In the Bully algorithm, a recovering process starts an election and will become the new coordinator
if it has a higher identifier than the current incumbent. Is this a necessary feature of the algorithm?
What will be an ideal response?
First note that this is an undesirable feature if there is no advantage to using a higher-numbered process: the
re-election is wasteful. However, the numbering of processes may reflect their relative advantage (for
example, with higher-numbered processes executing at faster machines). In this case, the advantage may be
worth the re-election costs. Re-election costs include the message rounds needed to implement the election;
they also may include application-specific state transfer from the old coordinator to the new coordinator.
To avoid a re-election, a recovering process could merely send a requestStatus message to successive lower
numbered processes to discover whether another process is already elected, and elect itself only if it receives
a negative response. Thereafter, the algorithm can operate as before: if the newly-recovered process discovers
the coordinator to have failed, or if it receives an election message, it sends a coordinator message to the
remaining processes.
You might also like to view...
Can you write a function that finds the silence between words? What should it return?
There are many possibilities in terms of what the function should return. At this point with what one has learned from the book thus far, the best solution would be to make use of a string that described where the silence segments were. Additionally, it’s not necessary to write a function for this section, though one can. Only the approach needs to be described.
The ____________________ option of the Scale attribute of a Flash movie fits the movie into the designated space so that no borders show, and the movie maintains the original aspect ratio.
Fill in the blank(s) with the appropriate word(s).
A technician removed several instances of malware from a customer’s Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files. Which of the following is the most likely cause for this error?
A. The malware removal process changed the file association for the .doc file type. B. The application used to open .doc files was corrupted during the malware removal process. C. The malware removal process deleted the file the user was attempting to open. D. The DLL file for the .doc file type was erased during the malware removal process.
Which of the following is where an unauthorized device is found allowing access to a network?
A. Bluesnarfing B. Rogue access point C. Honeypot D. IV attack