Evaluating different approaches to deadlock

Assignment Help Basic Computer Science
Reference no: EM131212098

Consider the following ways of handling deadlock:

(1) banker's algorithm,

(2) detect deadlock and kill thread, releasing all resources,

(3) reserve all resources in advance,

(4) restart thread and release all resources if thread needs to wait,

(5) resource ordering, and

(6) detect deadlock and roll back thread's actions.

a. One criterion to use in evaluating different approaches to deadlock is which approach permits the greatest concurrency. In other words, which approach allows the most threads to make progress without waiting when there is no deadlock? Give a rank order from 1 to 6 for each of the ways of handling deadlock just listed, where 1 allows the greatest degree of concurrency. Comment on your ordering.

b. Another criterion is efficiency; in other words, which requires the least processor overhead. Rank order the approaches from 1 to 6, with 1 being the most efficient, assuming that deadlock is a very rare event. Comment on your ordering. Does your ordering change if deadlocks occur frequently?

Reference no: EM131212098

Questions Cloud

Perform the same function as a j-k flip-flop : How do you modify a D-type flip-flop to perform the same function as a J-K flip-flop?
Compare the writing and information and references : Write a short  paper in which you compare and contrast the writing, information, references, and another other elements of the sources as appropriate.
Chronology of the development of the internet : 1) When looking at the chronology of the development of the Internet, which development do you believe to be the most important? Why?
Computing technologies on business productivity : Describe the impact of software development and computing technologies on business productivity.
Evaluating different approaches to deadlock : Another criterion is efficiency; in other words, which requires the least processor overhead. Rank order the approaches from 1 to 6, with 1 being the most efficient, assuming that deadlock is a very rare event. Comment on your ordering. Does your ..
Describe why the article''s argument is stronger than other : Describe why the article's argument is stronger than the other. Give examples from both. Include how current perspectives and theories support your rationale.
Can one be productive working at home : Can one be productive working at home? Please describe in detail of whether or not your choice on this. What is the difference in a Consultant vs a Contractor? Please describe the differences.
Separation of duties : Have you seen a movie where nuclear missiles were being test launched? If so, you might recall that two military officers followed a complex procedure to initiate the test launch. Each officer had half of what was needed to complete the procedure...
Write the research paper on building collapse in benue state : Write the Research Problem. - The topic is: Investigation on the natural and man-made causes of building collapse in Benue State.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Ssl web security and system architecture

Discuss the task and write a report. Introduction,SSL Web Security,Background of topic and solutions,Project Requirement,System Architecture,System Design,Client Side implementation.

  Against net neutrality

2. Discuss whether or not you are for or against Net Neutrality. Support your position.

  What type of employees will you hire to work at help desk

You have been asked to create a help desk for the computer support division of your company

  The medical biller

A physician has treated a patient who has a diagnosis that is not listed on the superbill. How is this handled by the physician? The medical biller?

  What are popular database management systems why use oracle

What are some of the more popular database management systems? Why use Oracle

  Personal identification number

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system.

  Create a program to keep track of the participants

Create a program to keep track of the participants in a triathlon. Your program will keep track of the times in three events: Running, Swimming, and Biking.

  Create an application that instantiates one martian

Create an application that instantiates one Martian and one Jupiterian and set and display their data.

  Research a writing guide for forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  Round-robin scheduling is used to execute the processes

a) If round-robin scheduling is used to execute the processes, how many items will each process have produced and consumed at the end of 10 time quanta? Assume that the initial run queue order is P1, P2, P3, C1.

  The back-end database

Three (3) page Word document that describes the front-end, the user interface, and the back-end database and how the requirements were met, and a full description of client needs and how the application supported the requirements.

  What is the difference between the types of parameters

What is the difference between the types of parameters (explained in Chapter 4) used in methods and the types of values that can be returned from a function?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd