Presented By –
Mushfekur Rahman
Implementation of
Election Algorithm of
Distributed Systems in
Client-Server Architecture
2
Distributed Systems
• Distributed systems are networked
computers or processes operating with same
resources generally mentioned as CRITICAL
SECTION.
• Critical Section can be any shared memory or
any shared data structure which can be
needed to update by each process.
3
Distributed Algorithms
• Distributed Algorithms are used to solve
some standard problems in Distributed
Systems such as mutual exclusion,
resource allocation, distributed search
and so on.
• Our project deals with only Mutual
Exclusion Problem.
4
Algorithms
• Here we will be describing about two common
algorithms to achieve mutual exclusion in
Distributed Systems.
1. Centralized Algorithm
2. Token Ring Algorithm
5
Centralized Algorithm …
• One process elected as coordinator
• Others send request to access into the
Critical Section
1. Request resource
2. Wait for response
3. Receive grant
4. access resource
5. Release resource
6
Centralized Algorithm …
• If another process claimed resource:
- Coordinator does not reply until release
- Maintain queue
•Service requests in FIFO order
7
Benefits
• All requests processed in order since there
is no priority so FIFO order is maintained
• Easy to implement, understand and verify
8
Token Ring Algorithm
• Assume known group of processes
- Some ordering can be imposed on group
- Construct logical ring in software
- Process communicates with neighbor
9
Token Ring Algorithm …
• Initialization
-Process 0 gets token for resource R
• Token circulates around ring
- From Pi to P(i+1)mod N
• When process acquires token
- Checks to see if it needs to enter
critical section
- If no, send ring to neighbor
- If yes, access resource
•Hold token until done
• Only one process at a time has token
– Mutual exclusion guaranteed
• Order well-defined
– Starvation cannot occur
• If token is lost (e.g. process died)
– It will have to be regenerated
• Does not guarantee FIFO order
– sometimes this is undesirable
10
Token Ring Algorithm …
THANK YOU !!!
11

More Related Content

PPT
Process Synchronization And Deadlocks
PPT
Mutual Exclusion Election (Distributed computing)
DOCX
Operating System Process Synchronization
PDF
Operating Systems - Process Synchronization and Deadlocks
PPTX
Process synchronization
PPTX
Concurrency
PPTX
Mutual Exclusion using Peterson's Algorithm
PPTX
Chapter05 new
Process Synchronization And Deadlocks
Mutual Exclusion Election (Distributed computing)
Operating System Process Synchronization
Operating Systems - Process Synchronization and Deadlocks
Process synchronization
Concurrency
Mutual Exclusion using Peterson's Algorithm
Chapter05 new

What's hot (20)

PDF
Operating Systems 1 (8/12) - Concurrency
PDF
8. mutual exclusion in Distributed Operating Systems
PPT
Dist deadlock sureka
DOCX
Critical section operating system
PPTX
Concurrency: Mutual Exclusion and Synchronization
PPTX
Process synchronization in Operating Systems
PDF
Deadlock in Distributed Systems
PPTX
Operating systems question bank
PPTX
A survey of distributed deadlock detection algorithms
PPTX
Process synchronization in operating system
PPTX
Critical Section in Operating System
PPTX
Process synchronization
PPT
Mutual exclusion and sync
PPTX
SYNCHRONIZATION
PPT
Process Synchronization
PPT
Process synchronization(deepa)
PPTX
Semaphore
PPT
Operating Systems - "Chapter 5 Process Synchronization"
PDF
Process Synchronization
PPT
Semaphores and Monitors
Operating Systems 1 (8/12) - Concurrency
8. mutual exclusion in Distributed Operating Systems
Dist deadlock sureka
Critical section operating system
Concurrency: Mutual Exclusion and Synchronization
Process synchronization in Operating Systems
Deadlock in Distributed Systems
Operating systems question bank
A survey of distributed deadlock detection algorithms
Process synchronization in operating system
Critical Section in Operating System
Process synchronization
Mutual exclusion and sync
SYNCHRONIZATION
Process Synchronization
Process synchronization(deepa)
Semaphore
Operating Systems - "Chapter 5 Process Synchronization"
Process Synchronization
Semaphores and Monitors
Ad

Similar to Implementation of Election Algorithm of Distributed Systems in Client-Server Architecture (20)

PDF
DC Lecture 04 and 05 Mutual Excution and Election Algorithms.pdf
PPTX
distributed system ppt presentation in cs
PDF
Chapter 11d coordination agreement
PPT
dos mutual exclusion algos
PPT
Mutual-Exclusion Algorithm.ppt
PPTX
Mutual Exclusion in Distributed Memory Systems
PPT
Coordination and Agreement .ppt
PPT
Distributed system TimeNState-Tanenbaum.ppt
PDF
7. Mutual Exclusion
PPT
Distributed System by Pratik Tambekar
PPTX
Synchronization
DOC
Distributed Mutual exclusion algorithms
PPTX
Synchronization in Distributed Systems.pptx
PPTX
PDF
Analysis of mutual exclusion algorithms with the significance and need of ele...
PDF
Process Synchronization
PPTX
Distributed Mutual Exclusion and Distributed Deadlock Detection
PPTX
OPERATING SYSTEMS PRESENTATION.pptx
PDF
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
PDF
Unit 3 Part 1.pdf distribution computing
DC Lecture 04 and 05 Mutual Excution and Election Algorithms.pdf
distributed system ppt presentation in cs
Chapter 11d coordination agreement
dos mutual exclusion algos
Mutual-Exclusion Algorithm.ppt
Mutual Exclusion in Distributed Memory Systems
Coordination and Agreement .ppt
Distributed system TimeNState-Tanenbaum.ppt
7. Mutual Exclusion
Distributed System by Pratik Tambekar
Synchronization
Distributed Mutual exclusion algorithms
Synchronization in Distributed Systems.pptx
Analysis of mutual exclusion algorithms with the significance and need of ele...
Process Synchronization
Distributed Mutual Exclusion and Distributed Deadlock Detection
OPERATING SYSTEMS PRESENTATION.pptx
A New Function-based Framework for Classification and Evaluation of Mutual Ex...
Unit 3 Part 1.pdf distribution computing
Ad

More from Mushfekur Rahman (7)

PPTX
An Automatic Method for Red-eye Detection and Correction in Digital Images
PPTX
Diagnosing HotSpot JVM Memory Leaks with JFR and JMC
PPTX
Webservices: The RESTful Approach
PPTX
Building a Unified Logging Layer with Fluentd, Elasticsearch and Kibana
PPTX
Http Basics
PPTX
Hands on Gradle
PPTX
Distributed Transaction Management in Spring & JEE
An Automatic Method for Red-eye Detection and Correction in Digital Images
Diagnosing HotSpot JVM Memory Leaks with JFR and JMC
Webservices: The RESTful Approach
Building a Unified Logging Layer with Fluentd, Elasticsearch and Kibana
Http Basics
Hands on Gradle
Distributed Transaction Management in Spring & JEE

Recently uploaded (20)

PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
Introduction to Windows Operating System
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
Cybersecurity: Protecting the Digital World
PDF
Website Design Services for Small Businesses.pdf
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Cost to Outsource Software Development in 2025
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Patient Appointment Booking in Odoo with online payment
Introduction to Windows Operating System
MCP Security Tutorial - Beginner to Advanced
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Cybersecurity: Protecting the Digital World
Website Design Services for Small Businesses.pdf
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Tech Workshop Escape Room Tech Workshop
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Oracle Fusion HCM Cloud Demo for Beginners
Autodesk AutoCAD Crack Free Download 2025
Advanced SystemCare Ultimate Crack + Portable (2025)
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Trending Python Topics for Data Visualization in 2025
Designing Intelligence for the Shop Floor.pdf
Cost to Outsource Software Development in 2025
Wondershare Recoverit Full Crack New Version (Latest 2025)
"Secure File Sharing Solutions on AWS".pptx
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...

Implementation of Election Algorithm of Distributed Systems in Client-Server Architecture

  • 1. Presented By – Mushfekur Rahman Implementation of Election Algorithm of Distributed Systems in Client-Server Architecture
  • 2. 2 Distributed Systems • Distributed systems are networked computers or processes operating with same resources generally mentioned as CRITICAL SECTION. • Critical Section can be any shared memory or any shared data structure which can be needed to update by each process.
  • 3. 3 Distributed Algorithms • Distributed Algorithms are used to solve some standard problems in Distributed Systems such as mutual exclusion, resource allocation, distributed search and so on. • Our project deals with only Mutual Exclusion Problem.
  • 4. 4 Algorithms • Here we will be describing about two common algorithms to achieve mutual exclusion in Distributed Systems. 1. Centralized Algorithm 2. Token Ring Algorithm
  • 5. 5 Centralized Algorithm … • One process elected as coordinator • Others send request to access into the Critical Section 1. Request resource 2. Wait for response 3. Receive grant 4. access resource 5. Release resource
  • 6. 6 Centralized Algorithm … • If another process claimed resource: - Coordinator does not reply until release - Maintain queue •Service requests in FIFO order
  • 7. 7 Benefits • All requests processed in order since there is no priority so FIFO order is maintained • Easy to implement, understand and verify
  • 8. 8 Token Ring Algorithm • Assume known group of processes - Some ordering can be imposed on group - Construct logical ring in software - Process communicates with neighbor
  • 9. 9 Token Ring Algorithm … • Initialization -Process 0 gets token for resource R • Token circulates around ring - From Pi to P(i+1)mod N • When process acquires token - Checks to see if it needs to enter critical section - If no, send ring to neighbor - If yes, access resource •Hold token until done
  • 10. • Only one process at a time has token – Mutual exclusion guaranteed • Order well-defined – Starvation cannot occur • If token is lost (e.g. process died) – It will have to be regenerated • Does not guarantee FIFO order – sometimes this is undesirable 10 Token Ring Algorithm …