wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Synchronization

profile
Himani Vaghasiya
Jul 12, 2023
0 Likes
0 Discussions
40 Reads

Defination: Processes Synchronization or Synchronization is the way by which processes that share the same memory space are managed in an operating system. It helps maintain the consistency of data by using variables or hardware so that only one process can make changes to the shared memory at a time. There are various solutions for the same such as semaphores, mutex locks, synchronization hardware etc.

Example: Let us take a look at why exactly we need Process Synchronization. For example, If a process1 is trying to read the data present in a memory location while another process2 is trying to change the data present at the same location, there is a high chance that the data read by the process1 will be incorrect.

 

 Different elements/sections of a program:

1). Entry Section: The entry Section decides the entry of 

process.

     2). Critical Section: Critical section allows and makes sure that only one process is modifying the shared data.

3). Exit Section: The entry of other processes in the shared data after the execution of one process is handled by the Exit section.

      4). Remainder Section: The remaining part of the code which is not categorized as above is contained in the Remainder section.


Comments ()


Sign in

Read Next

How to Find the Right Therapist For Me?

Blog banner

Logical and physical address

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

The most common internet security threats

Blog banner

Reconnaissance

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Health and fitness in technology

Blog banner

virtual machine

Blog banner

What is a Dumpster Diving Attack?

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Buffer overflow

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Ethical Hacking

Blog banner

Process State

Blog banner

Google

Blog banner

Paralysis/Paralysis Stroke

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

OS- Assignnment 1

Blog banner

Social Media Marketing Trends 2022

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Theads

Blog banner

Session Hijacking Techniques

Blog banner

Cycling

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Risk mitigation and management

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

BITCOIN WALLET

Blog banner

Student Grade Calculator in LISP

Blog banner

Rain bow

Blog banner

EMAIL INVESTIGATION

Blog banner

Evolution of operating systems

Blog banner

Service tax applied on sanitary pads and not condoms

Blog banner

Virtualization

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Service transistion under difficult conditions

Blog banner

geographic information system (GIS)

Blog banner

38_Exploring The Honeynet Project

Blog banner

semaphores

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

An Introduction To Quick Solutions Of International Dating Sites

Blog banner

Security Issues and Countermeasures

Blog banner