Token Based Algorithms
Token Based Algorithms
Here the access control is quite Here the access control is not
Fine-grained because here inside so fine as there is no token
the token roles, permissions and which can specify roles,
resources can be easily specifying permission, and resources for
8. for the user. the user.
Examples of Token-Based
Examples of Non-Token
Algorithms are:
Based Algorithms are:
(i) Singhal’s Heuristic
(i) Lamport’s Algorithm
Algorithm
(ii) Ricart-Agarwala
(ii) Raymonds Tree Based
Algorithm
Algorithm
(iii) Maekawa’s
(iii) Suzuki-Kasami
Algorithm
10. Algorithm
2. Synchronization Delay
The time required for the next process to enter the critical section after a
process leaves the critical section is known as Synchronization delay.
Synchronization Delay
3. Message complexity
The number of messages needed to execute each critical section by the
process.
4. Throughput
Throughput is the amount at which the system executes requests for the critical
section.
Throughput = 1/(Synchronization delay + Avg Critical Section execution time)
5. Low and High Load Performance
The amount of request that arrives for critical section execution denotes the
load. If more than 1 request is present for the critical section then it is known as
Low Load. If there is always a pending request then it is known as High Load. In
heavy load conditions, after a request is executed, a site promptly starts
activities to execute its next demand of Critical Section. A site is only
occasionally in the inactive state in heavy load conditions. For some mutual
exclusion algorithms, the performance metrics can be registered effectively
under low and heavy loads through simple mathematical reasoning.
For the most part, mutual exclusion algorithms have best and worst cases for
the performance metrics. In the best case, winning circumstances are to such an
extent that a performance metric achieves the best conceivable worth. For
example, in most mutual exclusion algorithms the best worth of the reaction
time is a round-trip message delay in addition to the critical section execution
time, 2T + E. Frequently for mutual exclusion algorithms, the best and worst
scenarios agree with low and high loads, individually.
For example, the best and worst of the reaction time are accomplished when the
load is, separately, low and high; in a few mutual exclusion algorithms, the best
and the worse message traffic is produced at low and heavy load conditions,
separately.