Mutual Exclusion Algorithms
Can be based on:
permissions,
tokens.
Centralized
Decentralized
Various coordinators.
Access is attributed to the majority of votes.
Distributed
Token Ring
Comparison
Last updated