When does a correct mutual exclusion algorithm guarantee mutual exclusion?
نویسندگان
چکیده
Dijkstra introduced mutual exclusion for an N -process system as the requirement “that at any moment only one of these N cyclic processes is in its critical section” [1]. This requirement, which we call true mutual exclusion, is still the standard definition of mutual exclusion. Mutual exclusion algorithms for shared-memorymultiprocessors do not guarantee true mutual exclusion. We give a simple example that shows why a mutual exclusion algorithm can permit two critical sections to be executing at the same time. We prove that a shared-memory mutual exclusion algorithm does provide true mutual exclusion if a processor does not know in advance what memory operations will follow the critical section. Modern processors can look ahead at operations that follow a critical section. If true mutual exclusion is needed, this look-ahead must be inhibited. However, as we will explain, true mutual exclusion is seldom useful in practice. One of the strongest and most common assumptions made about multiprocessor shared memory is sequential consistency. Sequential consistency is defined as follows:
منابع مشابه
An Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm
Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...
متن کاملSelf-Stabilizing Mutual Exclusion Using Tokens in Mobile Ad Hoc Network
In this paper, we propose a self-stabilizing mutual exclusion algorithm using tokens for the mobile ad hoc network. Since the liveness condition of mutual exclusion can’t be guaranteed by any algorithm for a mobile ad hoc network with arbitary mobility, we consider a mobile ad hoc network with restricted mobility. Our algorithm is based on the dynamic virtual rings formed by the token circulati...
متن کاملBounds for Mutual Exclusion with only Processor Consistency
Most weak memory consistency models are incapable of supporting a solution to mutual exclusion using only read and write operations. Processor Consistency–Goodman’s version is an exception. Ahamad et al.[1] showed that Peterson’s mutual exclusion algorithm is correct for PC-G, but Lamport’s bakery algorithm is not. In this paper, we derive a lower bound on the number and type (singleor multi-wr...
متن کاملDynamic Sharing of a Multiple Access Channel
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes perform a concurrent program which occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed...
متن کاملCompositional Veri cation of Real - time Systems
This paper presents a compositional proof system for the veriication of real-time systems. Real-time systems are modeled as timed transition modules, which explicitly model interaction with the environment and may be combined using composition operators. Composition rules are devised such that the correct-ness of a system may be determined from the correct-ness of its components. These proof ru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 76 شماره
صفحات -
تاریخ انتشار 2000