Skip to main content

Asymmetric Blind Rendezvous Algorithms

  • Chapter
  • First Online:
Book cover Rendezvous in Distributed Systems
  • 702 Accesses

Abstract

In this chapter, we present asymmetric algorithms for the blind rendezvous problem. In the settings, we fix Alg as:

(6.1)

where \(Time \in \{Syn, Asyn\}\), \(Port \in \{Port-S, Port-AS\}\), and \(ID \in \{Non-Anon, Anon\}\). Although there are eight different rendezvous settings when Alg is fixed as asymmetric and Label fixed as non-oblivious, in designing asymmetric algorithms, users’ ID do not matter much. This is because the users’ IDs are typically used to break symmetry in distributed computing, but we already assume the users can be distinguishable and they execute different algorithms. Therefore, we present how to design efficient algorithms for the four rendezvous settings (synchronous and port-symmetric, asynchronous and port-symmetric, synchronous and port-asymmetric, asynchronous and port-asymmetric), no matter the choice of ID from \(\{Non-Anon, Anon\}\). In Sect. 6.1, we present two different types of rendezvous algorithms for the synchronous and port-symmetric rendezvous setting, and these algorithms are extended for the asynchronous and port-symmetric rendezvous setting in Sect. 6.2. In Sects. 6.3 and 6.4, we introduce efficient algorithms for the synchronous, port-asymmetric and asynchronous, port-asymmetric rendezvous settings. Finally, we summarize the chapter in Sect. 6.5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bian, K., Park, J.-M., & Chen, R. (2009). A quorum-based framework for establishing control channels in dynamic spectrum access networks. In Mobicom.

    Google Scholar 

  2. Bian, K., Park, J.-M., & Chen, R. (2011). Control channel establishment in cognitive radio networks using channel hopping. IEEE Journal on Selected Areas in Communications, 29(4), 689–703.

    Article  Google Scholar 

  3. Bian, K., & Park, J.-M. (2013). Maximizing Rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks. IEEE Transactions on Mobile Computing, 12(7), 1294–1307.

    Article  Google Scholar 

  4. Luk, W. S., & Wong, T. T. (1997). Two new quorum based algorithms for distributed mutual exclusion. In ICDCS.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoquan Gu .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Gu, Z., Wang, Y., Hua, QS., Lau, F.C.M. (2017). Asymmetric Blind Rendezvous Algorithms. In: Rendezvous in Distributed Systems. Springer, Singapore. https://doi.org/10.1007/978-981-10-3680-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3680-4_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3679-8

  • Online ISBN: 978-981-10-3680-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics