Skip to main content

M-Guard: A New Distributed Deadlock Detection Algorithm Based on Mobile Agent Technology

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3358))

Abstract

Deadlock detection and resolution are of the fundamental issues in distributed systems. Although many algorithms have been proposed, these message passing based traditional solutions can hardly meet the challenges of the prevailing Internet computing and mobile computing. In this paper, we present a novel algorithm, namely the M-Guard, for deadlock detection and resolution in distributed systems based on mobile agent technology. The proposed algorithm lies in the intersection of the centralized type algorithm and the distributed type algorithm. An agent is employed in our algorithm as a guard with dual-role: when roaming in the system according to a specified itinerary algorithm, the agent collects resource request/allocation information for detecting deadlock cycles as well as propagating the collected network and resource information among the nodes. Consequently, accurate and timely detections of deadlocks can be made without any network node being the performance bottleneck. Preliminary simulation results show that, compared with several other algorithms, the M-Guard algorithm achieves both shorter deadlock persisting time and smaller phantom deadlock ratio. Moreover, the overall network communication overhead can be decreased, too.

This work is partially supported by the National 973 Program of China under grant 2002CB312002, the National 863 Program of China under grant 2001AA113050 and the Hong Kong Polytechnic University under HK PolyU Research Grant G-YD63.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, J., Chan, G.H., Jia, W., Dillon, T.: Checkpointing and Rollback of Wide-Area Distributed Applications Using Mobile Agents. In: Proc. of 15th Intl. Parallel and Distributed Processing Symposium, San Francisco, California, USA, April 23-27, pp. 1–6 (2001)

    Google Scholar 

  2. Cao, J., Zhou, J., Zhu, W., Chen, D., Lu, J.: A mobile agent enabled approach for distributed deadlock detection. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol. 3251, pp. 535–542. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Chandy, K.M., Misra, J.: A Distributed Algorithm for Detecting Resource Deadlocks in Distributed Systems. ACM Trans. on Computer Systems 1(2), 144–156 (1983)

    Article  Google Scholar 

  4. Choudhary, A.N.: Cost of Distributed Deadlock Detection: A Performance Study. In: Proceedings of the 6th Intl. Conf. on Data Engineering, Los Angeles, California, USA, February 5-9, pp. 174–181 (1990)

    Google Scholar 

  5. Funfrocken, S.: Integrating Java-based Mobile Agents into Web Servers under Security Concerns. In: Proc. of 31st Hawaii Intl. Conf. on System Sciences, Hawaii, USA, January 6-9, pp. 34–43 (1998)

    Google Scholar 

  6. Ho, G.S., Ramamoorthy, C.V.: Protocols for Deadlock Detection in Distributed Database Systems. IEEE Trans. on Software Engineering 8(6), 554–557 (1982)

    Article  Google Scholar 

  7. Knapp, E.: Deadlock Detection in Distributed Databases. ACM Computing Surveys 19(4), 303–328 (1987)

    Article  Google Scholar 

  8. Kshemkalyani, A.D., Singhal, M.: Invariant-based Verification of a Distributed Deadlock Detection Algorithm. IEEE Trans. on Software Engineering 17(8), 789–799 (1991)

    Article  Google Scholar 

  9. Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM 42(3), 88–89 (1999)

    Article  Google Scholar 

  10. Lee, S., Kim, J.L.: Performance Analysis of Distributed Deadlock Detection Algorithms. IEEE Trans. on Knowledge and Data Engineering 13(4), 623–636 (2001)

    Article  Google Scholar 

  11. Mitchell, D.P., Merritt, M.J.: A Distributed Algorithm for Deadlock Detection and Resolution. In: Proc. of the 3rd ACM Symposium on Principles of Distributed Computing, New York, USA, August 27-29, pp. 282–284 (1984)

    Google Scholar 

  12. Obermarck, R.: Distributed Deadlock Detection Algorithm. ACM Trans. on Database Systems 7(2), 187–208 (1982)

    Article  Google Scholar 

  13. Pham, V.A., Karmouch, A.: Mobile Software Agents: An Overview. IEEE Communications 36(7), 26–37 (1998)

    Article  Google Scholar 

  14. Singhal, M.: Deadlock Detection in Distributed Systems. IEEE Computer 22(11), 37–48 (1989)

    Google Scholar 

  15. Young, M.K., Ten, H.L., Soundarajan, N.: Efficient Distributed Deadlock Detection and Resolution Using Probes, Tokens, and Barriers. In: Proc. of the 1997 Intl. Conf. on Parallel and Distributed Systems, Seoul, Korea, December 11-13, pp. 584–593 (1997)

    Google Scholar 

  16. Wu, J.: Distributed System Design. CRC Press, USA (1999)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, J., Chen, X., Dai, H., Cao, J., Chen, D. (2004). M-Guard: A New Distributed Deadlock Detection Algorithm Based on Mobile Agent Technology. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds) Parallel and Distributed Processing and Applications. ISPA 2004. Lecture Notes in Computer Science, vol 3358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30566-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30566-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24128-7

  • Online ISBN: 978-3-540-30566-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics