The proposed algorithm is a betterment of the already existing Token Ring Algorithm, used to handle mutual exclusion in Distributed system. In the already existing algorithm, there are few problems, which, if occur during process execution, then the distributed system will not be able to ensure ...
1.On the base of the timed-token Protocol, Which is applied in the Fiber Distribrted Data Interface(FDDI), this paper improves the token ring algorithm, a known mutual exclusion methods for a Process to access to critical region in distributed system, to provide principle base for the distin...
Mutual Exclusion Algorithm These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves. References Author information Authors and Affiliations Computer Science Department, TECHNION, Haifa, Israel, 32000 ...
This article presents a fault tolerant extension for the Naimi-Trehel token-based mutual exclusion algorithm. Contrary to the extension proposed by Naimi-Trehel, our approach minimizes the use of broadcast support by exploiting the distributed queue of token requests kept by the original algorithm. ...
The tree's root is the site that last held the token. This organization is similar to that of Raymond's algorithm (1989). For its external communications, a group resorts to an external supplementary element: a router. This router manages external communications. The communication protocol ...
Due to the similarity, we simply refer to the older algorithm in this paper. The above protocols, except Raymond’s and Naimi’s, have an average message complexity larger than for a request. But Raymond needs an average of messages to send the token to a requester while ...
The algorithm proposed in [8] offers the best space complexity. All these above solutions [8, 7, 9, 10] h...F Petit and V Villain "Color optimal self-stabilizing depth-first token circulation protocol for asynchronous message-passing", PDCS-97 10th International Conference on Parallel...
2) token bucket algorithm 令牌桶算法 1. Research and Implement of Network Traffic Shaping Based on Leak Bucket Method and Token Bucket Algorithm; 基于漏桶理论及令牌桶算法的网络流量整形策略的研究与实现 2. Robustness of the token bucket algorithm is studied under the condition of different token...
Many existing token-based, distributed mutual exclusion algorithms can be generalized by a single algorithm. The number of messages required to provide mutual exclusion is dependent upon the logical topology imposed on the nodes and the policy used to forward requests. This paper extends the generaliz...
Congestion Organize of the best-effort service in the Internet was originally designed for a cooperative environment. It is still mainly dependent on the TCP congestion Organize algorithm at terminals, supplemented with load shedding at congestion links. This model is called the Terminal Dependent ...