Deadlock avoidance or prevention, Computer Networking

Deadlock Avoidance

To avoid deadlocks two types of strategies are used:

1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section.  Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.

The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.

During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.

2) One other method of deadlock prevention is dynamic deadlock avoidance.  It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.


Posted Date: 3/4/2013 5:38:14 AM | Location : United States

Related Discussions:- Deadlock avoidance or prevention, Assignment Help, Ask Question on Deadlock avoidance or prevention, Get Answer, Expert's Help, Deadlock avoidance or prevention Discussions

Write discussion on Deadlock avoidance or prevention
Your posts are moderated
Related Questions
Explain the meaning of Negotiation Negotiation is process of getting both sides to agree on some values or parameters to be used during communication. Maximum packet size is on

Q. What is Multimode Graded-Index Fiber? - Ever since the core density decreases with distance from the centre the light beams refract into a curve - Eliminates problem with

What is the full form of FDM and TDM It is both. Each of the 100 channels is possess its own frequency band (FDM), and on every channel two logical streams are intermixed by th

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

Case study on SAN Providers and Products available in the market.

What are the data units at different layers of the TCP / IP protocol suite? The data unit formed at the application layer is known as a message, at the transport layer the data

Convergence time is slower for Distant Vector routing and is faster for Link State routing.

Q. Mechanical Characteristics of RS232 interface? - 9-pin connector - 9-pin connector is more usually found in IBM-PC but it covers signals for asynchronous serial com

Explain Logical Ring Physical Star topology for Token-Passing Standard. It is definite that any break in the ring at any point will interrupt communications for all machines.