Explain wait for graph-resource request and allocation graph, Computer Engineering

Assignment Help:

Explain Wait for graph (WFG) with Resource request and allocation graph (RRAG).

WFG with RRAG:

A graph G = (V,E) is termed as bipartite if V can be decomposed in two disjoint sets V1 and V2 therefore every edge in E joins a vertex in V1 to a vertex in V2. Assume that V1 be a set of processes and also V2 be a set of resources. Thus the graph is directed we will seems as:

2420_Resource request and allocation graph.png

 

 

  • An edge (Rj,Pi) that is an assignment edge to mean that resource Rj has been assigned to process Pi
  • An edge (Pi,Rj) (termed as a request edge) to implies that process Pi has requested resource Rj

1. Utilize a resource allocation graph to derive a wait-for-graph.

2. Wait-for graph acquired by making an edge from p1 to p2 if p1 is waiting for a resource which is allocated to p2.

3. Deadlock exists if a cycle exists into resulting wait-for-graph.

245_WF Graph.png


Related Discussions:- Explain wait for graph-resource request and allocation graph

What is external interrupt, External Interrupt: Interrupt signal came ...

External Interrupt: Interrupt signal came from input-output devices connected external to processor. These interrupts depend on external conditions that are independent of the

Differentiate among validation and exception testing, Differentiate between...

Differentiate between validation and exception testing. - Validation testing is done to test software in conformance to requirements specified. It aims to demonstrate that soft

Determine frequency of a dtmf phone, In a DTMF phone a dialling of 8 genera...

In a DTMF phone a dialling of 8 generates (A) 1336 Hz- 770 Hz                      (B)  1209 Hz - 1477 Hz (C)  1209 Hz- 941 Hz                     (D)  1336 Hz-852 Hz

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Define the register length, Q. Define the Register Length? Register Le...

Q. Define the Register Length? Register Length: Asignificant characteristic related to registers is length of a register. Generally the length of a register is dependent on it

Can we run matlab without graphics, Sometimes you may need to run scripts w...

Sometimes you may need to run scripts which have plotting commands without displaying the plots and without going into the script to comment out the commands. An example: if you're

Explain working neural network work, Q. Explain working neural network work...

Q. Explain working neural network work? ANSWER: A neural network has an input layer with the factors under consideration, a middle or hidden layer that assigns and adjusts weig

How can we specify file transfer in a web page, Can we specify file transfe...

Can we specify file transfer in a Web page? Explain with the help of suitable example. Yes, file transfer can be given in a web page. The first field within a URL gives a proto

What is redundant array of independent disks, What is Redundant Array of In...

What is Redundant Array of Independent Disks? Researchers are constantly trying to improve secondary storage media by raising their, performance, capacity as well as reliabilit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd