Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Deadlock Avoidance
To avoid deadlocks two types of strategies are used:
1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared resources in a multiprocessor. Semaphores are developed based on sleep wait protocol. The section of programme, where a deadlock may occur is known as critical section. Semaphores are control signals used for avoiding collision among processes. V and P technique of Deadlock prevention associates a Boolean value 0 or 1 to each semaphore. Two atomic operators, V and P are used to access the critical section represented by the semaphore. The P(s) operation causes value of semaphore s to be increased by one if s is already at non-zero value.
The V(s) operation increases the value of s by one if it is not already one. The equation s=1 indicates the availability of the resource and s=0 indicates non- availability of the resource.
During implementation, various processes can submit their requests for resources asynchronously. The resources are allocated to many processors in such a way that they do not make circular wait. The shortcoming of the static avoidance is poor resource utilization.
2) One other method of deadlock prevention is dynamic deadlock avoidance. It checks deadlocks on runtime condition, which may initiate heavy overhead in detecting potential existence of deadlocks.
Q. What do you mean by Addressing? Addressing Require to uniquely and universally identify every device to allow global communication Internet address or IP address is us
Determine about the Address Translation When a Web site address or URL is typed in the Web browser, as www.bbc.com and not as a series of numbers, it is essential for the serv
Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A
Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control
Virtual private network The virtual private networks takes the user data encrypts them and sends them to their destination over the internet. the sender and the receiv
Can you describe in a generic manner the packet of IPSec
Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des
Connecting Devices of bridges - Five kinds: - Repeaters - Hubs - Bridges - Two- and three-layer switches - Repeaters and hubs - layer one of Internet model -
Multicast An identifier for a set of interfaces (typically belonging to dissimilar nodes). A packet sent to a multicast address is delivered to all interfaces identified by tha
TELNET Protocols The TCP/ IP protocol suite includes a simple textual remote terminal protocols called TELNET that allow a user to log into a computer across an interne
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd