Algorithm for reconstructing a logical ring, Operating System

Assignment Help:

Q. Present an algorithm for reconstructing a logical ring after a process in the ring fails?

Answer: Typically distributed systems utilize a coordinator process that performs functions needed by other processes in the system. This would comprise enforcing mutual exclusion and-in this case of a ring -replacing a lost token.

A scheme alike to the ring algorithm presented that can be used. The algorithm is as follows:

The ring algorithm presumes that the links are unidirectional and that processes send their messages to the neighbour on their right. The major data structure utilized by the algorithm is the active list a list that contains the priority numbers of all active processes in the system when the algorithm ends each one process maintains its own active list.

a. If process Pi notices a coordinator failure it creates a new active list that is initially empty. It then sends a message elect (i) to its right neighbour and adds the number i to its active list.

b. If Pi obtains a message elect (j) from the process on the left it should respond in one of three ways

1. If this is the first elect message it has seen or else sent Pi creates a new active list with the numbers i and j. It subsequently sends the message elect (i) followed by the message elect(j).

2. If i _= j that is the message received doesn't contain Pi 's number afterwards Pi adds j to its active list and forwards the message to its right neighbour.

3. If i = j, that is Pi accepts the message elect (i) then the active list for Pi now enclose the numbers of all the active processes in the system. Process Pi can currently determine the largest number in the active list to identify the new coordinator process.


Related Discussions:- Algorithm for reconstructing a logical ring

Define a linker program, Define a linker program  A linker program lin...

Define a linker program  A linker program links the program along with other programs required for its execution.

Designing issues in a network -transparency, Transparency Users mus...

Transparency Users must be able to access remote resources as though these resources were local. Transparency should as well promote user mobility. Users must be allowed

Monolithic, What is monolithic and its diagram

What is monolithic and its diagram

Invalid page fault, Invalid page fault :If a page fault happens for a ref...

Invalid page fault :If a page fault happens for a reference to an address that's not part of the virtual address space, so that there could not be a page in memory corresponding

Explain objectives of the file management system, Problem: a) Define a ...

Problem: a) Define a ‘file' and list the objectives of the file management system. b) List the ways in which programs access files and determine for what file types you woul

Can page tables be set up to replicate base registers, Q. We have an OS (o...

Q. We have an OS (operating system) for a machine that uses base and limit registers however we have modified the machine to provide a page table. Can the page tables be set up to

What inference does recovery in distributed systems, Q. Consider a distrib...

Q. Consider a distributed system with two sites A and B. Consider whether site A can distinguish among the following: a. B goes down. b. The link between A and B goes down.

Define unix device driver, Define UNIX device driver The UNIX device dr...

Define UNIX device driver The UNIX device driver is structured into two halves called top half and bottom half

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd