Deadlock avoidance or prevention, Computer Networking

Deadlock Avoidance

To avoid deadlocks two types of strategies are used:

1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section.  Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.

The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.

During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.

2) One other method of deadlock prevention is dynamic deadlock avoidance.  It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.


Posted Date: 3/4/2013 5:38:14 AM | Location : United States

Related Discussions:- Deadlock avoidance or prevention, Assignment Help, Ask Question on Deadlock avoidance or prevention, Get Answer, Expert's Help, Deadlock avoidance or prevention Discussions

Write discussion on Deadlock avoidance or prevention
Your posts are moderated
Related Questions
Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,

Router# reload is the command to reload the router

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology

Hello there i have an assignment in Data communication and networks. I have done most of the assignment but i am stuck in one part which is designing a network in a university cam

Define the term - Graphics Interchange Format A type of graphics file found frequently on the .net. A picture of a vice-president, for example, may appear on the Intranet as

Three layers are called upper layers a) Application Layer - 7 b) Presentation Layer - 6 c) Session Layer - 5

Advantages of mobile wireless network over a wired network is it is very much popular, it is very easy to set up, it requires a simple plug and the speed and reliability is very

I have an asignement regarding TCP tunning and optimization. Can you help?