Deadlock avoidance or prevention, Computer Networking

Deadlock Avoidance

To avoid deadlocks two types of strategies are used:

1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section.  Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.

The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.

During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.

2) One other method of deadlock prevention is dynamic deadlock avoidance.  It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.

 

Posted Date: 3/4/2013 5:38:14 AM | Location : United States







Related Discussions:- Deadlock avoidance or prevention, Assignment Help, Ask Question on Deadlock avoidance or prevention, Get Answer, Expert's Help, Deadlock avoidance or prevention Discussions

Write discussion on Deadlock avoidance or prevention
Your posts are moderated
Related Questions
DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, man

In this question, you will compare delays in packet switching (i.e. in IP networks), in circuit switching (i.e. in PSTN telephony) and in virtual circuit packet switching (i.e. in


What do mean by tunnel mode? This is a mode of data exchange wherein two communicating computers do not use IPSec themselves. Instead, the gateway that is linking their LANs to

Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

what is software

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

Cisco is the defaul LMI type. There are three types of LMI standards:  ANSI - Annex D defined by ANSI standard T1.617  ITU-T (Q.933A) - Annex A defined by Q933A  Cisco

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which