Election algorithm for bidirectional rings

Assignment Help Operating System
Reference no: EM1379697

Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm:

The ring algorithm supposes that the links are unidirectional and that every procedure sends its message to the neighbor on the right. The main data structure used through the algorithm is the active list, a list that contains the priority numbers of all active processes in the system when the algorithm ends; each process maintains its own active list. The algorithm works as follows:

1. If process Pi detects a coordinator failure, it creates a new active list that is initially empty. It then sends a message "elect(i)" to its right neighbor and adds the number i to its active list.

2. If Pi receives a message "elect(i)" from the process on the left, it must respond in one of three ways:
a) If this is the first 'elect' message it has seen or sent, Pi creates a new active list with the numbers i and j. It then sends the message 'elect(i)', followed by the message 'elect(i)'.
b) If i does not equal j - that is, the message received does not contain Pi's number - then Pi adds j to its active list and forwards the message to its right neighbor.
c) If i = j - that is, Pi receives the message 'elect(i)' - then the active list for Pi now contains the numbers of all the active processes in the system. Process Pi can now determine the largest number in the active list to identify the new coordinator process.

How many messages are needed for n processes?
(There is no need to program the algorithm, but explain the algorithm idea with words.)

Additional info on Election algorithm:
Many distributed algorithms employ a coordinator process that performs functions needed by the other processes in the system. These functions include enforcing mutual exclusion, maintaining a global wait-for graph for deadlock detection, replacing a lost token, and controlling an input or output device in the system. If the coordinator process fails due to the failure of the site at which it resides, the system can continue execution only by restarting a new copy of the coordinator on some other site. The algorithms that determine where a new copy of the coordinator should be restarted are called election algorithms.
Election algorithms assume that a unique priority number is associated with each active process in the system, For ease of notation, we assume the priority of process Pi is i. To simplify the discussion, we assume a one-to-one correspondence between processes and sites and thus refer to both as processes, The coordinator is always the process with the largest priority number. Hence, when a coordinator fails, the algorithm must elect that active process with the largest priority number. This number must be sent to each active process in the system. In addition, the algorithm must provide a mechanism for a recovered process to identify the current coordinator.

The answer can be an existing algorithm on bi-directional ring election algorithm, it just has to be explained how it works.

Reference no: EM1379697

Questions Cloud

Plot trend in manufacturing employment in illinois over last : Plot trend in manufacturing employment in Illinois over last four years. On your own, discuss what economic changes may have influenced that trend.
Discuss main reasons for it project failures : Discuss the main reasons for IT project failures? Are they because of problems with project management life cycle, product development life cycle,
Operating model for the organization : Analyze a specific company to recognize their foundation for execution, including, and post your results, for example, the operating model for the organization.
Fundamental stages of an enterprise system life cycle : Discuss why is this important to the success of the implementation project? Determine the fundamental stages of an enterprise system life cycle?
Election algorithm for bidirectional rings : The ring algorithm supposes that the links are unidirectional and that every procedure sends its message to the neighbor on the right. The main data structure used through the algorithm is the active list,
Process customer order history from a file : Required help creating a document that Develop an application that will read and procedure customer history order information from a document.
Determine a source code control system : Determine a source code control system and discuss why is such a system necessary when multiple programmers build a program or system?
Describe the concept of a signal : Assume when a child process is forked, a parent may wait for the successful completion of the child via the wait service so that return result of that application can be read from the procedure descriptor block.
Discuss mitigation strategies : It is determined that 3-out of 5-businesses that experience downtime of forty-eight hours or more will be out of business within three years.

Reviews

Write a Review

Operating System Questions & Answers

  Maintaining network configuration

In a Windows 2003 server network discuss various devices such as: repeaters, routers and gateways. Detemrine the functions for those devices? At which layer of the OSI model do those devices operate?

  Regulation of the telecommunications industry

Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Describe three solutions to critical section problem

Describe three solutions to critical section problem Explain the different methods used to handle deadlocks Distinguish between "No preemption" and "circular wait" in deadlocks prevention

  Question about about telecommunications

Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.

  Write pseudocode of thread with and without semaphores

Assume we have two threads A and B A and B are to repeatedly print out ping and pong. Write down pseudocode of thread A and B How can this be solved with and without semaphores.

  Dealing with internet security and privacy

A procedure is said to be I/O bound if it needs a lot of I/O operations, whereas a procedure that consists of mostly computations within the CPU/memory system is said to be compute bound.

  Pros and cons of using embedded uid and pw

Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?

  Determine transmission line speed

Imagine you are creating an application at work that transmits data record to another building within the similar city. The data records are 500 bytes in length,

  Benefits of the just in time inventory management system

Determine what does just in time inventory management have to do with the Carle Heart Center in Urbana, Illinois?

  Change current operating system of plant

The software house has been contacted by a Governmental Nuclear Reactor Agency that wants to change the current Operating System of their plant.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd