Explain about deadlock avoidance, Computer Engineering

Assignment Help:

Q. Explain about Deadlock Avoidance?

To prevent deadlocks two kinds of techniques are used:

1) Static prevention:  It employs P and V operators in addition to Semaphores to allocate and deallocate shared resources in multiprocessor. Semaphores are created based on sleep wait protocol. The portion of programme where a deadlock may occur is termed as critical section.   Semaphores are like control signals used for avoiding collision between processes.

 P and V technique of Deadlock prevention acquaintances a Boolean value 0 or 1 to every semaphore.  Two atomic operators, P and V are used to access critical section symbolized by the semaphore. The P(s) operation makes value of semaphore is to be raised by one if s is already at non-zero value.

The V(s) operation raises value of s by one if it's not already one. The equation s=1 denotes availability of resource and s=0 denotes non-availability of resource. 

At the time of execution different processes may submit their requests for resources asynchronously.  The resources are assigned to different processors in such a manner that they don't create circular wait.  The disadvantage of static prevention is poor resource utilisation.

2) One additional method of deadlock prevention is dynamic deadlock avoidance.  It ensures deadlocks on runtime condition that may bring in heavy overhead in distinguishing potential existence of deadlocks.


Related Discussions:- Explain about deadlock avoidance

Call a screen as dialog box, The Syntex used to call a screen as dialog box...

The Syntex used to call a screen as dialog box (pop up)is CALL SCREEN STARTING AT ENDING AT

Texts in the text elements of the program, Which Texts  in the text elemen...

Which Texts  in the text elements of the program helps in changing the displayed names of variables in the parameters statement. Selection text in the elements of the program

Protocols and services on internet, To work with Internet as well as to uti...

To work with Internet as well as to utilize its facilities we use certain tools. For illustration, Telnet is a tool, which is utilized for logging on remote computers on the Intern

Cim and holonic manufacturing system, CIM and Holonic Manufacturing System ...

CIM and Holonic Manufacturing System The improvement of computer integrated manufacturing has demonstrated that the automation has the same potential such that of computers in

draw the precedence diagram , The desired daily output for an assembly ...

The desired daily output for an assembly line is 360 units. This assembly line will operate 450 minutes per day. The following table have information on this product's task times a

Define dma, Define DMA. The transfer of data among a fast storage devic...

Define DMA. The transfer of data among a fast storage device such as magnetic disk and memory if often limited by the speed of the CPU. Removing the CPU from the path and letti

Design a multiplier, how can we design a multiplier by using ASM chart and ...

how can we design a multiplier by using ASM chart and then design the data controller ?!!

What is non-repudiation, What is non-repudiation? Non Repudiation: Assu...

What is non-repudiation? Non Repudiation: Assurance that the sender is given with proof of delivery and that the recipient is provided with proof of the sender's identity so th

Determine the simplified sop boolean expression, The Karnaugh map for a SOP...

The Karnaugh map for a SOP function is given below in figure. Determine the simplified SOP Boolean expression. Ans. F= B'C' + A'C'D + B'D'

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd