skip to main content
article
Free Access

A √N algorithm for mutual exclusion in decentralized systems

Authors Info & Claims
Published:01 May 1985Publication History
Skip Abstract Section

Abstract

An algorithm is presented that uses only c√N messages to create mutual exclusion in a computer network, where N is the number of nodes and c a constant between 3 and 5. The algorithm is symmetric and allows fully parallel operation.

References

  1. 1 ALBERT, A. A., AND SANDLER, R. An Introduction to Finite Projective Planes. Holt, Rinehart, and Winston, New York, 1968.Google ScholarGoogle Scholar
  2. 2 CARVALHO, O. S. F., AND ROUCAIROL, G. On mutual exclusion in computer networks. Commun. ACM 26, 2 (Feb. 1983), 146-147.Google ScholarGoogle Scholar
  3. 3 CHANG, E. J. H., AND ROBERTS, R. An improved algorithm for decentralized extrema-finding in circular configurations of processes. Comrnun. ACM 22, 5 (May 1979), 281-283. Google ScholarGoogle Scholar
  4. 4 GARCIA-MOLINA, H., AND BARBARA, D. How to assign votes in a distributed system. Tech. Rep. 311, Dept. of Electrical Engineering and Computer Science, Princeton Univ., Princeton, N.J., 1983.Google ScholarGoogle Scholar
  5. 5 GIFFORD, D.K. Weighted voting for replicated data. In Proceedings of the 7th Symposium on Operating System Principles (Pacific Grove, Calif., Dec. 10-12), ACM, New York, 1979, pp. 150- 162. Google ScholarGoogle Scholar
  6. 6 HIRSCHBERG, D. S., AND SINCLAIR, J.B. Decentralized extrema-finding in ciruclar configurations of processors. Cornmun. ACM 23, 11 (Nov. 1980), 627-628. Google ScholarGoogle Scholar
  7. 7 LAMPORT, L. The implementation of reliable distributed multiprocess systems. Comput. Networks 2 (1978), 95-114.Google ScholarGoogle Scholar
  8. 8 RICART, G., AND AGRAWALA, A.K. An optimal algorithm for mutual exclusion in computer networks. Commun. ACM 24, 1 (Jan. 1981), 9-17. Google ScholarGoogle Scholar
  9. 9 SCHNEIDER, F.B. Synchronization in distributed programs. A CM Trans. Program. Lang. Syst. 4, 2 (Apr. 1982), 125-148. Google ScholarGoogle Scholar
  10. 10 SKEEN, D. A quorum-based commit protocol. In Proceedings o{ the 6th Berkeley Workshop on Distributed Data Management and Computer Networks (Feb. 1982), pp. 69-80.Google ScholarGoogle Scholar
  11. 11 THOMAS, R. H. A majority consensus approach to concurrency control for multiple copy databases. ACM Trans. Database Syst. 4, 2 (June 1979), 180-209. Google ScholarGoogle Scholar

Index Terms

  1. A √N algorithm for mutual exclusion in decentralized systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Computer Systems
      ACM Transactions on Computer Systems  Volume 3, Issue 2
      May 1985
      83 pages
      ISSN:0734-2071
      EISSN:1557-7333
      DOI:10.1145/214438
      Issue’s Table of Contents

      Copyright © 1985 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 May 1985
      Published in tocs Volume 3, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader