System deadlock in shared programme structures, Computer Networking

System Deadlock

A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation.

The following conditions can avoid the deadlock from occurring:

1)    Mutual exclusion: Every process is given exclusive control of the resources allotted to it.

2)    Non-preemption: A process is not allowed to release its resources till task is finished.

3)    Circular wait:  Multiple processes wait for resources from the other processes in a circularly dependent situation

4)    Wait for: A process can hold resources while waiting for additional resources.


Posted Date: 3/4/2013 5:37:25 AM | Location : United States

Related Discussions:- System deadlock in shared programme structures, Assignment Help, Ask Question on System deadlock in shared programme structures, Get Answer, Expert's Help, System deadlock in shared programme structures Discussions

Write discussion on System deadlock in shared programme structures
Your posts are moderated
Related Questions
using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?

What is NVT (Network Virtual Terminal) It is a set of rules explaining a very simple virtual terminal interaction. The NVT is used in the begin of a Telnet session.

Explain the working of Transceivers Transceivers are used to connect nodes to the several Ethernet media. Most computers and network interface cards having a built-in 10BaseT o

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

Q. What are the basic key functions of data link layer? Ans: Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer

Assign switch ports to VLANs. Refer to the port assignment table at the starting of the lab to assign ports to the VLANs. Use the interface range command to make simpler this

If the host has the subnet ID why do we require a subnet mask?

Describe the concept of successor and feasible successor?

Vector-Distance algorithm illustrated in more detail below: Packet switches wait for next update message and they goes by entries in packet. If entry has least path to destinat

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends