Kommunikation in Verteilten Systemen (KiVS)
DOI: 10.1007/978-3-540-69962-0_4
|View full text |Cite
|
Sign up to set email alerts
|

On Improving the Performance of Reliable Server Pooling Systems for Distance-Sensitive Distributed Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…First results of our PlanetLabbased evaluations and performance optimizations can be found in [3,10]. Furthermore, we are actively promoting the IETF standardization process of RSerPool: the LUD policy is now part of the Internet Draft defining the pool policies [23].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…First results of our PlanetLabbased evaluations and performance optimizations can be found in [3,10]. Furthermore, we are actively promoting the IETF standardization process of RSerPool: the LUD policy is now part of the Internet Draft defining the pool policies [23].…”
Section: Discussionmentioning
confidence: 99%
“…While the general recommendation on cache configuration is to turn it off [7], it gets useful in scenarios having a significant network delay (which is realistic for critical services being distributed globally [10]) and short requests. In such situations, the cache can avoid time-consuming PR queries.…”
Section: Using the Handle Resolution Cachementioning
confidence: 99%
See 1 more Smart Citation
“…embedded systems like telecommunications equipment or routers). Nevertheless, PEs may be distributed globally for their service to survive localized disasters [15].…”
Section: Components and Protocolsmentioning
confidence: 99%
“…Instead, the most probable attack scenario is an attacker being able to compromise a PE or PU. These components are significantly more numerous [10] and may be distributed over multiple, less controllable locations [15]. For that reason, ASAP-based attacks are in the focus of our study.…”
Section: Introductionmentioning
confidence: 99%