Mutual Exclusion Algorithms
Can be based on:
permissions,
tokens.
Centralized



Decentralized
Various coordinators.
Access is attributed to the majority of votes.

Distributed

Token Ring

Comparison

Last updated