--%>

Shared memory

How shared memory are accessed if we have two processors attempting to gain the same region?

E

Expert

Verified

Synchronization has to be done to protect the data corruption by simultaneous writes from two processes running on two distinct processors. Synchronization among two processors is best done with the help of spinlocks.

While a process on one processor had locked the shared memory the other procedure running on the second processor shall be doing a hard spin till the first process released the lock. It is the rule of Spin locks.

   Related Questions in Science

  • Q : Debug a core dump Normal 0 false false

    Normal 0 false false

  • Q : Page fetching What is Normal 0 false

    What is Normal 0 false false

  • Q : What is Photo editing Photo editing :

    Photo editing: The photographs negatively affecting to the public sentiment and psychology must be avoided. Therefore before publishing a photograph in any media it required to be edited, whether the photo contain some massage to public and must regar

  • Q : Signals transferred in GPRS Signals

    Signals Transferred in GPRS: GPRS is 2.5 generation of GSM. Radio interface is alike as GSM. Thus it also uses the similar frequency band and modulation that means900/1800Mhz, GMSK modulation.   

  • Q : Explain about flag Normal 0 false false

    Normal 0 false false

  • Q : What are GPO links GPO links : To apply

    GPO links: To apply the settings of a GPO, the users and computers of a site or domain, you require adding a link to that GPO. You can add up one or more GPO links to each and every domain or site by using GPMC. Remember that building and linking GPOs

  • Q : Minimize the cost of conducting

    The over-arching objective of this assignment is to minimize the cost of conducting investigations of False-Positives (FP) and False-Negatives (FN) in the context of credit card fraud detection. An FP occurs when the front-end analytics identifies a suspicious se

  • Q : Describe SMTP SMTP : Logging into your

    SMTP: Logging into your email account to retrieve email is fairly simple. Though, there is technology working behind which is simple mail transfer protocol (SMTP) and internet networks to make sure you can send and receive email. Think regarding SMTP

  • Q : Stack in 8085 Normal 0 false false

    Normal 0 false false

  • Q : Describe Data Independence Data

    Data Independence: A system is data independent if the values of the infinite program data it manipulates are not relevant to the behavior of the system—for example, a protocol that transmits messages may be proved correct regardless of the cont