File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Agressive transmissions over redundant paths
Title | Agressive transmissions over redundant paths |
---|---|
Authors | |
Issue Date | 1991 |
Citation | Proceedings - International Conference On Distributed Computing Systems, 1991, p. 198-207 How to Cite? |
Abstract | Fault-tolerant computer systems have redundant paths connecting their components. Given these paths, it is possible to use aggressive techniques to reduce the average value and variability of the response time for critical messages. One technique is to send a copy of a packet over an alternate path before it is known if the first copy failed or was delayed. A second technique is to split a single stream of packets over multiple paths. The authors analyze both approaches and show that these techniques can provide significant improvements over conventional, conservative mechanisms. |
Persistent Identifier | http://hdl.handle.net/10722/151792 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | GarciaMolina, Hector | en_US |
dc.contributor.author | Kao, Ben | en_US |
dc.contributor.author | Barbara, Daniel | en_US |
dc.date.accessioned | 2012-06-26T06:29:34Z | - |
dc.date.available | 2012-06-26T06:29:34Z | - |
dc.date.issued | 1991 | en_US |
dc.identifier.citation | Proceedings - International Conference On Distributed Computing Systems, 1991, p. 198-207 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/151792 | - |
dc.description.abstract | Fault-tolerant computer systems have redundant paths connecting their components. Given these paths, it is possible to use aggressive techniques to reduce the average value and variability of the response time for critical messages. One technique is to send a copy of a packet over an alternate path before it is known if the first copy failed or was delayed. A second technique is to split a single stream of packets over multiple paths. The authors analyze both approaches and show that these techniques can provide significant improvements over conventional, conservative mechanisms. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Proceedings - International Conference on Distributed Computing Systems | en_US |
dc.title | Agressive transmissions over redundant paths | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Kao, Ben:kao@cs.hku.hk | en_US |
dc.identifier.authority | Kao, Ben=rp00123 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.scopus | eid_2-s2.0-0026159045 | en_US |
dc.identifier.spage | 198 | en_US |
dc.identifier.epage | 207 | en_US |
dc.identifier.scopusauthorid | GarciaMolina, Hector=7005594983 | en_US |
dc.identifier.scopusauthorid | Kao, Ben=35221592600 | en_US |
dc.identifier.scopusauthorid | Barbara, Daniel=7004629198 | en_US |