What is time-stamping, Operating System

Assignment Help:

time-stamping

It is a method proposed by Lamport, used to sequencing events in a distributed machine without the use of clocks. This process is intended to order events consisting of the transmission of codes. Each machine 'i' in the network used to maintain a counter Ci. Each time a system transmits a code; it adds its counter by 1 and selected the time-stamp Ti to the code. When a message is get, the receiving system 'j' puts its counter Cj to 1 more than the largest of its current number and the incoming timestamp Ti. At every site, the ordering of codes is calculated by the following principle: For messages x from site y and i from site j, x goes beyond y if one of the following conditions true....(a) if Ti

 

 

2013_time stamping.png


Related Discussions:- What is time-stamping

Architects applications by making use of multitasking, Architects Applicati...

Architects Applications by Making Use of Multitasking As the capability of computer hardware keeps increasing, operating systems are presented with overwhelming opportunities.

Name the evolutionary process models, Normal 0 false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Is disk scheduling except fcfs scheduling, Q. Is disk scheduling except FC...

Q. Is disk scheduling except FCFS scheduling useful in a single-user environment? describe your answer. Answer: In a single-user environment the I/O queue typically is empty.

Example of semaphore, For example, by initializing a semaphore to 0, thread...

For example, by initializing a semaphore to 0, threads can wait for an event to occur, and impose an ordering constraint, similar to a monitor using condition variables, but with m

Operating system.., What is the use of FIFOs in client-server applications

What is the use of FIFOs in client-server applications

Explain acyclic-graph directories, Acyclic-graph directories An acyclic...

Acyclic-graph directories An acyclic graph permits directories to have shared subdirectories and files. The similar file or subdirectory may be in two dissimilar directories. A

For what reason would such a scheme be useful, Q. A Burroughs B7000/B6000 ...

Q. A Burroughs B7000/B6000 MCP file is able to be tagged as sensitive data. When such a file is removed its storage area is overwritten by some random bits. For what reason would

Parent and child process communicate in unix, Parent and Child process comm...

Parent and Child process communicate in unix A child and parent can interact through any of the normal  inter-process communication schemes (pipes, message queues, sockets, s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd