wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

profile
HET KARIA
Jul 04, 2024
0 Likes
0 Discussions
106 Reads

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION

Concurrency is the execution of multiple instruction sequences at the same time. It happens in the operating system when there are several process threads running in parallel. The running process threads always communicate with each other through shared memory or message passing. Concurrency results in the sharing of resources resulting in problems like deadlocks and resource starvation. 

It helps in techniques like coordinating the execution of processes, memory allocation, and execution scheduling for maximizing throughput. 

During concurrent execution of processes, processes need to enter the critical section (or the section of the program shared across processes) at times for execution. It might happen that because of the execution of multiple processes at once, the values stored in the critical section become inconsistent. In other words, the values depend on the sequence of execution of instructions – also known as a race condition. The primary task of process synchronization is to get rid of race conditions while executing the critical section.

This is primarily achieved through mutual exclusion.

 Mutual Exclusion is a property of process synchronization that states that “no two processes can exist in the critical section at any given point of time”. The term was first coined by Dijkstra. Any process synchronization technique being used must satisfy the property of mutual exclusion, without which it would not be possible to get rid of a race condition.

Mutual exclusion is only applicable when the following conditions are met :

1. When using shared resources, it is important to ensure mutual exclusion between various processes. There cannot be two processes running simultaneously in either of their critical sections.

2. It is not advisable to make assumptions about the relative speeds of the unstable processes.

3. For access to the critical section, a process that is outside of it must not obstruct another process.

4. Its critical section must be accessible by multiple processes in a finite amount of time; multiple processes should never be kept waiting in an infinite loop.

Requirements for Mutual Exclusion Any facility or capability that is to provide support for mutual exclusion should meet the following requirements:

1. Mutual exclusion must be enforced: Only one process at a time is allowed into its critical section, among all processes that have critical sections for the same resource or shared object.

2. A process that halts in its noncritical section must do so without interfering with other processes.

 3. It must not be possible for a process requiring access to a critical section to be delayed indefinitely: no deadlock or starvation.

4. When no process is in a critical section, any process that requests entry to its critical section must be permitted to enter without delay.

5. No assumptions are made about relative process speeds or number of processors.

6. A process remains inside its critical section for a finite time only

Approaches To Implementing Mutual Exclusion

  1. Software method: Leave the responsibility to the processes themselves. These methods are usually highly error-prone and carry high overheads.
  2.  Hardware method: Special-purpose machine instructions are used for accessing shared resources. This method is faster but cannot provide a complete solution. Hardware solutions cannot give guarantee the absence of deadlock and starvation.

    3. Programming language method: Provide support through the operating system or through the programming language.


Comments ()


Sign in

Read Next

Why Friendship at Work is Important

Blog banner

Scheduling in Operating Systems

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

bulk email software

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Memory heirachy (Operating system)

Blog banner

How to tie a Tie

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

E-learning in today's world

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Race condition

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

MySQL

Blog banner

Mumbai

Blog banner

Metasploit

Blog banner

Security Issues

Blog banner

Pink sauce pasta

Blog banner

John Titor: The Time Traveler

Blog banner

How to feel Happy everyday day

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Operating System

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

OPERATING SYSTEM

Blog banner

Session Hijacking Techniques

Blog banner

Decoding Confusion Matrix

Blog banner

Indian Culture and Tradition

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Instagram

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Theads

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

EMAIL INVESTIGATION

Blog banner

ODOO

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Deadlock in operating system

Blog banner

Disk scheduling

Blog banner

Risk management in IT

Blog banner

Modern operating system

Blog banner

Memory Management in an Operating System

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner