Explain wait for graph-resource request and allocation graph, Computer Engineering

Assignment Help:

Explain Wait for graph (WFG) with Resource request and allocation graph (RRAG).

WFG with RRAG:

A graph G = (V,E) is termed as bipartite if V can be decomposed in two disjoint sets V1 and V2 therefore every edge in E joins a vertex in V1 to a vertex in V2. Assume that V1 be a set of processes and also V2 be a set of resources. Thus the graph is directed we will seems as:

2420_Resource request and allocation graph.png

 

 

  • An edge (Rj,Pi) that is an assignment edge to mean that resource Rj has been assigned to process Pi
  • An edge (Pi,Rj) (termed as a request edge) to implies that process Pi has requested resource Rj

1. Utilize a resource allocation graph to derive a wait-for-graph.

2. Wait-for graph acquired by making an edge from p1 to p2 if p1 is waiting for a resource which is allocated to p2.

3. Deadlock exists if a cycle exists into resulting wait-for-graph.

245_WF Graph.png


Related Discussions:- Explain wait for graph-resource request and allocation graph

Transformation – the process of change, TRANSFORMATION - THE PROCESS OF CHA...

TRANSFORMATION - THE PROCESS OF CHANGE Much of contemporary art and design practice and indeed popular culture is dedicated to looking at how change affects us as individuals a

Drawbacks to having call centres overseas, Drawbacks to having call centres...

Drawbacks to having call centres overseas -  Culture and language problems -  Animosity to overseas call centres (resulting in loss of customers) -  need for extensive r

Testmanager can be used for performance testing, Rational Testmanager is a ...

Rational Testmanager is a complicated tool that can be used for automating performance tests on client/server systems. A client/server system have client applications accessing a d

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Computation step in time complexity of an algorithm, Q. Computation step in...

Q. Computation step in time complexity of an algorithm? So First in the computation step the local processor executes an arithmetic and logic operation. Afterwards the several

Define the types programmable logic devices?, Define the types Programmable...

Define the types Programmable logic devices? There are mostly three types PLDs. These are vary in the placement of fuses in the AND- OR array. 1. ROM- It has fixed AND array

Explain call by value and call by reference, Call by value and Call by refe...

Call by value and Call by reference Call by value means sending the values of the arguments- The value of each of the original arguments in the calling function is copied in

Define congestion, Define Congestion. Congestion: This is uneconomic ...

Define Congestion. Congestion: This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telecommunication system. Inside

Describe the role of software developers, Describe the role of Software dev...

Describe the role of Software developers Software developers have wide experience of tackling such issues. Students who develop software project spending days and nights strug

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd