Deadlock a- given the sequence of resource requests below

Assignment Help Operating System
Reference no: EM13380231

Deadlock:

A- Given the sequence of resource requests below, draw the resource allocation graph and answer the following questions:
- Process A is holding resource S and is requesting resource X.
- Process B is holding resources X, Y and is requesting resource W.
- Process C is holding resource W and is requesting resource Z.
- Process D is holding resource Z and is requesting resource Y and S.

1- List the reasons which causes deadlock to occur in multiprogramming environment.
2-Discuss how can the deadlock detection algorithm for one resource find out if a deadlock exists in the above sequence?
3- List the deadlocked processes.
4- Discuss at least two possible recovery solutions. Which one is better? Why?
5- List the recovery process-scheduling sequence corresponding to each solution given in
the question above.

B- Name a proper method to be used for each of the following cases: Banker's algorithm
- Deadlock avoidance for multiprogramming system. ------- preemption--------------------
- Deadlock recovery for real-time system. ---------------------------
- Disk head scheduling for busy system. ---------------------------
- File system implementation for batch applications. ---------------------------
- Data transfer method for Database applications. ---------------------------

C- Consider a system state which consists of the set of running processes A, B, C, D, and E. Assume that the system has four different types of resources R1, R2, R3, and R4. The total numbers of resource copies available in the system are: 6, 4, 4, and 2 in order. The maximum claim and the current resources allocation tables are given below.

Process

R1

R2

R3

R4

A

3

2

2

1

B

4

2

2

2

C

2

2

1

0

D

3

2

2

2

E

2

3

1

1

Maximum Claim Table

Process

R1

R2

R3

R4

A

2

0

1

1

B

1

1

1

0

C

1

1

0

0

D

1

0

1

0

E

0

1

0

1

Current Allocation Table

1- List the resource allocation table for each individual resource type.
2- Is the current system state safe? Why?
3- Answer the above question if D requests a copy of R4 and another copy of R2.
Answer question number 2above if C requests a copy of R1 and at the same time B reserved a copy of R3.

Reference no: EM13380231

Questions Cloud

Tasks1design the software architecture of a web auctioning : tasks1.design the software architecture of a web auctioning site.2.design a database for storing information about
Given the following description answer the questions belowa : given the following description answer the questions below.a hard real-time rt system is one where the failure to
1 the project could fail because the cost of a key : 1. the project could fail because the cost of a key component has increased and we could build a product that does not
Write an introspective capstone paper expressing your views : write an introspective capstone paper expressing your views aboutinformation use in todays society. this will be
Deadlock a- given the sequence of resource requests below : deadlock a- given the sequence of resource requests below draw the resource allocation graph and answer the following
A- please answeronly two ofnbsp the following questions : a- please answeronly two ofnbsp the following questions that are related to the file
In a table forma compare between segmentation and virtual : in a table forma compare between segmentation and virtual memory organizations in terms of the memory structure
Problem 1you have four web servers that are serving static : problem 1you have four web servers that are serving static web pages. you want to prevent them from communicating with
1 this question relates to section 2 genetic algorithma : 1. this question relates to section 2 genetic algorithma heredna -gt channel assigned to a wireless linkindividual -gt

Reviews

Write a Review

Operating System Questions & Answers

  Web system deployed on campus has a failure rate

A web system deployed on campus has a failure rate of 10-3 failures per hour. What is the likeihood that the system will continue operating without failure throughout the duration of one week (Monday to Friday)?

  Computer privacy related question

One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..

  Potential management plans for monitoring network activities

Discussion on potential management plans for monitoring network activities and maintaining security of the network.

  Disadvantages to living in an information age

Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.

  Develop and manage internet usage

Discuss how does management in business or education develop and manage Internet usage as it relates to research, supplemental resources and functional support? Explain your answer with examples.

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Computing effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of the remaining, 10 percent (or 2 percent of the total) cause page faults.What is the effective memory access time?

  Requirement for routers to support ipv4 and 6 protocol stack

The answer describes the requirement for routers to support both IPv4 and IPv6 protocol stacks and describes the several types of connections a dual stack router can support, and why such connections are necessary.

  Differences and similarities between linux and unix?

What are some distinct differences and similarities between Linux and Unix? Why do you think it is important to know about both of these operating systems

  Page table entries are needed for two-level paging

Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how many page table entries are needed for two-level paging, with 10 bits in ea..

  Determine a source code control system

Determine a source code control system and discuss why is such a system necessary when multiple programmers build a program or system?

  How much cylinder skew is needed for an oceangate disk

How much cylinder skew is needed for an oceangate disk operating at 20,000 rpm(new series for the christmas promotions) which has a seek time of 0.5 milliseconds? This disk has 800 sectors of 512 bytes each on each track?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd