What is time-stamping, Operating System

time-stamping

It is a method proposed by Lamport, used to sequencing events in a distributed machine without the use of clocks. This process is intended to order events consisting of the transmission of codes. Each machine 'i' in the network used to maintain a counter Ci. Each time a system transmits a code; it adds its counter by 1 and selected the time-stamp Ti to the code. When a message is get, the receiving system 'j' puts its counter Cj to 1 more than the largest of its current number and the incoming timestamp Ti. At every site, the ordering of codes is calculated by the following principle: For messages x from site y and i from site j, x goes beyond y if one of the following conditions true....(a) if Ti

 

 

2013_time stamping.png

Posted Date: 8/20/2012 3:37:27 AM | Location : United States







Related Discussions:- What is time-stamping, Assignment Help, Ask Question on What is time-stamping, Get Answer, Expert's Help, What is time-stamping Discussions

Write discussion on What is time-stamping
Your posts are moderated
Related Questions
Q. Explain about Time Sharing Systems? Time Sharing Systems Multi-programmed batched systems provide an environment where various system resources (for illustration CP

Define busy waiting and spinlock. When a process is in its significant section, any other process that tries to enter its critical section must loop continuously in the entry c

Note that the parameter for scanf doesn't need the address operators & because name is an address. However the variable name has no defined space. This can cause problems within C

What are the disadvantages of linked allocation? The drawbacks are a. Used only for sequential access of files. b. Direct access is not supported c. Memory space neede

While it is hard to resolve a deadlock which has been detected, fortunately it is fairly easy to prevent deadlocks from ever happening. The key is that the conditions above for dea

What is a path name? A pathname is the path from the root by all subdirectories to a specified file. In a two-level directory structure a user name and a file name explain a pa

What are over lays? If a large process enters which is huge than the available memory we are able to use overlays. In this we can divide process into pieces .which is recognize

Question: (a) What are the main challenges for Mobile Computing? (b) What is the ISM band and what is particular about this frequency band? Name two wireless technologies


Consider the following snapshot of a system, answer the following questions using the banker's algorithm: 1. What is the content of the matrix Need? Is the system in a safe stat