Suppose that a unique priority number is associated

Assignment Help Computer Engineering
Reference no: EM1334196

Derive an election algorithm for bidirectional rings that is more efficient than the ring algorithm:

The ring algorithm assumes that the links are unidirectional and that each process sends its message to the neighbor on the right. The main data structure used by the algorithm is the active list, a list that contains the priority numbers of all active processes in the system when the algorithm ends; each process maintains its own active list. The algorithm works as follows:

1. If process Pi detects a coordinator failure, it creates a new active list that is initially empty. It then sends a message "elect(i)" to its right neighbor and adds the number i to its active list.

2. If Pi receives a message "elect(i)" from the process on the left, it must respond in one of three ways:
a) If this is the first 'elect' message it has seen or sent, Pi creates a new active list with the numbers i and j. It then sends the message 'elect(i)', followed by the message 'elect(i)'.
b) If i does not equal j - that is, the message received does not contain Pi's number - then Pi adds j to its active list and forwards the message to its right neighbor.
c) If i = j - that is, Pi receives the message 'elect(i)' - then the active list for Pi now contains the numbers of all the active processes in the system. Process Pi can now determine the largest number in the active list to identify the new coordinator process.

How many messages are needed for n processes?
(There is no need to program the algorithm, but explain the algorithm idea with words.)

Additional info on Election algorithm:
Many distributed algorithms employ a coordinator process that performs functions needed by the other processes in the system. These functions include enforcing mutual exclusion, maintaining a global wait-for graph for deadlock detection, replacing a lost token, and controlling an input or output device in the system. If the coordinator process fails due to the failure of the site at which it resides, the system can continue execution only by restarting a new copy of the coordinator on some other site. The algorithms that determine where a new copy of the coordinator should be restarted are called election algorithms.

Election algorithms assume that a unique priority number is associated with each active process in the system, For ease of notation, we assume the priority of process Pi is i. To simplify the discussion, we assume a one-to-one correspondence between processes and sites and thus refer to both as processes, The coordinator is always the process with the largest priority number. Hence, when a coordinator fails, the algorithm must elect that active process with the largest priority number. This number must be sent to each active process in the system. In addition, the algorithm must provide a mechanism for a recovered process to identify the current coordinator.

The answer can be an existing algorithm on bi-directional ring election algorithm, it just has to be explained how it works.

Reference no: EM1334196

Questions Cloud

Define product champion : Define product champion and what are the potential problems associated with ANY scoring model?
Effects on the business that is restructured : Restructuring is a popular management technique in recent business experience within the United States. Define this term. Discuss both its positive and negative effects on the business that is restructured.
Outline the description of hospitality marketing : Outline the Description of Hospitality Marketing and mobile technology affected using geography as a method of segmenting markets in both a positive and negative
Rule 1.6 providing : What does Rule 1.6 provide, exactly? Does it say that mentioning the names of parties constitutes a violation?
Suppose that a unique priority number is associated : find an election algorithm for bidirectional rings that is more efficient than the ring algorithm.
Describe why you selected these offenses : Describe why you selected these offenses and If the dismissed employee sued do you think the organization would be able to defend its action in court
Describing money and interest rates : What are the primary economic indicators that you would use if you were thinking about making a large purchase and needed a loan? For example, you may consider a new house, car, or new capital for a business?
Active and passive portfolio management styles : Consider only positions titles, not specific names, in your debate. What are Active and Passive Portfolio management styles?
Describe the augmented product concept : Describe the augmented product concept and also define the product protocols.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Challenges of internet search

State different challenges of relying over the Internet for your research?In extending a single-system mail system to distributed mail system, state the key additions which should be involved? Discuss in scholarly detail.

  Design a function that computes a taxi fare

Write down a function that computes a taxi fare. In some cities, taxi fares are calculated based on start and end zones plus a per-minute charge. In this city, there are three zones (1, 2, and 3) and a graduated scale for time.

  Write down english narrative that converts currency

Using the C compiler, write down a C program that contains your narrative from broken down into one line sentences, that have been commented out.

  Write down a recursive function "sumdigits"

modify a recursive function "sumDigits" in C++, that receives an integer as argument by reference and returns the sum of digits representing this integer. Also write a main function to test this function.

  How this technology works

"An emerging technology not in use at the company such as a wireless network or PDAs."

  Why lexical analysis is separated from syntax analysis

What do you mean by the term aliasing mean?why Lexical analysis is separated from syntax analysis.

  Functional specifications for the software at workplace

what are two of the most important methods to examine and why.

  Developing a pseudocode and the flowchart

Develop a flowchart or puesdocode that carry out the following task:. a) Begin the program. b) Declares the strings. c) Accept an input studentname.

  The most common process to ensure client security

How can worms and viruses be introduced to a Web site. What is the most common process to ensure client security.

  What are the benefits of networked computers

What are the advantages and drawbacks of email communication, or what if the email system went down in a major company. how will this impact productivity? Do companies rely on heavily on electronic communication today.

  Give declaration and definition of a structure

Write down a program to display the initial values held by the structure (you must use a structure) on the screen.give declaration and definition of a structure.

  Communication diagram and sequence diagram

Why you would generate a communication diagram in place of a sequence diagram? Describe what the arrow which points to an object in the communication diagram implies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd