
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
S. Nishio, K.F. Li, E.G. Manning, "A Resilient Mutual Exclusion Algorithm for Computer Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 1, no. 3, pp. 344356, July, 1990.  
BibTex  x  
@article{ 10.1109/71.80161, author = {S. Nishio and K.F. Li and E.G. Manning}, title = {A Resilient Mutual Exclusion Algorithm for Computer Networks}, journal ={IEEE Transactions on Parallel and Distributed Systems}, volume = {1}, number = {3}, issn = {10459219}, year = {1990}, pages = {344356}, doi = {http://doi.ieeecomputersociety.org/10.1109/71.80161}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Parallel and Distributed Systems TI  A Resilient Mutual Exclusion Algorithm for Computer Networks IS  3 SN  10459219 SP344 EP356 EPD  344356 A1  S. Nishio, A1  K.F. Li, A1  E.G. Manning, PY  1990 KW  Index Termsresilient mutual exclusion algorithm; computer networks; network failure; processor failure; communication controller failure; communication link failure; computer networks VL  1 JA  IEEE Transactions on Parallel and Distributed Systems ER   
The authors present an extension to the work of I. Suzuki and T. Kasami (see Proc. 3rd Int. Conf. Distributed Compact Syst., p.36570 (1982)), where a mutual exclusion algorithm uses a message called a token to transfer the privilege of entering a critical region among the participating sites. The proposed algorithm checks whether the token is lost during network failure, and regenerates it if necessary. The mutual exclusion requirement is satisfied by guaranteeing regeneration of only one token in the network. Failures in a computer network are classified into three types: processor failure, communication controller failure, and communication link failure. To detect failures, a timeout mechanism based on message delay is used. The execution of the algorithm is described for each type of failure; each site follows a rather simple execution procedure. Each site is not required to observe the failure of other sites or communication links.
[1] O. S. F. Carvalho, G. Roucairol, G. Ricart, and A. K. Agrawala, "On mutual exclusion in computer networks,"Commun. ACM, vol. 26, no. 2, pp. 146149, 1983.
[2] E. Chang and R. Roberts, "An improved algorithm for decentralized extremafinding in circular configurations of processes,"Commun. ACM, vol. 22, no. 5, pp. 281283, 1979.
[3] E. W. Dijkstra, "Solution of a problem in concurrent programming control,"Commun. ACM, vol. 8, pp. 569569, Sept. 1965.
[4] E. Dijkstra, "Selfstabilizing systems in spite of distributed control,"Commun. ACM, vol. 17, pp. 643644, 1974.
[5] H. GarciaMolina, "Reliability issues for fully replicated distributed databases, "IEEE Comput. Mag., vol. 15, no. 9, pp. 3442, 1982.
[6] P. Brinch Hansen,Operating System Principles, Englewood Cliffs, NJ: PrenticeHall, 1973.
[7] D. S. Hirschberg and J. B. Sinclair, "Decentralized extremafinding in circular configurations of processors,"Commun. ACM, vol. 23, no. 11, pp. 627628, 1980.
[8] E. Korach, S. Moran, and S. Zaks, "Tight lower and upper bounds for some distributed algorithms for a complete network of processors," inProc. 3rd ACM Symp. Principles Distributed Comput., Vancouver, B.C., Canada, Aug. 1984, pp. 199207.
[9] L. Lamport, "Time, clocks, and the ordering of events in a distributed system,"Commun. ACM, vol. 21, no. 7, pp. 558565, July 1978.
[10] G. LeLann, "Distributed systemsToward a formal approach," inProc. IFIP Congress, 1977, pp. 155160.
[11] G. LeLann, "Algorithms for distributed data sharing systems which use tickets," inProc. 3rd Berkeley Workshop Distributed Data Management Comput. Networks, 1978, pp. 259272.
[12] M. Maekawa, "A√N algorithm for mutual exclusion in decentralized systems,"ACM Trans. Comput. Syst., vol. 3, no. 2, May 1985.
[13] T. Minoura and G. Wiederhold, "Resilient extended truecopy token scheme for a distributed database system,"IEEE Trans. Software Eng., vol. SE8, no. 3, pp. 173189, 1982.
[14] T. Minoura, "Ranking scheme and control token scheme," inProc. 2nd Symp. Reliability Distributed Software Database Syst., 1982, pp. 4045.
[15] S. Nishio, N. Katoh, T. Minoura, and T. Hasegawa, "A resilient token transfer algorithm for mutual exclusion in a distributed system," (in Japanese)Trans. IECEJ, vol. J67D, no. 6, pp. 661668, 1984.
[16] S. Nishio, K. F. Li, and E. G. Manning, "A timeout based resilient token transfer algorithm for mutual exclusion in computer networks," inProc. 9th Int. Conf. Distributed Comput., Newport Beach, CA, 1989, pp. 386393.
[17] S. Nishio, K. F. Li, and E. G. Manning, "A timeout based resilient token transfer algorithm for mutual exclusion in computer networks," Tech. Rep. ECE883, Dep. Elec. Comput. Eng., Univ. of Victoria, Victoria, B.C., Canada, 1988.
[18] G. L. Peterson, "An O(n log n) unidirectional algorithm for the circular extrema problem,"ACM Trans. Programming Languages Syst., vol. 4, pp. 758762, 1982.
[19] K. Raymond, "A tree based algorithm for distributed mutual exclusion,"ACM Trans. Comput. Syst., vol. 7, pp. 6177, 1989.
[20] M. Raynal,Algorithms for Mutual Exclusion. North Oxford Academic, 1886. (Translated by D. Beeson).
[21] D. P. Reed and R. K. Kanodia, "Synchronization with eventcounts and sequences,"Commun. ACM, vol. 22, pp. 115123, Feb. 1979.
[22] G. Ricart and A. K. Agrawala, "An optimal algorithm for mutual exclusion in computer networks,"Commun. ACM, vol. 24, pp. 917, 1981.
[23] M. Singhal, "A heuristicallyaided algorithm for mutual exclusion in distributed systems,"IEEE Trans. Comput., vol. 38, no. 5, pp. 651662, 1989.
[24] J. L. A. van de Snepscheut, "Fair mutual exclusion on a graph of processes, distributed computing,"Distributed Comput., vol. 2, pp. 113115, 1987.
[25] I. Suzuki and T. Kasami, "An optimality theory for mutual exclusion algorithms in computer networks," inProc. 3rd Int. Conf. Distributed Comput Syst., 1982, pp. 365370.
[26] I. Suzuki and T. Kasami, "A distributed mutual exclusion algorithm,"ACM Trans. Comput. Syst., vol. 3, no. 4, pp. 344349, 1985.