如果您无法下载资料,请参考说明:
1、部分资料下载需要金币,请确保您的账户上有足够的金币
2、已购买过的文档,再次下载不重复扣费
3、资料包下载后请先用软件解压,在使用对应软件打开
CHAPTER8:DEADLOCKSSYSTEMMODELSystemModel:BridgecrossingexampleSystemModel:ThegeneralmodelDEADLOCKCHARACTERIZATIONDeadlockCharacterization:Resource-allocationgraphDeadlockCharacterization:Resource-allocationgraphDeadlockCharacterization:ExampleofaresourceallocationgraphDeadlockCharacterization:ResourceallocationgraphwithadeadlockDeadlockCharacterization:ResourceallocationgraphwithacyclebutnodeadlockDeadlockCharacterization:BasicfactsMETHODSFORHANDLINGDEADLOCKSDeadlockPreventionDeadlockPreventionDEADLOCKAVOIDANCEDeadlockAvoidanceDeadlockAvoidance:SafestateDeadlockAvoidance:BasicfactsDeadlockAvoidance:Safe,unsafe,deadlockstateDeadlockAvoidance:Resource-allocationgraphalgorithmDeadlockAvoidance:Resource-allocationgraphfordeadlockavoidanceDeadlockAvoidance:Unsafestateinresource-allocationgraphDeadlockAvoidance:Banker’salgorithmDeadlockAvoidance:Datastructuresforthebanker’salgorithmDeadlockAvoidance:SafetyalgorithmDeadlockAvoidance:Resource-requestalgorithmforprocessPiDeadlockAvoidance:Exampleofbanker’salgorithmDeadlockAvoidance:Example(Cont.)DeadlockAvoidance:ExampleP1Request(1,0,2)(Cont.)DEADLOCKDETECTIONDeadlockDetection:SingleInstanceofEachResourceTypeDeadlockDetection:Resource-AllocationGraphandWait-forGraphDeadlockDetection:SeveralInstancesofaResourceTypeDeadlockDetection:DetectionAlgorithmDetectionAlgorithm:AmexampleDetectionAlgorithm:Amexample(Cont.)Detection-Algorithm:UsageDEADLOCKRECOVERYDeadlockRecovery:ProcessTerminationDeadlockRecovery:ResourcePreemptionCombinedApproachtoDeadlockHandlingHomework