Shared variable programme structures, Computer Networking

Shared variable programme structures

 In this section, we talk about some more concepts related to the shared programme.

Concept of Lock

Locks are used for protected access of data in a shared variable system. 

There are various types of locks:

1)   Binary Locks: These locks are used globally between multiple processes.

2)   Deckkers Locks:  These locks are based on distributed requests, to make sure mutual exclusion without unnecessary waiting.

 

Posted Date: 3/4/2013 5:36:39 AM | Location : United States







Related Discussions:- Shared variable programme structures, Assignment Help, Ask Question on Shared variable programme structures, Get Answer, Expert's Help, Shared variable programme structures Discussions

Write discussion on Shared variable programme structures
Your posts are moderated
Related Questions
What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab

Question 1 Explain classification of computer Network by range Question 2 Explain three major problems of Transmission lines Question 3 What is the maximum data rate of

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s



Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t

Q. What are the basic key functions of data link layer? Ans: Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

What is the advantage of address sharing? By using address translation instead of routing, address sharing gives an inherent security benefit. That's because host PCs on the In