wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

profile
HET KARIA
Jul 04, 2024
0 Likes
0 Discussions
105 Reads

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION

Concurrency is the execution of multiple instruction sequences at the same time. It happens in the operating system when there are several process threads running in parallel. The running process threads always communicate with each other through shared memory or message passing. Concurrency results in the sharing of resources resulting in problems like deadlocks and resource starvation. 

It helps in techniques like coordinating the execution of processes, memory allocation, and execution scheduling for maximizing throughput. 

During concurrent execution of processes, processes need to enter the critical section (or the section of the program shared across processes) at times for execution. It might happen that because of the execution of multiple processes at once, the values stored in the critical section become inconsistent. In other words, the values depend on the sequence of execution of instructions – also known as a race condition. The primary task of process synchronization is to get rid of race conditions while executing the critical section.

This is primarily achieved through mutual exclusion.

 Mutual Exclusion is a property of process synchronization that states that “no two processes can exist in the critical section at any given point of time”. The term was first coined by Dijkstra. Any process synchronization technique being used must satisfy the property of mutual exclusion, without which it would not be possible to get rid of a race condition.

Mutual exclusion is only applicable when the following conditions are met :

1. When using shared resources, it is important to ensure mutual exclusion between various processes. There cannot be two processes running simultaneously in either of their critical sections.

2. It is not advisable to make assumptions about the relative speeds of the unstable processes.

3. For access to the critical section, a process that is outside of it must not obstruct another process.

4. Its critical section must be accessible by multiple processes in a finite amount of time; multiple processes should never be kept waiting in an infinite loop.

Requirements for Mutual Exclusion Any facility or capability that is to provide support for mutual exclusion should meet the following requirements:

1. Mutual exclusion must be enforced: Only one process at a time is allowed into its critical section, among all processes that have critical sections for the same resource or shared object.

2. A process that halts in its noncritical section must do so without interfering with other processes.

 3. It must not be possible for a process requiring access to a critical section to be delayed indefinitely: no deadlock or starvation.

4. When no process is in a critical section, any process that requests entry to its critical section must be permitted to enter without delay.

5. No assumptions are made about relative process speeds or number of processors.

6. A process remains inside its critical section for a finite time only

Approaches To Implementing Mutual Exclusion

  1. Software method: Leave the responsibility to the processes themselves. These methods are usually highly error-prone and carry high overheads.
  2.  Hardware method: Special-purpose machine instructions are used for accessing shared resources. This method is faster but cannot provide a complete solution. Hardware solutions cannot give guarantee the absence of deadlock and starvation.

    3. Programming language method: Provide support through the operating system or through the programming language.


Comments ()


Sign in

Read Next

Firewall / IDS Evasion Techniques

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

File management In Operating System

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

 " Healing of Yoga "

Blog banner

I/O Management and Disk Scheduling

Blog banner

Virtual Machine

Blog banner

Virtual Machine

Blog banner

Uniprocessor and Types

Blog banner

De-Coding Love

Blog banner

Importance of business process documentation

Blog banner

Multiple processor scheduling

Blog banner

Note Taker App

Blog banner

Strengthening Active Directory Security

Blog banner

RAID

Blog banner

THREADS (assignment 1)

Blog banner

Self defence

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Short note on expert system

Blog banner

Real Time Scheduling

Blog banner

Satellite Based Positioning

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Python as a tool for Data science task & project

Blog banner

Segmentation and paging concept

Blog banner

Bulk E-mail software

Blog banner

Linux Memory Management

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Understanding - Proof of Work!

Blog banner

What are NFT s?

Blog banner

Android Flashlight Application

Blog banner

BharatPe

Blog banner

DNS Cache

Blog banner

Cyber Security Control

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Blockchain in IoT Applications

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Smartsheet

Blog banner