Bully algorithm


In distributed computing, the bully algorithm is a method for dynamically electing a coordinator or leader from a group of distributed computer processes. The process with the highest process ID number from amongst the non-failed processes is selected as the coordinator.

Assumptions

The algorithm assumes that:

Algorithm

The algorithm uses the following message types:
  • Election Message: Sent to announce election.
  • Answer Message: Responds to the Election message.
  • Coordinator Message: Sent by winner of the election to announce victory.
When a process recovers from failure, or the failure detector indicates that the current coordinator has failed, performs the following actions:
  1. If has the highest process ID, it sends a Victory message to all other processes and becomes the new Coordinator. Otherwise, broadcasts an Election message to all other processes with higher process IDs than itself.
  2. If receives no Answer after sending an Election message, then it broadcasts a Victory message to all other processes and becomes the Coordinator.
  3. If receives an Answer from a process with a higher ID, it sends no further messages for this election and waits for a Victory message.
  4. If receives an Election message from another process with a lower ID it sends an Answer message back and if it has not already started an election, it starts the election process at the beginning, by sending an Election message to higher-numbered processes.
  5. If receives a Coordinator message, it treats the sender as the coordinator.

Analysis

Safety

The safety property expected of leader election protocols is that every non-faulty process either elects a process, or elects none at all. Note that all processes that elect a leader must decide on the same process as the leader. The Bully algorithm satisfies this property, and at no point in time is it possible for two processes in the group to have
a conflicting view of who the leader is, except during an election. This is true because if it weren't, there are two processes and such that both sent the Coordinator message to the group. This means and must also have sent each other victory messages. But this cannot happen, since before sending the victory message, Election messages would have been exchanged between the two, and the process with a lower process ID among the two would never send out victory messages. We have a contradiction, and hence our initial assumption that there are two leaders in the system at any given time is false, and that shows that the bully algorithm is safe.

Liveness

Liveness is also guaranteed in the synchronous, crash-recovery model. Consider the would-be leader failing after sending an Answer message but before sending a Coordinator message. If it does not recover before the set timeout on lower ID processes, one of them will become leader eventually. If the failed process recovers in time, it simply sends a Coordinator message to all of the group.

Network bandwidth utilization

Assuming that the bully algorithm messages are of a fixed sizes, the most number of messages are exchanged in the group when the process with the lowest ID initiates an election. This process sends Election messages, the next higher ID sends messages, and so on, resulting in election messages. There are also the Alive messages, and co-ordinator messages, thus making the overall number messages exchanged in the worst case be.