How a file can be shared among different users, Computer Engineering

Assignment Help:

Discuss the different techniques with which a file can be shared among different users.

Several popular techniques with that a file can be shared among various users are:

1. Sequential sharing: In this technique of sharing, a file can be shared through only one program at a time, it is file accesses by P1 and P2 are spaced-out over time. A lock field can be utilized to implement it. Setting and re-setting of the lock at file open and close makes sure that only one program can utilize the file at any time.

2. Concurrent sharing: Some number of programs may share a file concurrently. While this is the case, this is essential to ignore mutual interference among the

m. There are three categories of concurrent sharing:

a. Immutable files: If a file is shared into immutable mode, no one of the sharing programs can modify it. Such mode has the advantage that sharing programs are independent of one more.

b. Single image immutable files: There the changes made by one program are instantly visible to other programs. The Unix file system utilizes this file- sharing mode.

c. Multiple image mutable files: There many programs can concurrently update the shared file. All updating program creates a latest version of the file that is different from the version created through concurrent programs. Such sharing mode can only be utilized in applications where the existence of multiple versions and concurrent updates are meaningful.


Related Discussions:- How a file can be shared among different users

What is the draw back of micro programmed control, What is the draw back of...

What is the draw back of micro programmed control? It leads to a slower operating speed because of the time it takes to fetch microinstructions from the control store.

Explain the importance of computer architecture, Explain the importance of ...

Explain the importance of Computer architecture Computer architecture courses cover application, organization, architecture, logic and transistor layers. However, four other la

Describe about second generation computers, Q. Describe about Second Genera...

Q. Describe about Second Generation Computers? Silicon brought advent of second generation computers. A two state device termed as a transistor was created from silicon. Transi

Differences between inter statement and intra statement, Differences betwee...

Differences between inter statement and intra statement delay? //define register variables reg a, b, c; //intra assignment delays initial begin a = 0; c = 0;

Learning algorithm for multi-layered networks, Learning algorithm for multi...

Learning algorithm for multi-layered networks: Furthermore details we see that  if S is too high, the contribution from w i * x i is reduced. It means that t(E) - o(E) is mu

Explain the characteristics of program interpretation model, Explain the ch...

Explain the characteristics of program interpretation model. The program interpretation model characteristics are: The source program is retained into the source form it

Scope of supply chain management consultancy, What are included in scope of...

What are included in scope of Supply Chain Management Consultancy? Supply Chain Management Consultancy's scope is extensive, and classically includes as given here: a. Sales

Associative array processing, Associative Array Processing Consider tha...

Associative Array Processing Consider that a list of record or a table is stored in the memory and you want to search some information in that list. For example, the list havin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd