An Efficient and Fault-Tolerant Solution for Distributed Mutual Exclusion by D. Agrawal, A.E. Abbadi Presentation by Peter Tsui for COEN 317, F/03.

Slides:



Advertisements
Similar presentations
Chapter 13. Red-Black Trees
Advertisements

Dr. Kalpakis CMSC 621, Advanced Operating Systems. Distributed Mutual Exclusion.
Chapter 12 Binary Search Trees
CS 5204 – Operating Systems1 Paxos Student Presentation by Jeremy Trimble.
Token-Dased DMX Algorithms n LeLann’s token ring n Suzuki-Kasami’s broadcast n Raymond’s tree.
S. Sudarshan Based partly on material from Fawzi Emad & Chau-Wen Tseng
Tree Data Structures &Binary Search Tree 1. Trees Data Structures Tree  Nodes  Each node can have 0 or more children  A node can have at most one parent.
Ordering and Consistent Cuts Presented By Biswanath Panda.
Highly Concurrent and Fault-Tolerant h-out of-k Mutual Exclusion Using Cohorts Coteries for Distributed Systems.
Quorum Systems. 2 Quorum minimum number of people who must be present at a meeting (of a committee, etc) before it can proceed and its decisions, etc.
1 Trees. 2 Outline –Tree Structures –Tree Node Level and Path Length –Binary Tree Definition –Binary Tree Nodes –Binary Search Trees.
CS2420: Lecture 27 Vladimir Kulyukin Computer Science Department Utah State University.
A Fault-Tolerant h-out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems Presented by Jehn-Ruey Jiang National Central University.
A Fault-Tolerant h-out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems Presented by Jehn-Ruey Jiang National Central University.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
A Distributed Group k-Exclusion Algorithm Using k-Write-Read Coteries Presented by Jehn-Ruey Jiang National Central University Taiwan, R. O. C.
Computer Science Lecture 12, page 1 CS677: Distributed OS Last Class Vector timestamps Global state –Distributed Snapshot Election algorithms.
Version TCSS 342, Winter 2006 Lecture Notes Trees Binary Trees Binary Search Trees.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed Mutual Exclusion.
Distributed Mutual Exclusion
Fall 2004 TDIDT Learning CS478 - Machine Learning.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
4.5 DISTRIBUTED MUTUAL EXCLUSION MOSES RENTAPALLI.
4.5 Distributed Mutual Exclusion Ranjitha Shivarudraiah.
QoS-enabled Tree-based Distributed Mutexes James Edmondson Brian Sulcer.
Searching: Binary Trees and Hash Tables CHAPTER 12 6/4/15 Nyhoff, ADTs, Data Structures and Problem Solving with C++, Second Edition, © 2005 Pearson Education,
Centralized mutual exclusion Problem : What if the coordinator fails? Solution : Elect a new one.
Lecture 5: Sun: 1/5/ Distributed Algorithms - Distributed Databases Lecturer/ Kawther Abas CS- 492 : Distributed system &
MUTUAL EXCLUSION AND QUORUMS CS Distributed Mutual Exclusion Given a set of processes and a single resource, develop a protocol to ensure exclusive.
Computer Science Lecture 12, page 1 CS677: Distributed OS Last Class Vector timestamps Global state –Distributed Snapshot Election algorithms –Bully algorithm.
Chapter 2/6 –Critical Section Problem / Mutual exclusion progress, bounded wait –Hardware Solution disable interrupts –problems ? –Software Solution busy.
CAP + Clocks Time keeps on slipping, slipping…. Logistics Last week’s slides online Sign up on Piazza now – No really, do it now Papers are loaded in.
DC6: Chapter 12 Coordination Election Algorithms Distributed Mutual Exclusion Consensus Group Communication.
Hierarchical Quorum Consensus: A New Algorithm for Managing Replicated Data Akhil Kumar IEEE TRANSACTION ON COMPUTERS, VOL.40, NO.9, SEPTEMBER 1991.
Presenter: Long Ma Advisor: Dr. Zhang 4.5 DISTRIBUTED MUTUAL EXCLUSION.
1 Searching Searching in a sorted linked list takes linear time in the worst and average case. Searching in a sorted array takes logarithmic time in the.
Studying Different Problems from Distributed Computing Several of these problems are motivated by trying to use solutiions used in `centralized computing’
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Mutual Exclusion & Leader Election Steve Ko Computer Sciences and Engineering University.
ITEC452 Distributed Computing Lecture 6 Mutual Exclusion Hwajung Lee.
Hwajung Lee. Mutual Exclusion CS p0 p1 p2 p3 Some applications are:  Resource sharing  Avoiding concurrent update on shared data  Controlling the.
Hwajung Lee. Mutual Exclusion CS p0 p1 p2 p3 Some applications are: 1. Resource sharing 2. Avoiding concurrent update on shared data 3. Controlling the.
Binary Search Trees (BST)
A Tree Based Algorithm fro Distributed Mutual Exclusion Addy Gronquist 11/19/2003.
A Torus Quorum Protocol for Distributed Mutual Exclusion A Torus Quorum Protocol for Distributed Mutual Exclusion S.D. Lang and L.J. Mao School of Computer.
Lecture 7- 1 CS 425/ECE 428/CSE424 Distributed Systems (Fall 2009) Lecture 7 Distributed Mutual Exclusion Section 12.2 Klara Nahrstedt.
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
Decentralized solution 1
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Fault Tolerance (2). Topics r Reliable Group Communication.
Mutual Exclusion Algorithms. Topics r Defining mutual exclusion r A centralized approach r A distributed approach r An approach assuming an organization.
Hwajung Lee. Mutual Exclusion CS p0 p1 p2 p3 Some applications are:  Resource sharing  Avoiding concurrent update on shared data  Controlling the.
(c) University of Washington20c-1 CSC 143 Binary Search Trees.
Revisiting Logical Clocks: Mutual Exclusion Problem statement: Given a set of n processes, and a shared resource, it is required that: –Mutual exclusion.
Section Recursion 2  Recursion – defining an object (or function, algorithm, etc.) in terms of itself.  Recursion can be used to define sequences.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Oct 1, 2015 Lecture 12: Mutual Exclusion All slides © IG.
Chapter 11 Coordination Election Algorithms
Mutual Exclusion Continued
Distributed Mutual Exclusion
B+ Tree.
Outline Announcements Fault Tolerance.
Mutual Exclusion Problem Specifications
ITEC452 Distributed Computing Lecture 7 Mutual Exclusion
Mutual Exclusion CS p0 CS p1 p2 CS CS p3.
Lecture 36 Section 12.2 Mon, Apr 23, 2007
Synchronization (2) – Mutual Exclusion
ITEC452 Distributed Computing Lecture 7 Mutual Exclusion
CSC 143 Binary Search Trees.
Distributed Systems and Concurrency: Synchronization in Distributed Systems Majeed Kassis.
Distributed Mutual eXclusion
Chapter 11 Trees © 2011 Pearson Addison-Wesley. All rights reserved.
Presentation transcript:

An Efficient and Fault-Tolerant Solution for Distributed Mutual Exclusion by D. Agrawal, A.E. Abbadi Presentation by Peter Tsui for COEN 317, F/03

Goals Fault-Tolerant - sites, links, and network partitioning Low Communication Cost Distributed Solution

Background – Other Solutions Primary Site Distributed (Lamport) Majority Maekawa Token-Based (Raymond)

2 Ideas Coterie, C, is a set of sets or quorums. –Intersection Property – If g and h are quorums in C, then g and h has non-empty intersection. –Minimality Property – There are no two quorums g and h in C such that g is a superset of h. Use Logical Structure – Organize sites into a logical (complete) binary tree (easy extension to n-ary tree)

Tree Quorum TQ(T) Construction If AVAIL(T->Node) return – T->Node U TQ(T->Left-C) or – T->Node U TQ(T->Right-C) Else return –TQ(T->Left-C) U TQ(T->Right-C) –If either of above is empty, error

Example No fail : {1,2,4}, {1,2,5}, {1,3,6}, {1,3,7} {1} fail : {2,4,3,6}, {2,4,3,7}, {2,5,3,6}, {2,5,3,7} {2 or 3} fail : {1,4,5}, {1,6,7} {1, 2} fail : {4,5,3,6}, {4,5,3,7} {1,2,3} fail : {4,5,6,7} level complete binary tree

Correctness The set of Tree Quorums satisfy intersection and minimality properties of coteries. Proof by inducation of level of tree. Induction Step: Consider binary tree of level k+1. Any tree quorum is from one of following 3 classes:- {s1} U {members from quorum set of left subtree} {s1} U {members from quorum set of right subtree} {members from quorum set of left subtree} U {members from quorum set of right subtree}

Discussion Best case tree quorum size is (ceiling function on) log n (base 2). Worst case tree quorum size is (ceiling function on ) (n+1)/2. If {1,2,4} fail, no tree quorum possible. When {3,5,6,7} fail, a majority, tree quorum still possible. When less than log n nodes fail, tree quorum always possible.

Message Cost f = fraction of tree quorum that include ROOT of tree Recurrence relation of cost of tree quorum at level (l+1) in terms of l.

Availability Availability of Tree Quorum indistinguishable with Majority Quorum when p, probability of site availability, > Availability is only inferior when p is between [0.5, 0.75].

Some Applications Mutual Exclusion – send request to a tree quorum, get all replies to enter CS, send relinquish when done. Use Inquire/Yield to break deadlocks. Replication – use tree quorums for both read and write quorums. Get data with highest version number.

Conclusions Tree Quorum provide log n messaging cost in best case and (n+1)/2 in worst case. Tree Quorum provides fault tolerance up to about log n down sites in worst case. Tree Quorum availability is comparable with majority alogirthm when p > 0.75.