Problem
There are many ways to solve the mutual exclusion problem based on different implementation schemes, such as the use of spin locks or Dekker's protocol. Describe the following schemes:
(a) Implementing mutually exclusive access to a critical section using binary semaphores.
(b) Implementing mutual exclusion using a monitor called by processes competing for access to a critical section.