26-03-2015 дата публикации
Номер: US20150089060A1
Автор:
Esdras E. Cruz-Aguilar,
Perinkulam I. Ganesh,
Madhusudanan Kandasamy,
Charles E. Meyer,
Stephen J. Tovcimak,
CRUZ-AGUILAR ESDRAS E,
GANESH PERINKULAM I,
KANDASAMY MADHUSUDANAN,
MEYER CHARLES E,
TOVCIMAK STEPHEN J,
CRUZ-AGUILAR ESDRAS E.,
GANESH PERINKULAM I.,
MEYER CHARLES E.,
TOVCIMAK STEPHEN J.
Mechanisms are provided, in a data processing system comprising a plurality of nodes, each node being a computing device, for controlling access to a critical section of code. These mechanisms send, by a sender node of the data processing system, an access request for requesting access to the critical section of code. The critical section of code is a portion of code that accesses a shared resource. The mechanisms receive, in the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request. Each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response. The mechanisms control, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes. 1. A method , in a data processing system comprising a plurality of nodes , each node being a computing device , for controlling access to a critical section of code , the method comprising:sending, by a sender node of the data processing system, an access request for requesting access to the critical section of code, wherein the critical section of code is a portion of code that accesses a shared resource;receiving, by the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request, wherein each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response; andcontrolling, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes.2. The method of claim 1 , wherein the access request is sent by the sender node to receiver nodes claim 1 , in the plurality of nodes claim 1 , that are viewable by the sender node as being members of a cluster of nodes.3. The method of claim 2 , further ...
Подробнее