What are the four necessary condition of deadlock prevention, Computer Engineering

What are the four necessary conditions of deadlock prevention?

Four essential conditions for deadlock prevention are:

1.  Removing  the  mutual  exclusion  condition  implies  that  no  process  may  have exclusive access to a resource. It proves impossible for resources which cannot be spooled, and even along with spooled resources deadlock could still happen. Algorithms which avoid mutual exclusion are termed as non-blocking synchronization algorithms.

2. The "hold and wait" conditions may be eliminated by requiring processes to request all the resources they will require before starting up. The other way is to need processes to release all their resources before requesting all the resources they will require.

3. A "no preemption" or lockout condition may also be impossible or difficult to ignore as a process has to be capable to have a resource for a specific amount of time, or the processing outcome may be inconsistent or thrashing may happen. Though, inability to enforce preemption may interfere along with a priority algorithm. Algorithms which allow preemption contain lock-free and optimistic concurrency control and wait-free algorithms.

4. The circular wait condition: Algorithms which avoid circular waits contain "disable interrupts  throughout  critical  sections"  and  "use  a  hierarchy  to  find out  a  partial ordering of resources" and Dijkstra's solution.

Posted Date: 5/6/2013 8:49:43 AM | Location : United States







Related Discussions:- What are the four necessary condition of deadlock prevention, Assignment Help, Ask Question on What are the four necessary condition of deadlock prevention, Get Answer, Expert's Help, What are the four necessary condition of deadlock prevention Discussions

Write discussion on What are the four necessary condition of deadlock prevention
Your posts are moderated
Related Questions
Q. Approaches for development of information systems? Numerous approaches are available for development of Information Systems. They are as below: • Model Driven: It put e

We have to use 3 MPI communications: Plz the code in C++     1.  MPI_Scatter 2.  MPI_Alltoall 3.  MPI_Gather     **The length of the array will be determined by the user Fir

Instruction Cycle The instruction cycle consists of a series of steps required for the execution of an Instruction in a program. A distinctive instruction in a program is compo

Proof by Contradiction - Artificial intelligence So, both backward chaining andforward chaining have drawbacks. Another approach is to think regarding proving theorems by contr

What is the difference between VB6 and VB.Net? 1,Object-based Language 2,Doesnot support Threading 3 Not powerful Exception handling mechanism 4,Does not having suppor

What is CMP instruction Comparison instruction (CMP) is a subtraction that changes only the flag bits; destination operand never changes. A comparison is useful for checking th

1. How does this new generation of ERP products differ from traditional solutions? 2. What are the major external forces driving competition in the ERP industry? Cloud comput

There are various approaches to the classification of Computer Networks. One such classification is based on distance approach. Networks can be classified into LAN, WAN and MAN net

Explain the term - Integrity In most cases, corporate data should remain unchanged by third parties, so the system should be capable of ensuring that only authorised personn

EPROM contents can be erased by exposing it to ? Ans. By exposing EPROM contents to Ultraviolet rays, it can be erased. The Ultraviolet (UV) light passes throughout a window i