Explain mutual-exclusion implementation with semaphores, Computer Engineering

Assignment Help:

Disadvantage and Advantage of mutual-exclusion implementation with semaphores.

Disadvantage: Mutual-exclusion solutions specified by semaphores require busy waiting.

That is, even as a process is in its critical section, any other process which tries to enter its critical section should loop continuously in the entry code. Therefore, busy waiting wastes CPU cycles that several other process might capable to use productively.

Advantage: This kind of semaphore is also termed as spinlock as the process "spins" while waiting for lock. Spinlocks are helpful in multiprocessor systems as no context switch is needed when a process should wait on a lock. Therefore, when locks are expected to be held for short times, spinlocks are helpful.


Related Discussions:- Explain mutual-exclusion implementation with semaphores

Interpreted language and a compiled language, Difference between an interpr...

Difference between an interpreted language and a compiled language? Ans) A compiled language is written and then run by a compiler which checks its syntax and compresses it int

Enumerate in brief about the intranet security policy, Enumerate in brief a...

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

Interactive computer graphics.., graphical adapters and input methods in co...

graphical adapters and input methods in computer graphics

What is response ratio, What is response ratio? HRRN that is Highest Re...

What is response ratio? HRRN that is Highest Response Ratio Next scheduling is a non-preemptive discipline, as same to Shortest Job First (SJF) wherein the priority of all jobs

Total number of registers in a cpu, Q. Total number of registers in a CPU? ...

Q. Total number of registers in a CPU? Factors to consider when choosing total number of registers in a CPU are:  CPU can access registers faster than it can access m

What is write-back or copy-back protocol, What is write-back or copy-back p...

What is write-back or copy-back protocol? For a write operation using this protocol during write-hit: the method is to update only the cache and to mark it as updated with an a

Database management system, Consider the following instance of the Students...

Consider the following instance of the Students relation, sorted by gpa. sid name login age gpa 53831 Madayan madayan@music 11 1.8 53832 Guldu guldu@music 12 2.0 53688 Smith smith

Smtp vs esmtp, what shortcomings of smtp are over come by esmtp?

what shortcomings of smtp are over come by esmtp?

Block format and disk layout on cd-rom, Q. Block Format and Disk Layout on ...

Q. Block Format and Disk Layout on CD-ROM? A typical block format is displayed in Figure (a). It comprises the subsequent fields: Sync: Sync field identifies beginning o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd