Internetworking with TCP/IP: principles, protocols, and architecture
Internetworking with TCP/IP: principles, protocols, and architecture
Pitfalls in the design of distributed routing algorithms
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Communications of the ACM
An algorithm for distributed computation of a spanningtree in an extended LAN
SIGCOMM '85 Proceedings of the ninth symposium on Data communications
Introduction To Automata Theory, Languages, And Computation
Introduction To Automata Theory, Languages, And Computation
Vulnerabilities of network control protocols: an example
ACM SIGCOMM Computer Communication Review
Computer - Special issue on computer-based medical systems
Combatting maelstroms in networks of communicating agents
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Security Issues in Mobile Code Systems
Mobile Agents and Security
Hi-index | 4.10 |
A set of situations that are susceptible to network disasters is identified. Several examples of actual breakdowns are presented. Although they occurred in different types of networks, they have grant similarities. Several examples of potential breakdowns that can result from very subtle design failures are also given. The discussion supports the belief that distributed programs in general can have very subtle design failures that are hard to detect. However, it is shown that although it is theoretically impossible to prevent the berserk loops of messages that can bring down an entire computer network, a carefully applied set of rules will minimize these disasters.