Browse > Article
http://dx.doi.org/10.3745/KTCCS.2017.6.12.469

A Performance Evaluation on Classic Mutual Exclusion Algorithms for Exploring Feasibility of Practical Application  

Lee, Hyung-Bong (강릉원주대학교 컴퓨터공학과)
Kwon, Ki-Hyeon (강원대학교 전자정보통신공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.6, no.12, 2017 , pp. 469-478 More about this Journal
Abstract
The mutual exclusion is originally based on the theory of race condition prevention in symmetric multi-processor operating systems. But recently, due to the generalization of multi-core processors, its application range has been rapidly shifted to parallel processing application domain. POSIX thread, WIN32 thread, and Java thread, which are typical parallel processing application development environments, provide a unique mutual exclusion mechanism for each of them. Applications that are very sensitive to performance in these environments may want to reduce the burden of mutual exclusion, even at some cost, such as inconvenience of coding. In this study, we implement Dekker's and Peterson's algorithm in the form of busy-wait and processor-yield in various platforms, and compare the performance of them with the built-in mutual exclusion mechanisms to evaluate the usability of the classic algorithms. The analysis result shows that Dekker's algorithm of processor-yield type is superior to the built-in mechanisms in POSIX and WIN32 thread environments at least 2 times and up to 70 times, and confirms that the practicality of the algorithm is sufficient.
Keywords
Mutual Exclusion; Dekker's Algorithm; Peterson's Algorithm; POSIX Thread; WIN32 Thread; Java Monitor;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Silberschatz, P. B. Galvin, and G. Gagne, "Operating System Concepts," 9th Ed., pp.278-280, Wiley, 2013.
2 Young-Suk Lee, Young-Ho Nam, "A Study on Instruction Method for Mutual Exclusion Using Simulation Based on Graphic," The Journal of Korean Association of Computer Education, Vol.13, No.6, pp.9-21, 2010.
3 Microsoft, "Lockless Programming Considerations for Xbox 360 and Microsoft Windows," [Internet], https://msdn.microsoft.com/en-us/library/windows/desktop/ee418650(v=vs.85).aspx (accessed at May 15th, 2017).
4 Geoff Langdale, "Lock-Free Programming," [Internet], https://www.cs.cmu.edu/-410-s05/lectures/L31_LockFree.pdf (accessed at May 15th, 2017).
5 E. W. Dijkstra, "About the sequentiality of process descriptions (EWD-35)," E.W. Dijkstra Archive. Center for American History, University of Texas at Austin, 1962-1963 (http://www.cs.utexas.edu/users/EWD/translations/EWD35-English.html, accessed at May 15th, 2017).
6 G. L. Peterson, "Myths About the Mutual Exclusion Problem," Information Processing Letters, Vol.12, No.3, pp.115-116, 1981. (http://cs.nyu.edu/-lerner/spring12/Read03-Mutual Exclusion.pdf, accessed at May 15th, 2017).   DOI
7 S. H. Park and S. H. Lee, "Token-Based Mutual Exclusion Algorithm in Mobile Cellular Networks," Proc. of 26th International Conference on Advanced Information Networking and Applications Workshops, pp.460-465, 2012.
8 S. H. Park, Y. M. Kim, and S. C. Yoo, "A Design of Mutual Exclusion Protocol for Mobile Game in Cellular Wireless Networks," Journal of the Korea Entertainment Industry Association, Vol.10, No.6, pp.431-438, 2016.   DOI
9 A. Luo, W. Wu, J. Cao, and M. Raynal, "A Generalized Mutual Exclusion Problem and Its Algorithm," Proc. of 42nd International Conference on Parallel Processing(ICPP), IEEE, pp.300-309, 2013.
10 F. Cicirelli and L. Nigro, "Modelling and Verification of Mutual Exclusion Algorithms," Proc. of IEEE/ACM 20th International Symposium on Distributed Simulation and Real Time Applications(DS-RT), pp. 136-144, 2016.
11 S. M. Choi and H. B. Lee, "A Study on Mutual Exclusion Algorithms," Proc. of the KIPS Fall Conference 2016, Vol. 23, No.2, pp.38-39, 2016.
12 H. W. Cain and M. H. Lipasti, "Memory Ordering: A Value-Based Approach," Proc. of 1st Annual International Symposium on Computer Architecture(ISCA), 2004.
13 X. Ji and L. Song, "Mutual Exclusion Verification of Peterson's Solution in Isabelle/HOL," Proc. of third International Conference on Trustworthy Systems and Their Applications(TSA), IEEE, pp.81-86, 2016.