Suppose that a unique priority number is associated

Assignment Help Computer Engineering
Reference no: EM1334196

Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm:

The ring algorithm assumes that the links are unidirectional and that each process sends its message to the neighbor on the right. The main data structure used by the algorithm is the active list, a list that contains the priority numbers of all active processes in the system when the algorithm ends; each process maintains its own active list. The algorithm works as follows:

1. If process Pi detects a coordinator failure, it creates a new active list that is initially empty. It then sends a message "elect(i)" to its right neighbor and adds the number i to its active list.

2. If Pi receives a message "elect(i)" from the process on the left, it must respond in one of three ways:
a) If this is the first 'elect' message it has seen or sent, Pi creates a new active list with the numbers i and j. It then sends the message 'elect(i)', followed by the message 'elect(i)'.
b) If i does not equal j - that is, the message received does not contain Pi's number - then Pi adds j to its active list and forwards the message to its right neighbor.
c) If i = j - that is, Pi receives the message 'elect(i)' - then the active list for Pi now contains the numbers of all the active processes in the system. Process Pi can now determine the largest number in the active list to identify the new coordinator process.

How many messages are needed for n processes?
(There is no need to program the algorithm, but explain the algorithm idea with words.)

Additional info on Election algorithm:
Many distributed algorithms employ a coordinator process that performs functions needed by the other processes in the system. These functions include enforcing mutual exclusion, maintaining a global wait-for graph for deadlock detection, replacing a lost token, and controlling an input or output device in the system. If the coordinator process fails due to the failure of the site at which it resides, the system can continue execution only by restarting a new copy of the coordinator on some other site. The algorithms that determine where a new copy of the coordinator should be restarted are called election algorithms.

Election algorithms assume that a unique priority number is associated with each active process in the system, For ease of notation, we assume the priority of process Pi is i. To simplify the discussion, we assume a one-to-one correspondence between processes and sites and thus refer to both as processes, The coordinator is always the process with the largest priority number. Hence, when a coordinator fails, the algorithm must elect that active process with the largest priority number. This number must be sent to each active process in the system. In addition, the algorithm must provide a mechanism for a recovered process to identify the current coordinator.

The answer can be an existing algorithm on bi-directional ring election algorithm, it just has to be explained how it works.

Reference no: EM1334196

Questions Cloud

Define product champion : Define product champion and what are the potential problems associated with ANY scoring model?
Effects on the business that is restructured : Restructuring is a popular management technique in recent business experience within the United States. Define this term. Discuss both its positive and negative effects on the business that is restructured.
Outline the description of hospitality marketing : Outline the Description of Hospitality Marketing and mobile technology affected using geography as a method of segmenting markets in both a positive and negative
Rule 1.6 providing : What does Rule 1.6 provide, exactly? Does it say that mentioning the names of parties constitutes a violation?
Suppose that a unique priority number is associated : find an election algorithm for bidirectional rings that is more efficient than the ring algorithm.
Describe why you selected these offenses : Describe why you selected these offenses and If the dismissed employee sued do you think the organization would be able to defend its action in court
Describing money and interest rates : What are the primary economic indicators that you would use if you were thinking about making a large purchase and needed a loan? For example, you may consider a new house, car, or new capital for a business?
Active and passive portfolio management styles : Consider only positions titles, not specific names, in your debate. What are Active and Passive Portfolio management styles?
Describe the augmented product concept : Describe the augmented product concept and also define the product protocols.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Define the context in which normalization is used

define the context in which Normalization is used. What is its purpose.

  What do mean by digital stratigraphy

What is digital stratigraphy? Give an instance to illustrate how digital stratigraphy is important in the field of Computer Forensics.

  Write down a program that reads a person''s name

Write down a program that reads a person's name.

  Define the spirit of the recursion theorem of a program

define the spirit of the recursion theorem of a program.

  Write down a method definition to count

Write down a class declaration for a student that has String first, last, and middle names as data fields. Declare only the data members and a no-arg constructor.

  What is green computing and green communication technology

What is Green Computing and Green Communication technology.

  Program to calculate the weight of students

We have run regression analysis along with the resulting estimated regression equation as follows:” the estimated weight equals (-180 pounds) plus (5 pounds times the height in inches).” Write down the program to calculate the weight of students.

  Which applications running in data centers are candidates

What questions wil lbe useful to investigate when deciding which applications running in data centers are candidates for migration to the cloud environment.

  What is mflops rating of the system

What is MFLOPS rating of the system

  Determinining possible roots of equation

Utilize the Bisection Method in order to determine the first possible root of the following given functions: execute in fifteen (10) iterations/cycle. Present your tabulated solution or spread.

  Take a byte-addressable computer with 24-bit addresses

take a byte-addressable computer with 24-bit addresses, a cache capable of storing a total of 64KB of data, and blocks of 32 bytes. Show the format of a 24-bit memory address for.

  Show the accurate statement

Find out the error(s) in each of the following program segments. Show the corrected statement.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd