Unsafe state in a deadlock-avoidance system, Operating System

Assignment Help:

Question:

A set of processes are in a deadlock state when every process in the set is waiting for an event that can be caused by only another process in the set.

(a) There exists three different ways that an operating system can use to deal with deadlock situations. Identify the three methods, and explain how they can be used to deal with processes that are deadlocked.

(b) Assume that a system always require additional information about how resources are being requested for each process before making a decision on whether to grant the request or not to grant the request. One possible reason for not granting the request is because it can put the system in an unsafe state.

I. What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

Consider a system with 12 magnetic tape drives and 3 processes: P0, P1, P2. Process P0 requires 10 tape drives, process P1 may need as many as 4, and process P2 may need up to 9 tape drives. Suppose that at time t0, the processes are holding 5, 2 and 2 tape drives respectively, as illustrated in the table below:

5_Deadlock-avoidance system.png

II. Is the system in a safe state at time t0? Clearly explain your answer.

III. Suppose that at time t1, process P2 requests and is allocated 1 more tape drive. Now, will this allocation put the system in a safe or unsafe state? Clearly explain your answer.


Related Discussions:- Unsafe state in a deadlock-avoidance system

List the coffmans conditions that lead to a deadlock, List the Coffman's co...

List the Coffman's conditions that lead to a deadlock. Mutual Exclusion : Only one process might be use a critical resource at a time. Hold & Wait: A process may be alloc

Memory management, example of first fit best fit and worst fit

example of first fit best fit and worst fit

What is process migration, Question: (a) Describe blocking and non-bloc...

Question: (a) Describe blocking and non-blocking types of inter-process communication. What is easier to implement and why? Discuss their relative advantages and disadvantage

Protection, Can you please explain in easy words how input output protectio...

Can you please explain in easy words how input output protection works

Explain about deadlock detection, Explain about deadlock detection? In ...

Explain about deadlock detection? In deadlock situation, the system must provide An algorithm that verifies the state of the system to verify whether a deadlock has occu

Convert the hex to binary, Convert the following from hex to binary and dra...

Convert the following from hex to binary and draw it on the memory map.     RAM    = 0000 -> 00FF     EPROM = FF00  -> FFFF Answer:   0000  0000 0000  0000 (0)    RAM sta

What are the operations that can be performed on a directory, What are the ...

What are the operations that can be performed on a directory? The operations that can be performed on a directory are Search for a file Create a file Delete a

WINDOWS XP, DESIGN GOALS OF WINDOWS XP.DESCRIBE IN DETAIL.

DESIGN GOALS OF WINDOWS XP.DESCRIBE IN DETAIL.

Compression regarding the file system in windows 2000, Write short note on ...

Write short note on compression regarding the file system in Windows 2000. NTFS is able to perform data compression on individual files or on all data files in a directory. To

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd