Higher-Level Synchronization and Communication 3.1 SHARED MEMORY METHODS 3.2 DISTRIBUTED SYNCHRONIZATION AND COMMUNICATION 3.3 OTHER CLASSIC SYNCHRONIZATION PROBLEMS
ثبت نشده
چکیده
The main objections to semaphores and events—the synchronization mechanisms introduced in the last chapter—are that they are too low level and do not support the elegant structuring of concurrent programs. For example, they do not permit a segment of code to be designated explicitly as a critical section (CS). Rather, the effect of a CS must be enforced by correctly using the semaphore operations, i.e., by enclosing the desired segment between a pair of P and V operations and presetting the corresponding semaphore to 1, or by employing a mutex lock and mutex unlock pair correctly. Violating any of these rules will destroy the desired effect. Since P and V operations may be used anywhere in a program, the task of understanding and verifying the desired behavior of programs becomes very difficult. One common error that is usually extremely difficult to detect is the omission of a required V operation from a program or its mere bypassing when execution follows some unexpected path; this could result in a situation where processes are blocked forever—a situation commonly referred to as deadlock. Equally dangerous and common is an unintentional execution of a V operation, permitting, e.g., more than one process to enter a CS. The first part of the chapter presents several constructs that are used as alternatives to the low-level semaphore and event operations. These are based on ideas from abstract data types and objects. The aim is to concentrate and encapsulate all accesses to a shared resource, including any required synchronization. These mechanisms assume that processes share parts of main memory. However, it is not always desirable or possible that processes share some portion of memory. For example, it is sound software engineering practice to encapsulate program entities, including processes, as a way to improve understanding, analysis, and reusability. Shared memory is in conflict with this principle. For security reasons, processes often must run in isolation, each in its own logical space, with all interactions under strict control of the participating process. Another reason for alternatives to shared memory constructs is the increasing importance and use of distributed systems. In such environments, each processor may have only its own local memory; consequently, there can be no direct data sharing among processes running on different processors. For these reasons, distributed schemes for interprocess communication (IPC) and synchronization are commonly available.
منابع مشابه
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
متن کاملReliable Shared Memory Communication: A Position Statement on Synchronization and Composition
Much work was done on distributed shared memory and consistent shared memory models. However, communication through shared memory (read after write) is a low-level language-concept – too low for many programming tasks if not protected by a type system. We propose static types to enforce proper synchronization of shared memory communication in concurrent and even some sequential cases. For compo...
متن کاملA Fast Inter-Kernel Communication and Synchronization layer for MetalSVM
In this paper, we present the basic concepts for fast inter-kernel communication and synchronization layer motivated by the realization of a SCC-related shared virtual memory management system, called MetalSVM. This scalable memory management system is implemented in terms of a bare-metal hypervisor, located within a virtualization layer between the SCC’s hardware and actual operating system. I...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملA Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کامل