• Title/Summary/Keyword: mutual exclusion

Search Result 47, Processing Time 0.025 seconds

An Efficient Mutual Exclusion Protocol in a Mobile Computing Environment

  • Park, Sung-Hoon
    • International Journal of Contents
    • /
    • v.2 no.4
    • /
    • pp.25-30
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF

A Token-based Mutual Exclusion Algorithm in Mobile Computing Environments (모바일 컴퓨팅 환경에서의 토큰기반 상호배제 알고리즘)

  • Yang, Seung-Il;Lee, Tae-Gyu;Park, Sung-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.263-274
    • /
    • 2010
  • Mutual exclusion that applied on existing systems was designed for static distributed systems. but now computing environments are going to mobile computing environments. Therefore a mutual exclusion algorithm in static distributed environments should be designed for new computing environments. So this paper proposes a mobile mutual exclusion algorithm to support the mutual exclusion of shared resources in mobile computer environments. Mobile computing resources as wireless hosts cause new issues because of their mobility and weakness and made mutual exclusion problem more complex than stationary distributed environments. So we proposed a new mobile token mutual exclusion algorithm with deadlock-free and starvation-free in mobile computing environments based on spanning tree topology and extend for mobile computing environments. The proposed algorithm minimizes message complexity in case of free hopping in cellular networks.

Group Mutual Exclusion Algorithm Using RMS in Community Computing Environments (커퓨니티 컴퓨팅 환경에서 자원 관리 서비스를 이용한 그룹 상호 배제 알고리즘)

  • Park, Chang-Woo;Kim, Ki-Young;Jung, Hye-Dong;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.281-283
    • /
    • 2009
  • Forming Community is important to manage and provide the service in Ubiquitous Environments including embedded tiny computers. Community Computing is that members constitute the community and cooperate. A mutual exclusion problem occurs when many processors try to use one resource and race condition happens. In the expanded concept, a group mutual exclusion problem is that processors in the same group can share the resource but processors in different groups cannot share. As mutual exclusion problems might be in community computing environments, we propose algorithm which improves the execution speed using RMS (resource management service). In this paper describes proposed algorithm and proves its performance by experiments, comparing proposed algorithm with previous method using quorum-based algorithm.

  • PDF

Design of a Mutual Exclusion Algorithm in Mobile Distributed Systems (이동 분산 시스템에서 상호배제 알고리즘의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.50-58
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF

Quorum Based Algorithms using Group Choice

  • Park, Jae-Hyrk;Kim, Kwangjo;Yoshifumi Manabe
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.53-56
    • /
    • 2002
  • This paper discusses the quorum based algorithm for group mutual exclusion defined by Yuh-Jzer Joung. Group mutual exclusion[4,5,6] is a generalization of mutual exclusion that allows a resource to be shared by processes of the same group, but requites processes of different groups to use the resource in a mutually exclusive style. Joung proposed a quorum system, which he referred to as the surficial quorum system for group mutual exclusion and two modifications of Maekawa's algorithm[6]. He mentioned that when a process may belong to more than one group, the process must identify one of the groups it belongs when it wishes to enter CS(Critical Section). However, his solution didn't provide mechanism of identifying a group which maximizes the possibility to enter CS. In this paper, we provide a mechanism for identifying that each process belongs to which group.

  • PDF

A Fault-tolerant Mutual Exclusion Algorithm in Asynchronous Distributed Systems

  • Kim, Yoon
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.1-6
    • /
    • 2012
  • Mutual Exclusion is one of the most studied topics in distributed systems where processes communicate by asynchronous message passing. It is often necessary for multiple processes at different sites to access a shared resource or data called a critical section (CS) in distributed systems. A number of algorithms have been proposed to solve the mutual exclusion problem in distributed systems. In this paper, we propose the new algorithm which is modified from Garg's algorithm[1] thus works properly in a fault-tolerant system. In our algorithm, after electing the token generator, the elected process generates a new token based on the information of the myreqlist which is kept by every process and the reqdone which is received during election. Consequently, proposed algorithm tolerates any number of process failures and also does even when only one process is alive.

A Performance Evaluation on Classic Mutual Exclusion Algorithms for Exploring Feasibility of Practical Application (실제 적용 타당성 탐색을 위한 고전적 상호배제 알고리즘 성능 평가)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.12
    • /
    • pp.469-478
    • /
    • 2017
  • The mutual exclusion is originally based on the theory of race condition prevention in symmetric multi-processor operating systems. But recently, due to the generalization of multi-core processors, its application range has been rapidly shifted to parallel processing application domain. POSIX thread, WIN32 thread, and Java thread, which are typical parallel processing application development environments, provide a unique mutual exclusion mechanism for each of them. Applications that are very sensitive to performance in these environments may want to reduce the burden of mutual exclusion, even at some cost, such as inconvenience of coding. In this study, we implement Dekker's and Peterson's algorithm in the form of busy-wait and processor-yield in various platforms, and compare the performance of them with the built-in mutual exclusion mechanisms to evaluate the usability of the classic algorithms. The analysis result shows that Dekker's algorithm of processor-yield type is superior to the built-in mechanisms in POSIX and WIN32 thread environments at least 2 times and up to 70 times, and confirms that the practicality of the algorithm is sufficient.

A Mutual Exclusion Algorithm in Asynchronous Distributed System with Failure Detectors (비동기적 분산시스템에서 고장 추적 장치를 이용한 상호배제 알고리즘 설계)

  • Park, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2457-2464
    • /
    • 2013
  • In this paper, we design and analyze a mutual exclusion algorithm, based on the Token and Failure detector, in asynchronous distributed systems. A Failure Detector is an independent module that detects and reports crashes of other processes. There are some of advantages in rewriting the Token-based ME algorithm using a Failure Detector. We show that the Token-based ME algorithm, when using Failure Detector, is more effectively implemented than the classic Token-based ME algorithm for synchronous distributed systems.

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

  • Sharma, Bharti;Bhatia, Ravinder Singh;Singh, Awadhesh Kumar
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.36-54
    • /
    • 2014
  • Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intra-cluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.

A Study on Instruction Method for Mutual Exclusion Using Simulation Based on Graphic (그래픽 기반 시뮬레이션을 활용한 상호배제 교육방법 연구)

  • Lee, Young-Suk;Nam, Young-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.9-21
    • /
    • 2010
  • Concurrent processes come into conflict with each other when they are competing for the use of the same resources. In the case of competing processes three control problems must be faced: mutual exclusion, deadlock, and starvation. The concurrency is a subject rather difficult to understand. In addition, because concurrent programs included in most of OS texts are described by pseudocode and are not being able to execute directly, almost learners are difficult to understand behaviour of concurrent programs. The purpose of this study is to propose instruction method for mutual exclusion using SDL and MSC base on graphic. In order to verify the effectiveness of the proposed materials, we compare with materials based on pseudocode. The results indicated that the proposed materials is more effective than materials based on pseudocode in teaching-learning for mutual exclusion mechanisms.

  • PDF