Mutual Exclusion Algorithms

Can be based on:

  • permissions,

  • tokens.

Centralized

Decentralized

Various coordinators.

Access is attributed to the majority of votes.

Distributed

Token Ring

Comparison

Last updated