System deadlock in shared programme structures, Computer Networking

System Deadlock

A deadlock refers to the situation when simultaneous processes are holding resources and preventing each other from completing their implementation.

The following conditions can avoid the deadlock from occurring:

1)    Mutual exclusion: Every process is given exclusive control of the resources allotted to it.

2)    Non-preemption: A process is not allowed to release its resources till task is finished.

3)    Circular wait:  Multiple processes wait for resources from the other processes in a circularly dependent situation

4)    Wait for: A process can hold resources while waiting for additional resources.

 

Posted Date: 3/4/2013 5:37:25 AM | Location : United States







Related Discussions:- System deadlock in shared programme structures, Assignment Help, Ask Question on System deadlock in shared programme structures, Get Answer, Expert's Help, System deadlock in shared programme structures Discussions

Write discussion on System deadlock in shared programme structures
Your posts are moderated
Related Questions
what is difference between Star and Mesh topology?

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

The disadvantages and advantages of Private and Public networks are shown in the table below:

advantages and disadvantages of time sharing system

Maintaining the sequence number The  other advantage of GBN  is that  it maintain  the next  sequence number.

today, what is the most common or mostly encountered problem in terms of database management system?

The Network layer is used to route physical data to the destination point, it decides the actual path from where data travels to destination point. The network layer supports both

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program