wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

profile
HET KARIA
Jul 04, 2024
0 Likes
0 Discussions
106 Reads

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION

Concurrency is the execution of multiple instruction sequences at the same time. It happens in the operating system when there are several process threads running in parallel. The running process threads always communicate with each other through shared memory or message passing. Concurrency results in the sharing of resources resulting in problems like deadlocks and resource starvation. 

It helps in techniques like coordinating the execution of processes, memory allocation, and execution scheduling for maximizing throughput. 

During concurrent execution of processes, processes need to enter the critical section (or the section of the program shared across processes) at times for execution. It might happen that because of the execution of multiple processes at once, the values stored in the critical section become inconsistent. In other words, the values depend on the sequence of execution of instructions – also known as a race condition. The primary task of process synchronization is to get rid of race conditions while executing the critical section.

This is primarily achieved through mutual exclusion.

 Mutual Exclusion is a property of process synchronization that states that “no two processes can exist in the critical section at any given point of time”. The term was first coined by Dijkstra. Any process synchronization technique being used must satisfy the property of mutual exclusion, without which it would not be possible to get rid of a race condition.

Mutual exclusion is only applicable when the following conditions are met :

1. When using shared resources, it is important to ensure mutual exclusion between various processes. There cannot be two processes running simultaneously in either of their critical sections.

2. It is not advisable to make assumptions about the relative speeds of the unstable processes.

3. For access to the critical section, a process that is outside of it must not obstruct another process.

4. Its critical section must be accessible by multiple processes in a finite amount of time; multiple processes should never be kept waiting in an infinite loop.

Requirements for Mutual Exclusion Any facility or capability that is to provide support for mutual exclusion should meet the following requirements:

1. Mutual exclusion must be enforced: Only one process at a time is allowed into its critical section, among all processes that have critical sections for the same resource or shared object.

2. A process that halts in its noncritical section must do so without interfering with other processes.

 3. It must not be possible for a process requiring access to a critical section to be delayed indefinitely: no deadlock or starvation.

4. When no process is in a critical section, any process that requests entry to its critical section must be permitted to enter without delay.

5. No assumptions are made about relative process speeds or number of processors.

6. A process remains inside its critical section for a finite time only

Approaches To Implementing Mutual Exclusion

  1. Software method: Leave the responsibility to the processes themselves. These methods are usually highly error-prone and carry high overheads.
  2.  Hardware method: Special-purpose machine instructions are used for accessing shared resources. This method is faster but cannot provide a complete solution. Hardware solutions cannot give guarantee the absence of deadlock and starvation.

    3. Programming language method: Provide support through the operating system or through the programming language.


Comments ()


Sign in

Read Next

Maharashtrian culture: Tradition, Art, Food

Blog banner

Culture Of Ladakh

Blog banner

GraphX:- A graph processing tool

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Objectives and Functions of Operating System

Blog banner

Danger assessment in GIS

Blog banner

10 Reasons to date your best friend

Blog banner

Worms, viruses and Bots

Blog banner

The Evolution of Operating Systems

Blog banner

Processes : Process description and control

Blog banner

Data Visualization in Decision-Making

Blog banner

Short note on Microsoft office

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Quality check in IT services

Blog banner

Cyber Forensics

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Explain Kernel in OS

Blog banner

Introduction my self

Blog banner

Mumbai Metro 3

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Chicken Dum Biryani

Blog banner

DISK SCHEDULING

Blog banner

Caching windows

Blog banner

Security issues

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

IP ADDRESS

Blog banner

Financial Fraud Detection

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Privacy LAWs in IT

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Internet of Things and cyber security

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Importance of modern technology era

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Security issues

Blog banner

Service Design Model

Blog banner

Earth with no trees

Blog banner

Memory input output management

Blog banner

differentiate thinking humanly and rationally

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner