Deadlock avoidance or prevention, Computer Networking

Deadlock Avoidance

To avoid deadlocks two types of strategies are used:

1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section.  Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.

The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.

During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.

2) One other method of deadlock prevention is dynamic deadlock avoidance.  It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.

 

Posted Date: 3/4/2013 5:38:14 AM | Location : United States







Related Discussions:- Deadlock avoidance or prevention, Assignment Help, Ask Question on Deadlock avoidance or prevention, Get Answer, Expert's Help, Deadlock avoidance or prevention Discussions

Write discussion on Deadlock avoidance or prevention
Your posts are moderated
Related Questions
Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen


Describe the count-to-infinity problem in distance vector

What are the disadvantages of Star Topology? The disadvantages are considered as follows: a. Needs more cable than most topologies. b. Moderately complex to install.

Client  Server Architecture There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client progra

Applications of Fiber Optics - Backbone networks because of wide bandwidth and cost effectiveness - Cable TV - LANS - 100Base-FX (Fast Ethernet)

This new model of Client/Server having of thin, portable, "universal" clients that talks to superfast servers. In the simple form, a web server returns documents when clients ask f

SONET STS SONET defines a hierarchy of signalling levels called as STSs (Synchronous Transport Signals). Every STS level supports a certain data rate specified in megabits p

How do I draw a flowchart and psuedocode that allows the user to input two different values and complete the sum and display the results?