Algorithm for reconstructing a logical ring, Operating System

Assignment Help:

Q. Present an algorithm for reconstructing a logical ring after a process in the ring fails?

Answer: Typically distributed systems utilize a coordinator process that performs functions needed by other processes in the system. This would comprise enforcing mutual exclusion and-in this case of a ring -replacing a lost token.

A scheme alike to the ring algorithm presented that can be used. The algorithm is as follows:

The ring algorithm presumes that the links are unidirectional and that processes send their messages to the neighbour on their right. The major data structure utilized by the algorithm is the active list a list that contains the priority numbers of all active processes in the system when the algorithm ends each one process maintains its own active list.

a. If process Pi notices a coordinator failure it creates a new active list that is initially empty. It then sends a message elect (i) to its right neighbour and adds the number i to its active list.

b. If Pi obtains a message elect (j) from the process on the left it should respond in one of three ways

1. If this is the first elect message it has seen or else sent Pi creates a new active list with the numbers i and j. It subsequently sends the message elect (i) followed by the message elect(j).

2. If i _= j that is the message received doesn't contain Pi 's number afterwards Pi adds j to its active list and forwards the message to its right neighbour.

3. If i = j, that is Pi accepts the message elect (i) then the active list for Pi now enclose the numbers of all the active processes in the system. Process Pi can currently determine the largest number in the active list to identify the new coordinator process.


Related Discussions:- Algorithm for reconstructing a logical ring

Explain message passing among systems, Q. Explain Message passing among sys...

Q. Explain Message passing among systems? Communications- Message passing among systems requires messages to be turned into packets of information and sent to the network contr

Name the evolutionary process models, Normal 0 false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Linux os, Introduction of linux

Introduction of linux

Explain what is file structure, Problem 1. List out the conditions that...

Problem 1. List out the conditions that result in Deadlock situations. Illustrate deadlock situation with a simple graphical notation Listing conditions for deadlock occu

Explain system-wide open-file and per-process open-file, Explain system-wid...

Explain system-wide open-file and per-process open-file The system-wide open-file table have a copy of the FCB of each open file, as well as other information. The per-pr

Operating system, What criteria are important in choosing a file organisati...

What criteria are important in choosing a file organisation?

Perform alpha-beta pruning on the following tree, Perform alpha-beta prunin...

Perform alpha-beta pruning on the following tree. Put an "X" over each node that is pruned. Put the final value next to all other nodes. Indicate which action MAX should take: to B

Describe paging technique used in unix systems, Describe paging technique u...

Describe paging technique used in UNIX systems. When a process begin in UNIX, not every its memory pages are read in from the disk at once. In its place, the kernel loads into

Why high level languages need compiler, Q. Why High level languages need Co...

Q. Why High level languages need Compiler? High level languages - illustrations are COBOL, FORTRAN, PL/I andALGOL - are processed by interpreters andcompilers. A compilers is a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd