Sole access protocol in parallel programming , Computer Networking

Sole Access Protocol

The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

1)  Lock Synchronization: In this process contents of an atom are updated by requester process and sole access is granted before the atomic operation. This method can be applied for shared read-only access.

2)  Optimistic  Synchronization: This process also updates the atom by requester process, but sole access is granted after atomic operation via abortion. This technique is also known as post synchronisation. In this process, any process may secure sole access after first finishing an atomic operation on a local version of the atom, and then implementing the global version of the atom. The second operations make sure the concurrent update of the first atom with the updation of second atom.

3)  Server synchronization: It updates the atom by the server process of requesting process. In this process, an atom behaves as a unique update server. A process requesting an atomic operation on atom sends the request to the atom's update server. 

 

 

 

Posted Date: 3/4/2013 5:33:41 AM | Location : United States







Related Discussions:- Sole access protocol in parallel programming , Assignment Help, Ask Question on Sole access protocol in parallel programming , Get Answer, Expert's Help, Sole access protocol in parallel programming Discussions

Write discussion on Sole access protocol in parallel programming
Your posts are moderated
Related Questions
i have an exam i need it to be solved

Fiber Optic Cable A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts

What is the difference between a straight-through and crossover cable? A straight-through cable is used to connect computers to a hub, switch, or router. A crossover cable is u

What are NETBIOS and NETBEUI? NETBIOS is a programming interface that permits I/O requests to be sent to and received from a remote computer and it hides the networking hardwar

Pretty much any end-user program is an best example of the Application Layer.

State the benefits of Infrared light Infrared light does not penetrate walls or other opaque objects. This has two benefits: First, infrared communications can be more simply

Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data t

Define the term - Proxy servers These types of firewalls have been further classified into two types: application level gateways and circuit level gateways. The application

What is data encapsulation? Data encapsulation is the method of breaking down information into smaller manageable chunks before it is transferred across the network. It is also

What is Uniform Resource Locator Address of location for accessing Web pages. Clicking on an icon or "hot text" is the most common means of accessing and using a URL. Typing