TAILIEUCHUNG - Lecture Operating System: Chapter 03 - University of Technology

Lecture Operating System: Chapter 03 - Deadlocks presented Resource, introduction to deadlocks, the ostrich algorithm, deadlock detection and recovery, deadlock avoidance, deadlock prevention, other issues. | Deadlocks Chapter 3 . Resource . Introduction to deadlocks . The ostrich algorithm . Deadlock detection and recovery . Deadlock avoidance . Deadlock prevention . Other issues Resources Examples of computer resources printers tape drives tables Processes need access to resources in reasonable order Suppose a process holds resource A and requests resource B at same time another process holds B and requests A both are blocked and remain so Resources (1) Deadlocks occur when processes are granted exclusive access to devices we refer to these devices generally as resources Preemptable resources can be taken away from a process with no ill effects Nonpreemptable resources will cause the process to fail if taken away Resources (2) Sequence of events required to use a resource request the resource use the resource release the resource Must wait if request is denied requesting process may be blocked may fail with error code Introduction to Deadlocks .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.