Deadlock avoidance or prevention, Computer Networking

Deadlock Avoidance

To avoid deadlocks two types of strategies are used:

1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section.  Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.

The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.

During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.

2) One other method of deadlock prevention is dynamic deadlock avoidance.  It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.

 

Posted Date: 3/4/2013 5:38:14 AM | Location : United States







Related Discussions:- Deadlock avoidance or prevention, Assignment Help, Ask Question on Deadlock avoidance or prevention, Get Answer, Expert's Help, Deadlock avoidance or prevention Discussions

Write discussion on Deadlock avoidance or prevention
Your posts are moderated
Related Questions
Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Parallel Balance Point In order to implement a parallel algorithm on a parallel computer, K number of processors is needed. It may be noted that the given input is assigned to

Cisco Express Forwarding CEF is a new method of switching that available in IOS, its overcome the drawbacks of fast switching method In IOS packet switching, There are thre

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re


LAN Topologies The term topology explains the geographic arrangement of networking devices. It explains the actual layout of the network hardware. Given the location of worksta

Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

Q. Show the Routing Table? Routing Table Every router remains a routing table that has one entry for every destination network of which the router is aware Proces

bit stuffing program in python

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is