Sole access protocol in parallel programming , Computer Networking

Sole Access Protocol

The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

1)  Lock Synchronization: In this process contents of an atom are updated by requester process and sole access is granted before the atomic operation. This method can be applied for shared read-only access.

2)  Optimistic  Synchronization: This process also updates the atom by requester process, but sole access is granted after atomic operation via abortion. This technique is also known as post synchronisation. In this process, any process may secure sole access after first finishing an atomic operation on a local version of the atom, and then implementing the global version of the atom. The second operations make sure the concurrent update of the first atom with the updation of second atom.

3)  Server synchronization: It updates the atom by the server process of requesting process. In this process, an atom behaves as a unique update server. A process requesting an atomic operation on atom sends the request to the atom's update server. 

 

 

 

Posted Date: 3/4/2013 5:33:41 AM | Location : United States







Related Discussions:- Sole access protocol in parallel programming , Assignment Help, Ask Question on Sole access protocol in parallel programming , Get Answer, Expert's Help, Sole access protocol in parallel programming Discussions

Write discussion on Sole access protocol in parallel programming
Your posts are moderated
Related Questions
Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

In spite of the incompatibilities among networks, researchers have devised a function that gives universal service among heterogeneous networks known 'internetworking'. It uses bot

can i get a sample networking project for 20 computer with all network components?

Question : (a) Several techniques are now available for users to connect to the Internet. (i) A modem is commonly used to dial up to the Internet. Why is a modem needed fo

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

No Retransmission This  protocols  will not  through  the correctly received packets  but buffers than  and send  acknowledgment  for those packets. Thus  retransmission of th

10Base-FL: Fiber Link Ethernet Utilizes star topology to connect stations to a hub External transceiver entitle as a fiber-optic MAU connects processing device to fib

The Common method for writing a program with PVM is as follows: A user writes one or more sequential programs in C, C++, or Fortran 77 having embedded PVM function (or subroutin

Some of the ?elds of IP and ICMP datagrams will be ?xed, some will be settable by the application, and others will computed according to the situation. You must set all ?elds of th