre Louis Aublin, Grenoble university Vivien Quéma, Grenoble INP 18/10/2013 Who am I? CNRS reseacher, LIRIS lab, DRIM research
More informationEpisode 12: TCP/IP & UbiComp
Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,
More informationResource-efficient Byzantine Fault Tolerance. Tobias Distler, Christian Cachin, and Rüdiger Kapitza
1 Resource-efficient Byzantine Fault Tolerance Tobias Distler, Christian Cachin, and Rüdiger Kapitza Abstract One of the main reasons why Byzantine fault-tolerant (BFT) systems are currently not widely
More informationPublish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Publish/Subsribe Systems on Node and Link Error Prone Mobile Environments Sangyoon Oh,, Sangmi Lee Pallikara, Sunghoon Ko, Jai-Hoon Kim,3, Geoffrey Fox, Community Grids Lab., Indiana University, Bloomington,
More informationMulti-Channel Wireless Networks: Capacity and Protocols
Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:
More informationAnnouncements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core
Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,
More informationByzantine fault tolerance. Jinyang Li With PBFT slides from Liskov
Byzantine fault tolerance Jinyang Li With PBFT slides from Liskov What we ve learnt so far: tolerate fail-stop failures Traditional RSM tolerates benign failures Node crashes Network partitions A RSM w/
More informationAdobe Certified Associate
Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals
More informationPractical Byzantine Fault Tolerance
Practical Byzantine Fault Tolerance Robert Grimm New York University (Partially based on notes by Eric Brewer and David Mazières) The Three Questions What is the problem? What is new or different? What
More informationRun Time Environment. Implementing Object-Oriented Languages
Run Time Environment Implementing Objet-Oriented Languages Copright 2017, Pedro C. Diniz, all rights reserved. Students enrolled in the Compilers lass at the Universit of Southern California have epliit
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationPublish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Publish/Subsribe Systems on Node and Link Error Prone Mobile Environments Sangyoon Oh,, Sangmi Lee Pallikara, Sunghoon Ko, Jai-Hoon Kim,3, and Geoffrey Fox, Community Grids Lab., Indiana University, Bloomington,
More informationByzantine Techniques
November 29, 2005 Reliability and Failure There can be no unity without agreement, and there can be no agreement without conciliation René Maowad Reliability and Failure There can be no unity without agreement,
More informationConsensus in Distributed Systems. Jeff Chase Duke University
Consensus in Distributed Systems Jeff Chase Duke University Consensus P 1 P 1 v 1 d 1 Unreliable multicast P 2 P 3 Consensus algorithm P 2 P 3 v 2 Step 1 Propose. v 3 d 2 Step 2 Decide. d 3 Generalizes
More informationZZ: Cheap Practical BFT using Virtualization
University of Massachusetts, Technical Report TR14-08 1 ZZ: Cheap Practical BFT using Virtualization Timothy Wood, Rahul Singh, Arun Venkataramani, and Prashant Shenoy Department of Computer Science, University
More informationThe challenges of non-stable predicates. The challenges of non-stable predicates. The challenges of non-stable predicates
The challenges of non-stable predicates Consider a non-stable predicate Φ encoding, say, a safety property. We want to determine whether Φ holds for our program. The challenges of non-stable predicates
More informationAuthenticated Byzantine Fault Tolerance Without Public-Key Cryptography
Appears as Technical Memo MIT/LCS/TM-589, MIT Laboratory for Computer Science, June 999 Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography Miguel Castro and Barbara Liskov Laboratory
More informationUpRight Cluster Services
UpRight Cluster Services Allen Clement, Manos Kapritsos, Sangmin Lee, Yang Wang, Lorenzo Alvisi, Mike Dahlin, Taylor Riché Department of Computer Sciences The University of Texas at Austin Austin, Texas,
More informationDepartment of Electrical and Computer Engineering University of Wisconsin Madison. Fall
Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due
More informationarxiv: v2 [cs.dc] 12 Sep 2017
Efficient Synchronous Byzantine Consensus Ittai Abraham 1, Srinivas Devadas 2, Danny Dolev 3, Kartik Nayak 4, and Ling Ren 2 arxiv:1704.02397v2 [cs.dc] 12 Sep 2017 1 VMware Research iabraham@vmware.com
More informationZZ and the Art of Practical BFT
University of Massachusetts, Technical Report 29-24 ZZ and the Art of Practical BFT Timothy Wood, Rahul Singh, Arun Venkataramani, Prashant Shenoy, and Emmanuel Cecchet Department of Computer Science,
More informationDiscovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013 289 Disovery and Verifiation of Neighbor Positions in Mobile Ad Ho Networks Maro Fiore, Member, IEEE, Claudio Ettore Casetti, Member,
More informationIMPORTANT INFORMATION FOR MEDIA REGARDING THE 2017 DENI UTE MUSTER Friday 29 and Saturday 30 September 2017
IMPORTANT INFORMATION FOR MEDIA REGARDING THE 2017 DENI UTE MUSTER Friday 29 and Saturday 30 September 2017 PLEASE READ CAREFULLY Media applying for areditation to over the 2017 DENI UTE MUSTER MUST be
More informationCA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2
CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For
More informationWORKSHOP 20 CREATING PCL FUNCTIONS
WORKSHOP 20 CREATING PCL FUNCTIONS WS20-1 WS20-2 Problem Desription This exerise involves reating two PCL funtions that an be used to easily hange the view of a model. The PCL funtions are reated by reording
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationCA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1
Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationCluster-based Cooperative Communication with Network Coding in Wireless Networks
Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu
More informationCA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1
Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationCA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0
Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationCA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0
Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationZZ and the Art of Practical BFT Execution
To appear in EuroSys 2 and the Art of Practical BFT Execution Timothy Wood, Rahul Singh, Arun Venkataramani, Prashant Shenoy, And Emmanuel Cecchet Department of Computer Science, University of Massachusetts
More informationRecursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3
Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))
More informationPractical Byzantine Fault Tolerance and Proactive Recovery
Practical Byzantine Fault Tolerance and Proactive Recovery MIGUEL CASTRO Microsoft Research and BARBARA LISKOV MIT Laboratory for Computer Science Our growing reliance on online services accessible on
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationCA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0
Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationSecurity (and finale) Dan Ports, CSEP 552
Security (and finale) Dan Ports, CSEP 552 Today Security: what if parts of your distributed system are malicious? BFT: state machine replication Bitcoin: peer-to-peer currency Course wrap-up Security Too
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationA Lightweight Intrusion-Tolerant Overlay Network
A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationZZ and the Art of Practical BFT Execution
Extended Technical Report for EuroSys 2 Paper and the Art of Practical BFT Execution Timothy Wood, Rahul Singh, Arun Venkataramani, Prashant Shenoy, And Emmanuel Cecchet Department of Computer Science,
More informationByzID: Byzantine Fault Tolerance from Intrusion Detection
: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan UC Davis sduan@ucdavis.edu Karl Levitt UC Davis levitt@ucdavis.edu Hein Meling University of Stavanger, Norway hein.meling@uis.no Sean Peisert
More informationSimultaneous image orientation in GRASS
Simultaneous image orientation in GRASS Alessandro BERGAMINI, Alfonso VITTI, Paolo ATELLI Dipartimento di Ingegneria Civile e Ambientale, Università degli Studi di Trento, via Mesiano 77, 38 Trento, tel.
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationCA PPM 15.x Proven Implementation Professional Exam (CAT-223) Study Guide Version 1.3
CA PPM 15.x Proven Implementation Professional Exam (CAT-223) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For
More informationTHROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC
THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University
More informationG Distributed Systems: Fall Quiz II
Computer Science Department New York University G22.3033-006 Distributed Systems: Fall 2008 Quiz II All problems are open-ended questions. In order to receive credit you must answer the question as precisely
More informationIntra- and Inter-Stream Synchronisation for Stored Multimedia Streams
IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner
More informationIntroduction to Distributed Systems Seif Haridi
Introduction to Distributed Systems Seif Haridi haridi@kth.se What is a distributed system? A set of nodes, connected by a network, which appear to its users as a single coherent system p1 p2. pn send
More informationIntroductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test
Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/
More informationCA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5
Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationThe objective. Atomic Commit. The setup. Model. Preserve data consistency for distributed transactions in the presence of failures
The objective Atomic Commit Preserve data consistency for distributed transactions in the presence of failures Model The setup For each distributed transaction T: one coordinator a set of participants
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationC 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)
SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat
More informationAccelerating Multiprocessor Simulation with a Memory Timestamp Record
Aelerating Multiproessor Simulation with a Memory Timestamp Reord Kenneth Barr Heidi Pan Mihael Zhang Krste Asanovi Marh, 5 Massahusetts Institute of Tehnology Intelligent sampling gives est speed-auray
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationA Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing
A Novel Timestamp Ordering Approah for Co-existing Traditional and Cooperative Transation Proessing Author Sun, Chengzheng, Zhang, Y., Kambayashi, Y., Yang, Y. Published 1998 Conferene Title Proeedings
More informationDepartment of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Test I Solutions
Department of Eletrial Engineering and Computer iene MAACHUETT INTITUTE OF TECHNOLOGY 6.035 Fall 2016 Test I olutions 1 I Regular Expressions and Finite-tate Automata For Questions 1, 2, and 3, let the
More informationCS 138: Practical Byzantine Consensus. CS 138 XX 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
CS 138: Practical Byzantine Consensus CS 138 XX 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Scenario Asynchronous system Signed messages s are state machines It has to be practical CS 138
More information- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.
- 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?
More informationTriangles. Learning Objectives. Pre-Activity
Setion 3.2 Pre-tivity Preparation Triangles Geena needs to make sure that the dek she is building is perfetly square to the brae holding the dek in plae. How an she use geometry to ensure that the boards
More informationRuntime Support for OOLs Part II Comp 412
COMP 412 FALL 2017 Runtime Support for OOLs Part II Comp 412 soure IR Front End Optimizer Bak End IR target Copright 2017, Keith D. Cooper & Linda Torzon, all rights reserved. Students enrolled in Comp
More informationCA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1
Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationDistributed Algorithms (PhD course) Consensus SARDAR MUHAMMAD SULAMAN
Distributed Algorithms (PhD course) Consensus SARDAR MUHAMMAD SULAMAN Consensus (Recapitulation) A consensus abstraction is specified in terms of two events: 1. Propose ( propose v )» Each process has
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationParallel Data Types of Parallelism Replication (Multiple copies of the same data) Better throughput for read-only computations Data safety Partitionin
Parallel Data Types of Parallelism Replication (Multiple copies of the same data) Better throughput for read-only computations Data safety Partitioning (Different data at different sites More space Better
More informationTo do. Consensus and related problems. q Failure. q Raft
Consensus and related problems To do q Failure q Consensus and related problems q Raft Consensus We have seen protocols tailored for individual types of consensus/agreements Which process can enter the
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationViewstamped Replication to Practical Byzantine Fault Tolerance. Pradipta De
Viewstamped Replication to Practical Byzantine Fault Tolerance Pradipta De pradipta.de@sunykorea.ac.kr ViewStamped Replication: Basics What does VR solve? VR supports replicated service Abstraction is
More informationZZ and the Art of Practical BFT Execution
and the Art of Practical BFT Execution Timothy Wood, Rahul Singh, Arun Venkataramani, Prashant Shenoy, and Emmanuel Cecchet University of Massachusetts Amherst {twood,rahul,arun,shenoy,cecchet}@cs.umass.edu
More information