Distributed Computing in Mobile Environment
Distributed Computing in Mobile Environment
ENVIRONMENT
Apekshit Sharma, Chandrakant Sharma
ABSTRACT
o This paper considers central issues of distributed computing in a mobile environment.
Its aim is to light on the first brick of a common view for mobile systems.
o We propose a distributed algorithm for solving the h-out of-k mutual exclusion
problem for ad hoc mobile networks.
o The h-out of-k mutual exclusion problem is also known us the h-out of-k resource
allocution problem.
OBJECTIVE
o The main goal of a distributed computing system is to connect users and
resources in a transparent, open, and scalable way.
o Ideally this arrangement is drastically more fault tolerant and more powerful
than many combinations of stand-alone computer systems.
WHERE DISTRIBUTED COMPUTING IN A
MOBILE ENVIRONMENT IS USED
We pool together mobile systems and analyze them from different angles including
architecture and computability aspects.
We show that mobile systems are basically face the same problems; hence it is
useless to maintain the actual “misleading” barriers.
Moreover, in the new model, the fundamental problems of distributed computing
should find appropriate specifications.
The distributed computing environment consists of a collection of dissimilar computers
connected through the fixed-wired networks such as the Ethernet.
MOBILE SYSTEMS
In this, we show that the Mobile System appellation is not restricted to wireless mobile
systems, but includes several research areas.
o A node i can access the shared resource only within the critical section.
o Every time when a node i wishes to access h shared resources,
o node i moves from its NCS to the WS, waiting for entering the CS.
H-OUT OF K-MUTUAL EXCLUSION PROBLEM
o The h-out of-k mutual exclusion problem is concerned with how to design an
algorithm satisfying the following properties:
o Mutual Exclusion:
No more than k resources can be accessed concurrently.
o Bounded Delay:
If a node enters the WS to request h resources, then it eventually enters the CS.
REVERSE LINK (RL) MUTUAL EXCLUSION
ALGORITHM
SOLUTION
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
Direct wireless links
Height
Next pointers
Token holder
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
OPERATION OF REVERSE LINK MUTUAL
EXCLUSION ALGORITHM ON STATIC NETWORK.
ALTERNATIVE SOLUTION
o Lamport's mutual exclusion algorithm
o Token-based distributed mutual exclusion algorithms
o Suzuki-Kasami broadcast algorithm
o Raymond's tree-based algorithm
CONCLUSION
o We propose a distributed algorithm for solving the h-out of-k mutual exclusion
problem for ad hoc mobile networks.
o The proposed algorithm is sensitive to link forming and link breaking and thus is
suitable for ad hoc mobile networks.
o This paper pointed out similarities among common mobile systems (i.e., cellular
networks, ad hoc networks, peer-to-peer systems, reality virtual systems and
cooperative robots).
THANK YOU
Ms. Riddhi Rathod (30).
Ms. Sneha Ariga ().
Ms. Vaishali ().