Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A tree-based algorithm for distributed mutual exclusion

Published: 01 January 1989 Publication History

Abstract

We present an algorithm for distributed mutual exclusion in a computer network of N nodes that communicate by messages rather than shared memory. The algorithm uses a spanning tree of the computer network, and the number of messages exchanged per critical section depends on the topology of this tree. However, typically the number of messages exchanged is O(log N) under light demand, and reduces to approximately four messages under saturated demand.
Each node holds information only about its immediate neighbors in the spanning tree rather than information about all nodes, and failed nodes can recover necessary information from their neighbors. The algorithm does not require sequence numbers as it operates correctly despite message overtaking.

References

[1]
LAMPORT, L. Time, clocks, and the ordering of events in a distributed system. Comrnun. ACM 21, 7 (July 1978), 558-565.
[2]
MAEKAWA, M. A 4~ algorithm for mutual exclusion in decentralized systems. ACM Trans. Comput. Syst. 3, 2 (May 1985), 145-159.
[3]
RICART, G., AND AGRAWALA, A.K. An optimal algorithm for mutual exclusion in computer networks. Commun. ACM 24, 1 (Jan. 1981), 9-17.
[4]
SuzuKI, I., AND KASAMI, T. A distributed mutual exclusion algorithm. A CM Trans. Comput. Syst. 3, 4 (Nov. 1985), 344-49.

Cited By

View all
  • (2024)Mostly Automated Verification of Liveness Properties for Distributed Protocols with Ranking FunctionsProceedings of the ACM on Programming Languages10.1145/36328778:POPL(1028-1059)Online publication date: 5-Jan-2024
  • (2024)An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structureComputer Communications10.1016/j.comcom.2024.02.007218(1-13)Online publication date: Mar-2024
  • (2023)On Asymptotically Optimal Approach for Finding of the Minimum Total Weight of Edge-Disjoint Spanning Trees with a Given DiameterAutomation and Remote Control10.1134/S000511792307006884:7(772-787)Online publication date: 1-Jul-2023
  • Show More Cited By

Recommendations

Reviews

Charles N. Schroeder

This interesting and well-written paper presents an algorithm for distributed mutual exclusion in a computer network. The algorithm uses messages, rather than shared memory, to pass the equivalent of a token that allows the node holding the privilege to enter the critical section. The author compares the algorithm to others, suggests ways to improve it, and lists some possible problems. The network topology affects the algorithm's performance (the number of messages passed); Raymond discusses best and worst cases as well as two variations of the algorithm's implementation. I found the paper easy to read and to follow. One could easily scan it for the major concepts, and even a novice at distributed systems and networking should be able to follow the flow of the paper and most of the proofs. I recommend this interesting approach to the general reader interested in distributed systems and networks.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1989
Published in TOCS Volume 7, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)248
  • Downloads (Last 6 weeks)26
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Mostly Automated Verification of Liveness Properties for Distributed Protocols with Ranking FunctionsProceedings of the ACM on Programming Languages10.1145/36328778:POPL(1028-1059)Online publication date: 5-Jan-2024
  • (2024)An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structureComputer Communications10.1016/j.comcom.2024.02.007218(1-13)Online publication date: Mar-2024
  • (2023)On Asymptotically Optimal Approach for Finding of the Minimum Total Weight of Edge-Disjoint Spanning Trees with a Given DiameterAutomation and Remote Control10.1134/S000511792307006884:7(772-787)Online publication date: 1-Jul-2023
  • (2023)Opportunistic Mutual Exclusion2023 28th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC)10.1109/ASYNC58294.2023.10239610(1-9)Online publication date: 16-Jul-2023
  • (2023)The Problem of Finding Several Given Diameter Spanning Trees of Maximum Total Weight in a Complete GraphAnalysis of Images, Social Networks and Texts10.1007/978-3-031-54534-4_24(341-348)Online publication date: 28-Sep-2023
  • (2023)Mutual ExclusionDistributed Systems10.1002/9781119825968.ch8(189-217)Online publication date: 10-Feb-2023
  • (2022)Load balanced distributed directoriesInformation and Computation10.1016/j.ic.2021.104700285:PAOnline publication date: 1-May-2022
  • (2022)Finding bounded diameter minimum spanning tree in general graphsComputers and Operations Research10.1016/j.cor.2022.105822144:COnline publication date: 1-Aug-2022
  • (2022)Token Based k-Mutual Exclusion for Multi-UAV FANETWireless Personal Communications: An International Journal10.1007/s11277-022-09886-6126:4(3693-3714)Online publication date: 1-Oct-2022
  • (2021)Learning Algorithms with Self-Play: A New Approach to the Distributed Directory Problem2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI52525.2021.00081(501-505)Online publication date: Nov-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media