what is Semaphore and explain with example?, Basic Computer Science

Assignment Help:
Description
A semaphore is a confined variable whose value can be accessed and changed only by the operations P and V and initialization operation known as ''Semaphoiinitislize''.
• Binary Semaphores can take for granted only the value 0 or the value 1 counting semaphores also described general semaphores can suppose only nonnegative values.

• The P (or wait or sleep or down) operation on semaphores S, assumed as P(S) or wait (S), controls as follows:
• P(S):

IF S > 0
THEN S := S - 1
ELSE (wait on S)

The V (or signal or wakeup or up) process on semaphore S, written as V(S) or signal (S), controls as follows:
V(S): IF (one or additional process are waiting on S)
THEN (let one of these processes proceed)
ELSE S := S +1


Related Discussions:- what is Semaphore and explain with example?

Functioning of a computer , FUNCTIONING OF A COMPUTER: Computers have...

FUNCTIONING OF A COMPUTER: Computers have undergone through a long history of evolution. The evolutionary history is often divided into mechanical and electronic era, with ele

Information system and information technology, What is the difference betwe...

What is the difference between information technology and information systems? Describe some of the fuctions of information systems

Properties of Dictionary Keys, Dictionary values encompass no limitations. ...

Dictionary values encompass no limitations. They can be any random Python object, moreover standard objects or user-defined objects. Though, same is not true for the keys. There ar

Operation research, origin,nature and impact of operation research

origin,nature and impact of operation research

Data structure, i have attached all files in zip folder, all files are give...

i have attached all files in zip folder, all files are given and act as headers, all what you need to work on: oaa.h "partially given" , wordbench2.h "needed", wordbench2.cpp "nee

Q1, Write a half-page summary explaining IP spoofing.

Write a half-page summary explaining IP spoofing.

Java - Stack and Queue, Consider a class called Configuration. This class “...

Consider a class called Configuration. This class “encapsulates” the configuration management for any software system. For example, once created, the user can simply ask the config

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Omputer applications 2, true or false-- most designs of a desktop publishin...

true or false-- most designs of a desktop publishing document needs to follow clear, specific rules pertaining to design

Function, function of arithmetic logic unit

function of arithmetic logic unit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd