Sole access protocol in parallel programming , Computer Networking

Sole Access Protocol

The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

1)  Lock Synchronization: In this process contents of an atom are updated by requester process and sole access is granted before the atomic operation. This method can be applied for shared read-only access.

2)  Optimistic  Synchronization: This process also updates the atom by requester process, but sole access is granted after atomic operation via abortion. This technique is also known as post synchronisation. In this process, any process may secure sole access after first finishing an atomic operation on a local version of the atom, and then implementing the global version of the atom. The second operations make sure the concurrent update of the first atom with the updation of second atom.

3)  Server synchronization: It updates the atom by the server process of requesting process. In this process, an atom behaves as a unique update server. A process requesting an atomic operation on atom sends the request to the atom's update server. 




Posted Date: 3/4/2013 5:33:41 AM | Location : United States

Related Discussions:- Sole access protocol in parallel programming , Assignment Help, Ask Question on Sole access protocol in parallel programming , Get Answer, Expert's Help, Sole access protocol in parallel programming Discussions

Write discussion on Sole access protocol in parallel programming
Your posts are moderated
Related Questions

What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance

Q. Explain Multipurpose Internet Mail Extensions? - The Multipurpose Internet Mail Extensions is an extension of SMTP that allows the transfer of multimedia and other non-ASCII

what are the applications of different encoding schemes

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

What is packet filter? Packet filter is a standard router up to with some extra functionality. The extra functionality permits every incoming or outgoing packet to be inspected

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

THIN ETHERNET WIRING: Thin Ethernet needs thin coax cable that is cost effective and easier to install than thick Ethernet coax. In this case transceiver electronics are creat

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c