Sole access protocol in parallel programming , Computer Networking

Sole Access Protocol

The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

1)  Lock Synchronization: In this process contents of an atom are updated by requester process and sole access is granted before the atomic operation. This method can be applied for shared read-only access.

2)  Optimistic  Synchronization: This process also updates the atom by requester process, but sole access is granted after atomic operation via abortion. This technique is also known as post synchronisation. In this process, any process may secure sole access after first finishing an atomic operation on a local version of the atom, and then implementing the global version of the atom. The second operations make sure the concurrent update of the first atom with the updation of second atom.

3)  Server synchronization: It updates the atom by the server process of requesting process. In this process, an atom behaves as a unique update server. A process requesting an atomic operation on atom sends the request to the atom's update server. 

 

 

 

Posted Date: 3/4/2013 5:33:41 AM | Location : United States







Related Discussions:- Sole access protocol in parallel programming , Assignment Help, Ask Question on Sole access protocol in parallel programming , Get Answer, Expert's Help, Sole access protocol in parallel programming Discussions

Write discussion on Sole access protocol in parallel programming
Your posts are moderated
Related Questions
A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

Question: (a) With mobile telecommunications providing an important engine for growth, continuing to stimulate growth and to ensure mobiles remain affordable for all, will re

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

1.  Consider these two potential additions to the MIPS instruction set and explain how they would restrict pipelining. a)  cp d1(r1), d2(r2) copy contents of word at address

What are the two broad class classifications under which Networks can be divided? All computer networks fit in one of the two dimensions namely: a)      Transmission Technol

iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Explain Bus Topology. The physical Bus topology is the easiest and most widely used of the network designs. It having of one continuous length of cable (trunk) and a terminatin

What are the Access methods used in LAN: i. Switched access: It is used in LANs which are assigned around CBXs. Electronic switching is techniques are used to provide access

What is a Management Information Base (MIB)? A Management Information Base is part of each SNMP-managed device. Every SNMP agent has the MIB database that having information ab