نتایج جستجو برای: backup nodes

تعداد نتایج: 136625  

Journal: :Computer Networks 2009
Mohand Yazid Saidi Bernard Cousin Jean-Louis Le Roux

To cope quickly with all types of failure risks (link, node and Shared Risk Link Group (SRLG)), each router detecting a failure on an outgoing interface activates locally all the backup paths protecting the primary paths which traverse the failed interface. With the observation that upon a SRLG failure, some active backup paths are inoperative and do not really participate to the recovery (sinc...

2009
Hiroaki Sandoh Hajime Kawai

A word processor has become one of essential devices used in offices. Document files created by using a word processor are generally preserved on a floppy disk 01' floppy disks for referencE's. Nevertheless, the files stored on a floppy disk art' occasionally lost due to human errors. the life of the floppy disk and a failure of hardware devices, which comprise the word processor. This is callp...

Journal: :CoRR 2015
Sebastian M. Krause Michael M. Danziger Vinko Zlatic

Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A “backup” path is not sufficient if both paths depend on nodes which share a vulnerability. For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their c...

Journal: :Procedia Computer Science 2017

Journal: :Molecular Therapy 2003

2003
Jing Wu Michel Savoie Delfin Y. Montuno H. T. Mouftah

The Label Distribution Protocol (LDP) needs to recover its state information after a control plane failure, so that the established connections in the data plane are not disrupted by any new connection set-up. We propose a backup mechanism to store the LDP state information in an upstream neighbour node. The backup LDP state information is synchronized with the original LDP state information in...

Journal: :SSRG international journal of electrical and electronics engineering 2022

The two biggest problems with wireless sensor networks are security and energy usage. In sensing devices, malicious nodes could be found in large numbers. researchers have proposed several methods to find these rogue nodes. To prevent assaults on data transmission, the must secured. Data aggregation aids reducing number of messages transmitted within network, which turn lowers total network con...

2012
Yinjin Fu Hong Jiang Nong Xiao

Cluster deduplication has become a widely deployed technology in data protection services for Big Data to satisfy the requirements of service level agreement (SLA). However, it remains a great challenge for cluster deduplication to strike a sensible tradeoff between the conflicting goals of scalable deduplication throughput and high duplicate elimination ratio in cluster systems with low-end in...

2004
Wei-Bin Gao Shi-Chung Chang

Automat i c and rapid network service restoration (self-healing) w h e n failures occur i s of increasing importance f o r network operations and managemen t as network speed and bandwidth increase. In th is paper, we s tudy the self-healing problem of a n ATM network at the virtual pa th (VP) configuration level. W e analyze the design issues o f self-healing algorithms, and develop a state t ...

Journal: :J. Parallel Distrib. Comput. 2009
Xubin He Li Ou Christian Engelmann Xin Chen Stephen L. Scott

High availability data storage systems are critical for many applications as research and business become more data driven. Since metadata management is essential to system availability, multiple metadata services are used to improve the availability of distributed storage systems. Past research has focused on the active/standby model, where each active service has at least one redundant idle b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید