SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 53 
ANALYSIS OF ROUCAIROL AND CARVALHO APPROACH IN DISTRIBUTED MUTUAL EXCLUSION Rajeev Ranjan Kumar Tripathi1 1Department of CSE, Institute of Technology and Management, GIDA, Gorakhpur Abstract Critical section problem is a well known problem in Computer Science. It arises when multiple processes or threads simultaneously try to access shared resources like physical devices or logical objects. In Conventional Operating System Design, we use semaphores to solve this one. In Distributed System due to absence of shared memory we cannot implement the same solution. Various approaches are given to solve the critical section problem in Distributed System. An algorithm that solves critical section problem should have following properties like fairness along with deadlock freedom, freedom from starvation and fault tolerant. Ricart and Agrawala suggested message based approach to get mutual exclusion in Distributed System. This approach fairly deals with the critical section problem. Roucairol and Carvalho suggested an optimization for the given approach. This paper is shedding lights on the proposed optimization. This paper finally concludes that though the optimization has a better performance over the original one yet this one is compromising with the fairness. Keywords— Critical Section, Distributed System, Fairness, Deadlock, Starvation, Fault Tolerance. 
--------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Distributed System is a collection of inter connected nodes that work together to get a specific goal. Each node has some pre defined roles. Nodes communicate with each other only by message passing. Distributed System has inherent limitations of 1) Shared Memory & 2) Global Clock [1, 2, 3]. In an application, nodes may be in different time zones. It is almost impossible to synchronize the clocks associated with the individual nodes due to clock drift rate. Again if processes are running at different machines we cannot terminate them in the same manner as we do in a standalone machine. A resource may be shared in two different ways 1) Read Only Mode & 2) Exclusive Mode. Note that if sharing is in read only mode, simultaneously many processes, threads and users can access this one. This sharing does not cause the critical section. Critical section arises when sharing is in exclusive mode. Algorithms designated for the mutual algorithms basically generates schedule when multiple requests reach to access the critical section [1, 2, 3]. We can broadly categorise the algorithms given to get mutual exclusion in Distributed System in two different ways [1]: 
A. Message Based 
B. Token Based 
In message based algorithms, site interested to execute critical section sends REQUEST messages to all other participants. On reception of this message, participants cannot send the REPLY message to the sender if they have already sent REPLY message to a site which is still executing the critical section. When a site exists from the critical section it sends RELEASE message. The RELEASE message works as an acknowledgement. If participants have received the RELEASE message from the site to which REPLY message was sent, REPLY message to the new REQUEST is sent. 
Lamport’s Algorithm, Ricart-Agrawala Algorithm and Maekawa Algorithm come under this category. 
In token based algorithm, a TOKEN is available in the system. A site can enter into the critical section if it has the TOKEN. If a site wants to execute the critical section and it has not TOKEN, the site broadcasts REQUESTS to the other sites. If the site having the TOKEN is not currently executing the critical section, sends back the TOKEN. If it is already executing the critical section, received REQUEST is kept in waiting state in a queue. Suzuki-Kasami Broadcast Algorithm, Raymond Tree Based Algorithm and Singhal Heuristic Algorithm come under this category. Generally we measure the algorithm’s performance on two parameters: time and space. In this scenario algorithm’s efficiency is measured in terms of messages required to invoke critical section at a time. In next section this paper is describing the essential properties required by the mutual exclusion algorithms. 2. REQUIREMENTS Primary requirement for a mutual exclusion algorithm is that only one site can only execute the critical section. No two sites can simultaneously execute the critical section at any cost. Besides this followings are some other requirements [1]: 2.1 Freedom from Deadlock Mutual exclusion algorithm should be free from deadlock. In message based algorithm, a site should not wait infinitely for the REPLY message. In token based algorithm, a site should not wait infinitely for the TOKEN.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 54 
2.2 Free from Starvation A site should not be forced to wait infinitely whether on the other there is a site which is frequently executing the critical section. That is every site should get a chance to execute the critical section. 2.3 Fairness Permission for executing the critical section should be always granted in the same manner in which the REQUESTS appear. That is disposal of REQUESTS should be in First Come First Serve (FCFS) basis. When we have to introduce fairness in a system, queue is the most appropriate data structure to use. That’s why all the algorithms which are based either on message or on token usage the queue. 2.4 Fault Tolerance A mutual exclusion algorithm should work even in presence of any failure. Lamport was the first who had proposed an algorithm to achieve mutual exclusion in Distributed System. In next section, this paper is exploring the Lamport’s approach to get mutual exclusion in Distributed System. 3. LAMPORT’S APRROACH OF MUTUAL EXCLUSION In 1978, Lamport proposed this concept. Every site maintains a request set. Let there are n sites in a system. The request set of site Si will contain all other sites. So the size of request set (Ri) of Si is (n-1). That is in Ri, Si is absent. Site Si has a request queue (request_queuei). In request_queue, incoming requests are placed in the same order in which they arrive. Every REQUEST has a timestamp associated with it. For timestamp we have a clock. Every site Si has a clock Ci. Every REQUEST has two tupples: timestamp and the site identifier. Let two REQUESTS are coming from Sj and Sk as (tsj, j) and (tsk, k). Where tsj is indicating the timestamp associated with this REQUEST and j denotes that this REQUEST is coming from site Sj and the similar interpretation for the second REQUEST. Let these REQUESTS arrive at Si. In request_queuei , REQUEST of Sj will be at the top if and only if tsj<tsk else REQUEST of Sk will be at the top in request_queuei. 3.1 Algorithm 3.1.1 Requesting the Critical Section 
 When a site Si wants to execute the critical section it sends a REQUEST (tsi, i) to all the sites of its request_queuei. The site Si places this REQUEST in its request_queuei. Note that (n-1) REQUESTS are sent by Si. 
 On reception of this REQUEST, the site Sj sends a REPLY message to Si. The REPLY message is also equipped with the timestamp and the site identifier. The site identifier attached with the REPLY informs the receiver about the originator of this REPLY. 
Happened before (->) relationship is used to identify that the received REPLY is for in response to the REQUEST made or not. 
3.1.2 Executing Critical Section: 
Site Si enters into the critical section when two conditions meet together: 
 Si has received REPLY messages with timestamp larger than tsi from all other sites. 
 Si’s request is at the top of request_queuei. 
3.1.3 Releasing the critical section 
 The site Si when exits from the critical section, it removes its REQUEST from its request_queuei and sends RELEASE messages to all the sites. Note that release message is also equipped with the timestamp and identifier. This timestamp is again used by the receivers to determine that it is coming in response of the REPLYS that they have earlier sent to the Si. 
 When a site Sj receives the RELEASE message, it deletes the REQUEST of Si from its request_queuej and sends the REPLY to the site whose REQUEST is in its request_queuej after the deleted request. 
3.2 Performance For each critical section execution, we have to spend 3(n-1) messages. First (n-1) REQUEST messages are sent, then (n-1) REPLY messages are received and finally (n-1) RELEASE messages are sent again. 3.3 Proof of Correctness This proof is based on contradiction. Let two sites Si& Sk are simultaneously executing the critical section. 
Fig.1 Sites requesting from the permission The site Sj receives two REQUESTS from Si and Sk as: (tsi ,i) and(tsk ,k). Let Sj sends REPLY to the site Si, this will be if and only if tsi<tsk (as per the algorithm). Let Sj sends REPLY to the site Sk, this will be if and only if tsk<tsi (as per the algorithm).These two conditions cannot occur simultaneously. Finally we can conclude that only one site is executing the critical section [6]. To reduce the number of messages required in critical section invocation, we have only two approaches: 
 Override a message so that a single message can play role of more than one message. 
 Reduce the size of request set. 
Si 
Sj 
Sk
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 55 
Above mentioned approaches are optimizations. Ricart- Agrawala approach follows the first criteria while Maekawa approach follows the second. Next section of this paper is describing the Ricart-Agrawala algorithm: 4. RICART-AGRAWALA ALGORITHMS In Ricart-Agrawala algorithm all the assumptions are same except that REPLY message works as both REPLY and RELEASE. 4.1 The Algorithm 4.1.1 Requesting the Critical Section 
 When a site Si wants to enter the critical section, it sends a timestamped REQUEST message to all the sites in its request set. 
 When site Sj receives a REQUEST message from site Si, it sends a REPLY message to site Si if site Sj is neither requesting nor executing the critical section or if site Sj is requesting and Si’s request’s timestamp is smaller than site Sj’s own request’s timestamp. The request is deferred otherwise. 
4.1.2 Executing the Critical Section 
 Site Si enters the critical section after it has received REPLY message from all the sites in its request set. 
4.1.3 Releasing the Critical Section 
 When site Si exits the critical section, it sends REPLY message to all the deferred requests. 
A site’s REPLY messages are blocked only by sites that are requesting the critical section with higher priority (i.e., a smaller timestamp). Thus, when a site sends out REPLY messages to all the deferred requests, the site with the next highest priority request receives the last needed REPLY message and enters the critical section. The execution of critical section requests in this algorithm is always in the order of their timestamp. 4.2 Performance The Ricart-Agrawala algorithm requires 2(N-1) messages per critical section execution: (N-1) REQUEST and (N-1) REPLY messages [5]. Its correctness proof is same as Lamport’s approach. 5. ROUCAIROL AND CARVALHO OPTIMIZATION 
Roucairol and Carvalho [4] proposed an improvement to the Ricart-Agrawala algorithm by observing that once a site Si has received a REPLY message from a site Sj, the authorization implicit in this message remains valid until Si sends a REPLY message to Sj (which happens only after the reception of a REQUEST message from Sj). Therefore, after site Si has received a REPLY message from site Sj, site Si can enter its critical section any number of times without requesting permission from site Sj until Si sends a REPLY message to Sj. With this change, a site in the Ricart-Agrawala algorithm requests permission from a dynamically varying set of sites and requires 0 to 2(N-1) messages per CS execution. 
6. ANALYSIS OF ROUCAIROL AND CARVALHO OPTIMIZATION Let a site Si gets permission from all the sites and it enters into the critical section. During execution some more REQUESTS are coming to Si for the permission. If site Si is repeatedly executing the critical section all the REQUESTS will be treated as deferred REQUESTS. Requesting sites have to wait infinitely. Though this optimization optimizes the execution of critical section by consuming zero messages in next subsequent invocation, starvation occurs for the other sites. 7. CONCLUSIONS Optimization approach suggested by Roucairol and Carvalho is not fairly good. Once a site gets permission to execute the critical section it remains always in critical section. Ricart- Agrawala approach uses request_queue to introduce fairness. REQUESTS are always processed in the same ways as they arrive. But the proposed optimization tends the Ricart- Agrawala approach to starvation. REFERENCES 
[1] Singhal and Shivaratri, “Advanced Concepts in Operating System,” 18th Reprint Edition,TMH. 
[2] Coulouris, Dollimore and Kindberg, “Distributed System Concepts and Design,” 4th Edition, Pearson Education. 
[3] Gerard Tel, "Introduction to Distributed Algorithms," 2nd Edition, Cambridge University Press, 2000. 
[4] Carvalho O.S.F. and G. Roucairol, “On Mutual Exclusion in Computer Science, Technical Correspondance,” Journal of ACM, 1985. 
[5] Ricart , G. and A.K. Agrawal, “ An optimal Algorithm for Mutual Exclusion in Computer Networks,” Communication of the ACM, Jan. 1981. 
[6] Lamport, L, “Time, Clocks and Ordering of Events in Distributed Systems,” Communication of the ACM, Jan. 1978.

More Related Content

Viewers also liked

A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllications
eSAT Publishing House
 
Geo distributed parallelization pacts in map reduce
Geo distributed parallelization pacts in map reduceGeo distributed parallelization pacts in map reduce
Geo distributed parallelization pacts in map reduce
eSAT Publishing House
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
eSAT Publishing House
 
Swing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capabilitySwing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capability
eSAT Publishing House
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
 
Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,
eSAT Publishing House
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
eSAT Publishing House
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
eSAT Publishing House
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
eSAT Publishing House
 
A batch study of phosphate adsorption characteristics on clay soil
A batch study of phosphate adsorption characteristics on clay soilA batch study of phosphate adsorption characteristics on clay soil
A batch study of phosphate adsorption characteristics on clay soil
eSAT Publishing House
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent review
eSAT Publishing House
 
Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...
eSAT Publishing House
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantizationIsolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
eSAT Publishing House
 
Detailed study of aggregator for updates
Detailed study of aggregator for updatesDetailed study of aggregator for updates
Detailed study of aggregator for updates
eSAT Publishing House
 
Analysis of element shape in the design for multi band applications
Analysis of element shape in the design for multi band applicationsAnalysis of element shape in the design for multi band applications
Analysis of element shape in the design for multi band applications
eSAT Publishing House
 
Information technology and cost optimization
Information technology and cost optimizationInformation technology and cost optimization
Information technology and cost optimization
eSAT Publishing House
 
Shear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deepShear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deep
eSAT Publishing House
 
Design of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adcDesign of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adc
eSAT Publishing House
 
Comparision of different imaging techniques used for
Comparision of different imaging techniques used forComparision of different imaging techniques used for
Comparision of different imaging techniques used for
eSAT Publishing House
 

Viewers also liked (20)

A study on the importance of image processing and its apllications
A study on the importance of image processing and its apllicationsA study on the importance of image processing and its apllications
A study on the importance of image processing and its apllications
 
Geo distributed parallelization pacts in map reduce
Geo distributed parallelization pacts in map reduceGeo distributed parallelization pacts in map reduce
Geo distributed parallelization pacts in map reduce
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
Swing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capabilitySwing, voltage stability and power transfer capability
Swing, voltage stability and power transfer capability
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
 
Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...A study of localized algorithm for self organized wireless sensor network and...
A study of localized algorithm for self organized wireless sensor network and...
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
A batch study of phosphate adsorption characteristics on clay soil
A batch study of phosphate adsorption characteristics on clay soilA batch study of phosphate adsorption characteristics on clay soil
A batch study of phosphate adsorption characteristics on clay soil
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent review
 
Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...Effect of calcination on the electrical properties and quantum confinement of...
Effect of calcination on the electrical properties and quantum confinement of...
 
Isolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantizationIsolated word recognition using lpc & vector quantization
Isolated word recognition using lpc & vector quantization
 
Detailed study of aggregator for updates
Detailed study of aggregator for updatesDetailed study of aggregator for updates
Detailed study of aggregator for updates
 
Analysis of element shape in the design for multi band applications
Analysis of element shape in the design for multi band applicationsAnalysis of element shape in the design for multi band applications
Analysis of element shape in the design for multi band applications
 
Information technology and cost optimization
Information technology and cost optimizationInformation technology and cost optimization
Information technology and cost optimization
 
Shear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deepShear and flexural behavior of ferro cement deep
Shear and flexural behavior of ferro cement deep
 
Design of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adcDesign of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adc
 
Comparision of different imaging techniques used for
Comparision of different imaging techniques used forComparision of different imaging techniques used for
Comparision of different imaging techniques used for
 

Similar to Analysis of roucairol and carvalho approach in

MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
cscpconf
 
Modeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event bModeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event b
csandit
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock Detection
SHIKHA GAUTAM
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
Govt. P.G. College Dharamshala
 
Module 3 (1).pptx
Module 3 (1).pptxModule 3 (1).pptx
Module 3 (1).pptx
AmalMR4
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
AzmiNizar1
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...Neelamani Samal
 
Unit_5_Distributed Mutual Exclusion.pdf
Unit_5_Distributed Mutual Exclusion.pdfUnit_5_Distributed Mutual Exclusion.pdf
Unit_5_Distributed Mutual Exclusion.pdf
Dr.Somnath Thigale
 
Operating System- INTERPROCESS COMMUNICATION.docx
Operating System- INTERPROCESS COMMUNICATION.docxOperating System- INTERPROCESS COMMUNICATION.docx
Operating System- INTERPROCESS COMMUNICATION.docx
minaltmv
 
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
A New Function-based Framework for Classification and Evaluation of Mutual Ex...A New Function-based Framework for Classification and Evaluation of Mutual Ex...
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
CSCJournals
 
Multisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobileMultisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobile
eSAT Publishing House
 
Comparative Study of Mutual Exclusion Algorithms in Distributed Systems
Comparative Study of Mutual Exclusion Algorithms in Distributed SystemsComparative Study of Mutual Exclusion Algorithms in Distributed Systems
Comparative Study of Mutual Exclusion Algorithms in Distributed Systems
IJERA Editor
 
Dynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approachDynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approach
IJARIIT
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
ijujournal
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
ijujournal
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
ijujournal
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
guest0f5a7d
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
guest61205606
 

Similar to Analysis of roucairol and carvalho approach in (20)

MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
 
Modeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event bModeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event b
 
Distributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionDistributed Mutual Exclusion and Distributed Deadlock Detection
Distributed Mutual Exclusion and Distributed Deadlock Detection
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
 
Module 3 (1).pptx
Module 3 (1).pptxModule 3 (1).pptx
Module 3 (1).pptx
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
 
Unit_5_Distributed Mutual Exclusion.pdf
Unit_5_Distributed Mutual Exclusion.pdfUnit_5_Distributed Mutual Exclusion.pdf
Unit_5_Distributed Mutual Exclusion.pdf
 
Operating System- INTERPROCESS COMMUNICATION.docx
Operating System- INTERPROCESS COMMUNICATION.docxOperating System- INTERPROCESS COMMUNICATION.docx
Operating System- INTERPROCESS COMMUNICATION.docx
 
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
A New Function-based Framework for Classification and Evaluation of Mutual Ex...A New Function-based Framework for Classification and Evaluation of Mutual Ex...
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
 
Multisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobileMultisensor data fusion based autonomous mobile
Multisensor data fusion based autonomous mobile
 
Comparative Study of Mutual Exclusion Algorithms in Distributed Systems
Comparative Study of Mutual Exclusion Algorithms in Distributed SystemsComparative Study of Mutual Exclusion Algorithms in Distributed Systems
Comparative Study of Mutual Exclusion Algorithms in Distributed Systems
 
Dynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approachDynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approach
 
D24019026
D24019026D24019026
D24019026
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
 
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMRCHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
CHECKPOINTING WITH MINIMAL RECOVERY IN ADHOCNET BASED TMR
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

