2012 Ninth International Conference on Information Technology - New Generations 2012
DOI: 10.1109/itng.2012.166
|View full text |Cite
|
Sign up to set email alerts
|

A Design of Mutual Exclusion Protocol in Cellular Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In permission based mutex algorithms the host that wishes to go into critical section must first acquire permission from rest of the hosts by exchanging messages. On the other side, in token based mutex algorithms [17,18,19], a unique token is shared with the hosts and if a host possesses the token then it is permitted to invoke the CS. The token based protocols further classified into two categories: circulating token scheme and requesting token scheme.…”
Section: Safetymentioning
confidence: 99%
“…In permission based mutex algorithms the host that wishes to go into critical section must first acquire permission from rest of the hosts by exchanging messages. On the other side, in token based mutex algorithms [17,18,19], a unique token is shared with the hosts and if a host possesses the token then it is permitted to invoke the CS. The token based protocols further classified into two categories: circulating token scheme and requesting token scheme.…”
Section: Safetymentioning
confidence: 99%