An Effective Methodology For Deadlock Detection: Mamta Mishra, Miss. Madhulika Sharma
An Effective Methodology For Deadlock Detection: Mamta Mishra, Miss. Madhulika Sharma
arbitrary but finite delay. The messages are neither lost nor
Abstract In distributed algorithms, the pieces of the duplicated and the entire system is fault-free. The events in
algorithm are run concurrently and independently in different the system are classified into internal and external events,
processes over the distributed systems. Deadlocks are very and they are time stamped using logical clock. They are
thorny to detect in distributed systems. This is so because no site has further classified into computation events and control events.
precise knowledge about the system, and each inter-site The computation event triggers the computational messages
communication involves a finite and unpredictable delay. such as DEMAND, RESPONSE, CANCEL and ACKN due
Furthermore in distributed systems, depending on the applications, to the execution of applications. Whereas, the control event
processes make requests according to different resource model such generates the control messages including INVOKE and
as Single Resource Model, AND Model, OR Model, AND-OR STATUS as a result of the execution of deadlock detection
Model, P out-of Q Model (generalized model ) and Unrestricted algorithm.
Model.
III. DESCRIPTION OF THE ALGORITHM
Index TermsAND-OR Model, Q Model,OR Model
Whenever a process i blocks on a pi out-of qi demands, it
I. INTRODUCTION initiates the deadlock detection algorithm. A process i, called
originator, records the consistent snapshot of distributed wait
The available generalized deadlock detection algorithms are for graph by propagating the INVOKE messages along the
grouped into two categories namely Centralized Algorithms and outgoing edges in the wait for graph. When the replies are
Distributed Algorithms. In Centralized algorithms, the global propagated backwards to the originator, the algorithm
state of the system is preserved at the single site, whereas in the reduces the snapshot to determine a deadlock. The proposed
Distributed algorithms, the information needs to determine a algorithm follows the method of the algorithm proposed by
Kshemkalyani and Singhal (1994) for handling concurrent
deadlock is maintained across multiple sites. But, both kinds of
executions. According to the method, the algorithm assigns a
algorithms have a few precincts. Distributed algorithms have unique priority to each instance based on the originators
required additional round of messages for resolving deadlocks, identifier, and the time at which it was blocked. It supports
whereas Centralized algorithms have suffered with single point the execution of higher priority instance and suspends the
of failure, large communicational overhead, and congestion of execution of lower priority instances in the conflicting
communication links near the control site and local processes. Hence, each originator maintains its own snapshot
to detect a deadlock. For simplicity, this section describes the
computational complexity. To overcome those problems, the
single instance execution of proposed algorithm.
requirement for novel and better generalized deadlock detection
algorithm is apparent Hence, all processes have equal amount of IV. EXPLANATION OF THE ALGORITHM
information, and bear equal responsibility to take the final
decision. However, a single site needs to have enough memory When process i wants to find out whether it is deadlocked, it
space and processing power in the centralized algorithms. So, sends a INVOKE(i,i) message to all its successors (outi). The
first parameter of the INVOKE message is id of the process
the centralized algorithms are resource intensive. Moreover, the
that propagates the message and the second parameter is the
distributed algorithms are more reliable than the centralized id of the originator. When process j receives the INVOKE
algorithms due to the absence of single point of failure. Also, message from process i, it performs one of the following
they are easily scalable. actions.
515 www.erpublication.org
An Effective Methodology For Deadlock Detection
V. EXAMPLE EXECUTION
516 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-4, April 2015
The stepwise execution of SDRA algorithm is given below.
Assume that
517 www.erpublication.org
An Effective Methodology For Deadlock Detection
Deadlock
3d+1 2d 2d+2 2d
Duration
Message
6e 4e-2n+2l 2e 2e
Complexity
Message
O(1) O(1) O(e) O(1)
Size
Deadlock No e 1
No Scheme
Resolution Scheme Messages Message
VII. CONCLUSION
518 www.erpublication.org