Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Hayden is active.

Publication


Featured researches published by Mark Hayden.


ACM Transactions on Computer Systems | 1999

Bimodal multicast

Kenneth P. Birman; Mark Hayden; Oznur Ozkasap; Zhen Xiao; Mihai Budiu; Yaron Minsky

There are many methods for making a multicast protocol “reliable.” At one end of the spectrum, a reliable multicast protocol might offer tomicity guarantees, such as all-or-nothing delivery, delivery ordering, and perhaps additional properties such as virtually synchronous addressing. At the other are protocols that use local repair to overcome transient packet loss in the network, offering “best effort” reliability. Yet none of this prior work has treated stability of multicast delivery as a basic reliability property, such as might be needed in an internet radio, television, or conferencing application. This article looks at reliability with a new goal: development of a multicast protocol which is reliable in a sense that can be rigorously quantified and includes throughput stability guarantees. We characterize this new protocol as a “bimodal multicast” in reference to its reliability model, which corresponds to a family of bimodal probability distributions. Here, we introduce the protocol, provide a theoretical analysis of its behavior, review experimental results, and discuss some candidate applications. These confirm that bimodal multicast is reliable, scalable, and that the protocol provides remarkably stable delivery throughput.


Middleware '98 Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing | 2009

A gossip-style failure detection service

Robbert van Renesse; Yaron Minsky; Mark Hayden

Failure Detection is valuable for system management, replication, load balancing, and other distributed services. To date, Failure Detection Services scale badly in the number of members that are being monitored. This paper describes a new protocol based on gossiping that does scale well and provides timely detection. We analyze the protocol, and then extend it to discover and leverage the underlying network topology for much improved resource utilization. We then combine it with another protocol, based on broadcast, that is used to handle partition failures.


Software - Practice and Experience | 1997

Building adaptive systems using ensemble

Robbert van Renesse; Kenneth P. Birman; Mark Hayden; Alexey Vaysburd; David A. Karr

Trends in networking and distributed computing are creating a new generation of applications that must adapt as the environment within which they execute changes. Examples of adaptation include switching protocols to overcome a security exposure or failure mode seen only in certain settings, changing data rates to accommodate a slow link, or adapting the behavior of a high level application to match the set of participants using the application. We describe the Ensemble system, a tool for building adaptive distributed programs.


principles of distributed computing | 1995

A framework for protocol composition in Horus

Robbert van Renesse; Kenneth P. Birman; Roy Friedman; Mark Hayden; David A. Karr

The Horus system supports a communication architecture that treats protocols as instances of an abstract data type. This approach encourages developers to partition complex protocols into simple microprotocols, each of which is implemented by a protocol layer. Protocol layers can be stacked on top of each other in a variety of ways, at run-time. First, we describe the classes of protocols that can be supported this way. Next, we present the Horus object model that we designed for this technology, and the interface between the layers that makes it all work. We then present an example layer that implements a group membership protocol. Next, we show how, given a set of required properties, an appropriate stack can be constructed. We look at an example stack of protocols, which provides fault-tolerant, totally ordered communication between a group of processes. The work contributes a standard framework for protocol development and experimentation, provides a high performance implementation of the virtual synchrony model, and introduces a methodology for increasing the robustness of the protocol development process.


darpa information survivability conference and exposition | 2000

The Horus and Ensemble projects: accomplishments and limitations

Kenneth P. Birman; B. Constable; Mark Hayden; Jason Hickey; Christoph Kreitz; R. van Renesse; Ohad Rodeh; Werner Vogels

The Horus and Ensemble efforts culminated a multi-year Cornell research program in process group communication used for fault-tolerance, security and adaptation. Our intent was to understand the degree to which a single system could offer flexibility and yet maintain high performance, to explore the integration of fault tolerance with security and real-time mechanisms, and to increase trustworthiness of our solutions by applying formal methods. Here, we summarize the accomplishments of the effort and evaluate the successes and failures of the approach.


conference on automated deduction | 1998

A Proof Environment for the Development of Group Communication Systems

Christoph Kreitz; Mark Hayden; Jason Hickey

We present a theorem proving environment for the development of reliable and efficient group communication systems. Our approach makes methods of automated deduction applicable to the implementation of real-world systems by linking the Ensemble group communication toolkit to the NuPRL proof development system.


high performance distributed computing | 1997

Optimizing layered communication protocols

Mark Hayden; R. van Renesse

Layering of communication protocols offers many well-known advantages but typically leads to performance inefficiencies. We present a model for layering, and point out where the performance problems occur in stacks of layers using this model. We then investigate the common execution paths in these stacks and how to identify them. These paths are optimized using three techniques: optimizing the computation, compressing protocol headers, and delaying processing. All of the optimizations can be automated in a compiler with the help of minor annotations by the protocol designer. We describe the performance that we obtain after implementing the optimizations by hand on a full-scale system.


IFIP | 1996

A Gossip-Style Failure Detection Service

Robbert van Renesse; Yaron Minsky; Mark Hayden


symposium on operating systems principles | 1999

Building reliable, high-performance communication systems from components

Xiaoming Liu; Christoph Kreitz; Robbert van Renesse; Jason Hickey; Mark Hayden; Kenneth P. Birman; Robert L. Constable


Archive | 1998

Method and system for masking the overhead of protocol layering

Robbert van Renesse; Mark Hayden

Collaboration


Dive into the Mark Hayden's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jason Hickey

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy Friedman

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ohad Rodeh

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge