Explain readers-writers problem, Computer Engineering

Assignment Help:

Explain Readers-writers problem.

Readers-writers problem: Assume that a data object (as a file or record) is to be shared between several concurrent processes. The readers are processes which are interested in only reading the content of shared data-object. Writers are the processes which may need to update (i.e. to read and write) the shared data object. No adverse effects will result, if two readers access the shared data object simultaneously. Though, if a writer and some other process (either a writer or reader) access the shared object concurrently, anomaly may arise. To make sure that these difficulties do not occur, writers are needed to have exclusive access to the shared object. Such synchronization problem is referred to as the problem of readers-writers.


Related Discussions:- Explain readers-writers problem

#microprocessor, Program to transfer 10 byte of data from DMS to EMS using ...

Program to transfer 10 byte of data from DMS to EMS using 8086 instructions

Explain about the various features present in ms access, Microsoft access h...

Microsoft access has vast advantages for a programmer and end user. Some of the advantages are ? Relative compatibility with SQL and VBA. ? Microsoft SQL server desktop engi

Coupling and cohesion, Coupling and cohesion can be shown using a:- Dep...

Coupling and cohesion can be shown using a:- Dependence matrix

Why SS7 protocol is use, SS7 Protocol uses: (A) Out of band signalling...

SS7 Protocol uses: (A) Out of band signalling. (B) Associated signalling. (C) Speech control signalling. (D) No signalling. Ans: SS7 Protocol uses Out of

Determine about the programmable read only memory, Programmable read only m...

Programmable read only memory (PROM) A PROM is a memory chip on which data can be written only one time. Once a program has been written onto a PROM, it's permanent. Unlike RAM

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

What are the objectives of uml, What are the Objectives of UML tra...

What are the Objectives of UML trace development of UML; recognize and describe notations for object modelling using UML; describe a variety of structural and be

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd