Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Explain about Deadlock Avoidance?
To prevent deadlocks two kinds of techniques are used:
1) Static prevention: It employs P and V operators in addition to Semaphores to allocate and deallocate shared resources in multiprocessor. Semaphores are created based on sleep wait protocol. The portion of programme where a deadlock may occur is termed as critical section. Semaphores are like control signals used for avoiding collision between processes.
P and V technique of Deadlock prevention acquaintances a Boolean value 0 or 1 to every semaphore. Two atomic operators, P and V are used to access critical section symbolized by the semaphore. The P(s) operation makes value of semaphore is to be raised by one if s is already at non-zero value.
The V(s) operation raises value of s by one if it's not already one. The equation s=1 denotes availability of resource and s=0 denotes non-availability of resource.
At the time of execution different processes may submit their requests for resources asynchronously. The resources are assigned to different processors in such a manner that they don't create circular wait. The disadvantage of static prevention is poor resource utilisation.
2) One additional method of deadlock prevention is dynamic deadlock avoidance. It ensures deadlocks on runtime condition that may bring in heavy overhead in distinguishing potential existence of deadlocks.
Calculate the number of trunks that can be supported on a time multiplexed space switch given that, 32 channels are multiplexed in each stream, while the control memory access time
One Erlang is equal to (A) 3600 CCS (B) 36 CCS (C) 60 CCS (D) 24 CCS Ans: One Erlang is equivalent to 3600 CCS.
Stack Organization The CPU of the most computers comprises of stack or called as last-in-first-out (LIFO) list in which information is stored in such a manner that item stored
Can I use a Verilog function to define the width of a multi-bit port, wire, or reg type? Width elements of ports, wire or reg declarations require a constant in bot
Q. Define the Thread libraries? The most distinctive representatives of shared memory programming models are thread libraries present in most of modern operating systems. Illus
One of these objectives is related to costs. By going e-commerce, consumers will be able to submit their purchase requests to the sellers without paying a visit to their place. Thi
Strong AI makes the bold claim that computers can be made to think on a level (at least) equivalent to humans. Weak AI only states that some "thinking-like" features can be added t
Question: (a) There are several camera angles that can be used to make a sequence more interesting for a video production project. Explain clearly, using diagrams where appro
Explain various fields in IPV6 base header? Although IPv6 base header is double as large as an IPv4 header, this contains less information. Given diagram demonstrates the forma
The process of importing data from one more Access database follows these common steps they are. ? Preparing the document for import operation and make ensure that extensions ar
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd