Unsafe state in a deadlock-avoidance system, Operating System

Assignment Help:

Question:

A set of processes are in a deadlock state when every process in the set is waiting for an event that can be caused by only another process in the set.

(a) There exists three different ways that an operating system can use to deal with deadlock situations. Identify the three methods, and explain how they can be used to deal with processes that are deadlocked.

(b) Assume that a system always require additional information about how resources are being requested for each process before making a decision on whether to grant the request or not to grant the request. One possible reason for not granting the request is because it can put the system in an unsafe state.

I. What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

Consider a system with 12 magnetic tape drives and 3 processes: P0, P1, P2. Process P0 requires 10 tape drives, process P1 may need as many as 4, and process P2 may need up to 9 tape drives. Suppose that at time t0, the processes are holding 5, 2 and 2 tape drives respectively, as illustrated in the table below:

5_Deadlock-avoidance system.png

II. Is the system in a safe state at time t0? Clearly explain your answer.

III. Suppose that at time t1, process P2 requests and is allocated 1 more tape drive. Now, will this allocation put the system in a safe or unsafe state? Clearly explain your answer.


Related Discussions:- Unsafe state in a deadlock-avoidance system

Explain fifo page replacement in detail, FIFO page replacement This is...

FIFO page replacement This is the easiest page replacement algorithm. Here the 1 st page toward the inside is the 1 st to leave that is the oldest page leaves. To execute th

Facility location, What is the essence of facility location in production o...

What is the essence of facility location in production operation management

Catalogue the design goals of windows xp, Q. Catalogue the design goals of ...

Q. Catalogue the design goals of Windows XP. Answer: Design goals comprise security and reliability and Windows and POSIX application compatibility with high performance and ex

Write pseudo code to implement the pthread create wrapper, Write pseudo cod...

Write pseudo code to implement the pthread_create wrapper of the Tern memoizer. Note you need to describe your data structure for maintaining deterministic thread IDs. In addition,

Unix, what is difference between file descriptor and file pointer?

what is difference between file descriptor and file pointer?

Semaphore examples, Ok so i think i got this right by not 100% on this. wha...

Ok so i think i got this right by not 100% on this. what I want to figure out is if there are x visitors that can line up for a ride but only 1 passenger can get on the ride at a t

Embedded systems design or hardware design, You have been requested by your...

You have been requested by your Senior Engineer to design an Engine Control Unit (ECU) and prepare a report detailing your proposed solution. The client requires a design for a mic

Explian integrating a request/response mechanism, Explian Integrating a Req...

Explian Integrating a Request/Response Mechanism Traditional application developers will need to develop a mechanism for communication between requesting (client) and respondin

In which page replacement policy balady’s anomaly occurs, In which page rep...

In which page replacement policy Balady’s anomaly occurs? FIFO (First in First Out)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd