Skip to main content

A Dual-Token-Based Fault Tolerant Mutual Exclusion Algorithm for MANETs

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

Abstract

Most existing mutual exclusion algorithms for mobile ad hoc networks (MANETs) adopt a token-based approach. In traditional wired networks, timeout-based mechanisms are commonly used to detect token losses. However, in MANETs, it is difficult to set a proper timeout value due to the network dynamics. In this paper, we propose a dual-token-based mutual exclusion algorithm, which can tolerate token losses without using timeout. Two tokens are concurrently circulated in the system to monitor each other by using sequence numbers. If one token is lost, the other token can detect the loss and regenerate a new token. Simulations have been carried out to evaluate the effectiveness and performance of the proposed algorithm in comparison with the timeout-based approach. The results show that the timeout-based algorithm may falsely claim the loss of a token, thus cannot guarantee the correctness of mutual exclusion algorithms. On the contrary, our proposed algorithm can avoid false detection of token losses and satisfy all the correctness requirements of mutual exclusion, though it costs a bit more messages and longer time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baldoni, R., Virgillito, A., Petrassi, R.: A Distributed Mutual Exclusion Algorithm for Mobile Ad-Hoc Networks. In: Proc. of ISCC (2002)

    Google Scholar 

  2. Benchaïba, M., Bouabdallah, A., Badache, N., Ahmed-Nacer, M.: Distributed Mutual Exclusion Algorithms in Mobile Ad Hoc Networks: an Overview. ACM SIGOPS Operating Systems Review 38(1) (2004)

    Google Scholar 

  3. Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications & Mobile Computing (WCMC) 2(5) (2002)

    Google Scholar 

  4. Chang, Y., Singhal, M., Liu, M.: A Fault Tolerant Algorithm for Distributed Mutual Exclusion. In: Proc. of SRDS (1990)

    Google Scholar 

  5. Chen, Y., Welch, J.: Self-stabilizing Mutual Exclusion Using Tokens in Ad Hoc Networks. In: Proc. of Dial-M (April 2002)

    Google Scholar 

  6. Forman, G., Zahorjan, J.: The Challenges of Mobile Computing, IEEE Computer (1994)

    Google Scholar 

  7. Johnson, D., Maltz, D.: Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing. Ch. 5. Kluwer Academic Publishers, Boston, MA (1996)

    Google Scholar 

  8. Le Lann, G.: Distributed Systems, towards a Formal Approach, IFIP Congress (1977)

    Google Scholar 

  9. Malpani, N., Vaidya, N., Welch, J.: Distributed Token Circulation on Mobile Ad Hoc Networks. In: Proc. of ICNP (2001)

    Google Scholar 

  10. Mizuno, M., Neilsen, M., Rao, R.: A Token based Distributed Mutual Exclusion Algorithm based on Quorum Agreements. In: Proc. of ICDCS (1991)

    Google Scholar 

  11. Misra, J.: Detecting Termination of Distributed Computations Using Markers. In: Proc. of PODC (1983)

    Google Scholar 

  12. Nishio, S., Li, F., Manning, G.: A Resilient Mutual Exclusion Algorithm for Computer Networks. IEEE Trans. on Parallel and Distributed Systems 1(3) (July 1990)

    Google Scholar 

  13. Perkins, C., Bhangwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector (DSDV) Routing for Mobile Computers. In: Proc. of ACM SIGCOMM 1994 (August 1994)

    Google Scholar 

  14. Perkins, C., Royer, E.: Ad-hoc On-Demand Distance Vector Routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (February 1999)

    Google Scholar 

  15. Raymond, K.: A Tree-based Algorithm for Distributed Mutual Exclusion. ACM Transactions on Computer Systems 7(1) (1989)

    Google Scholar 

  16. Sanders, B.: The Information Structure of Distributed Mutual Exclusion Algorithms. ACM Trans. on Computer Systems 5(3) (1987)

    Google Scholar 

  17. Satyanarayanan, M.: Fundamental Challenges in Mobile Computing. In: Proc. of PODC (1996)

    Google Scholar 

  18. Singhal, M.: A Heuristically-aided Algorithm for Mutual Exclusion in Distributed Systems. IEEE Trans. on Computers 38(5) (1989)

    Google Scholar 

  19. Singhal, M. : A Taxonomy of Distributed Mutual Exclusion, Journal of Parallel and Distributed Computing (18) (1993)

    Google Scholar 

  20. Walter, J., Kini, S.: Mutual Exclusion on Multihop, Mobile Wireless Networks, Texas A&M Univ., College Station, TX 77843-3112, TR97-014 (December 9, 1997)

    Google Scholar 

  21. Walter, J., Welch, J., Vaidya, N.: A Mutual Exclusion Algorithm for Ad Hoc Mobile Networks. Wireless Networks 9(6) (November 2001)

    Google Scholar 

  22. Wu, W., Cao, J., Yang, J.: A Scalable Mutual Exclusion Algorithm for Mobile Ad Hoc Networks. In: Proc. of ICCCN (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, W., Cao, J., Raynal, M. (2007). A Dual-Token-Based Fault Tolerant Mutual Exclusion Algorithm for MANETs. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics