TY - GEN
T1 - Efficient mutual exclusion in peer-to-peer systems
AU - Muhammad, Moosa
AU - Cheema, Adeep S.
AU - Gupta, Indranil
PY - 2005
Y1 - 2005
N2 - Due to the recent surge in the area of Grid computing, there is an urgency to find efficient ways of protecting consistent and concurrent access to shared resources. Traditional peer-to-peer (p2p) applications such as Kazaa and Gnutella have been primarily used for sharing read-only files (such as mpegs and mp3s). This paper introduces two novel protocols, the End-to-End and Non End-to-End, for achieving mutual exclusion efficiently in dynamic p2p systems. The protocols are layered atop a distributed hash table (DHT), making them scalable and fault-tolerant. The burden of controlling access to the critical section is also evenly distributed among all the nodes in the network, making the protocols more distributed and easily adaptable to growing networks. Since the protocols are designed independent of any specific DHT implementation, they can be incorporated with any generic p2p DHT, depending on the application requirements. We present experiments comparing our implementations with existing mutual exclusion algorithms. The significant reduction in overall message overhead and better load-balancing mechanisms makes the proposed protocols very attractive in being used for current and future p2p and Grid applications.
AB - Due to the recent surge in the area of Grid computing, there is an urgency to find efficient ways of protecting consistent and concurrent access to shared resources. Traditional peer-to-peer (p2p) applications such as Kazaa and Gnutella have been primarily used for sharing read-only files (such as mpegs and mp3s). This paper introduces two novel protocols, the End-to-End and Non End-to-End, for achieving mutual exclusion efficiently in dynamic p2p systems. The protocols are layered atop a distributed hash table (DHT), making them scalable and fault-tolerant. The burden of controlling access to the critical section is also evenly distributed among all the nodes in the network, making the protocols more distributed and easily adaptable to growing networks. Since the protocols are designed independent of any specific DHT implementation, they can be incorporated with any generic p2p DHT, depending on the application requirements. We present experiments comparing our implementations with existing mutual exclusion algorithms. The significant reduction in overall message overhead and better load-balancing mechanisms makes the proposed protocols very attractive in being used for current and future p2p and Grid applications.
KW - Distributed algorithms
KW - Distributed computing
KW - Resource management
KW - Token networks
UR - http://www.scopus.com/inward/record.url?scp=33749664796&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33749664796&partnerID=8YFLogxK
U2 - 10.1109/GRID.2005.1542758
DO - 10.1109/GRID.2005.1542758
M3 - Conference contribution
AN - SCOPUS:33749664796
SN - 0780394933
SN - 9780780394933
T3 - Proceedings - IEEE/ACM International Workshop on Grid Computing
SP - 296
EP - 299
BT - Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
T2 - 6th IEEE/ACM International Workshop on Grid Computing
Y2 - 13 November 2005 through 14 November 2005
ER -