Preview

Mutex

Better Essays
Open Document
Open Document
1644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mutex
Operating System
Abstract
This paper problem and solution comparison is based on two journal paper in the area of computer science. The topic is about the problem of mutual-exclusion and the solutions given by Leslie Lamport and Gary L. Peterson.
1. Introduction
Leslie Lamport are responsible for many ground breaking result so mutual exclusion problem. Lamport was the first to notice the circular reasoning inherent in shared memory mutual exclusion algorithms that require atomic instruction. He shows that atomic reads and writes can be implemented from non-atomic reads and writes without mutual exclusion. Lamport also initiated the study of mutual exclusion algorithm that “fast” in the action of contention. He is also responsible for the first fully distributed solution for the mutual exclusion problem. The algorithm he used presented is a paper that also introduces logical clocks and state machines. Gary L. Peterson introduce the algorithm that much simpler than other algorithm.
2. Problem statement
Mutual exclusion algorithms are used to resolve conflicting accesses to shared resources by asynchronous, concurrent processes. A process accesses the resource to be managed by executing a “critical section” of code. Before and after executing its critical section, a process executes two other code fragments, called “entry" and “exit" sections, respectively. A process may stop within its non-critical section but not within its critical section. The objective is to design the entry and exit sections so that the following requirements hold. Exclusion; at most one process executes its critical section at any time. Starvation-freedom; if some process is in its entry section, then that process eventually executes its critical section.
3. Method used to solve problem
3.1 Leslie Lamport have introduces many works on mutual exclusion and has focused on “user-level” algorithm for shared memory based on either atomic or non-atomic reads or writes. He has



References: [1] L. Lamport. A new solution of Dijkstra 's concurrent programming problem. Communications of the ACM, 17(8) pp. 453-455, August 1974 [2] Gary L. Peterson. Myths About The Mutual Exclusion Problem. Information Processing Letters. Vol. 12, number 3, pp. 115-116

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 1 Study Guide

    • 378 Words
    • 2 Pages

    Multiple threads can interfere with each other when sharing hardware resources such as caches or translation lookaside buffers (TLBs). As a result, execution times of a single thread are not improved but can be degraded, even when only one thread is executing, due to lower frequencies or additional pipeline stages that are necessary to accommodate thread-switching hardware.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mat 540 Week 4

    • 4465 Words
    • 18 Pages

    15. If A and B are mutually exclusive events and S is the sample space such that P (A) = 1 P (B) and 3 S = A , B , then P (A) = (A) 1 4 (B) 1 2 (C) 3 4 (D) 3 8…

    • 4465 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    BCA SEM I / BCA 1040 / Unit 1 Logic Design Self Assessment Questions 1.2 1. Decimal means base __________. 2. The decimal value of the bit pattern 11111111 is _________. 3.…

    • 4533 Words
    • 19 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +• Synchronization: With multiple active processes having potential access to shared address spaces or shared I/O resources, care must be taken to provide effective synchronization. Synchronization is a facility that enforces mutual exclusion and event…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Ellis, R. (n.d.). Lock Granularity. Granularity of Locks_and Degrees of Consistency_in a Shared Database. Retrieved September 12, 2013, from www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&sqi=2&ved=0CF8QFjAI&url=http%3A%2F%2Fpages.cs.wisc.edu%2F~nil%2F764%2FTrans%2FGranularity.ppt&ei=kQ8yUqOhPIzl4AOM6oDIDw&usg=AFQjCNEdfijo3XG83N7W2WlglSi3cEJsQQ&sig2=WGLffPJ8amqYRjHXJAHLuQ&bvm=bv.52109…

    • 1383 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.…

    • 694 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Schneider, G.M. & Gersting, J.L., (2013). Invitation to Computer Science. (6th ed.). Boston, Ma: press…

    • 2002 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Database and Page Ref

    • 4307 Words
    • 19 Pages

    9) Concurrency control measures are taken to ensure that one user's work has absolutely no influence on another user's work.…

    • 4307 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Exercise 8 Study Guide

    • 398 Words
    • 2 Pages

    An unsafe state may not necessarily lead to deadlock, it just means that we cannot guarantee that deadlock will not occur. Thus, it is possible that a system in an unsafe state may still allow all processes to complete without deadlock occurring. Consider the situation where a system has 12 resources allocated among processes P0, P1, and P2. There sources are allocated according to the following policy:…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Sommer, R. (2009, July). An architecture for exploiting multi-core processors to parallelize network intrusion prevention..Concurrency & Computation: Practice & Experience, 21(10)…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Real Life Exercise

    • 638 Words
    • 3 Pages

    Give at least two “real life” examples (not related to a computer system environment) of each of these concepts: deadlock, starvation and race. Describe how the deadlocks could be resolved.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. Consider a concurrent program with two processes, p and q, defines as follows. A, B, C, D and E are arbitrary atomic ( indivisible ) statements. Assume that the main program ( not shown ) does a parbegin of the two processes.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Better Essays

    OSI Protocol Hierarchy

    • 533 Words
    • 3 Pages

    Synchronization. Move the two session entities into a known state. The session layer allows a process to add checkpoints, or synchronization points, to a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent.…

    • 533 Words
    • 3 Pages
    Better Essays