Sole access protocol in parallel programming , Computer Networking

Sole Access Protocol

The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

1)  Lock Synchronization: In this process contents of an atom are updated by requester process and sole access is granted before the atomic operation. This method can be applied for shared read-only access.

2)  Optimistic  Synchronization: This process also updates the atom by requester process, but sole access is granted after atomic operation via abortion. This technique is also known as post synchronisation. In this process, any process may secure sole access after first finishing an atomic operation on a local version of the atom, and then implementing the global version of the atom. The second operations make sure the concurrent update of the first atom with the updation of second atom.

3)  Server synchronization: It updates the atom by the server process of requesting process. In this process, an atom behaves as a unique update server. A process requesting an atomic operation on atom sends the request to the atom's update server. 

 

 

 

Posted Date: 3/4/2013 5:33:41 AM | Location : United States







Related Discussions:- Sole access protocol in parallel programming , Assignment Help, Ask Question on Sole access protocol in parallel programming , Get Answer, Expert's Help, Sole access protocol in parallel programming Discussions

Write discussion on Sole access protocol in parallel programming
Your posts are moderated
Related Questions
Explain about the Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the  Internet. The Ghoper was formed as a piece of sof

Consider the procedure described for estimating average delay di. Suppose that u=0.1. Let r1-t1 be the most recent sample delay, let     r2 -t2 be the next most recent sample delay

Q. Define the Backbone Networks? Backbone Networks - Allows several LANs to be connected - Non of station is directly connected to the backbone - Stations are part

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

How can I identify the difference types of networks

Routing Principle The principle  criterion of  successful routing is of course correctness but it not only criterion. You might  prefer to take the most direct route ( the  one


(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

ADVANTAGE AND DISADVANTAGE OF WIRING SCHEMES:  Each of three wiring procedure has disadvantages and advantages, which are illustrate as follows: RELIABILITY ISSUES:  W

Troubleshoot and Correct VTP and Configuration Errors When all errors are corrected, you should be capable to ping PC4 from PC1, PC5 from PC2, and PC6 from PC3. You should also