wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

semaphores in os

profile
Dia Jha
Aug 15, 2024
0 Likes
0 Discussions
73 Reads

In Operating Systems: Semaphores


Semaphors are one of the most important concepts in OS,it is mainly used to synchronise and control access on any concurrent process or threads. They protect against race conditions and make sure that multi-process environment uses resources effectively, and safely.


 1. Definition and Types


 A semaphore is a synchronization tool,that uses an integer value for controlling access to any shared resource. The semaphore can work after adjustment of its value by two atomic operations


– Wait (P of Proberen): Decreases the semaphore value. Is the value goes below 0 then until it becomes positive again, that process will be on hold.


- Signal (V or Verhogen): This processes signals increase the value of semaphore. if value is less then calls up blocked process.


There are two kind of semaphores:-


Binary Semaphore (Mutex): This can only take two values 0 and 1. It is used to do compliant access on one resource.


- Counting Semaphore: can yield any integer value and they are used to control access of a finite number of instances for a resource.


 2. Usage


Some of the scenarios using semaphores are as follows:


Mutex: mutual exclusion, which allows only a single process or thread to enter the critical section of the code.


- Resource Sharing: It manages access to a pool of identical resources—such as database connections.


Process Synchronization- It controls running of the processes in a certain order, it allows only specific operations to conduct at some time.


3. Implementation and Challenges


This signal is generally created in the kernel of an operating system and makes use of specific functions. Semaphores come with a few challenges out of the box:


On the other hand, Deadlocks can occur if processes are waiting indefinitely for a semaphore.


-Priority Inversion: Prevent a high-priority process from moving forward by a low-priorit.


– Starvation: Some processes may never get access to a semaphore if continuous acquisition of it is being done by other processes.


 4. The Pro 's and Con's 


- Advantages:


Simple but efficient synchronization mechanism.


Allows control over the execution of processes and access to resources.


- Disadvantages:


 Disadvantages- Difficult to implement correctly (deadlocks, priority inversion).


Semaphores are difficult to be debugged


Summary


Semaphores are used to synchronize or coordinate execution of process among themselves and helps lot in maintaining access / modification order of shared resources. Appropriate use of semaphores Improves the performance and reliability in multi-process environment.


Comments ()


Sign in

Read Next

Ethical Hacking

Blog banner

DURGA POOJA

Blog banner

operating system

Blog banner

Types of Viruses

Blog banner

"Games and the future"

Blog banner

Deadlocks in Operating Systems

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Importance of business process documentation

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Women Empowerment

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Why Friendship at Work is Important

Blog banner

bulk email software

Blog banner

Be you

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Key to success in Sports

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

ONLINE NEWSROOMS

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

OS Assignment 3

Blog banner

File system

Blog banner

Royal enfield

Blog banner

Multiprocessor and Multicore Organization

Blog banner

URL vs Domain

Blog banner

Operating system

Blog banner

Fault tolerance

Blog banner

The War With Cold On Earth

Blog banner

Major achievement

Blog banner

Technical SEO : Total Guide

Blog banner

virtual memory

Blog banner

From Model Mistakes to Metrics

Blog banner

NETWORK SECURITY RISKS

Blog banner

RAID_142

Blog banner

Virtual Memory

Blog banner

Virtual Machine

Blog banner

What is Segmentation?

Blog banner