Efficient mutual exclusion in peer-to-peer systems

被引:0
|
作者
Muhammad, M [1 ]
Cheema, AS [1 ]
Gupta, I [1 ]
机构
[1] Motorola Inc, Schaumburg, IL 60196 USA
关键词
distributed algorithms; distributed computing; resource management; token networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the recent surge in the area of Grid computing, there is an urgency to find efficient ways of protecting consistent and concurrent access to shared resources. Traditional peer-to-peer (p2p) applications such as Kazaa and Gnutella have been primarily used for sharing read-only files (such as mpegs and mp3s). This paper introduces two novel protocols, the End-to-End and Non End-to-End, for achieving mutual exclusion efficiently in dynamic p2p systems. The protocols are layered atop a distributed hash table (DHT), making them scalable and fault-tolerant. The burden of controlling access to the critical section is also evenly distributed among all the nodes in the network, making the protocols more distributed and easily adaptable to growing networks. Since the protocols are designed independent of any specific DHT implementation, they can be incorporated with any generic p2p DHT, depending on the application requirements. We present experiments comparing our implementations with existing mutual exclusion algorithms. The significant reduction in overall message overhead and better load-balancing mechanisms makes the proposed protocols very attractive in being used for current and future p2p and Grid applications.
引用
收藏
页码:296 / 299
页数:4
相关论文
共 50 条
  • [1] A practical distributed mutual exclusion protocol in dynamic peer-to-peer systems
    Lin, SD
    Lian, Q
    Chen, M
    Zhang, Z
    [J]. PEER-TO-PEER SYSTEMS III, 2004, 3279 : 11 - 21
  • [2] Developing End-To-End Mutual Exclusion Protocol in Peer-to-Peer Systems
    Obeidae, Atef Ahmed
    Gubarev, Vasily Vasiliyevich
    [J]. IFOST 2008: PROCEEDING OF THE THIRD INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGIES, 2008, : 282 - 286
  • [3] Mutual anonymity Protocols for hybrid peer-to-peer systems
    Li, X
    Xu, ZC
    Zhang, XD
    [J]. 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 68 - 75
  • [4] An efficient protocol for peer-to-peer file sharing with mutual anonymity
    Ye, BL
    Zhou, JY
    Zhang, Y
    Cao, JN
    Chen, DX
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 665 - 670
  • [5] Efficient content locating in peer-to-peer systems
    Chen, HT
    Huang, ZU
    Gong, ZH
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 253 - 256
  • [6] Efficient Bandwidth Estimation for Peer-to-Peer Systems
    Sueselbeck, Richard
    Schiele, Gregor
    Komarnicki, Patricius
    Becker, Christian
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2011, : 10 - 19
  • [7] Efficient semantic search in peer-to-peer systems
    Zhou, AY
    Ling, B
    Lu, ZG
    Ng, WS
    Shu, YF
    Tan, KL
    [J]. ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2003, 2762 : 278 - 289
  • [8] Fair K Mutual Exclusion Algorithm for Peer To Peer Systems
    Reddy, Vijay Anand
    Mittal, Prateek
    Gupta, Indranil
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 655 - 662
  • [9] A peer mutual authentication method using PKI on super peer based peer-to-peer systems
    Oh, Byeong-Thaek
    Lee, Sang-Bong
    Park, Ho-Jin
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 2221 - 2225
  • [10] Proximity-Aware Distributed Mutual Exclusion for Effective Peer-to-Peer Replica Management
    Smith, Denvil
    Tzeng, Nian-Feng
    [J]. 2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 36 - 43