what is Semaphore and explain with example?, Basic Computer Science

Assignment Help:
Description
A semaphore is a confined variable whose value can be accessed and changed only by the operations P and V and initialization operation known as ''Semaphoiinitislize''.
• Binary Semaphores can take for granted only the value 0 or the value 1 counting semaphores also described general semaphores can suppose only nonnegative values.

• The P (or wait or sleep or down) operation on semaphores S, assumed as P(S) or wait (S), controls as follows:
• P(S):

IF S > 0
THEN S := S - 1
ELSE (wait on S)

The V (or signal or wakeup or up) process on semaphore S, written as V(S) or signal (S), controls as follows:
V(S): IF (one or additional process are waiting on S)
THEN (let one of these processes proceed)
ELSE S := S +1


Related Discussions:- what is Semaphore and explain with example?

Database design, Build a database application for a sports league. Assume y...

Build a database application for a sports league. Assume your application is to keep track of teams and equipment that is checked out to teams. Explain the steps that is needed and

Internetworking, You have been approached by Company XYZ to design and depl...

You have been approached by Company XYZ to design and deploy a new network that will span three cities in Queensland: Brisbane (12 users), Gold Coast (8 users), and Cairns (6 users

Explain the working of character recognition, Question 1 Explain the follo...

Question 1 Explain the following terms associated with Pattern Recognition Features Collection Question 2 Explain the working of character recognition with a suit

C programming program, I wrote a program that adds up 5x5 matrices by colum...

I wrote a program that adds up 5x5 matrices by column and row. Now i have to use pointers to rewrite the same code how would do that

About the faculty posts, is there any oppurtunity for a mca to teach mcasub...

is there any oppurtunity for a mca to teach mcasubjects online

Hacking, how can i hack a server

how can i hack a server

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

C, board coloring

board coloring

ASSIGNMENTS, A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP...

A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP OF THE STAIRS AND ANOTHER AT THE BOTTOM OF STAIRS

Memory access, Memory access: The use of semi-conductor memory elements...

Memory access: The use of semi-conductor memory elements (bistables) has been made possible by the use of large scale integrated circuits (LSI) which provide reliability, ease

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd