Abstract
The problem of mutual exclusion is a highly focused area in the distributed architecture. To avoid inconsistency in data, mutual exclusion ensures that no two processes running on different processors are allowed to enter into the same shared resource simultaneously in the system. In recent years, the consistent development of ongoing internet and mobile communication technologies, the devices, infrastructure and resources in networking systems like Ad Hoc Networks are becoming more complex and heterogeneous. Various algorithms have been introduced as a solution to mutual exclusion problem in the domain of distributed architecture over the past years. The performance and adaptability of these solutions depend on the different strategies used by them in the system. Various classifications of these strategies have been proposed such as token-based and non-token-based (also, permission-based). This paper presents a survey of various existing token-based distributed mutual exclusion algorithms (TBDMEA) in the focus of their performance measures and fault-tolerant capabilities which comprises the associated open challenges and directions to future research. In conjunction with traditional to latest proposed TBDMEA, token-based distributed group mutual exclusion algorithms (TBDGMEA) and token-based self-stabilizing distributed mutual exclusion algorithms (TBStDMEA) have also been surveyed in this paper as new variants of the token-based scheme.
Similar content being viewed by others
References
Tanenbaum AS, Maarten VS (2013) Distributed systems. Pearson Education, London
Srivastava A, Prakash J (2021) Future FANET with application and enabling techniques: anatomization and sustainability issues. Comput Sci Rev 39:100359. https://doi.org/10.1016/j.cosrev.2020.100359
Bekmezci I, Sahingoz OK, Temel Ş (2013) Flying Ad-Hoc Networks (FANETs): a survey. Ad Hoc Netw 11(3):1254–1270. https://doi.org/10.1016/j.adhoc.2012.12.004
Chriki A, Touati H, Snoussi H, Kamoun F (2019) FANET: communication, mobility models and security issues. Comput Netw. https://doi.org/10.1016/j.comnet.2019.106877
Dijkstra E (1965) Solution of a problem in concurrent programming control. Commun ACM 8:569. https://doi.org/10.1145/365559.365617
Saxena PC, Rai J (2003) A survey of permission-based Distributed Mutual Exclusion Algorithms. Comput Stand Interfaces 25(2):159–181. https://doi.org/10.1016/S0920-5489(02)00105-8
Ricart G, Agrawala AK (1981) An optimal algorithm for mutual exclusion in computer networks. Commun ACM 24(1):9–17. https://doi.org/10.1145/358527.358537
Suzuki I, Kasami T (1985) A Distributed Mutual Exclusion Algorithm. ACM Trans Comput Syst 3(4):344–349. https://doi.org/10.1145/6110.214406
Singhal M (1989) A heuristically-aided algorithm for mutual exclusion in distributed systems. IEEE Trans Comput 38(5):651–662. https://doi.org/10.1109/12.24268
Goscinski A (1990) Two algorithms for mutual exclusion in real-time distributed computer systems. J Parallel Distrib Comput 9(1):77–82. https://doi.org/10.1016/0743-7315(90)90114-5
Mishra S, Srimani PK (1990) Fault-tolerant mutual exclusion algorithms. J Syst Softw 11(2):111–129. https://doi.org/10.1016/0164-1212(90)90056-r
Nishio S, Li KF, Manning EG (1990) A resilient mutual exclusion algorithm for computer networks. IEEE Trans Parallel Distrib Syst 1(3):344–355. https://doi.org/10.1109/71.80161
Chang Y-I, Singhal M, Liu MT (1991) A dynamic Token-Based Distributed Mutual Exclusion Algorithm. In: [1991 Proceedings] Tenth Annual International Phoenix Conference on Computers and Communications. https://doi.org/10.1109/pccc.1991.113817
Makki K, Banta P, Been K, Pissinou N, Park EK (1992) A token based distributed k mutual exclusion algorithm. In: [1992] Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing. https://doi.org/10.1109/spdp.1992.242717
Maekawa M (1985) A √N algorithm for mutual exclusion in decentralized systems. ACM Trans Comput Syst 3(2):145–159. https://doi.org/10.1145/214438.214445
Agrawal D, Elabbadi A (1995) A Token-Based Fault-Tolerant Distributed Mutual Exclusion Algorithm. J Parallel Distrib Comput 24(2):164–176. https://doi.org/10.1006/jpdc.1995.1016
Lamport L (1978) Time, clocks, and the ordering of events in a distributed system. Commun ACM 21(7):558–565. https://doi.org/10.1145/359545.359563
Wu M (2002) An efficient Distributed Token-Based Mutual Exclusion Algorithm with central coordinator. J Parallel Distrib Comput 62(10):1602–1613. https://doi.org/10.1016/s0743-7315(02)91847-2
Tanenbaum S (1992) Modern operating systems. Prentice-Hall Inc, Englewood Cliffs
Mohamed N, Michel T (1988) How to detect a failure and regenerate the token in the Log(n) distributed algorithm for mutual exclusion. In: van Leeuwen J (ed) Distributed algorithms. WDAG 1987. Lecture notes in computer science, vol 312. Springer, Berlin. https://doi.org/10.1007/BFb0019802
Raymond K (1989) A tree-based algorithm for Distributed Mutual Exclusion. ACM Trans Comput Syst 7(1):61–77. https://doi.org/10.1145/58564.59295
Raymond K (1989) A distributed algorithm for multiple entries to a critical section. Inf Process Lett 30(4):189–193. https://doi.org/10.1016/0020-0190(89)90211-1
Satyanarayanan R, Muthukrishnan DR (1992) A note on Raymond’s tree based algorithm for Distributed Mutual Exclusion. Inf Process Lett 43(5):249–255. https://doi.org/10.1016/0020-0190(92)90219-l
Dhamdhere DM, Kulkarni SS (1994) A token based k-resilient mutual exclusion algorithm for distributed systems. Inf Process Lett 50(3):151–157. https://doi.org/10.1016/0020-0190(94)00019-0
Chang Y, Singhal M, Liu MT (1990) A fault tolerant algorithm for Distributed Mutual Exclusion. In: Proceedings Ninth Symposium on Reliable Distributed Systems, Huntsville, AL, USA, 1990, pp 146–154. https://doi.org/10.1109/RELDIS.1990.93960
Helary J-M, Mostefaoui A, Raynal M (1994) A general scheme for token and tree-based Distributed Mutual Exclusion algorithms. IEEE Trans Parallel Distrib Syst 5(11):1185–1196. https://doi.org/10.1109/71.329670
Thambu P, Wong J (1995) An efficient token-based mutual exclusion algorithm in a distributed system. J Syst Softw 28(3):267–276. https://doi.org/10.1016/0164-1212(94)00061-q
Naimi M, Trehel M, Arnold A (1996) A log (N) Distributed Mutual Exclusion Algorithm based on path reversal. J Parallel Distrib Comput 34(1):1–13. https://doi.org/10.1006/jpdc.1996.0041
Wagner C, Mueller F (2000) Token-based read/write-locks for Distributed Mutual Exclusion. Lect Notes Comput Sci. https://doi.org/10.1007/3-540-44520-x_167
Sopena J, Arantes L, Bertier M, Sens P (2005) A fault-Tolerant Token-Based Mutual Exclusion Algorithm using a dynamic tree. In: Cunha JC, Medeiros PD (eds) Euro-Par 2005 parallel processing. Euro-Par 2005. Lecture notes in computer science, vol 3648. Springer, Berlin. https://doi.org/10.1007/11549468_72
Naimi M, Trehel M (1987) (1987) How to detect a failure and regenerate the token in the log(n) distributed algorithm for mutual exclusion. Lect Notes Comput Sci LNCS 312:155–166. https://doi.org/10.1007/BFb0019802
Mueller F (2001) Fault tolerance for token-based synchronization protocols. Workshop on fault-tolerant parallel and distributed systems, IEEE. https://doi.org/10.1109/IPDPS.2001.925101
Lejeune J, Arantes L, Sopena J, Sens P (2015) (2015) A fair starvation-free prioritized mutual exclusion algorithm for distributed systems. J Parallel Distrib Comput. https://doi.org/10.1016/j.jpdc.2015.04.002
Kanrar S, Chaki N (2010) Fapp: a new fairness algorithm for priority process mutual exclusion in distributed systems. JNW 5(1):11–18
Mueller F (1999) Priority inheritance and ceilings for Distributed Mutual Exclusion. In: The 20th IEEE Real-Time Systems Symposium, 1999. Proceedings, pp 340–349. https://doi.org/10.1109/REAL.1999.818861
Chang Y-I (1994) Design of mutual exclusion algorithms for real-time distributed systems. J Inf Sci Eng 11(4):527–548
Chang YI, Singhal M, Liu MT (1990) An improved O(log N) mutual exclusion algorithm for distributed systems. In” Proceedings of 1990 International Conference on Parallel Processing, vol III, pp 295–302, August 1990.
Tamhane SA, Kumar M (2012) A token-based distributed algorithm for supporting mutual exclusion in opportunistic networks. Pervas Mobile Comput 2012:795–809. https://doi.org/10.1016/j.pmcj.2011.08.002
Baldoni R, Virgilito A, Petrassi R (2002) A Distributed Mutual Exclusion Algorithm for mobile ad-hoc networks. In: International Symposium on Computers and Communications, pp 539–544
Wu W, Cao J, Raynal M (2007) (2007) A dual-token-based fault tolerant mutual exclusion algorithm for MANETs. Mob Ad Hoc Sens Netw 4864(2007):572–583. https://doi.org/10.1007/978-3-540-77024-4_52
Malpani N, Chen Y, Vaidya N, Welch J (2005) Distributed token circulation in mobile ad hoc networks. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2005.25
Derhab A, Badache N (2008) A distributed mutual exclusion algorithm over multi-routing protocol for mobile ad-hoc networks. Int J Parallel Emergent Distrib Syst 23(3):197–218. https://doi.org/10.1080/17445760701536084
Walter JE, Welch JL, Vaidya NH (2001) (2001) A mutual exclusion algorithm for ad hoc mobile networks. Wirel Netw 7:585–600. https://doi.org/10.1023/A:1012363200403
Wu W, Cao J, Yang J (2008) A fault tolerant mutual exclusion algorithm for mobile ad hoc networks. Pervasive Mob Comput 4(1):139–160. https://doi.org/10.1016/j.pmcj.2007.08.001
Fakhfakh F, Tounsi M, Mohamed M (2020) Modeling and proving distributed algorithms for dynamic graphs. Future Gener Comput Syst 108:751–761. https://doi.org/10.1016/j.future.2020.03.003
Chaudhuri P (1995) An algorithm for Distributed Mutual Exclusion. Inf Softw Technol 37(7):375–381. https://doi.org/10.1016/0950-5849(95)91493-j
Chaudhuri P, Karaata MH (1998) An O(n1/3) Algorithm for Distributed Mutual Exclusion. J Syst Architect 45(5):409–420. https://doi.org/10.1016/s1383-7621(97)00087-8
Neamatollahi P, Sedaghat Y, Naghibzadeh M (2017) A simple token-based algorithm for the mutual exclusion problem in distributed systems. J Supercomput 73(9):3861–3878. https://doi.org/10.1007/s11227-017-1985-y
Saxena PC, Gupta S (1999) A token-based delay optimal algorithm for mutual exclusion in distributed systems. Comput Stand Interfaces 21(1):33–50. https://doi.org/10.1016/s0920-5489(99)00003-3
Helary J, Plozeau N, Raynal M (1988) A distributed algorithm for mutual exclusion in an arbitrary network. Comput J 31(4):289–295. https://doi.org/10.1093/comjnl/31.4.289
Yan Y, Zhang X, Yang H (1996) A fast token chasing mutual exclusion algorithm in arbitrary network topologies. J Parallel Distrib Comput 35(1996):156–172. https://doi.org/10.1006/jpdc.1996.0078
Loukantchevsky M (2020) Distributed ring-based mutual exclusion with failure recovery. In: Proceedings of the 21st International Conference on Computer Systems and Technologies '20 (CompSysTech '20). Association for Computing Machinery, New York, NY, USA, pp 111–115. https://doi.org/10.1145/3407982.3408014
Taheri H, Neamatollahi P, Naghibzadeh M (2011) A hybrid token-based Distributed Mutual Exclusion Algorithm using wraparound two-dimensional array logical topology. Inf Process Lett 111(17):841–847. https://doi.org/10.1016/j.ipl.2011.05.021
Neamatollahi P, Taheri H, Naghibzadeh M (2012) Info-based approach in Distributed Mutual Exclusion Algorithms. J Parallel Distrib Comput 72(5):650–665. https://doi.org/10.1016/j.jpdc.2012.01.005
Bertier M, Arantes L, Sens P (2004) Hierarchical token based mutual exclusion algorithms. In: IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004. https://doi.org/10.1109/ccgrid.2004.1336650.
Zheng W, Song LS, Mei’an L (2007) Ad hoc Distributed Mutual Exclusion Algorithm based on token-asking. J Syst Eng Electron 2007:398–406. https://doi.org/10.1016/S1004-4132(07)60104-2
Sharma B, Bhatia RS, Singh AK (2014) A token-based protocol for mutual exclusion in mobile Ad Hoc networks. J Inf Process Syst 10:36–54. https://doi.org/10.3745/JIPS.2014.10.1.036
Khanna A, Rodrigues JJPC, Gupta N, Swaroop A, Gupta D, Saleem K, de Albuquerque VHC (2019) A mutual exclusion algorithm for flying Ad Hoc networks. Comput Electr Eng 76:82–93. https://doi.org/10.1016/j.compeleceng.2019.03.005
Khanna A, Rodrigues JJPC, Gupta N, Swaroop A, Gupta D (2020) Local Mutual Exclusion algorithm using fuzzy logic for Flying Ad hoc Networks. Comput Commun 156:101–111. https://doi.org/10.1016/j.comcom.2020.03.036
Chang Y-I (1992) A priority-based approach to mutual exclusion for real-time distributed systems. In: Proceedings of of the International Computer Symposium, vol 1, pp 36–43
Fu SS, Tzeng N-F, Chung J-Y (2000) Empirical evaluation of mutual exclusion algorithms for distributed systems. J Parallel Distrib Comput 60(7):785–806. https://doi.org/10.1006/jpdc.2000.1635
Neilsen ML, Mizuno M (1991) A dag-based algorithm for Distributed Mutual Exclusion. In: Proceedings of 11th International Conference on Distributed Computing Systems, pp 354–360. https://doi.org/10.1109/ICDCS.1991.148689
Fu SS, Tzeng N-F (1995) Efficient Token-Based Approach to Mutual Exclusion in Distributed Memory Systems. Technical Report TR-95-8-1 CACS, Univ. Southwestern Louisiana, Lafayette, LA
Dice D, Kogan A (2021) Hemlock: compact and scalable mutual exclusion. arXiv:2102.03863
Srimani PK, Reddy RLN (1992) Another distributed algorithm for multiple entries to a critical section. Inf Process Lett 41(1):51–57. https://doi.org/10.1016/0020-0190(92)90079-b
DeMent NS, Srimani PK (1994) A new algorithm for k mutual exclusions in distributed systems. J Syst Softw 26(2):179–191. https://doi.org/10.1016/0164-1212(94)90087-6
Wang S, Lang SD (1994) A tree-based distributed algorithm for the K-entry critical section problem. In: Proceedings of 1994 International Conference on Parallel and Distributed Systems. https://doi.org/10.1109/icpads.1994.590400
Bulgannawar S, Vaidya NH (1995) A distributed K-mutual exclusion algorithm. In: Proceedings of 15th International Conference on Distributed Computing Systems, Vancouver, BC, Canada, 1995, pp 153–160. https://doi.org/10.1109/ICDCS.1995.500014
Chaudhuri P, Edward T (2008) An algorithm for k-mutual exclusion in decentralized systems. Comput Commun 31(14):3223–3235. https://doi.org/10.1016/j.comcom.2008.05.009
Kakugawa H, Kamei S, Masuzawa T (2008) A Token-Based Distributed Group Mutual Exclusion Algorithm with quorums. IEEE Trans Parallel Distrib Syst 19(9):1153–1166. https://doi.org/10.1109/tpds.2008.22
Joung Y-J (2000) Asynchronous Group Mutual Exclusion. Distrib Comput 13:189–206. https://doi.org/10.1007/PL00008918
Joung Y-J (2002) The congenial talking philosophers problem in computer networks. Distrib Comput 15:155–175. https://doi.org/10.1007/s004460100069
Mittal N, Mohan PK (2007) A Priority-based Distributed Group Mutual Exclusion Algorithm when group access is non-uniform. J Parallel Distrib Comput 67:797–815. https://doi.org/10.1016/j.jpdc.2007.02.005
Atreya R, Mittal N, Peri S (2007) A quorum-based Group Mutual Exclusion Algorithm for a distributed system with dynamic group set. IEEE Trans Parallel Distrib Syst 18(10):1345–1360. https://doi.org/10.1109/TPDS.2007.1072
Mizuno M, Neilsen ML, Rao R (1991) A Token-Based Distributed Mutual Exclusion Algorithm Based on Quorum Agreements. In: Proceeding of 11th IEEE International Conference on Distributed Computing Systems (ICDCS ’91), pp 361–368. https://doi.org/10.1109/ICDCS.1991.148690
Mamun Q, Khan MA (2020) A Group Mutual Exclusion protocol for the use case of IoT-blockchain integration in work-safe scenario. In: 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, pp 0025–0030. https://doi.org/10.1109/CCWC47524.2020.9031277
Belkhiria M, Bertier M, Tedeschi C (2020) Group Mutual Exclusion to scale distributed stream processing pipelines. In: 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC), Leicester, UK, pp 247–256. https://doi.org/10.1109/UCC48980.2020.00043
Aravind A (2020) Symmetric Tokens based Group Mutual Exclusion. In: 49th International Conference on Parallel Processing—ICPP : Workshops (ICPP Workshops '20). Association for Computing Machinery, New York, NY, USA, Article 5, pp 1–10. https://doi.org/10.1145/3409390.3409395
Hadzilacos V (2001) A note on Group Mutual Exclusion. In: Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp 100–106
Kiniwa J (2006) Request-based token passing for self-stabilizing mutual exclusion. Inf Sci 176(18):2603–2623. https://doi.org/10.1016/j.ins.2005.11.013
Chen Y, Welch JL (2005) Self-stabilizing dynamic mutual exclusion for mobile ad hoc networks. J Parallel Distrib Comput 65(9):1072–1089. https://doi.org/10.1016/j.jpdc.2005.03.009
Chen Y, Welch JL (2002) Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks. In: The Sixth Annual International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM’2002), 2002. https://doi.org/10.1145/570810.570815
Malpani N, Vaidya N, Welch J (2001) Distributed token circulation in mobile ad hoc networks. In: Proceedings of the Ninth International Conference on Network Protocols (ICNP)
Beauquier J, Gradinariu M, Johnen C, Durand-Lose J (2002) Token-Based Self-Stabilizing Uniform Algorithms. J Parallel Distrib Comput 62(5):899–921. https://doi.org/10.1006/jpdc.2001.1832
Aleliunas R, Karp RM, Lipton R, Lovasz L, Rackoff C (1979) Random walks, universal traversal sequences and the complexity of the maze problem. In: FOCS’79, Proceedings of the 20st Annual IEEE Symposium on Foundation of Computer Science, pp 218–223. https://doi.org/10.1109/SFCS.1979.34
Alstein D, Hoepman JH, Olivier B, Put P (1995) Self-stabilizing mutual exclusion on directed graphs. Technical Report 9513, CWI Amsterdam
Angluin D (1980) Local and global properties in networks of processors. In: STOC’80, Proceedings of the 12th Annual ACM Symposium on Theory of Computing, pp 82–93. https://doi.org/10.1145/800141.804655
Awerbuch B, Ostrovsky R (1994) Memory-efficient and self-stabilizing network reset. In: PODC’94, Proceedings of the 13th Annual ACM Symposium on Principles of Distributed Computing, pp 254–263. https://doi.org/10.1145/197917.198104
Beauquier J, Cordier S, Dela S et al (1995) Optimum probabilistic self-stabilization on uniform rings. In: WSS’95, Proceedings of the 2nd Workshop on Self-Stabilizing Systems, pp 15.1–15.15
Beauquier J, Gradinariu M, Johnen C (1999) Memory space requirements for self-stabilizing leader election protocols. In: PODC’99, Proceedings of the 18th Annual ACM Symposium on Principles of Distributed Computing, pp 199–208. https://doi.org/10.1145/301308.301358
Dijkstra E (1974) Self stabilizing systems in spite of distributed control. Commun Assoc Comput Mach 17(11):643–644. https://doi.org/10.1145/361179.361202
Dhoked S, Mittal N (2020) An adaptive approach to recoverable mutual exclusion. In: Proceedings of the 39th Symposium on Principles of Distributed Computing (PODC '20). Association for Computing Machinery, New York, NY, USA, pp 1–10. https://doi.org/10.1145/3382734.3405739
Bouabdallah A, Laforest C (2000) A distributed token-based algorithm for the dynamic resource allocation problem. ACM SIGOPS Oper Syst Rev 34(3):60–68. https://doi.org/10.1145/506117.506125
Shahryari O, Broumandnia A (2018) An improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm. J Comput Robot 11(2):49–58
Ismail DPII, Ja’afar MHF (2007). Mobile ad hoc network overview. In: 2007 Asia-Pacific Conference on Applied Electromagnetics. https://doi.org/10.1109/apace.2007.4603864
Jain M, Saxena R (2017) Overview of VANET: Requirements and its routing protocols. In: 2017 International Conference on Communication and Signal Processing (ICCSP). https://doi.org/10.1109/iccsp.2017.8286742
Khanna A, Singh AK, Swaroop A (2016) A Token-Based Solution to Group Local Mutual Exclusion Problem In Mobile Ad Hoc Networks. Arab J Sci Eng 41:5181–5194. https://doi.org/10.1007/s13369-016-2199-y
Rohit VR, Eswarathevar R (2019) Priority based hybrid Mutual Exclusion Algorithm with starvation avoidance for MANET. Proc Natl Acad Sci India Sect A Phys Sci 89:643–651. https://doi.org/10.1007/s40010-018-0513-7
Sharma B, Bhatia RS, Singh AK (2011) An O(1/n) protocol for supporting distributed mutual exclusion in Vehicular Ad Hoc Networks. In: Nagamalai D, Renault E, Dhanuskodi M (eds) Advances in parallel distributed computing. PDCTA 2011. Communications in computer and information science, vol 203. Springer, Berlin
Wu W, Zhang J, Luo A, Cao J (2015) Distributed Mutual Exclusion Algorithms for intersection traffic control. IEEE Trans Parallel Distrib Syst 26(1):65–74. https://doi.org/10.1109/TPDS.2013.2297097
Lim J, Jeong YS, Park DS et al (2018) An efficient distributed mutual exclusion algorithm for intersection traffic control. J Supercomput 74:1090–1107. https://doi.org/10.1007/s11227-016-1799-3
Shehu HA, Sharif MH, Ramadan RA (2020) Distributed Mutual Exclusion Algorithms for intersection traffic problems. IEEE Access 8:138277–138296. https://doi.org/10.1109/ACCESS.2020.3012573
Jin X, Han J (2011) K-means clustering. In: Sammut C, Webb GI (eds) Encyclopedia of machine learning. Springer, Boston. https://doi.org/10.1007/978-0-387-30164-8_425
Cunningham P, Cord M, Delany SJ (2008) Supervised learning. In: Cord M, Cunningham P (eds) Machine learning techniques for multimedia: cognitive technologies. Springer, Berlin. https://doi.org/10.1007/978-3-540-75171-7_2
Sunyaev A (2020) Distributed ledger technology. In: Internet computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_9
Funding
This study was not funded by any organization.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest in relation to this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: Symbol notations
Symbol | Description |
---|---|
N | Number of nodes in the distributed network |
L | (L \(\in\) Z+ , L > 1) |
k/K | Number of token in the network |
d (D) | Diameter of network topology |
q | Number of neighbor nodes |
e | total number of edges in network |
M | Switch count between Pi and Pj |
\(\omega\) | Average time unit after which a node regenerates the CS request for next time |
\(\left| Q \right|\) | Size of quorum |
T | Message propagation delay |
\(\gamma\) | Poisson distribution with average rate |
Appendix 2: List of abbreviations
FC | Fully connected |
---|---|
LRT | Logical rooted tree |
MSUT | Minimal spanning unrooted tree |
DRT | Dynamic rooted tree |
TLTBA | Two-level trees based on arbitrators |
DLT | Dynamic logical tree |
DT | Directed tree |
BST | BFS spanning tree |
SLT | Static logical tree |
G | Graph |
DAG | Directed acyclic graph |
EM | Equivalent Mesh |
TDEM | Three-Dimensional Equivalent Mesh |
TLS | Torus logical structure |
CR | Chordal ring |
VRT | Virtual ring topology |
W2DA | Wraparound 2-D array |
2DA | 2-D array |
HNT | Hierarchical network topology |
ANT | Arbitrary network topology |
AHN | Ad Hoc Network |
DG | Dynamic graph |
RB | Ring based |
OG | Object graph |
HLC | Hardware level circuit |
DN | Directed network |
I&IC | Inter and intra cluster |
LS | Logical structure |
CB | Coterie based |
ASMM | Asynchronous shared memory model |
MANET | Mobile Ad Hoc Network |
FANET | Flying Ad Hoc Network |
Rights and permissions
About this article
Cite this article
Parihar, A.S., Chakraborty, S.K. Token-based approach in distributed mutual exclusion algorithms: a review and direction to future research. J Supercomput 77, 14305–14355 (2021). https://doi.org/10.1007/s11227-021-03802-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03802-8