Deadlock Detection and Avoidance in Static Step Topology under Distributed Environment

Abstract

During the past years, the distributed computing approach has become very popular due to various advantages over centralized approach. In the distributed approach, the execution of a process has reduced and also it requires low cost for installation. Many of the researchers are using the modeling approach for solution of the software and hardware architecture research problems. The most popular approach of modeling is known as Unified Modeling Language based on the object-oriented technology. In the present work, a method of deadlock detection is explained for the newly proposed static step topology for the distributed network. In the step topology, the processes are taken as a task, sub task, macro, subroutine, etc which are executed in reflexive and symmetric manners when the systems are interconnected to each other under distributed environment and avoidance technique is also presented for the same. The deadlock detection technique is presented through a UML class model.

Share and Cite:

T. Zaidi and V. Saxena, "Deadlock Detection and Avoidance in Static Step Topology under Distributed Environment," Journal of Software Engineering and Applications, Vol. 6 No. 2, 2013, pp. 48-52. doi: 10.4236/jsea.2013.62008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. Siberschatz and P. B. Galvin, “Operating Systems Concepts,” 5th Edition, John Wiley and Sons, Inc., Hoboken, 2008.
[2] A. S. Tanenbaum, “Distributed Operating Systems,” Prentice Hall, Upper Saddle River, 1995.
[3] N. Minar, “Distributed System Topologies Part 1 and Part 2,” 2012. http://www.open2p.com/lpt/a/1461,2002
[4] K. Hwang, “Advanced Computer Architecture”, McGraw-Hill Series in Computer Engineering, McGraw-Hill Inc., New York City, 1993.
[5] M. Milenkovic, “Operating Systems: Concepts and Design,” Tata McGraw-Hill, Noida, 1997.
[6] L. Lamport, “Time, Clocks and Ordering of Events in a Distributed System,” Communications of ACM, Vol. 21, No. 7, 1978, pp. 558-565. doi:10.1145/359545.359563
[7] G. Ricart and A. Agrawala, “An Optimal Algorithm for Mutual Exclusion in Computer Networks,” Communications of the ACM, Vol. 24, No. 1, 1991, pp. 9-17.
[8] M. Maekawa, “A N Algorithm for Mutual Exclusion in Decentralized Systems,” ACM Transactions on Computer Systems, Vol. 3, No. 2, 1985, pp. 145-159. doi:10.1145/214438.214445
[9] D. Agrawal and A. El Abbadi, “An Efficient and Fault Tolerant Solution for Distributed Mutual Exclusion,” ACM Transactions on Computer Systems, Vol. 9, No. 1, 1991, pp. 1-20. doi:10.1145/103727.103728
[10] I. Suzuki and T. Kasami, “A Distributed Mutual Exclusion Algorithm”, ACM Transactions on Computer Systems, Vol. 3, No. 4, 1985, pp. 344-349. doi:10.1145/6110.214406
[11] H. Gomma, “Designing Concurrent, Distributed, and Real-Time Applications with UML,” Proceedings of the 23rd International Conference on Software Engineering (ICSE’01), Toronto, 12-19 May 2001, pp. 2-15.
[12] S. Pllana and T. Fahringer, “On Customizing the UML for Modeling Performance Oriented Applications,” The Unified Modeling Language, Springer-Verlag, Dresden, Germany, 2002.
[13] S. Pllana and T. Fahringer, “UML Based Modeling of Performance Oriented Parallel and Distributed Applications”, Winter Simulation Conference, Washington, 8-11 December 2002, pp. 497-505. doi:10.1109/WSC.2002.1172922
[14] V. Saxena and D. Arora, “UML Modeling of a Protocol for Establishing Mutual Exclusion in Distributed Computer System,” International Journal of Computer Science and Network Security, Vol. 8, No. 6, 2008, pp. 227-235.
[15] V. Saxena and T. Zaidi, “Step Topology for Static Interconnection of Computer Systems under Distributed Environment,” World Conference of Information Technology, Barcelona, 14-17 November 2012, in Press.
[16] V. Saxena and T. Zaidi, “Modeling Aspects for Step and Bus Topologies under Distributed Computing System,” International Journal of Computer Applications, Vol. 53, No. 6, 2012, pp. 20-24.
[17] V. Saxena and T. Zaidi, “National knowledge Network vs. Information Communication Technology,” Proceedings of National Seminar in Information Technology, Muzzafarfur, 11-12 February 2012, pp. 24-28.
[18] V. Saxena and T. Zaidi, “Modifications in Lamport Algorithm for Distributed Computing System,” International Journal of Computer Applications, Vol. 53, No. 6, 2012, pp. 28-35.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.