Deadlock to occur in multiprogramming environment

Assignment Help Operating System
Reference no: EM13190512

Deadlock:

A- Given the sequence of resource requests below, draw the resource allocation graph and answer the following questions:
- Process A is holding resource S and is requesting resource X.
- Process B is holding resources X, Y and is requesting resource W.
- Process C is holding resource W and is requesting resource Z.
- Process D is holding resource Z and is requesting resource Y and S.

1- List the reasons which causes deadlock to occur in multiprogramming environment.
2-Discuss how can the deadlock detection algorithm for one resource find out if a deadlock exists in the above sequence?
3- List the deadlocked processes.
4- Discuss at least two possible recovery solutions. Which one is better? Why?
5- List the recovery process-scheduling sequence corresponding to each solution given in
the question above.

B- Name a proper method to be used for each of the following cases: Banker's algorithm
- Deadlock avoidance for multiprogramming system. ------- preemption--------------------
- Deadlock recovery for real-time system. ---------------------------
- Disk head scheduling for busy system. ---------------------------
- File system implementation for batch applications. ---------------------------
- Data transfer method for Database applications. ---------------------------

C- Consider a system state which consists of the set of running processes A, B, C, D, and E. Assume that the system has four different types of resources R1, R2, R3, and R4. The total numbers of resource copies available in the system are: 6, 4, 4, and 2 in order. The maximum claim and the current resources allocation tables are given below.

Process

R1

R2

R3

R4

A

3

2

2

1

B

4

2

2

2

C

2

2

1

0

D

3

2

2

2

E

2

3

1

1

Maximum Claim Table

Process

R1

R2

R3

R4

A

2

0

1

1

B

1

1

1

0

C

1

1

0

0

D

1

0

1

0

E

0

1

0

1

Current Allocation Table

1- List the resource allocation table for each individual resource type.
2- Is the current system state safe? Why?
3- Answer the above question if D requests a copy of R4 and another copy of R2.
Answer question number 2above if C requests a copy of R1 and at the same time B reserved a copy of R3.

Reference no: EM13190512

Questions Cloud

Describe about quantum computing : Quantum computing is the latest technological concept in information processing. Your imaginings and musings about where technology may take us after quantum-based computing
Find the value of the calculator after 5 years : the value of a graphing calculator is $225. after 2 years.the value of this calculator is $160. find the value of the calculator after 5 years.
What are the total state and federal unemployment taxes : Morris Leste, owner of Carlson Company, has three employees who earn $431, $503, and $738 per week. What are the total state and federal unemployment taxes that Morris owes for the first 12 weeks of the year and for week 30?
What is the fed funds rate in the banking system : Third National Bank is fully loaned up with reserves of $30,000 and demand deposits equal to $100,000. The reserve ratio is 5%. Households deposit $20,000 in currency into the bank. How much excess reserves does the bank now have.
Deadlock to occur in multiprogramming environment : List the reasons which causes deadlock to occur in multiprogramming environment and discuss how can the deadlock detection algorithm for one resource find out if a deadlock exists in the above sequence
How many possible uniforms are there using one helmet : How many possible uniforms are there using one helmet, one jersey, and one pair of pants?
Find how many trucks are in the parking lot : In a parking lot, there are 84 vehicles. All vehicles are either cars, trucks, or bicycles. There are twice as many trucks as bicycles, and twice as many cars as trucks.
Estimate gdp impact of a positive change in govt spendings : You are told that 75 cents out of every extra dollar pumped into the economy goes toward consumption (as opposed to saving). Estimate the GDP impact of a positive change in government spending that equals $25 billion.
What is the maximum number of regions : What is the maximum number of regions into which a circle can be cut using four lines?

Reviews

Write a Review

Operating System Questions & Answers

  Process customer order history from a file

Required help creating a document that Develop an application that will read and procedure customer history order information from a document.

  Give three advantages of virtual machine

In different communications models, communication may take place using either "message passing" or "shared memory". Distinguish between "message passing" and "shared memory", illustrating your answer with a diagram Give three advantages of virt..

  Ethernet or token ring protocol

Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?

  Benefits of the just in time inventory management system

Determine what does just in time inventory management have to do with the Carle Heart Center in Urbana, Illinois?

  Calculate the total execution time

Calculate the total execution time of a program consisting of 100 instructions for NIOS II/f(6-stage pipeline) if five instructions are branch instructions. Clock frequency is 50MHz. Consider two cases: (1) 100% success in branch prediction, (2) n..

  Consider a web server with one cpu that serves web requests

Consider a web server with one CPU that serves web requests; each web request requires 3 (time) units of CPU processing and 9 (time) units to read data from disk.

  Ethical issues of web site design

Analyze the user interaction interface of a typical website that you might wish to improve and design in terms of any ethical considerations that might require to be addressed.

  What speedup could be expected in the steady state

What speedup could be expected in the steady state by using a merging write buffer instead of a nonmerging buffer when zeroing memory by the execution of 64 bit stores if all other instructions could be issued in parallel with the stores and the b..

  Information technology security

Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.

  Question about it planning

Some companies think that IT planning is a waste of time because the competitive environment and technologies change too rapidly.

  Access time for reading a word from a virtual address

Consider a computer system where the overhead required for reading a word from the page table is 1.25ms. A TLB lookup of a word requires 250 ns.

  Explain deadlock-avoidance system

What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd