
Multi-Resource Allocation Strategies for Unknown Participants
Explore various resource allocation models and strategies designed for scenarios where clients do not know each other, focusing on safety, liveness, and exclusion criteria. Discusses K-resource allocation, asynchronous message passing, and deadlock issues. Related work on peer-to-peer systems and drinking philosophers application also examined. Presented at PDAA'2011 in Osaka.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Multi-resource Allocation with Unknown Participants Ajoy K. Datta, St phane Devismes, Fran ois Kawala, Lawrence L. Larmore, and Maria Potop-Butucaru
K-resource Allocation C1 N >> M C2 R1 C3 R2 C4 C5 RM C6 Resources CN December 2, 2011 Clients PDAA'2011, Osaka
K-resource Allocation C1 N >> M C2 R1 Clients don t know each other C3 R2 C4 C5 RM C6 Resources CN December 2, 2011 Clients PDAA'2011, Osaka
K-resource Allocation C1 R1,R2 N >> M C2 R1 Clients don t know each other C3 R1,R3 R2 C4 Request: up to K resources R4 C5 Clients only know the IDs of the resource they request RM C6 R2, R6,R7 Resources Request given by an oracle CN December 2, 2011 Clients PDAA'2011, Osaka
K-resource Allocation C1 R1,R2 C2 R1 C3 R1,R3 R2 C4 R4 C5 RM C6 R2, R6,R7 Resources SAFETY: Each resource is used by at most one client at a time CN December 2, 2011 Clients PDAA'2011, Osaka
K-resource Allocation C1 R1,R2 C2 R1 C3 R1,R3 R2 LIVENESS: Every request is eventually satisfied C4 R4 C5 RM C6 R2, R6,R7 Resources CN December 2, 2011 Clients PDAA'2011, Osaka
Related Work K-out-of-L Exclusion Drinking philosophers Application: Peer-to-Peer systems December 2, 2011 PDAA'2011, Osaka
Model Asynchronous message passing Reliable link Any client can only communicate with the resources it requests December 2, 2011 PDAA'2011, Osaka
2-Resource Allocation Overview Queues At each resource To store client s requests The request at head of the queue is satisfied Issue Deadlock C2 C1 C3 R5 December 2, 2011 PDAA'2011, Osaka
2-Resource Allocation C1 C2 R1 C3 R2 R3 December 2, 2011 PDAA'2011, Osaka
Deadlock C1 C2 C1 C2 R1 C3 C2 C3 C1 C3 R2 R3 December 2, 2011 PDAA'2011, Osaka
Our solution First request: strong (Second request: weak) Two queues per resource: strong, weak Resource allocated to the head of its strong queue Weak requests move from weak to strong queue Under some conditions December 2, 2011 PDAA'2011, Osaka
Our solution R1 C1 C1,R1,Weak R2 December 2, 2011 PDAA'2011, Osaka
Our solution R1 C1 C1,R2,Strong C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 C1 C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 StrongReady R1 C1 C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 C1 C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 C1 C1 ResAllowed R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 CS C1 C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 C1 Done C1 R2 December 2, 2011 PDAA'2011, Osaka
Our solution C1 R1 C1 Done R2 December 2, 2011 PDAA'2011, Osaka
Our solution EndAck R1 C1 R2 December 2, 2011 PDAA'2011, Osaka
Deadlock C3 C2 C1 C2 C1 C3 R1 R2 R3 December 2, 2011 PDAA'2011, Osaka
Deadlock C2 C1 C3 C2 C1 C3 R1 R2 R3 December 2, 2011 PDAA'2011, Osaka
Dependancy Cycle C2 C1 C3 C2 C1 C3 R1 R2 R3 December 2, 2011 PDAA'2011, Osaka
Conflict Resolution Dependency cycle detection A message follows the dependencies Dependency cycle breaking A dependency is broken A client s request is penalized December 2, 2011 PDAA'2011, Osaka
Fairness Penalization must be fair Identifiers cannot be used We use a token circulating on the resource ring December 2, 2011 PDAA'2011, Osaka
Token (1/2) Token reception The resource marks all its strong requests Token releasing When all marked request have been satisfied Forwarded to the next resource in the ring Each resource gets the token infinitely often December 2, 2011 PDAA'2011, Osaka
Token (2/2) Token holder never penalized Penalized dependency: the one out-coming from the smallest non token holder The token holder flushes its old requests before releasing the token December 2, 2011 PDAA'2011, Osaka
Dynamicity Join New identity Leave With announcement: easy Crash Need a participant detector December 2, 2011 PDAA'2011, Osaka
Participant Detector Required : Perfect [Fetzer,2003] Strong completeness: Every client that leaves tge system is eventually removed from the participant lists Strong accuracy: No client can be removed from a list before it leaves the system December 2, 2011 PDAA'2011, Osaka
K > 2 Generalized the previous solution: hard Pessimistic approach: prevent deadlock creation Resource allocated sequentially Not efficient (not enough concurrency) Hybrid solution ? December 2, 2011 PDAA'2011, Osaka
Thank you December 2, 2011 PDAA'2011, Osaka