A simple token-based algorithm for the mutual exclusion problem in distributed systems

被引:3
作者
Neamatollahi, Peyman [1 ]
Sedaghat, Yasser [1 ]
Naghibzadeh, Mahmoud [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Fac Engn, Mashhad, Iran
关键词
Mutual exclusion; Critical section; Distributed systems; Token-based algorithm; Token-ring; REAL-TIME SYSTEMS; EFFICIENT;
D O I
10.1007/s11227-017-1985-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Solving the problem of mutually exclusive access to a critical resource is a major challenge in distributed systems. In some solutions, there is a unique token in the whole system which acts as a privilege to access a critical resource. Practical and easily implemented, the token-ring algorithm is one of the most popular token-based mutual exclusion algorithms known in this field's literature. However, it suffers from low scalability and a high average waiting time for resource seekers. The present paper proposes a new algorithm which employs a two-dimensional torus logical structure of N processes and the token-ring algorithm concept. It performs in a way that increasingly raises scalability and reduces the average waiting time of the token-ring algorithm. The token makes a circular movement along the columns of the two-dimensional torus (vertical ring), while the requests for the critical resource make a circular movement along the rows of the torus (horizontal ring). In this algorithm, the number of messages exchanged is between and 3 under light load situations and, under heavy load situations, is at the most three messages per critical section invocation. Thus, in contrast with the leading algorithms, the proposed algorithm has gained significant improvements, in addition to having been proved to operate correctly.
引用
收藏
页码:3861 / 3878
页数:18
相关论文
共 42 条
[1]   AN EFFICIENT AND FAULT-TOLERANT SOLUTION FOR DISTRIBUTED MUTUAL EXCLUSION [J].
AGRAWAL, D ;
ELABBADI, A .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1991, 9 (01) :1-20
[2]   An efficient schedulability condition for non-preemptive real-time systems at common scheduling points [J].
Alrashed, Saleh ;
Alhiyafi, Jamal ;
Shafi, Aamir ;
Min-Allah, Nasro .
JOURNAL OF SUPERCOMPUTING, 2016, 72 (12) :4651-4661
[3]  
[Anonymous], P 2006 INT C COMP DE
[4]  
Arabnia H. R., 1986, Computer Graphics Forum, V5, P179, DOI 10.1111/j.1467-8659.1986.tb00296.x
[5]   Simple, space-efficient, and fairness improved FCFS mutual exclusion algorithms [J].
Aravind, Alex A. .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (08) :1029-1038
[6]   Highly-fair bakery algorithm using symmetric tokens [J].
Aravind, Alex A. .
INFORMATION PROCESSING LETTERS, 2010, 110 (23) :1055-1060
[7]   Adaptive atomic capture of multiple molecules [J].
Bertier, Marin ;
Obrovac, Marko ;
Tedeschi, Cedric .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (09) :1251-1266
[8]   Randomized mutual exclusion on a multiple access channel [J].
Bienkowski, Marcin ;
Klonowski, Marek ;
Korzeniowski, Miroslaw ;
Kowalski, Dariusz R. .
DISTRIBUTED COMPUTING, 2016, 29 (05) :341-359
[9]   The wandering token: Congestion avoidance of a shared resource [J].
Ciuffoletti, Augusto .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2010, 26 (03) :473-478
[10]   SOLUTION OF A PROBLEM IN CONCURRENT PROGRAMMING CONTROL [J].
DIJKSTRA, EW .
COMMUNICATIONS OF THE ACM, 1965, 8 (09) :569-&