Analysis of roucairol and carvalho approach in

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 53 ANALYSIS OF ROUCAIROL AND CARVALHO APPROACH IN DISTRIBUTED MUTUAL EXCLUSION Rajeev Ranjan Kumar Tripathi1 1Department of CSE, Institute of Technology and Management, GIDA, Gorakhpur Abstract Critical section problem is a well known problem in Computer Science. It arises when multiple processes or threads simultaneously try to access shared resources like physical devices or logical objects. In Conventional Operating System Design, we use semaphores to solve this one. In Distributed System due to absence of shared memory we cannot implement the same solution. Various approaches are given to solve the critical section problem in Distributed System. An algorithm that solves critical section problem should have following properties like fairness along with deadlock freedom, freedom from starvation and fault tolerant. Ricart and Agrawala suggested message based approach to get mutual exclusion in Distributed System. This approach fairly deals with the critical section problem. Roucairol and Carvalho suggested an optimization for the given approach. This paper is shedding lights on the proposed optimization. This paper finally concludes that though the optimization has a better performance over the original one yet this one is compromising with the fairness. Keywords— Critical Section, Distributed System, Fairness, Deadlock, Starvation, Fault Tolerance. --------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Distributed System is a collection of inter connected nodes that work together to get a specific goal. Each node has some pre defined roles. Nodes communicate with each other only by message passing. Distributed System has inherent limitations of 1) Shared Memory & 2) Global Clock [1, 2, 3]. In an application, nodes may be in different time zones. It is almost impossible to synchronize the clocks associated with the individual nodes due to clock drift rate. Again if processes are running at different machines we cannot terminate them in the same manner as we do in a standalone machine. A resource may be shared in two different ways 1) Read Only Mode & 2) Exclusive Mode. Note that if sharing is in read only mode, simultaneously many processes, threads and users can access this one. This sharing does not cause the critical section. Critical section arises when sharing is in exclusive mode. Algorithms designated for the mutual algorithms basically generates schedule when multiple requests reach to access the critical section [1, 2, 3]. We can broadly categorise the algorithms given to get mutual exclusion in Distributed System in two different ways [1]: A. Message Based B. Token Based In message based algorithms, site interested to execute critical section sends REQUEST messages to all other participants. On reception of this message, participants cannot send the REPLY message to the sender if they have already sent REPLY message to a site which is still executing the critical section. When a site exists from the critical section it sends RELEASE message. The RELEASE message works as an acknowledgement. If participants have received the RELEASE message from the site to which REPLY message was sent, REPLY message to the new REQUEST is sent. Lamport’s Algorithm, Ricart-Agrawala Algorithm and Maekawa Algorithm come under this category. In token based algorithm, a TOKEN is available in the system. A site can enter into the critical section if it has the TOKEN. If a site wants to execute the critical section and it has not TOKEN, the site broadcasts REQUESTS to the other sites. If the site having the TOKEN is not currently executing the critical section, sends back the TOKEN. If it is already executing the critical section, received REQUEST is kept in waiting state in a queue. Suzuki-Kasami Broadcast Algorithm, Raymond Tree Based Algorithm and Singhal Heuristic Algorithm come under this category. Generally we measure the algorithm’s performance on two parameters: time and space. In this scenario algorithm’s efficiency is measured in terms of messages required to invoke critical section at a time. In next section this paper is describing the essential properties required by the mutual exclusion algorithms. 2. REQUIREMENTS Primary requirement for a mutual exclusion algorithm is that only one site can only execute the critical section. No two sites can simultaneously execute the critical section at any cost. Besides this followings are some other requirements [1]: 2.1 Freedom from Deadlock Mutual exclusion algorithm should be free from deadlock. In message based algorithm, a site should not wait infinitely for the REPLY message. In token based algorithm, a site should not wait infinitely for the TOKEN.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 54 2.2 Free from Starvation A site should not be forced to wait infinitely whether on the other there is a site which is frequently executing the critical section. That is every site should get a chance to execute the critical section. 2.3 Fairness Permission for executing the critical section should be always granted in the same manner in which the REQUESTS appear. That is disposal of REQUESTS should be in First Come First Serve (FCFS) basis. When we have to introduce fairness in a system, queue is the most appropriate data structure to use. That’s why all the algorithms which are based either on message or on token usage the queue. 2.4 Fault Tolerance A mutual exclusion algorithm should work even in presence of any failure. Lamport was the first who had proposed an algorithm to achieve mutual exclusion in Distributed System. In next section, this paper is exploring the Lamport’s approach to get mutual exclusion in Distributed System. 3. LAMPORT’S APRROACH OF MUTUAL EXCLUSION In 1978, Lamport proposed this concept. Every site maintains a request set. Let there are n sites in a system. The request set of site Si will contain all other sites. So the size of request set (Ri) of Si is (n-1). That is in Ri, Si is absent. Site Si has a request queue (request_queuei). In request_queue, incoming requests are placed in the same order in which they arrive. Every REQUEST has a timestamp associated with it. For timestamp we have a clock. Every site Si has a clock Ci. Every REQUEST has two tupples: timestamp and the site identifier. Let two REQUESTS are coming from Sj and Sk as (tsj, j) and (tsk, k). Where tsj is indicating the timestamp associated with this REQUEST and j denotes that this REQUEST is coming from site Sj and the similar interpretation for the second REQUEST. Let these REQUESTS arrive at Si. In request_queuei , REQUEST of Sj will be at the top if and only if tsj<tsk else REQUEST of Sk will be at the top in request_queuei. 3.1 Algorithm 3.1.1 Requesting the Critical Section  When a site Si wants to execute the critical section it sends a REQUEST (tsi, i) to all the sites of its request_queuei. The site Si places this REQUEST in its request_queuei. Note that (n-1) REQUESTS are sent by Si.  On reception of this REQUEST, the site Sj sends a REPLY message to Si. The REPLY message is also equipped with the timestamp and the site identifier. The site identifier attached with the REPLY informs the receiver about the originator of this REPLY. Happened before (->) relationship is used to identify that the received REPLY is for in response to the REQUEST made or not. 3.1.2 Executing Critical Section: Site Si enters into the critical section when two conditions meet together:  Si has received REPLY messages with timestamp larger than tsi from all other sites.  Si’s request is at the top of request_queuei. 3.1.3 Releasing the critical section  The site Si when exits from the critical section, it removes its REQUEST from its request_queuei and sends RELEASE messages to all the sites. Note that release message is also equipped with the timestamp and identifier. This timestamp is again used by the receivers to determine that it is coming in response of the REPLYS that they have earlier sent to the Si.  When a site Sj receives the RELEASE message, it deletes the REQUEST of Si from its request_queuej and sends the REPLY to the site whose REQUEST is in its request_queuej after the deleted request. 3.2 Performance For each critical section execution, we have to spend 3(n-1) messages. First (n-1) REQUEST messages are sent, then (n-1) REPLY messages are received and finally (n-1) RELEASE messages are sent again. 3.3 Proof of Correctness This proof is based on contradiction. Let two sites Si& Sk are simultaneously executing the critical section. Fig.1 Sites requesting from the permission The site Sj receives two REQUESTS from Si and Sk as: (tsi ,i) and(tsk ,k). Let Sj sends REPLY to the site Si, this will be if and only if tsi<tsk (as per the algorithm). Let Sj sends REPLY to the site Sk, this will be if and only if tsk<tsi (as per the algorithm).These two conditions cannot occur simultaneously. Finally we can conclude that only one site is executing the critical section [6]. To reduce the number of messages required in critical section invocation, we have only two approaches:  Override a message so that a single message can play role of more than one message.  Reduce the size of request set. Si Sj Sk
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 55 Above mentioned approaches are optimizations. Ricart- Agrawala approach follows the first criteria while Maekawa approach follows the second. Next section of this paper is describing the Ricart-Agrawala algorithm: 4. RICART-AGRAWALA ALGORITHMS In Ricart-Agrawala algorithm all the assumptions are same except that REPLY message works as both REPLY and RELEASE. 4.1 The Algorithm 4.1.1 Requesting the Critical Section  When a site Si wants to enter the critical section, it sends a timestamped REQUEST message to all the sites in its request set.  When site Sj receives a REQUEST message from site Si, it sends a REPLY message to site Si if site Sj is neither requesting nor executing the critical section or if site Sj is requesting and Si’s request’s timestamp is smaller than site Sj’s own request’s timestamp. The request is deferred otherwise. 4.1.2 Executing the Critical Section  Site Si enters the critical section after it has received REPLY message from all the sites in its request set. 4.1.3 Releasing the Critical Section  When site Si exits the critical section, it sends REPLY message to all the deferred requests. A site’s REPLY messages are blocked only by sites that are requesting the critical section with higher priority (i.e., a smaller timestamp). Thus, when a site sends out REPLY messages to all the deferred requests, the site with the next highest priority request receives the last needed REPLY message and enters the critical section. The execution of critical section requests in this algorithm is always in the order of their timestamp. 4.2 Performance The Ricart-Agrawala algorithm requires 2(N-1) messages per critical section execution: (N-1) REQUEST and (N-1) REPLY messages [5]. Its correctness proof is same as Lamport’s approach. 5. ROUCAIROL AND CARVALHO OPTIMIZATION Roucairol and Carvalho [4] proposed an improvement to the Ricart-Agrawala algorithm by observing that once a site Si has received a REPLY message from a site Sj, the authorization implicit in this message remains valid until Si sends a REPLY message to Sj (which happens only after the reception of a REQUEST message from Sj). Therefore, after site Si has received a REPLY message from site Sj, site Si can enter its critical section any number of times without requesting permission from site Sj until Si sends a REPLY message to Sj. With this change, a site in the Ricart-Agrawala algorithm requests permission from a dynamically varying set of sites and requires 0 to 2(N-1) messages per CS execution. 6. ANALYSIS OF ROUCAIROL AND CARVALHO OPTIMIZATION Let a site Si gets permission from all the sites and it enters into the critical section. During execution some more REQUESTS are coming to Si for the permission. If site Si is repeatedly executing the critical section all the REQUESTS will be treated as deferred REQUESTS. Requesting sites have to wait infinitely. Though this optimization optimizes the execution of critical section by consuming zero messages in next subsequent invocation, starvation occurs for the other sites. 7. CONCLUSIONS Optimization approach suggested by Roucairol and Carvalho is not fairly good. Once a site gets permission to execute the critical section it remains always in critical section. Ricart- Agrawala approach uses request_queue to introduce fairness. REQUESTS are always processed in the same ways as they arrive. But the proposed optimization tends the Ricart- Agrawala approach to starvation. REFERENCES [1] Singhal and Shivaratri, “Advanced Concepts in Operating System,” 18th Reprint Edition,TMH. [2] Coulouris, Dollimore and Kindberg, “Distributed System Concepts and Design,” 4th Edition, Pearson Education. [3] Gerard Tel, "Introduction to Distributed Algorithms," 2nd Edition, Cambridge University Press, 2000. [4] Carvalho O.S.F. and G. Roucairol, “On Mutual Exclusion in Computer Science, Technical Correspondance,” Journal of ACM, 1985. [5] Ricart , G. and A.K. Agrawal, “ An optimal Algorithm for Mutual Exclusion in Computer Networks,” Communication of the ACM, Jan. 1981. [6] Lamport, L, “Time, Clocks and Ordering of Events in Distributed Systems,” Communication of the ACM, Jan. 1978.