How many messages are needed for n processes

Assignment Help Operating System
Reference no: EM13943128

Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm:

The ring algorithm assumes that the links are unidirectional and that each process sends its message to the neighbor on the right. The main data structure used by the algorithm is the active list, a list that contains the priority numbers of all active processes in the system when the algorithm ends; each process maintains its own active list. The algorithm works as follows:

1. If process Pi detects a coordinator failure, it creates a new active list that is initially empty. It then sends a message "elect(i)" to its right neighbor and adds the number i to its active list.

2. If Pi receives a message "elect(i)" from the process on the left, it must respond in one of three ways:

a) If this is the first 'elect' message it has seen or sent, Pi creates a new active list with the numbers i and j. It then sends the message 'elect(i)', followed by the message 'elect(i)'.

b) If i does not equal j - that is, the message received does not contain Pi's number - then Pi adds j to its active list and forwards the message to its right neighbor.

c) If i = j - that is, Pi receives the message 'elect(i)' - then the active list for Pi now contains the numbers of all the active processes in the system. Process Pi can now determine the largest number in the active list to identify the new coordinator process.

How many messages are needed for n processes?
(There is no need to program the algorithm, but explain the algorithm idea with words.)

Additional info on Election algorithm:
Many distributed algorithms employ a coordinator process that performs functions needed by the other processes in the system. These functions include enforcing mutual exclusion, maintaining a global wait-for graph for deadlock detection, replacing a lost token, and controlling an input or output device in the system. If the coordinator process fails due to the failure of the site at which it resides, the system can continue execution only by restarting a new copy of the coordinator on some other site. The algorithms that determine where a new copy of the coordinator should be restarted are called election algorithms.
Election algorithms assume that a unique priority number is associated with each active process in the system, For ease of notation, we assume the priority of process Pi is i. To simplify the discussion, we assume a one-to-one correspondence between processes and sites and thus refer to both as processes, The coordinator is always the process with the largest priority number. Hence, when a coordinator fails, the algorithm must elect that active process with the largest priority number. This number must be sent to each active process in the system. In addition, the algorithm must provide a mechanism for a recovered process to identify the current coordinator.

The answer can be an existing algorithm on bi-directional ring election algorithm, it just has to be explained how it works.

Reference no: EM13943128

Questions Cloud

Explain the generation of a lifting force : You can also view it at http://www.pbs.org/wgbh/nova/space/lift-drag.html. Next, describe the way in which one could use both Newton's Third Law of Motion and the Bernoulli Effect to explain the generation of a lifting force when air passes over ..
How do progression of style help us date archaeological find : Is there evidence of greater naturalism in drapery? in anatomy? How does the progression of style help us date archaeological finds? What is the story represented?
Importance of the role of reproducibility : You can also view the video at http://www.ket.org/education/video/kgedu/kgedu_000005.htm. Next, describe each step of the scientific method. Assess the importance of the role of reproducibility, collaboration, and peer review as part of scientifi..
What is major feature of national environmental policy act : Formulate arguments for and against the idea that risk assesment can and should be separated from risk management. Discuss land as a natural resource and how and why it is or should be regulated by environmental laws.
How many messages are needed for n processes : Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm
Engineering and chemical thermodynamic 2nd edition : i need 1 page about this book( engineering and chemical thermodynamic 2nd edition )what learn form this problem in book: 4.44 , 4.48 , 5.2 ,5.9 ,5.10, 5.29 ,5.39 ,5.46 ,6.19 ,6.44 ,6.52 .6.54 ,7.18 ,7.29 ,7.45 ,7.50 ,7.54 , 8.19 ,8.20 summarize yo..
What are the major provisions of the epcrtka : For what reasons did congress enact the Emergency Planning Community Right to Know Act? How is this Act related to OSHA, RCRA, SARA, and CERCLA? What are the major provisions of the EPCRTKA?
Analyse arguments about global economic trends : Evaluate the Institutions of the global economy - Analyse arguments about global economic trends and dynamics and interpret differing levels of global movements of goods and factors of production
User entry to a month value and display : Convert the user's entry to a Month value and display it.Create an enumeration named Planet that holds the names for the eight planets in our solar system, starting with MERCURY and ending with NEPTUNE.

Reviews

Write a Review

Operating System Questions & Answers

  Which blocks of cache may element 31 of memory go

Consider a memory of 64 blocks (labeled 0 through 63) and a cache of 16 blocks (labeled 0 through 15). In the questions below, list only correct results.

  Operating system that provides semaphores

Assume that you have an operating system that provides semaphores. Implement a message system. Write the procedures for sending and receiving messages

  Disk scheduling algorithms

Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.

  Compute number of disk tracks traversed by using fcfs-sstf

Compute number of disk tracks traversed by using FCFS, SSTF, SCAN, and LOOK algorithms for series of disk track service request given below.

  Implement a paged memory allocation scheme

Create a memory allocation program that determines the number of frames that are needed by a requesting client and assigns pages to available frames using a client-server architecture.

  1 what does it mean to say that a programming language is

1. what does it mean to say that a programming language is machine independent?2. name and describe four different

  Routers in ospf

Using a simulator the boson simulator need to create a four router topology. Using any interfaces of my choice. I am given 24 networks

  Programming language machine independence

Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.

  Automate or automated patch deployment

Discuss and define Automate or Automated patch deployment?

  Wireless internet security

Millions of American homes are prepared with wireless networks. Suppose if the network is not made secure, any nearby computer with a wireless card can use network.

  Enable multimedia on a website

Few multimedia can be hard to watch on a mobile device due to screen size or bandwidth limitations. Determine two articles that discuss considerations and new developments that will enable multimedia on a site

  Indefinite blocking what is semaphore what is the meaning

what is semaphore? what is the meaning of it and how to explain it?meaning of semaphore...... where this type of word

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd