【摘 要】
:
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle th
【机 构】
:
Beijing Jiaotong University, Beijing 100044, China;National Secrecy Science and Technology Evaluatio
论文部分内容阅读
Paxos is a well-known distributed algorithm that provides strong consistency.However,the original Paxos has several shortcomings,including those of slow elections,redundant communications and excessive traffic of the coordinator node.In order to tackle the above deficiencies,the design of advanced edition of Paxos (Adv Paxos)was proposed,which is a new distributed consensus algorithm that is derived from Basic Paxos.This paper analyzes the behavior of each character of the original algorithm during each of its phases.By optimizing the behavior of the proposer and acceptor,a series of behavioral optimization measures was proposed,which included distance related waiting mechanisms,optimization of the number of proposals,self-learning and a reduction in broadcast communications.Through theoretical analysis and experimentation,it is demonstrated that the new algorithm has a lower probability of livelock without a reduction in reliability,faster agreement reaching speeds,lower communication costs among server clusters and higher percentage of successful proposals.
其他文献
Cloud computing makes it possible for users to share computing power.The framework of multiple data centers gains a greater popularity in modern cloud computing.Due to the uncertainty of the requests from users,the loads of center processing unit (CPU) of
For complex networks,their effectiveness and invulnerability are extremely important.With the development of complex networks,how to evaluate the effectiveness and invulnerability of these networks becomes an important research topic.The relationship amon
Human activity recognition (HAR) for dense prediction is proven to be of good performance,but it relies on labeling every point in time series with the high cost.In addition,the performance of HAR model will show significant degradation when tested on the
With the development and application of information technology,the problem of personal privacy leakage is becoming more and more serious.Most attribute-based broadcast encryption (ABBE) schemes focus on data security,while ignoring the protection of the p
Aiming at the coexistence of cellular network and wireless fidelity (WiFi) network,a coalitional game-based WiFi offloading algorithm in heterogeneous networks is proposed.Firstly,this paper defines the user fairness utility function that comprehensively
To reduce fetching cost from a remote source,it is natural to cache information near the users who may access the information later.However,with development of 5G ultra-dense cellular networks andmobile edge computing (MEC),a reasonable selection among ed
With the advantages of low cost and high mobility,unmanned aerial vehicles (UAVs) have played an important role in wireless communication.We investigate a UAV-enabled mobile relaying system,where a UAV is used as a mobile relay to assist in the communicat
Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information,and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS.Recently,it is discovered that an AQS protocol based on
Low earth orbit (LEO) satellite network provides global coverage and supports a wide range of services.However,due to the rapid changes and energy-limitation of satellites,how to meet the demand of the quality of service (QoS) from ground traffic and prol
Recently,physical layer security in wireless communication system attracts much attention,and the reconciliation protocol plays an important role in the final secure key distillation,since the secret keys extracted from the realistic characteristics of th