Explain conditions for the critical section problem solution, Computer Engineering

Assignment Help:

What are the properties which a data item should possess to implement a critical section?

The Critical Section Problem Solution should satisfy the following conditions:

1. Mutual Exclusion: If process Pi is executing into its critical section, so no other processes can be executing into their critical sections.

2. Progress: If no process is executing into its critical section and there exist several processes which need to enter their critical section, so the selection of the processes which will enter the critical section subsequently cannot be postponed indefinitely.

3. Bounded Waiting: A bound should exist on the number of times that other processes are permitted to enter their critical sections after a process has done a request to enter its critical section and before which request is granted.

-Suppose that each process executes at a non-zero speed

-No assumption relating to concern speed of the n processes.


Related Discussions:- Explain conditions for the critical section problem solution

Explain the matlab working environment, This is the set of tools and facili...

This is the set of tools and facilities that you work with as the MATLAB user or programmer. It contains facilities for managing the variables in your workspace and importing and e

Data rate limitations in PSTN's by using nyquist theorem, Explain with the ...

Explain with the help of Nyquist theorem, the data rate limitations in PSTN's. Data rates in PSTNs : A voice channel in a public switched telephone network is band restricted

DBMS, DEFINE FILE ORGANISATION

DEFINE FILE ORGANISATION

Design issues of multi-threaded processors, Q. Design issues of Multi-threa...

Q. Design issues of Multi-threaded processors? To accomplish the maximum processor utilization in a multithreaded architecture, the subsequent design issues should be addressed

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Define the internal users of system, Q. Define the Internal Users of system...

Q. Define the Internal Users of system? Internal Users are employees of business for that an information system is built. Illustration are clerical and service staff, technic

History, #what is the history of computer science

#what is the history of computer science

What is a symbolic constant, What is a symbolic constant? How it is defined...

What is a symbolic constant? How it is defined ? Symbolic constants are constants of any type declared by using the #define compiler directive. It is a preprocessor directive.

The concept of electronic cash, The concept of electronic cash is to implem...

The concept of electronic cash is to implement payment by Using computers over network

Arithmetic pipeline, Arithmetic Pipeline The complex arithmetic operati...

Arithmetic Pipeline The complex arithmetic operations like floating point and multiplication operations use a lot of the time of the ALU. These operations can also be pipelined

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd