Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Open access

A bounded first-in, first-enabled solution to the l-exclusion problem

Published: 01 May 1994 Publication History

Abstract

This article presents a solution to the first-come, first-enabled ℓ-exclusion problem of Fischer et al. [1979]. Unlike their solution, this solution does not use powerful read-modify-write synchronization primitives and requires only bounded shared memory. Use of the concurrent timestamp system of Dolev and Shavir [1989] is key in solving the problem within bounded shared memory.

References

[1]
AFEK, Y., ATTIYA, H., DOLEV, D., GAFNI, E., MERRITT, M., AND SHAVIT, N. 1990. Atomic snapshots of shared memory. In Proceedings of the 9th Annual ACM Symposium on Principles of Distributed Computing. ACM, New York, 1-13.
[2]
ATTIYA, H., BAR-NOY, A., DOLEV, D., KOLLER, D., PELEG, D., AND REISCHUK, R. 1987. Achievable cases in an asynchronous environment. In Proceedings of the 28th IEEE Annual Symposium on Foundations of Computer Science. IEEE, New York, 337-346.
[3]
CHANDY, K., AND MISRA, J. 1984. The drinking philosophers problem. ACM Trans. Program. Lang. Syst. 6, 4 (Oct.), 632-646.
[4]
DIJKSTRA, E. 1974. Self-stabilizing systems in spite of distributed control. Commun. ACM 17, 11 (Nov.), 643-644.
[5]
DIJKSTRA, E. 1971. Hierarchical ordering of sequential processes. Acta Informat~ca 1,115-138.
[6]
DIJKSTRA, E. 1965. Solution of a problem in concurrent programming control. Commun. ACM 8, 9 (Sept.), 569.
[7]
DOLEV, D., AND SHAVIT, N. 1989. Bounded concurrent time-stamp systems are constructible! In Proceedings of the 21st Annual ACM Symposium on the Theory of Computing. ACM, New York, 454-465.
[8]
DOLEV, D., GAFNI, E., AND SHAVIT, N. 1988. Towards a non-atomic era: /'-exclusion as a test case. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing. ACM, New York, 78-92.
[9]
DWORK, C., AND WAARTS, O. 1992. Simple and efficient bounded concurrent timestamping or bounded concurrent timestamp systems are comprehensible! In Proceedings of the 24th ACM Symposium on the Theory of Computing. ACM, New York, 655-666.
[10]
DWORK, C., HERLIHY, M., PLOTKIN, S., AND WAARTS, O. 1992. Time lapse snapshots. In Proceedings of the 1st Israel Symposium on Theory of Computing and Systems. Springer-Verlag, Berlin, 276-290.
[11]
FISCHER, M., LYNCH, N., BURNS, J., AND BORODIN, A. 1989. Distributed FIFO allocation of identical resources using small shared space. ACM Trans. Program. Lang. Syst., 11, 1 (Jan.), 90-114.
[12]
FISCHER, M., LYNCH, N., BURNS, J., AND BORODIN, A. 1979. Resource allocation with immunity to limited process failure. In Proceedings 20th IEEE Annual Symposium on Foundattons of Computer Science. IEEE, New York, 234-254.
[13]
GAWLICK, R., LYNCH, N., AND SHAVIT, N. 1992. Concurrent time-stamping made simple. In Proceedings of the 1st Israel Symposium on the Theory of Computing and Systems. Springer- Verlag, New York, 171-185.
[14]
HERLIHY, M. synchronization. ACM Trans. Program. Lang. Syst. 13, 1 (Jan.), 124-149.
[15]
ISRAELI, A., AND PINHASOV, M. 1992. A concurrent time-stamp scheme which is linear in time and space. In Proceedings of the 6th Internatmnal Workshop on Dtstributed Algorithms. Springer-Verlag, Berlin, 95-109. Also, Tech. Rep., Technion, Haifa, Israel, 1991.
[16]
KATSEFF, H. 1978. A new solution to the critical section problem, in Proceedtngs of the 10th Annual ACM Symposium on the Theory of Computing. ACM, New York, 86-88.
[17]
LAMPORT, L. 1986. The mutual exclusion problem. Part II: Statement and solutions. J. ACM 33, 2 (Apr.), 327-348.
[18]
LAMPORT, L. 1984. What it means for a concurrent program to satisfy a specification: Why no one has specified priority. In Proceedings of the 11th ACM Symposium on Principles of Programmtng Languages. ACM, New York, 78-83.
[19]
LAMPORT, L. 1974. A new solution of Ddkstra's concurrent programming problem. Commun. ACM 17, 8 (Aug), 453-455.
[20]
PETERSON, G. 1981. Myths about the mutual exclusion problem. Inf. Process. Lett. 12, 3 (June), 115-116.
[21]
RUDOLPH, L. 1981. Software structures for ultra-parallel computers. Ph.D. thesis, New York Univ., New York.

Cited By

View all

Recommendations

Reviews

Jie Wu

Consider a system consisting of n processes, where each process has a segment of code called a critical section. The important feature of the system is that, when one process is executing in its critical section, no other process is allowed to execute in its critical section. Thus, the execution of critical sections by the processes is mutually exclusive in time. In this paper, the authors study the ? -exclusion problem, which is an extension of the traditional mutual exclusion problem. The ? -exclusion problem is to guarantee that the system does not enter a state in which more than ? processes are executing their critical sections. Clearly, the normal mutual exclusion problem is a special case of ? -exclusion with ?=1 . The proposed solution to the ? -exclusion problem is elegant, and a complete proof of its correctness is provided. This solution has two main features. It ensures first-in, first-enabled, a weaker form of the <__?__Pub Caret>traditional first-come, first-served of entering processes. In the first-in, first-enabled condition, each requesting process is first enabled before actual entry. Second, only shared memory, a relatively weak model, is used as the communication primitive, as opposed to the read-modify-write and fetch-and-add primitives used in other known solutions. The unnatural formulation of the first-in, first-enabled condition, as pointed out by the authors, may lead the reader to wonder about the significance of the results obtained in this paper. This should not diminish the authors' contribution to this field. This paper is painstakingly thorough and well-organized. The results are impressive, and I enjoyed reading this paper enormously. I have one minor complaint: there are a number of typographical errors and several missing words, including one in an important algorithm.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Programming Languages and Systems
ACM Transactions on Programming Languages and Systems  Volume 16, Issue 3
May 1994
773 pages
ISSN:0164-0925
EISSN:1558-4593
DOI:10.1145/177492
  • Editor:
  • Andrew W. Appel
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 1994
Published in TOPLAS Volume 16, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. atomic registers
  2. concurrency
  3. timestamps

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)8
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Efficient Bounded Timestamping from Standard Synchronization PrimitivesProceedings of the 2023 ACM Symposium on Principles of Distributed Computing10.1145/3583668.3594601(113-123)Online publication date: 19-Jun-2023
  • (2022)Contention-related crash failuresTheoretical Computer Science10.1016/j.tcs.2022.01.029909:C(76-86)Online publication date: 28-Mar-2022
  • (2019)Weak Failures: Definitions, Algorithms and Impossibility ResultsNetworked Systems10.1007/978-3-030-05529-5_4(51-66)Online publication date: 5-Jan-2019
  • (2018)Set Agreement and Renaming in the Presence of Contention-Related Crash FailuresStabilization, Safety, and Security of Distributed Systems10.1007/978-3-030-03232-6_18(269-283)Online publication date: 20-Oct-2018
  • (2014)An Improved k-Exclusion AlgorithmJournal of Computers10.4304/jcp.9.3.529-5369:3Online publication date: 1-Mar-2014
  • (2014)The Space Complexity of Long-Lived and One-Shot Timestamp ImplementationsJournal of the ACM10.1145/255990461:1(1-25)Online publication date: 1-Jan-2014
  • (2014)Tight space bounds for $$\ell $$ℓ-exclusionDistributed Computing10.1007/s00446-014-0207-627:3(165-179)Online publication date: 1-Jun-2014
  • (2011)Tight space bounds for l-exclusionProceedings of the 25th international conference on Distributed computing10.5555/2075029.2075040(110-124)Online publication date: 20-Sep-2011
  • (2011)The space complexity of long-lived and one-shot timestamp implementationsProceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing10.1145/1993806.1993826(139-148)Online publication date: 6-Jun-2011
  • (2011)Tight Space Bounds for ℓ-ExclusionDistributed Computing10.1007/978-3-642-24100-0_8(110-124)Online publication date: 2011
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media