Algorithm for reconstructing a logical ring, Operating System

Assignment Help:

Q. Present an algorithm for reconstructing a logical ring after a process in the ring fails?

Answer: Typically distributed systems utilize a coordinator process that performs functions needed by other processes in the system. This would comprise enforcing mutual exclusion and-in this case of a ring -replacing a lost token.

A scheme alike to the ring algorithm presented that can be used. The algorithm is as follows:

The ring algorithm presumes that the links are unidirectional and that processes send their messages to the neighbour on their right. The major data structure utilized by the algorithm is the active list a list that contains the priority numbers of all active processes in the system when the algorithm ends each one process maintains its own active list.

a. If process Pi notices a coordinator failure it creates a new active list that is initially empty. It then sends a message elect (i) to its right neighbour and adds the number i to its active list.

b. If Pi obtains a message elect (j) from the process on the left it should respond in one of three ways

1. If this is the first elect message it has seen or else sent Pi creates a new active list with the numbers i and j. It subsequently sends the message elect (i) followed by the message elect(j).

2. If i _= j that is the message received doesn't contain Pi 's number afterwards Pi adds j to its active list and forwards the message to its right neighbour.

3. If i = j, that is Pi accepts the message elect (i) then the active list for Pi now enclose the numbers of all the active processes in the system. Process Pi can currently determine the largest number in the active list to identify the new coordinator process.


Related Discussions:- Algorithm for reconstructing a logical ring

What are the advantages of contiguous allocation, What are the advantages o...

What are the advantages of Contiguous allocation? The advantages are a. Supports direct access b. Supports sequential access c. Number of disk seeks is minimal.

Socket, socket based fortune teller sever.your program should create a serv...

socket based fortune teller sever.your program should create a server that listens to a specific port when a client receives a connection the server should respond with a random fo

Process destruction, Most process abstractions support processes being dest...

Most process abstractions support processes being destroyed when the program terminates, or in response to a specific kill directive. There are two common implementations, one a "p

Define a election algorithm, Consider a setting where processors are not as...

Consider a setting where processors are not associated with unique identifiers but the total number of processors is known and the processors are organized along a bidirectional ri

Windows Resources on a Network, VoIP (Voice over Internet Protocol), also c...

VoIP (Voice over Internet Protocol), also called Internet telephone, was once a novelty on the Internet, but not very useful because of all the problems with poor voice quality and

Write a short note about the different states of a process, Write a short n...

Write a short note about the different STATES of a process. As a process implement it changes state. The state of a process is described in part by the current activity of that

How many disks can be used effectively by one fast wide bus, Q. More than ...

Q. More than one disk drive is able to be attached to a SCSI bus. Especially a fast wide SCSI-II bus can be connected to at most 15 disk drives. Remember that this bus has a bandw

Define busy waiting and spinlock, Define busy waiting and spinlock. Whe...

Define busy waiting and spinlock. When a process is in its significant section, any other process that tries to enter its critical section must loop continuously in the entry c

Is data in a file access sequentially or randomly, Q. Give an instance of ...

Q. Give an instance of an application in which data in a file should be accessed in the following order: a. Sequentially b. Randomly Answer: a. Print the content of

Define program preemption, Define Program preemption The Forced de-allo...

Define Program preemption The Forced de-allocation of the CPU from a program which is executing on the CPU is known as Program preemption

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd