wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

profile
HET KARIA
Jul 04, 2024
0 Likes
0 Discussions
106 Reads

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION

Concurrency is the execution of multiple instruction sequences at the same time. It happens in the operating system when there are several process threads running in parallel. The running process threads always communicate with each other through shared memory or message passing. Concurrency results in the sharing of resources resulting in problems like deadlocks and resource starvation. 

It helps in techniques like coordinating the execution of processes, memory allocation, and execution scheduling for maximizing throughput. 

During concurrent execution of processes, processes need to enter the critical section (or the section of the program shared across processes) at times for execution. It might happen that because of the execution of multiple processes at once, the values stored in the critical section become inconsistent. In other words, the values depend on the sequence of execution of instructions – also known as a race condition. The primary task of process synchronization is to get rid of race conditions while executing the critical section.

This is primarily achieved through mutual exclusion.

 Mutual Exclusion is a property of process synchronization that states that “no two processes can exist in the critical section at any given point of time”. The term was first coined by Dijkstra. Any process synchronization technique being used must satisfy the property of mutual exclusion, without which it would not be possible to get rid of a race condition.

Mutual exclusion is only applicable when the following conditions are met :

1. When using shared resources, it is important to ensure mutual exclusion between various processes. There cannot be two processes running simultaneously in either of their critical sections.

2. It is not advisable to make assumptions about the relative speeds of the unstable processes.

3. For access to the critical section, a process that is outside of it must not obstruct another process.

4. Its critical section must be accessible by multiple processes in a finite amount of time; multiple processes should never be kept waiting in an infinite loop.

Requirements for Mutual Exclusion Any facility or capability that is to provide support for mutual exclusion should meet the following requirements:

1. Mutual exclusion must be enforced: Only one process at a time is allowed into its critical section, among all processes that have critical sections for the same resource or shared object.

2. A process that halts in its noncritical section must do so without interfering with other processes.

 3. It must not be possible for a process requiring access to a critical section to be delayed indefinitely: no deadlock or starvation.

4. When no process is in a critical section, any process that requests entry to its critical section must be permitted to enter without delay.

5. No assumptions are made about relative process speeds or number of processors.

6. A process remains inside its critical section for a finite time only

Approaches To Implementing Mutual Exclusion

  1. Software method: Leave the responsibility to the processes themselves. These methods are usually highly error-prone and carry high overheads.
  2.  Hardware method: Special-purpose machine instructions are used for accessing shared resources. This method is faster but cannot provide a complete solution. Hardware solutions cannot give guarantee the absence of deadlock and starvation.

    3. Programming language method: Provide support through the operating system or through the programming language.


Comments ()


Sign in

Read Next

TEAMWORK

Blog banner

PERSONAL STORIES

Blog banner

SPEM

Blog banner

TRAIN TRAVELING

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Love is in air.....

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Network Forensics Tools and Techniques

Blog banner

Disk Management

Blog banner

Process, process creation and process termination

Blog banner

Microsoft powerpoint presentation

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

RAID

Blog banner

Deadlocks

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

EdTech (Education Technology)

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Cache memory

Blog banner

Zoho

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

INTRODUCTION TO C#

Blog banner

Developments in Modern Operating Systems

Blog banner

DATA VAULT

Blog banner

Lifestyle of a photographer

Blog banner

I/O buffer and its techniques

Blog banner

Network Security Risks

Blog banner

Types of Big Data

Blog banner

Blog name

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Man VS Nature

Blog banner

operating system

Blog banner

MOVEMBER

Blog banner

Metasploit

Blog banner

MY FIRST BLOG?

Blog banner

Big Data

Blog banner

Different Types of Data

Blog banner

Memory management and virtual memory

Blog banner

Music is life

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner