Enhanced mutual exclusion algorithm for mobile computing environments

Hyun Ho Kim, Sang Joon Ahn, Tai Myoung Chung, Young Ik Eom

Research output: Contribution to journalArticlepeer-review

Abstract

The mobile computing system is a set of functions on a distributed environment organized to support mobile hosts. In this environment, mobile hosts should be able to move without any constraints and should remain connected to the network even while moving. Also, they should be able to get necessary information regardless of their current location and time. Distributed mutual exclusion methods for supporting distributed algorithms have hitherto been designed for networks only with static hosts. However, with the emergence of mobile computing environments, a new distributed mutual exclusion method needs to be developed for integrating mobile hosts with underlying distributed systems. In the sense, many issues that should be considered stem from three essential properties of mobile computing system such as wireless communication, portability, and mobility. Thus far, distributed mutual exclusion methods for mobile computing environments were designed based on a token ring structure, which has the drawback of requiring high costs in order to locate mobile hosts. In this paper, we propose not only a distributed mutual exclusion method that can reduce such costs by structuring the entire system as a tree-based logical structure but also recovery schemes that can be applied when a node failure occurs. Finally, we evaluate the operation costs for the mutual exclusion scheme and the recovery scheme.

Original languageEnglish
Pages (from-to)350-361
Number of pages12
JournalIEICE Transactions on Information and Systems
VolumeE85-D
Issue number2
StatePublished - Feb 2002

Keywords

  • Critical section
  • Distributed algorithm
  • Mobile computing
  • Mutual exclusion
  • Starvation

Fingerprint

Dive into the research topics of 'Enhanced mutual exclusion algorithm for mobile computing environments'. Together they form a unique fingerprint.

Cite this