Coordination and time

Table of contents

  1. Introduction
  2. Clock synchronization
    1. NTP
    2. The Berkley algorithm
  3. History
    1. Serializability
  4. Logical clocks
    1. Lamport logical clocks
    2. Vector clocks
  5. Mutual exclusion
  6. Election algorithms
    1. The bully algorithm
  7. References


Coordination between processes can be required for several reasons:

  1. To ensure two sets of data are the same (data synchronization).
  2. To ensure one process waits for another to finish its operation (process synchronization).
  3. To manage the interactions and dependencies between activities in a distributed system (coordination).

[1, P. 297]

Clock synchronization

Clock synchronization is the process of coordinating independent clocks.

Clock synchronization in a distributed system is difficult since processes running on different machines will have different hardware clocks and hardware clocks suffer from clock drift. An average quartz-based hardware clock has a clock drift rate of around 31.5 seconds per year [1, Pp. 298, 303].

Clock synchronization is needed to overcome the problem of clock drift in order to provide a holistic view of a system, for example when reading logs from multiple processes.

Two important timekeeping concepts are precision and accuracy. Precision refers to the deviation between two clocks. Accuracy refers to the precision in reference to an external value, like UTC [1, P. 303].

Internal clock synchronization is the process of keeping clocks precise, whereas external clock synchronization is the process of making clocks accurate [1, P. 303].

UTC is the primary time standard used to regulate time. There are shortwave radio stations around the world that broadcast a pulse at the start of each UTC second, as well as satellites that offer a UTC service [1, P. 302].

A UTC receiver is hardware that can receive UTC from providers such as satellites. Other computers can sync their clocks to a computer equipped with a receiver in order to follow UTC [1, P. 302].

When a computer’s clock is greater than the actual time, the clock must be readjusted. Setting the clock to the lower correct time can lead to problems for programs that rely on an ever-increasing time value. To solve this, the time change can be introduced gradually. One way to do this is to reduce the number of milliseconds that the computer time is incremented by on each tick until the local time has caught up to the time the computer is synchronizing with.

There are many algorithms to synchronize several computers to one machine with a UTC receiver or for keeping a set of machines as synchronized as possible.


NTP (Network Time Protocol) is a protocol for synchronizing clocks over a network [1, P. 304].

In NTP, the clock offset and roundtrip delay between two machines is estimated by sending messages between them. The offset can then be used to adjust the local time [1, P. 305].

NTP divides servers into strata. A server with a reference clock is known as a stratum-1 server. When server contacts server , it will adjust its time iff . Once has synchronized, will change its stratum level to [1, P. 306].

The Berkley algorithm

The Berkley algorithm is an internal clock synchronization algorithm. It works by having a time daemon poll other machines periodically to get their respective times. The daemon then computes an average time using the answers and tells other machines to advance/slow their clocks to the new time [1, P. 306].

The Berkley algorithm works well for systems that don’t have a UTC receiver where internal clock synchronization is adequate [1, P. 306].


A history is a sequence of events that occur in a distributed system.

Informally, a history is said to be totally ordered if each event occurs one after the other. A total order can be created by ordering events according to the time each event occurred. In the case of multiple events occurring at the same time (concurrent events), the tie can be broken arbitrarily (e.g. by comparing the process ID of the event’s originator) [2].

Informally, a history is said to be partially ordered if some events are not ordered relative to each other.

Figure: Total and partial ordering

Note: For the formal definition of total ordering and partial ordering, see the total order Wikipedia page and the partial order Wikipedia page.


A history is defined as serializable if the outcome of executing transactions (or operations) in the history is the same as if the transactions were executed sequentially one after the other [3, P. 631].

Logical clocks

Logical clocks are abstract clocks that have no relation to physical time. They can be used in distributed systems to create an ordering of events [2, P. 559].

Lamport logical clocks

Leslie Lamport introduced a logical clock system in the paper Time, Clocks, and the Ordering of Events in a Distributed System [2].

Lamport’s clock system can be used to create a totally ordered history in a system that doesn’t have a precise physical time available to all processes [2, P. 559].

In the paper, Lamport introduces the happened-before relation (denoted: ). means event occurred before event .

Using Lamport’s assumptions, there are only three ways to determine that event :

  1. If and are events running in the same process and occurs before .
  2. If is the event of a message being sent by a process and is the event of the same message being received by a different process.
  3. If and then (happened-before is a transitive relation).

A Lamport clock system can be used to assign a number to each event. Each process has an event counter where assigns a number to event in that process. Globally, if is an event that occurred in [2, P. 559].

The Clock Condition states that if then . The Clock Condition is satisfied as long as two conditions hold:

  • C1: If and are events in process and occurs before then .
  • C2: If is the sending of a message by process and is receipt of the message by process , then .

[2, P. 560]

This can be implemented with the following rules:

  • IR1: Each process increments between any two successive events.
  • IR2:
    • a) If event is the sending of message by process , contains a timestamp
    • b) On receiving a message , process sets to

[2, P. 560]

The clock system creates a partially ordered history because two events can have the same event counter value. To create a totally ordered history, a tie between events with the same counter value can be broken arbitrarily by assigning a numeric value to a process’ ID and using the ID value to compare the conflicting events [2, P. 561].

Vector clocks

A vector clock is a data structure for determining the partial ordering of events in a distributed system.

Vector clocks extend on logical clocks to capture causality [4, P. 57].

With vector clocks, timestamps are represented as a vector where each index in the vector holds the event counter of a process , e.g.: .

Let be the vector clock of process and be the timestamp of message :

  1. is the number of events that have occurred so far at .
  2. is ’s knowledge of the local time at .

[1, P. 318]

Vector clocks are sent with messages according to the following rules:

  1. Before executing an event increments .
  2. When sends a message to process it sets ’s vector timestamp to after executing step 1.
  3. When receives a message it adjusts to for each (equivalent to merging causal histories). It then executes the first step to record the receipt of the message.

[1, P. 318]

This data allows a process to determine whether an event must have occurred before another event by comparing the values of each process’ timestamp at the time an event occurred [4, P. 59].

You can also use vector clocks to determine if two events are concurrent, which, depending on the event, could cause conflicts [1, P. 319].

Mutual exclusion

Mutual exclusion is needed to ensure that resources cannot be accessed multiple times, since concurrent access could lead to corrupted data [1, P. 321].

There are two main categories of distributed mutual exclusion algorithms:

  1. Token-based solutions
  2. Permission-based solutions

In token-based solutions a token is passed between processes. Only processes that hold a token can access the shared resource. The downside to token-based solutions is that if the token is lost a new token must be generated (which can be a complicated procedure) [1, P. 322].

In permission-based solutions, a process that wishes to access a resource must gain permission from other processes first [1, P. 322].

Election algorithms

Election algorithms are used to pick a node to perform a special role (e.g. a coordinator) [1, P. 329].

Generally, election algorithms work by deciding which reachable node has the highest ID [1, P. 329].

The goal of an election algorithm is to ensure that an election process ends with all processes agreeing on an elected node [1, P. 330].

The bully algorithm

The bully algorithm uses the following steps to elect a new coordinator:

  1. sends an ELECTION message to all processes with higher identifiers.
  2. If no one responds, wins the election and becomes coordinator.
  3. If one of the higher-valued nodes responds, it takes over from .

A node can receive an ELECTION message from a lower-valued node at any moment. If it does, the receiver sends OK to the sender to indicate that the node is alive and taking over, and the receiver then holds an election [1, P. 330].

Eventually all processes give up but one, which is the newly elected node. It announces its victory by sending a message to all processes [1, P. 330].

If a process that was down comes back up, it holds an election [1, P. 330].


  1. [1] A. Tanenbaum and M. van Steen, Distributed Systems, 3.01 ed. Pearson Education, Inc., 2017.
  2. [2] L. Lamport, “Time, Clocks, and the Ordering of Events in a Distributed System,” Commun. ACM, vol. 21, no. 7, pp. 558–565, Jul. 1978.
  3. [3] C. H. Papadimitriou, “The serializability of concurrent database updates,” Journal of the ACM (JACM), vol. 26, no. 4, pp. 631–653, 1979.
  4. [4] C. J. Fidge, “Timestamps in message-passing systems that preserve the partial ordering,” Proceedings of the 11th Australian Computer Science Conference, vol. 10, no. 1, pp. 56–66, 1988.