0% found this document useful (0 votes)
68 views

Algorithm

Uploaded by

dehinaye
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Algorithm

Uploaded by

dehinaye
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1.

Path-Pushing Algorithms
In path-pushing algorithms, distributed deadlocks are detected by maintaining an explicit global
WFG. The basic idea is to build a global WFG for each site of the distributed system. In this class of
algorithms, at each site whenever deadlock computation is performed, it sends its local WFG to all
the neighboring sites
2. Edge-Chasing Algorithms
In an edge-chasing algorithm, the presence of a cycle in a distributed graph structure is be verified
by propagating special messages called probes, along the edges of the graph. These probe
messages are different than the request and reply messages. The formation of cycle can be deleted
by a site if it receives the matching probe sent by it previously.
3. Diffusing Computations Based Algorithms
In diffusion computation based distributed deadlock detection algorithms, deadlock detection
computation is diffused through the WFG of the system. These algorithms make use of echo
algorithms to detect deadlocks. This computation is superimposed on the underlying distributed
computation. If this computation terminates, the initiator declares a deadlock global state detection.
4. Global State Detection Based Algorithms
Global state detection based deadlock detection algorithms exploit the following facts:
1 A consistent snapshot of a distributed system can be obtained without freezing the underlying
computation and
Lecture #9: Distributed Deadlock Detection
These topics are from Chapter 7 (Distributed Deadlock
Detection) in Advanced Concepts in OS

Topics for Today


 Review: Deadlock
o Definition
o Models for Requests: Single-Unit request model, AND request model,
OR request model,
o General Resource Graph
o Necessary and Sufficient conditions for a deadlock
 Distributed deadlock detection algorithms

System Model
 The systems have only reusable resources.
 Processes are allowed only exclusive access to resources.
 There is only one copy of each resource.

Distributed Deadlock Models


Based on WFG (not GRG)

 Nodes are processes


 Resources are located at a site, but may be held by processes at other sites
 Edge (P,Q) indicates P is blocked and waiting for Q to release some resource
 Deadlock exists iff there is a directed cycle or knot.

The text fudges a bit by forgetting that in some models the existence of a cycle is
necessary but not sufficient, and the existence of a knot is sufficient but not necessary,
leaving a gap.

Distributed Deadlock Handling Strategies


 Deadlock prevention
o All resource at once.
o Preventing a process from holding while waiting
o inefficient, can become deadlocked at resource acquiring phase, resource
requirements are unpredictable -- not an efficient, universal solution.
 Deadlock avoidance
o A resource is granted to a process if the resulting state is safe
o Every site has to maintain the global state
o The checking for a safe state must be done with mutual exclusion
o The number of processes and resources in a distributed system is large
o Not a practical solution
 Deadlock detection
o Once deadlock, always deadlock -- detection won't be outdated
o deadlock detection can be preceed concurrently with normal activities
o This is the usual approach -- the focus of this Chapter

Distributed Deadlock Detection Issues


 issues
o maintenance of WFG
o detection of cycles (or knots) in the WFG
 requirements
o progress = no undetected deadlocks
o safety = no false deadlocks

What do we do when a deadlock is detected?

Categorization of Methods
 centralized control
 distributed control
 hierarchical control

Simple Centralized Control


 one control site maintains the WFG and checks for deadlock
 other sites send request and release messages to control site

What are the advantages and disadvantages?


If we try to improve this algorithm by having each site maintaining its own WFG
locally and sending the information to the control site periodically, we may have false
deadlocks:

False Deadlock Example


Two transactions run concurrently:

T2: lock R1 T2: unlock R1 T2: lock R2


T1: lock R1 T : unlock R2
T1: unlock R1 T1: lock R2 T1: unlock R2 2

False Deadlock Example: Event Trace


Diagram

Ho-Ramamoorthy Algorithm: Two-Phase


 each site maintains table with status of all local processes
 control site periodically requests status from all sites, builds WFG, and checks
for deadlock
 if deadlock detected, control site repeats status requests, but throws out
transactions that have changed

May still report false deadlocks.

Ho-Ramamoorthy Algorithm: One-Phase


 each site maintains two tables:
o resource status (for all local resources)
o process status (for all local processes)
 control site periodically requests copies of tables, builds WFG, and checks for
deadlock
 transactions are not used unless the process table info agrees with the resource
table info

Notice the similarity in principle here to the Chandy-Lamport global sate recording
algorithm, i.e., we need to capture not just the states of the processes but also the
states of the messages in transit.

Classification of Distributed Detection


Algorithms
 path-pushing
o path information transmitted, accumulated
 edge-chasing
o ``I'm waiting for you'' probes are sent along edges
o single returned probe indicates a cycle
 diffusion
o ``Are you blocked?'' probes are sent along all edges
o all queries returned indicates a cycle
 global state detection
o take and use snapshot of system state

Obermarck's Path-Pushing Algorithm


 designed for distributed database systems
 processes are called ``transactions'' T1, T2, �Tn
 there is special virtual node Ex
 transactions are totally ordered

How can we totally order the transactions?

Obermarck's Path-Pushing Algorithm


1. wait for info from previous iteration of Step 3
2. combine received info with local TWFG
detect all cycles
break local cycles
3. send each cycle including the node Ex
to the external nodes it is waiting for
4. time-saver: only send path to other sites if last
transaction is higher in lexical order than the first

Note: In the textbook, the rule above is reversed, i.e., it says to only send the path of
the first transaction is higher in lexical order than the first. Either rule will work. The
essential idea is simply to have one canonical representation of each

path. 
Problems with Obermarck's Path-Pushing
Algorithm
Detects false deadlocks, due to asynchronous snapshots at different sites.

Message complexity? Message size? Detection delay?

Exactly how are paths combined and checked?

Obermarck's Path-Pushing Algorithm:


Performance
 O(n(n1)/2) messages
 O(n) message size
 O(n) delay to detect deadlock

Chandy-Misra-Haas Edge-Chasing
Algorithm
 for AND request model
 probe= (i,j,k) is sent for
detection initiated by Pi,
by site of Pj to site of Pk
 deadlock is detected when a probe returns to its initiator

Terminology
 Pj is dependent on Pk if there is a sequence Pj,Pi1,Pi2,�Pim, Pk such that each
process except Pk is blocked and each process except the first holds a resource
for which the previous process is waiting
 Pj is locally dependent on Pk if it is dependent and both processes are at the
same site
 array dependenti(j) = true � Pi knows that Pj is dependent on it
Algorithm Initiation by Pi
if Pi is locally dependent on itself then declare a deadlock
else send probe (i, j, k) to home site of Pk for each j, k such that all of the following
hold

 Pi is locally dependent on Pj


 Pj is waiting on Pk
 Pj and Pk are on different sites

Algorithm on receipt of probe (i,j,k)


check the following conditions

 Pk is blocked
 dependentk(i) = false
 Pk has not replied to all requests of Pj

if these are all true, do the following


 set dependentk(i) = true
 if k=i declare that Pi is deadlocked
 else send probe (i,m,n) to the home site of Pn for every m and n such that the
following all hold
o Pk is locally dependent on Pm
o Pm is waiting on Pn
o Pm and Pn are on different sites
Chandy Misra Haas Complexity
 What is the message complexity?
 What is delay in detection?

Analysis
 m(n1)/2 messages for m processes at n sites in the book, is this right?
 3-word message length
 O(n) delay to detect deadlock

Diffusion Based Algorithms: Chandy et al.


 for OR request model
 processes are active or blocked
 A blocked process may start a diffusion.
 if deadlock is not detected, the process will eventually unblock and terminate
the algorithm
 message = query (i,j,k)
o i = initiator of check
o j = immediate sender
o k = immediate recipient
 reply = reply (i,k,j)

On receipt of query(i,j,k) by m


 if not blocked then discard the query
 if blocked
o if this is an engaging query
propagate query(i,k,m) to dependent set of m
o else
 if not continously blocked since engagement then discard the
query
 else send reply(i,k,j) to j
On receipt of reply(i,j,k) by k
 if this is not the last reply
then just decrement the awaited reply count
 if this is the last reply then
o if i=k report a deadlock
o else send reply(i,k,m)
to the engaging process m
The black dashed arrows indicate the engaging process for each engaged process. This
information is needed to route the reply when the number of other processes for which
the engaged process is waiting goes to zero.

Observe that the engaging process arrows form a spanning tree of the subgraph
corresponding to the set of process for which the initiating process is waiting. If every
process in this subgraph is blocked, we have a knot.
At this point, a knot has been detected.

Global State Detection Based Algorithms


 take snapshot of distributed WFG
 use graph reduction to check for deadlock

Details differ.

Recall: What is graph reduction?

Graph Reduction
General idea: simulate the result of execution, assuming all unblocked processes
complete without requesting any more resources

 while there is an unblocked process, remove the process and all (resource-
holding) edges to it
 there is deadlock if the remaining graph is non-null

You might also like