Using virtual links for reliable information retrieval across point-to-point networks

The problem of establishing reliable communication across point-to-point networks is addressed. Several protocols are given, using node-disjoint paths to implement a set of independent virtual links (u-links) between each node pair. The u-links can be used to establish communication between the node pair provided the number and type of failures in the network are limited. Failed devices are classified by whether they are benign (delay and omission faults) or are malicious (not benign). The use of u-links is demonstrated with a protocol for remote information retrieval. With b benign and m malicious faults, retrieval can always be achieved if the graph connectivity exceeds b+2 m. This bound is tight. The authors give a flexible retrieval protocol; it analyzes the responses received thus far, and computes a minimum and maximum number of u-links to send (additional) retrieval requests. Maximal requests guarantee completion of the protocol upon their timeout. With minimal requests, protocol completion is barely possible with no further requests. u-links are extended so that they bounce requests when there is no response, which strengthens the retrieval protocol.

[1]  Yechiam Yemini,et al.  Controlling window protocols for time-constrained communication in multiple access networks , 1988, IEEE Trans. Commun..

[2]  John P. Hayes,et al.  A Graph Model for Fault-Tolerant Computing Systems , 1976, IEEE Transactions on Computers.

[3]  William McCuaig,et al.  A simple proof of Menger's theorem , 1984, J. Graph Theory.

[4]  Kang G. Shin,et al.  A multiple copy approach for delivering messages under deadline constraints , 1991, [1991] Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium.

[5]  Hector Garcia-Molina,et al.  Aggressive Transmissions of Short Messages Over Redundant Paths , 1994, IEEE Trans. Parallel Distributed Syst..

[6]  Dhiraj K. Pradhan,et al.  Flip-Trees: Fault-Tolerant Graphs with Wide Containers , 1988, IEEE Trans. Computers.

[7]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[8]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[9]  Dhiraj K. Pradhan,et al.  Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..

[10]  Ariel Orda,et al.  Routing with packet duplication and elimination in computer networks , 1988, IEEE Trans. Commun..

[11]  Yechiam Yemini,et al.  Multiple-access protocols and time-constrained communication , 1984, CSUR.