A Permission-Based Distributed Mutual Exclusion Algorithm allowing Quality of Service (PBDMEAQoS)
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 10
Abstract
The main purpose of mutual exclusion in a distributed environment is to control access to a shared resource. Large-scale distributed systems such as clouds or grids provide shared informatics resources to its clients. In this type of environment, Service Level Agreement (SLA) allows for the definition of a type of quality of service (QoS) between a resource provider and a client. This means that some constraints like priority, response time or reliability must be taken into consideration to maintain a good QoS. Permission-based algorithms are costly in messages, not easily extensible and naturally more robust, pertaining to failures when compared to token algorithms. In this paper, we propose two mutual exclusion algorithms, integrating priority and time constraints for each request, via deadline and execution time in the critical section, with the aim of ensuring a proper service quality. The proposed algorithms are based on a logical structure of nodes in complete binary trees. The algorithms named PBDMEAQoSα and PBDMEAQoSβ are SLA (Service Level Agreement) based. They integrate priority dynamics, which cumulates with the age of a request. PBDMEAQoSα requires 3log2N messages per access to critical section and a synchronization delay of 2log2N for a set of N nodes competing for the critical resource. PBDMEAQoSβ requires 2log2N messages per access to critical section and a synchronization delay of log2N.
Authors and Affiliations
E. D. Ngounou Ntoukam, V. C. Kamla, J. C. Kamgang
Modeling user and topic interactions in social networks using Hawkes processes
We present in this paper a framework to model information diffusion in social networks based on linear multivariate Hawkes processes. Our model exploits the effective broadcasting times of information by users, which gua...
A Fair Cloud Resource Allocation using Data Envelopment Analysis
Internet technology is advancing with each passing day, the user's demand is also increasing. Of course the users will more concern to quality of service. The vendors must find out a win win method of resource allocation...
CloudTUI-FTS: a user-friendly and powerful tool to manage Cloud Computing Platforms
The NIST defines Cloud Computing as a model for en-abling ubiquitous network access to a shared pool of con-figurable computing resources. Thanks to the popularity of Cloud Computing and its various area of applicability...
Video Steganography using MATLAB
This paper discusses a Video Steganographic scheme that can provide approvable security with high computing speed, by embedding data in video frames. The technique of embedding data in a video file by using LSB before wh...
Adapting Data Popularity in Mobility-Based Proactive Caching Decisions for Heterogeneous Wireless Networks
The current paper presents extensions to a distributed user mobility-based proactive caching scheme that supports individual users’ requests, and a brief discussion of the benefits from exploiting user-centric features....