wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

semaphores in os

profile
Dia Jha
Aug 15, 2024
0 Likes
0 Discussions
73 Reads

In Operating Systems: Semaphores


Semaphors are one of the most important concepts in OS,it is mainly used to synchronise and control access on any concurrent process or threads. They protect against race conditions and make sure that multi-process environment uses resources effectively, and safely.


 1. Definition and Types


 A semaphore is a synchronization tool,that uses an integer value for controlling access to any shared resource. The semaphore can work after adjustment of its value by two atomic operations


– Wait (P of Proberen): Decreases the semaphore value. Is the value goes below 0 then until it becomes positive again, that process will be on hold.


- Signal (V or Verhogen): This processes signals increase the value of semaphore. if value is less then calls up blocked process.


There are two kind of semaphores:-


Binary Semaphore (Mutex): This can only take two values 0 and 1. It is used to do compliant access on one resource.


- Counting Semaphore: can yield any integer value and they are used to control access of a finite number of instances for a resource.


 2. Usage


Some of the scenarios using semaphores are as follows:


Mutex: mutual exclusion, which allows only a single process or thread to enter the critical section of the code.


- Resource Sharing: It manages access to a pool of identical resources—such as database connections.


Process Synchronization- It controls running of the processes in a certain order, it allows only specific operations to conduct at some time.


3. Implementation and Challenges


This signal is generally created in the kernel of an operating system and makes use of specific functions. Semaphores come with a few challenges out of the box:


On the other hand, Deadlocks can occur if processes are waiting indefinitely for a semaphore.


-Priority Inversion: Prevent a high-priority process from moving forward by a low-priorit.


– Starvation: Some processes may never get access to a semaphore if continuous acquisition of it is being done by other processes.


 4. The Pro 's and Con's 


- Advantages:


Simple but efficient synchronization mechanism.


Allows control over the execution of processes and access to resources.


- Disadvantages:


 Disadvantages- Difficult to implement correctly (deadlocks, priority inversion).


Semaphores are difficult to be debugged


Summary


Semaphores are used to synchronize or coordinate execution of process among themselves and helps lot in maintaining access / modification order of shared resources. Appropriate use of semaphores Improves the performance and reliability in multi-process environment.


Comments ()


Sign in

Read Next

Personalized Movie Recommendations with Data Science

Blog banner

Modern Operating Systems

Blog banner

Introduction to GIS

Blog banner

Time Series Analysis

Blog banner

Segmentation and paging concept

Blog banner

History of Money

Blog banner

Malware Defense

Blog banner

Artificial Intelligence (AI)

Blog banner

Emailing the merger document

Blog banner

Traveling

Blog banner

Banaras

Blog banner

Layers Of Blockchain

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

E-learning in today's world

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Data Structures

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Deadlock and starvation

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Capacity management in ITSM

Blog banner

Note Taker App

Blog banner

Virtual Machine

Blog banner

Oracle Corporation

Blog banner

Disk Management

Blog banner

I/O Management and Disk Scheduling

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Smartsheet

Blog banner

RAID_142

Blog banner

Session Hijacking Techniques

Blog banner

security controls

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

memory cache

Blog banner

Cache memory

Blog banner

Virtualization

Blog banner

Mumbai Metro 3

Blog banner

To-Do List In LISP

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

How to Run your First android App

Blog banner