SlideShare a Scribd company logo
 Programming of of applications for loosely coupled
distributed memory machines with the message-
passing paradigm is a difficult and error-prone task.
 The Distributed Shared Memory (DSM) facility
simplifies this programming task by providing a
higher level abstraction that allows programmers to
write programs with the shared-memory
paradigm,which is consistent with the way sequential
applications access data.
 The DSM system normally have an architecture of
the form.
 Each node of the system consists of one or more
CPUs and a memory unit.
 The nodes are connected by a high-speed
communication network.
 A simple message-passing system allows processes
on different nodes to exchange messages with each
other
 The DSM abstraction presents a large shared-
memory space to the processors of all nodes.
 In contrast to the shared physical memory in
tightly coupled parallel architecture, the shared
memory of DSM exists only virtually.
 A software memory- mapping manager routine in
each node maps the local memory onto the
shared virtual memory.
 To facilitate the mapping operation, the shared-
memory space is partitioned into blocks.
 Granularity
 Structure of shared-memory space
 Memory coherence and access
synchronization
 Data location and access
 Replacement strategy
 Thrashing
 Heterogenity
 One of the most visible parameters to be chosen in
the design of a DSM system is the block size.
 Just as with paged main memory, there are a number
of trade-offs and no single criterion dominates.
 Paging Overhead- Because shared memory
programs provide locality of reference, a process is
likely to access a large region of its shared address
space in a small amount of time.
 Directory Size- Another factor affecting the choice of
block size is the need keep directory information
about the blocks in the system.
 Thrashing- The problem of thrashing may occur
when data items in the same data block are being
updated by multiple nodes at the same time, causing
large numbers of data block transfers among the
nodes without much progress in the execution of the
application.
 False Sharing- False sharing occurs when two
different processes access two unrelated variables
that reside in the same data block.
1) No sharing- Most DSM systems do not structure
their shared-memory space. In these systems, the
shared-memory space is simply a linear array of
words. It is convenient to choose any suitable page
size as the unit of sharing and a fixed grain size may
be used for all applications.
2) Structuring by data type- In this method, the shared-
memory space is either as a collection of objects
and Orca or as a collection of variables in the source
language.
3) Structuring as a database- Another method is to
structure the shared memory like a database. A set of
primitives that can be added to any base language are
provided to place tuples in the tuple space and to
read or extract them from tuple space.
 Strict Consistency model
 Sequential consistency model
 Causal Consistency model
 Pipelined Random-Access Memory Consistency
Model
 Processor Consistent Model
 Weak Consistency Model
 Release Consistency Model
 In DSM systems that allow shared-memory blocks to
be dynamically migrated/replicated, the following
issues must be addressed when the available space
for caching shared data fill up at a node:
1) Which block should be replaced to make
space for a newly required block?
2) Which should the replaced block be placed?
 The problem of replacement has been studied
extensively for paged main memories and shared-
memory multiprocessor systems.
 The usual classification of replacement algorithm
group them into the following categories:
1) Usage based versus non-usage based- Usage based
algorithms keep track of the history of usage of a
cache line and use this information to make
replacement decisions.
2) Fixed space versus variable space- Fixed-space
algorithms assume that the cache size fixed while
variable-space algorithms are based on the
assumption that the cache size can be changed
dynamically depending on the need.
 Unused: A free memory block that is not currently
being used.
 Nil: A block that has been invalidated.
 Read-only: A block for which the node has only read
right.
 Read-owned: A block for which the node has only
read access right but is also the owner of the block.
 Writable: A block for which the node has write
access permission. Obviously, the node is the owner
of the block because IVY uses the write-invalidate
protocol.
 Once a memory block has been selected for
replacement, it should not be lost.
1)Using Secondary storage
2) Using the memory space of other nodes.
 Using Secondary store: In this method, the block is
simply transferred on to a local disk. The advantage
of this method is that it does not waste any memory
space, and if the node want to access the same block
again.
 Using the memory space of thee other nodes:
Sometimes it may be faster to transfer a block over
the network than to transfer it to a block disk.
 Thrashing is said to occur when the system spends a
large amount of time transferring shared data blocks
from one node to another, compared to the time
spent doing the useful work of executing application
process.
1) When interleaved data accesses made by process on
two or more nodes causes a data block to move
back and forth from one node to another in quick
succession.
2) When blocks with read-only permissions are
repeatedly invalidated soon after they are replicated.
 The following methods may be used to solve the thrashing
problem in DSM systems:
1) Providing Application-controlled locks.
2) Nailing a block to a node for a minimum amount of
time.
3) Tailoring the coherence algorithm to the shared-data
usage patterns.
 Heterogeneous DSM is a mechanism that provides
the shared-memory paradigm in a heterogeneous
environment and allows memory sharing among
machines of different architecture.
 The main issues in building a DSM system on a
network of heterogeneous machines are :
1) Data conversion
2) Block size selection
 Simpler Abstraction
 Better Portability of Distributed Applications
Programs
 Better Performance of some Applications
 Flexible Communication Environment
 Ease of Process Migration
 A distributed system consists of a collection of
distinct processes that are spatially separated and run
concurrently.
 The rules for enforcing correct interaction are
implemented in the form of synchronization
mechanisms.
 Clock synchronization
 Event ordering
 Mutual exclusion
 Deadlock
 Election algorithms
 In a distributed system, an application may have
process that concurrently run on multiple nodes of
the system.
 For correct results, several such distributed
applications require that the clocks of the nodes are
synchronized with each other.
 In a distributed system, synchronized clocks also
enable one to measure the duration of distributed
activities that start on one node and terminate on
another node, for instance, calculating the time taken
to transmit a message from one node to another at
any arbitrary time.
 It is difficult to get the correct result in this case if
the clocks of the sender and receiver nodes are not
synchronized.
 Keeping the clocks in a distributed system
synchronize to within 5 or 10 msec is an expensive
and nontrivial task.
 Lamport observed that for most application it is not
necessary to keep the clocks in a distributed system
synchronized.
 Rather, it is sufficient to ensure that all events that
occur in a distributed system be totally ordered in a
manner that is consistent with an observed
behaviour.
 There are several resources in a system that must not
be used simultaneously by multiple processes if
program operation is to be correct.
 For example, a file must not be simultaneously
updated by multiple processes.
 Similarly, use of unit record peripherals such as tape
drives or printers must be restricted to a single
process at a time.
 Therefore, exclusive acces to such a shared resource
by a process must be ensured.
 This exclusiveness of access is called mutual
exclusion between process.
 The section of a program that need exclusive access
to shared resources are referred to as critical
sections.
 There are three approaches in the mutual exclusion:
1) Centralized approach
2) Distributed approach
3) Token-pausing approach
 In concurrent computing, a deadlock is a state in
which each member of a group is waiting for another
member, including itself, to take action, such as
sending a message or more commonly releasing a
lock.
 Request: The process first makes a request for the
resource. If the requested resource is not available.
 Allocate: The system allocates the resources to the
requesting process as soon as possible. It maintains a
table in which it records whether each resource is
free or allocated and, if it is allocated.
 Release: After the process has finished using the
allocated resource, it releases the resource to the
system.
 Asking for operator intervention
 Termination
 Rollback of process
 Asking for operator Intervention: The simplest way
is to inform the operator that a deadlock has occurred
and to let the operator deal with it manually.
 Termination of process: The simplest way to
automatically recover from a deadlock is to
terminate one or more processes and to reclaim the
resources held by them, which can then be
reallocated.
 Rollback of process: Killing a process requires its
restart from the very expensive, particularly when
the process has already run for a substantially long
time.
 Election algorithms are meant for electing a
coordinator process from among the currently
running processes in such a manner that any instance
of time there is a single coordinator for all processes
in the system.
1) Each process in the system has a unique priority
number.
2) Whenever an election is held, the process having the
highest priority number among the currently active
processes is elected as the coordinator.
3) On recovery, a failed process can take appropriate
actions to rejoin the set of active processes.

More Related Content

What's hot

Operating system
Operating systemOperating system
Operating system
Hussain Ahmady
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architectures
Gokuldhev mony
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
IJORCS
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
ijfcstjournal
 
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with PrioritiesA Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
idescitation
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
Sharda University Greater Noida
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based on
ijp2p
 
I0935053
I0935053I0935053
I0935053
IOSR Journals
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
sandra sukarieh
 
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
May Sit Hman
 
Memory Management
Memory ManagementMemory Management
Memory Management
Visakh V
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
ijdpsjournal
 

What's hot (16)

Operating system
Operating systemOperating system
Operating system
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architectures
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
Chapter04 new
Chapter04 newChapter04 new
Chapter04 new
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
 
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with PrioritiesA Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
A Kernel-Level Traffic Probe to Capture and Analyze Data Flows with Priorities
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
 
Shared memory
Shared memoryShared memory
Shared memory
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based on
 
I0935053
I0935053I0935053
I0935053
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
 
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 

Similar to Dos unit3

Advance Operating Systems
Advance Operating SystemsAdvance Operating Systems
Advance Operating SystemsRaghu nath
 
Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OSC.U
 
Distribution transparency and Distributed transaction
Distribution transparency and Distributed transactionDistribution transparency and Distributed transaction
Distribution transparency and Distributed transaction
shraddha mane
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
vampugani
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
NANDINI SHARMA
 
Distributed database
Distributed databaseDistributed database
Distributed database
sanjay joshi
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
Johan Granados Montero
 
Distributed system lectures
Distributed system lecturesDistributed system lectures
Distributed system lectures
marwaeng
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
Arush Nagpal
 
Distributed Shared Memory notes in distributed systems.pptx
Distributed Shared Memory notes in distributed systems.pptxDistributed Shared Memory notes in distributed systems.pptx
Distributed Shared Memory notes in distributed systems.pptx
KumbiraiLuciaKondo
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1rohassanie
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
rprajat007
 
Distributed database
Distributed databaseDistributed database
Distributed database
sanjay joshi
 
CS197OSTYPES.pdf
CS197OSTYPES.pdfCS197OSTYPES.pdf
CS197OSTYPES.pdf
Omid695066
 
Distributed computing
Distributed  computingDistributed  computing
Distributed computing
Swetha544947
 
Bab 4
Bab 4Bab 4
Bab 4
n k
 
Distributed Database
Distributed DatabaseDistributed Database

Similar to Dos unit3 (20)

Chap 4
Chap 4Chap 4
Chap 4
 
Advance Operating Systems
Advance Operating SystemsAdvance Operating Systems
Advance Operating Systems
 
Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OS
 
Distribution transparency and Distributed transaction
Distribution transparency and Distributed transactionDistribution transparency and Distributed transaction
Distribution transparency and Distributed transaction
 
Overview of Distributed Systems
Overview of Distributed SystemsOverview of Distributed Systems
Overview of Distributed Systems
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
Operating system
Operating systemOperating system
Operating system
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
Distributed system lectures
Distributed system lecturesDistributed system lectures
Distributed system lectures
 
Distributed Shared Memory Systems
Distributed Shared Memory SystemsDistributed Shared Memory Systems
Distributed Shared Memory Systems
 
Wiki 2
Wiki 2Wiki 2
Wiki 2
 
Distributed Shared Memory notes in distributed systems.pptx
Distributed Shared Memory notes in distributed systems.pptxDistributed Shared Memory notes in distributed systems.pptx
Distributed Shared Memory notes in distributed systems.pptx
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
CS197OSTYPES.pdf
CS197OSTYPES.pdfCS197OSTYPES.pdf
CS197OSTYPES.pdf
 
Distributed computing
Distributed  computingDistributed  computing
Distributed computing
 
Bab 4
Bab 4Bab 4
Bab 4
 
Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

Dos unit3

  • 1.
  • 2.  Programming of of applications for loosely coupled distributed memory machines with the message- passing paradigm is a difficult and error-prone task.  The Distributed Shared Memory (DSM) facility simplifies this programming task by providing a higher level abstraction that allows programmers to write programs with the shared-memory paradigm,which is consistent with the way sequential applications access data.
  • 3.
  • 4.  The DSM system normally have an architecture of the form.  Each node of the system consists of one or more CPUs and a memory unit.  The nodes are connected by a high-speed communication network.  A simple message-passing system allows processes on different nodes to exchange messages with each other
  • 5.  The DSM abstraction presents a large shared- memory space to the processors of all nodes.  In contrast to the shared physical memory in tightly coupled parallel architecture, the shared memory of DSM exists only virtually.  A software memory- mapping manager routine in each node maps the local memory onto the shared virtual memory.  To facilitate the mapping operation, the shared- memory space is partitioned into blocks.
  • 6.  Granularity  Structure of shared-memory space  Memory coherence and access synchronization  Data location and access  Replacement strategy  Thrashing  Heterogenity
  • 7.  One of the most visible parameters to be chosen in the design of a DSM system is the block size.  Just as with paged main memory, there are a number of trade-offs and no single criterion dominates.
  • 8.  Paging Overhead- Because shared memory programs provide locality of reference, a process is likely to access a large region of its shared address space in a small amount of time.  Directory Size- Another factor affecting the choice of block size is the need keep directory information about the blocks in the system.
  • 9.  Thrashing- The problem of thrashing may occur when data items in the same data block are being updated by multiple nodes at the same time, causing large numbers of data block transfers among the nodes without much progress in the execution of the application.  False Sharing- False sharing occurs when two different processes access two unrelated variables that reside in the same data block.
  • 10. 1) No sharing- Most DSM systems do not structure their shared-memory space. In these systems, the shared-memory space is simply a linear array of words. It is convenient to choose any suitable page size as the unit of sharing and a fixed grain size may be used for all applications. 2) Structuring by data type- In this method, the shared- memory space is either as a collection of objects and Orca or as a collection of variables in the source language.
  • 11. 3) Structuring as a database- Another method is to structure the shared memory like a database. A set of primitives that can be added to any base language are provided to place tuples in the tuple space and to read or extract them from tuple space.
  • 12.  Strict Consistency model  Sequential consistency model  Causal Consistency model  Pipelined Random-Access Memory Consistency Model  Processor Consistent Model  Weak Consistency Model  Release Consistency Model
  • 13.  In DSM systems that allow shared-memory blocks to be dynamically migrated/replicated, the following issues must be addressed when the available space for caching shared data fill up at a node: 1) Which block should be replaced to make space for a newly required block? 2) Which should the replaced block be placed?
  • 14.  The problem of replacement has been studied extensively for paged main memories and shared- memory multiprocessor systems.  The usual classification of replacement algorithm group them into the following categories:
  • 15. 1) Usage based versus non-usage based- Usage based algorithms keep track of the history of usage of a cache line and use this information to make replacement decisions. 2) Fixed space versus variable space- Fixed-space algorithms assume that the cache size fixed while variable-space algorithms are based on the assumption that the cache size can be changed dynamically depending on the need.
  • 16.  Unused: A free memory block that is not currently being used.  Nil: A block that has been invalidated.  Read-only: A block for which the node has only read right.  Read-owned: A block for which the node has only read access right but is also the owner of the block.  Writable: A block for which the node has write access permission. Obviously, the node is the owner of the block because IVY uses the write-invalidate protocol.
  • 17.  Once a memory block has been selected for replacement, it should not be lost. 1)Using Secondary storage 2) Using the memory space of other nodes.
  • 18.  Using Secondary store: In this method, the block is simply transferred on to a local disk. The advantage of this method is that it does not waste any memory space, and if the node want to access the same block again.  Using the memory space of thee other nodes: Sometimes it may be faster to transfer a block over the network than to transfer it to a block disk.
  • 19.  Thrashing is said to occur when the system spends a large amount of time transferring shared data blocks from one node to another, compared to the time spent doing the useful work of executing application process.
  • 20. 1) When interleaved data accesses made by process on two or more nodes causes a data block to move back and forth from one node to another in quick succession. 2) When blocks with read-only permissions are repeatedly invalidated soon after they are replicated.
  • 21.  The following methods may be used to solve the thrashing problem in DSM systems: 1) Providing Application-controlled locks. 2) Nailing a block to a node for a minimum amount of time. 3) Tailoring the coherence algorithm to the shared-data usage patterns.
  • 22.  Heterogeneous DSM is a mechanism that provides the shared-memory paradigm in a heterogeneous environment and allows memory sharing among machines of different architecture.
  • 23.  The main issues in building a DSM system on a network of heterogeneous machines are : 1) Data conversion 2) Block size selection
  • 24.  Simpler Abstraction  Better Portability of Distributed Applications Programs  Better Performance of some Applications  Flexible Communication Environment  Ease of Process Migration
  • 25.  A distributed system consists of a collection of distinct processes that are spatially separated and run concurrently.  The rules for enforcing correct interaction are implemented in the form of synchronization mechanisms.
  • 26.  Clock synchronization  Event ordering  Mutual exclusion  Deadlock  Election algorithms
  • 27.  In a distributed system, an application may have process that concurrently run on multiple nodes of the system.  For correct results, several such distributed applications require that the clocks of the nodes are synchronized with each other.
  • 28.  In a distributed system, synchronized clocks also enable one to measure the duration of distributed activities that start on one node and terminate on another node, for instance, calculating the time taken to transmit a message from one node to another at any arbitrary time.  It is difficult to get the correct result in this case if the clocks of the sender and receiver nodes are not synchronized.
  • 29.  Keeping the clocks in a distributed system synchronize to within 5 or 10 msec is an expensive and nontrivial task.  Lamport observed that for most application it is not necessary to keep the clocks in a distributed system synchronized.  Rather, it is sufficient to ensure that all events that occur in a distributed system be totally ordered in a manner that is consistent with an observed behaviour.
  • 30.  There are several resources in a system that must not be used simultaneously by multiple processes if program operation is to be correct.  For example, a file must not be simultaneously updated by multiple processes.  Similarly, use of unit record peripherals such as tape drives or printers must be restricted to a single process at a time.
  • 31.  Therefore, exclusive acces to such a shared resource by a process must be ensured.  This exclusiveness of access is called mutual exclusion between process.  The section of a program that need exclusive access to shared resources are referred to as critical sections.
  • 32.  There are three approaches in the mutual exclusion: 1) Centralized approach 2) Distributed approach 3) Token-pausing approach
  • 33.  In concurrent computing, a deadlock is a state in which each member of a group is waiting for another member, including itself, to take action, such as sending a message or more commonly releasing a lock.
  • 34.  Request: The process first makes a request for the resource. If the requested resource is not available.  Allocate: The system allocates the resources to the requesting process as soon as possible. It maintains a table in which it records whether each resource is free or allocated and, if it is allocated.  Release: After the process has finished using the allocated resource, it releases the resource to the system.
  • 35.  Asking for operator intervention  Termination  Rollback of process
  • 36.  Asking for operator Intervention: The simplest way is to inform the operator that a deadlock has occurred and to let the operator deal with it manually.  Termination of process: The simplest way to automatically recover from a deadlock is to terminate one or more processes and to reclaim the resources held by them, which can then be reallocated.  Rollback of process: Killing a process requires its restart from the very expensive, particularly when the process has already run for a substantially long time.
  • 37.  Election algorithms are meant for electing a coordinator process from among the currently running processes in such a manner that any instance of time there is a single coordinator for all processes in the system.
  • 38. 1) Each process in the system has a unique priority number. 2) Whenever an election is held, the process having the highest priority number among the currently active processes is elected as the coordinator. 3) On recovery, a failed process can take appropriate actions to rejoin the set of active processes.