7th IEEE International Conference on Computer and Information Technology (CIT 2007) 2007
DOI: 10.1109/cit.2007.86
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Method for Leader Election Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Such that the set N= {1, 2, 3, …, n-1, n} where N [1] is the node with ID=1 and N [2] is the node with ID=2, and so on. This ID could either represent the node's network address (this is applicable in cases where all nodes are exactly the same with no distinguishing characteristics), or the ID could represent the capacity of nodes (this is applicable in unreliable environments such ad hoc networks, where nodes are varying in their capacities, and the node with higher capacity will be assigned a higher ID).…”
Section: Algorithm Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such that the set N= {1, 2, 3, …, n-1, n} where N [1] is the node with ID=1 and N [2] is the node with ID=2, and so on. This ID could either represent the node's network address (this is applicable in cases where all nodes are exactly the same with no distinguishing characteristics), or the ID could represent the capacity of nodes (this is applicable in unreliable environments such ad hoc networks, where nodes are varying in their capacities, and the node with higher capacity will be assigned a higher ID).…”
Section: Algorithm Assumptionsmentioning
confidence: 99%
“…Examples of these nodes are file servers, time servers and central lock coordinators. These servers are called leaders [2]. Algorithms through which leaders are elected called: leader election algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, (10) calculates Election process Consuming Time ( 1 ). However, (7) and (10) will be changed to (11) and (14) respectively when all coordinator alternatives are already crashed but coordinator itself is still up.…”
Section: Fceabr Time Complexity Analyzingmentioning
confidence: 99%
“…The first one is based on Bully algorithm and passes fewer messages than [10] which will be proved by simulation. Mirakhorli [11] proposed an algorithm by considering k candidate for coordinating in order to prevent new global election. When a typical process such as N finds a coordinator crashed, it'll send Crash-Leader message to candide1.…”
Section: Related Workmentioning
confidence: 99%
“…This particular process is referred to as the leader. In distributed systems, a leader is responsible to act as an initiator and a coordinator and to handle a specific job such as directory server, token regenerator and central lock coordinator [3] The process of selecting and assigning a unique leader in a distributed system is known as leader election problem. In the literature, several leader election algorithms have been proposed for classical distributed systems [4], [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%