نتایج جستجو برای: backup nodes
تعداد نتایج: 136625 فیلتر نتایج به سال:
To cope quickly with all types of failure risks (link, node and Shared Risk Link Group (SRLG)), each router detecting a failure on an outgoing interface activates locally all the backup paths protecting the primary paths which traverse the failed interface. With the observation that upon a SRLG failure, some active backup paths are inoperative and do not really participate to the recovery (sinc...
A word processor has become one of essential devices used in offices. Document files created by using a word processor are generally preserved on a floppy disk 01' floppy disks for referencE's. Nevertheless, the files stored on a floppy disk art' occasionally lost due to human errors. the life of the floppy disk and a failure of hardware devices, which comprise the word processor. This is callp...
Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A “backup” path is not sufficient if both paths depend on nodes which share a vulnerability. For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their c...
The Label Distribution Protocol (LDP) needs to recover its state information after a control plane failure, so that the established connections in the data plane are not disrupted by any new connection set-up. We propose a backup mechanism to store the LDP state information in an upstream neighbour node. The backup LDP state information is synchronized with the original LDP state information in...
The two biggest problems with wireless sensor networks are security and energy usage. In sensing devices, malicious nodes could be found in large numbers. researchers have proposed several methods to find these rogue nodes. To prevent assaults on data transmission, the must secured. Data aggregation aids reducing number of messages transmitted within network, which turn lowers total network con...
Cluster deduplication has become a widely deployed technology in data protection services for Big Data to satisfy the requirements of service level agreement (SLA). However, it remains a great challenge for cluster deduplication to strike a sensible tradeoff between the conflicting goals of scalable deduplication throughput and high duplicate elimination ratio in cluster systems with low-end in...
Automat i c and rapid network service restoration (self-healing) w h e n failures occur i s of increasing importance f o r network operations and managemen t as network speed and bandwidth increase. In th is paper, we s tudy the self-healing problem of a n ATM network at the virtual pa th (VP) configuration level. W e analyze the design issues o f self-healing algorithms, and develop a state t ...
High availability data storage systems are critical for many applications as research and business become more data driven. Since metadata management is essential to system availability, multiple metadata services are used to improve the availability of distributed storage systems. Past research has focused on the active/standby model, where each active service has at least one redundant idle b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید