35,632 research outputs found

    Dynamic sharing of a multiple access channel

    Get PDF
    In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes perform a concurrent program which occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource in such a way that in any time there is at most one process accessing it. We consider both the classic and a slightly weaker version of mutual exclusion, called ep-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most ep. We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while ep-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker ep-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed

    Logical rings in the mutual exclusion problem of distributed memory systems

    Full text link
    In this thesis, we investigate distributed mutual exclusion algorithms and delineate the features of a new distributed mutual exclusion algorithm. The basis of the algorithm is the logical ring structure employed in token-based mutual exclusion algorithms. Specifically, there exists dynamic properties of the logical ring that, given certain restrictions regarding message traffic flow, passively give useful information about the location of the token. Effectively, the algorithm demonstrates a type of intelligent routing that identifies useful shortcuts to in the routing of the token. The result is a reduction in the total number of messages exchanged prior to the execution of the critical section as compared to the algorithm proposed by Fu and Tzeng (7). Furthermore, the algorithm allows for an increased degree of fairness in a lightly loaded system than that allowed by Fu and Tzeng\u27s algorithm

    An O(n1/3) algorithm for distributed mutual exclusion

    Get PDF
    In this paper, a distributed algorithm is proposed that realizes mutual exclusion among n nodes in a computer network. No common or global memory is shared by the nodes and there is no global controller. The nodes of the network communicate among themselves by exchanging messages only. The best-known algorithms so far, for the distributed mutual exclusion problem, require O(√n) messages per mutual exclusion invocation. The proposed algorithm is the first to cross this O(√n) barrier and the message complexity achieved by our algorithm is O(n1/3) per mutual exclusion. © 1998 Elsevier Science B.V. All rights reserved

    Quorum Based Conflict Resolution Algorithms In Distributed Systems

    Get PDF
    Mutual exclusion is one of the most fundamental issues in the study of distributed systems. The problem arises when two or more processes are competing to use a mutual exclusive resource concurrently, i.e., the resource can only be used by at most one process at a time. Synchronizations adopting quorum systems are an important class of distributed algorithms since they are gracefully and significantly tolerate process and communication failures that may lead to network partitioning. Coterie based algorithm is a typical quorum based algorithm for mutual exclusion: A process can use the resource  only if it obtains permissions from all processes in any quorum ofcoterie, and since each quorum intersects with each other and each process only issues one permission, the mutual exclusion can be guaranteed. Many quorum systems have been defined based on the relaxation of the properties of coterie system. Each of them is designed to resolve its corresponding problem, e.g., k-coterie based algorithm to resolve the k-mutual exclusion, local coterie for the generalized mutual exclusion, (h, k)-arbiter for h-out of-k resource allocation problem, etc. Therefore, design an algorithm for any distributed conflict resolution problem is only meant to define a new quorum system which can be implemented to the corresponding problem. Since most of distributed conflict resolution problems are designed based on the relaxation of the safety property of mutual exclusion, understanding the way to relaxing the safety property and its quorum system is important to study any kind of conflict resolution problem in distributed systems

    Distributed stabilizing data structures

    Full text link
    Distributed algorithms aim to achieve better performance than sequential algorithms in terms of time complexity (or asymptotic time complexity) while keeping or lowering the memory requirement (space complexity) in a node. (In sequential algorithms, the memory requirement is the memory requirement of the algorithm itself.); Self-stabilizing distributed algorithms aim to achieve a comparable performance to non-stabilizing distributed algorithms when transient faults or arbitrary initialization cause the system to enter a state where a non-stabilizing algorithm cannot continue to properly perform its task; Transient faults can affect an existing data structure and alter its data content. As a result, the data structure may lose its properties, and the operations defined over the data structure will have unpredictable and undesirable results, making the data structure unusable; We present several self or snap-stabilizing algorithms for particular data structures; We propose an optimal self-stabilizing distributed algorithm for simultaneously activating non-adjacent processes on an oriented chain (Algorithm SSDS ). We use Algorithm SSDS to accomplish two tasks: local mutual exclusion and line sorting. We propose two uniform, self-stabilizing, deterministic protocols on oriented chains: a time and space optimal solution to the local mutual exclusion problem (Algorithm LMEC ), and a space and (asymptotic) time optimal solution to the distributed sorting problem (Algorithm SORTc ); We extend Algorithm SSDS to an asynchronous oriented ring with a distinguished node with some minor modifications, and we obtain general self-stabilization for simultaneously activated non-adjacent processes in an oriented ring with a distinguished process (Algorithm SSDSR ). We use Algorithm SSDSR to accomplish two tasks: local resource allocation and ring sorting. We propose two uniform, self-stabilizing, deterministic protocols on oriented rings: a time and space optimal solution to the local resource allocation problem (Algorithm LRAR ), and a space and (asymptotic) time optimal solution to the distributed sorting problem (Algorithm SORTr ); We extend Algorithm SSDS to an asynchronous rooted tree, and we obtain general self-stabilization for simultaneously activated non-adjacent processes in a rooted tree (Algorithm SSDST ). We then give two applications of Algorithm SSDST : a time and space optimal solution to the local mutual exclusion problem (Algorithm LMET ) and a space and (asymptotically) time optimal solution to the min heap problem (Algorithm HEAP ); In proving the time complexity of sorting, we introduce the notion of pseudo-time, similar to logical time introduced by Lamport; We present the first snap-stabilizing distributed binary search tree (BST) algorithm. The proposed algorithm uses a heap algorithm (Algorithm Heap) as a preprocessing step. This is also the first snap-stabilizing distributed solution to the heap problem

    Performance Evaluation in Energy consumption of Mobile Ad-Hoc Network to increase the Network Lifetime

    Get PDF
    MANET is self configuring network. It has many design issues like scalability, energy consumption etc.In this paper, an overview of the Distributed mutual exclusion algorithm & various enhanced variations done on distributed mutual exclusion. In DME Permission-based algorithm is used for discovering clusters of the nodes. The initial point selection effects on the results of the algorithm, in the number of clusters found and their cluster headers. Methods to enhance the Permission-based clustering algorithm are discussed. With the help of these methods increase the concurrency between the nodes, decrease the synchronization delay and decrease response time. Some enhanced variations improve the efficiency and accuracy of algorithm. Basically in all the methods the main aim is to increase the life of each node in the network or increase the battery power which will decrease the computational time. Various enhancements done on DME are collected, so by using these enhancements one can build a new hybrid algorithm which will be more efficient, accurate and less time consuming than the previous work
    • …
    corecore