SlideShare uma empresa Scribd logo
1 de 61
CHAPTER 7   الفصل السابــــــــــــــــــع DEADLOCKS الجمــــــــــــــــــــــود
مقدمــــــــــــــــــــــــة ,[object Object],[object Object],[object Object],[object Object],[object Object]
مقدمــــــــــــــــــــــــة ,[object Object],[object Object],[object Object]
7.1 System Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.1 System Model ,[object Object],[object Object],[object Object]
7.1 System Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.2 Deadlock Characterization وصف  ( تمثيل )  الجمود ,[object Object],[object Object]
7.2 Deadlock Characterization 7.2.1 Necessary Conditions ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.2 Deadlock Characterization 7.2.1 Necessary Conditions ,[object Object],[object Object]
7.2 Deadlock Characterization 7.2.1 Necessary Conditions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.2 Deadlock Characterization 7.2.1 Necessary Conditions ,[object Object],[object Object]
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object]
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object]
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 7.1: Resource-allocation graph R 1 R 3 P 1 P 2 P 3 R 2 R 4
7.2.2 Resource-Allocation Graph الرسم البياني للمصدر المخصص  ( المحجوز ) ,[object Object],[object Object],[object Object],[object Object]
Figure 7.2: Resource-allocation graph with a deadlock R 1 R 3 P 1 P 2 P 3 R 2 R 4
Resource-allocation graph with a cycle but no deadlock ,[object Object],[object Object],[object Object],[object Object],[object Object]
Figure 7.3: Resource-allocation graph with a cycle but no deadlock P 1 P 2 P 3 P 4 R 1 R 2
7.3 Methods for handling Deadlocks ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.3 Methods for handling Deadlocks ,[object Object],[object Object],[object Object]
7.3 Methods for handling Deadlocks ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.1 Mutual Exclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.1 Mutual Exclusion ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.2 Hold and Wait ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.3 No Preemption  ( حق الشفعة ) ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.3 No Preemption  ( حق الشفعة ) ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.3 No Preemption  ( حق الشفعة ) ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.3 No Preemption  ( حق الشفعة ) ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.3 No Preemption  ( حق الشفعة ) ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object],[object Object],[object Object]
7.4 Deadlock Prevention 7.4.4 Circular Wait ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance ,[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance ,[object Object],[object Object]
7.5 Deadlock Avoidance ,[object Object],[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance ,[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object],Figure (7.4) Safe, Unsafe, and Deadlock state Spaces Unsafe Safe Deadlock
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],Max. Needs Current Needs P0 10 5 P1 4 2 P2 9 2
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object],[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object]
7.5 Deadlock Avoidance 7.5.1 Safe State ,[object Object],[object Object]
تمت بحمد الله تعالى و فضله

Mais conteúdo relacionado

Mais procurados

Java Thread Synchronization
Java Thread SynchronizationJava Thread Synchronization
Java Thread SynchronizationBenj Del Mundo
 
Introduction to java
Introduction to java Introduction to java
Introduction to java Sandeep Rawat
 
Find & Locate utility Linux
Find & Locate utility LinuxFind & Locate utility Linux
Find & Locate utility LinuxBhavik Bhansali
 
Ruby Presentation
Ruby Presentation Ruby Presentation
Ruby Presentation platico_dev
 
Solid Principles & Design patterns with PHP examples
Solid Principles & Design patterns with PHP examplesSolid Principles & Design patterns with PHP examples
Solid Principles & Design patterns with PHP examplesFederico Damián Lozada Mosto
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowVi Tính Hoàng Nam
 
Java rmi example program with code
Java rmi example program with codeJava rmi example program with code
Java rmi example program with codekamal kotecha
 
Lecture 7 Control Statements.pdf
Lecture 7 Control Statements.pdfLecture 7 Control Statements.pdf
Lecture 7 Control Statements.pdfSalmanKhurshid25
 
Object Oriented with Java Programmazione Base
Object Oriented with Java Programmazione BaseObject Oriented with Java Programmazione Base
Object Oriented with Java Programmazione BaseFelice Pescatore
 
[OOP - Lec 08] Encapsulation (Information Hiding)
[OOP - Lec 08] Encapsulation (Information Hiding)[OOP - Lec 08] Encapsulation (Information Hiding)
[OOP - Lec 08] Encapsulation (Information Hiding)Muhammad Hammad Waseem
 
JVM Memory Management Details
JVM Memory Management DetailsJVM Memory Management Details
JVM Memory Management DetailsAzul Systems Inc.
 
Reversing Android Applications For Fun and Profit
Reversing Android Applications For Fun and ProfitReversing Android Applications For Fun and Profit
Reversing Android Applications For Fun and ProfitMaycon Vitali
 
Java Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug ClassJava Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug ClassCODE WHITE GmbH
 

Mais procurados (20)

Java Thread Synchronization
Java Thread SynchronizationJava Thread Synchronization
Java Thread Synchronization
 
Introduction to java
Introduction to java Introduction to java
Introduction to java
 
Find & Locate utility Linux
Find & Locate utility LinuxFind & Locate utility Linux
Find & Locate utility Linux
 
Ruby Presentation
Ruby Presentation Ruby Presentation
Ruby Presentation
 
Threads concept in java
Threads concept in javaThreads concept in java
Threads concept in java
 
Encapsulation
EncapsulationEncapsulation
Encapsulation
 
Solid Principles & Design patterns with PHP examples
Solid Principles & Design patterns with PHP examplesSolid Principles & Design patterns with PHP examples
Solid Principles & Design patterns with PHP examples
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Java rmi example program with code
Java rmi example program with codeJava rmi example program with code
Java rmi example program with code
 
Lecture 7 Control Statements.pdf
Lecture 7 Control Statements.pdfLecture 7 Control Statements.pdf
Lecture 7 Control Statements.pdf
 
Object Oriented with Java Programmazione Base
Object Oriented with Java Programmazione BaseObject Oriented with Java Programmazione Base
Object Oriented with Java Programmazione Base
 
Ruby programming
Ruby programmingRuby programming
Ruby programming
 
The Same-Origin Policy
The Same-Origin PolicyThe Same-Origin Policy
The Same-Origin Policy
 
[OOP - Lec 08] Encapsulation (Information Hiding)
[OOP - Lec 08] Encapsulation (Information Hiding)[OOP - Lec 08] Encapsulation (Information Hiding)
[OOP - Lec 08] Encapsulation (Information Hiding)
 
JVM Memory Management Details
JVM Memory Management DetailsJVM Memory Management Details
JVM Memory Management Details
 
Java loops
Java loopsJava loops
Java loops
 
Reversing Android Applications For Fun and Profit
Reversing Android Applications For Fun and ProfitReversing Android Applications For Fun and Profit
Reversing Android Applications For Fun and Profit
 
Java features
Java featuresJava features
Java features
 
Java Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug ClassJava Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug Class
 
Java program structure
Java program structureJava program structure
Java program structure
 

Destaque

Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating systemSara Ali
 
USTU classroom and laboratory complex
USTU classroom and laboratory complexUSTU classroom and laboratory complex
USTU classroom and laboratory complexugtuinternational
 
USTU and PJSC Gazprom: strategic partnership
USTU and PJSC Gazprom: strategic partnershipUSTU and PJSC Gazprom: strategic partnership
USTU and PJSC Gazprom: strategic partnershipugtuinternational
 
ditributed databases
ditributed databasesditributed databases
ditributed databasesHira Awan
 
Multi Channel copper extrusion process
Multi Channel copper extrusion processMulti Channel copper extrusion process
Multi Channel copper extrusion processbrijsoft
 
Sentiment Analysis for Arabic tweets
Sentiment Analysis for Arabic tweetsSentiment Analysis for Arabic tweets
Sentiment Analysis for Arabic tweetsRaed Marji
 
Hot melt extrusion
Hot melt extrusionHot melt extrusion
Hot melt extrusionmanmanasi
 
Practical sentiment analysis
Practical sentiment analysisPractical sentiment analysis
Practical sentiment analysisDiana Maynard
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock GalvinSonali Chauhan
 
Universidad Central Facultad de Filosofia
Universidad Central Facultad de FilosofiaUniversidad Central Facultad de Filosofia
Universidad Central Facultad de Filosofiaanimalzuelto
 
Veritas - resiliency platform
Veritas - resiliency platformVeritas - resiliency platform
Veritas - resiliency platformFernando Alves
 
Princípios de liderança bíblica em elias 5
Princípios de liderança bíblica em elias   5Princípios de liderança bíblica em elias   5
Princípios de liderança bíblica em elias 5Vilmar Nascimento
 
call outs thoughts style 2 powerpoint presentation templates
call outs thoughts style 2 powerpoint presentation templatescall outs thoughts style 2 powerpoint presentation templates
call outs thoughts style 2 powerpoint presentation templatesSlideTeam.net
 

Destaque (20)

Sql pl
Sql plSql pl
Sql pl
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
USTU classroom and laboratory complex
USTU classroom and laboratory complexUSTU classroom and laboratory complex
USTU classroom and laboratory complex
 
Lecture 03 decision making
Lecture 03   decision makingLecture 03   decision making
Lecture 03 decision making
 
USTU and PJSC Gazprom: strategic partnership
USTU and PJSC Gazprom: strategic partnershipUSTU and PJSC Gazprom: strategic partnership
USTU and PJSC Gazprom: strategic partnership
 
ditributed databases
ditributed databasesditributed databases
ditributed databases
 
USTU AR
USTU ARUSTU AR
USTU AR
 
Multi Channel copper extrusion process
Multi Channel copper extrusion processMulti Channel copper extrusion process
Multi Channel copper extrusion process
 
Sentiment Analysis for Arabic tweets
Sentiment Analysis for Arabic tweetsSentiment Analysis for Arabic tweets
Sentiment Analysis for Arabic tweets
 
Hot melt extrusion
Hot melt extrusionHot melt extrusion
Hot melt extrusion
 
Practical sentiment analysis
Practical sentiment analysisPractical sentiment analysis
Practical sentiment analysis
 
Extrusion
ExtrusionExtrusion
Extrusion
 
Extrusion
ExtrusionExtrusion
Extrusion
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock Galvin
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Universidad Central Facultad de Filosofia
Universidad Central Facultad de FilosofiaUniversidad Central Facultad de Filosofia
Universidad Central Facultad de Filosofia
 
Veritas - resiliency platform
Veritas - resiliency platformVeritas - resiliency platform
Veritas - resiliency platform
 
Princípios de liderança bíblica em elias 5
Princípios de liderança bíblica em elias   5Princípios de liderança bíblica em elias   5
Princípios de liderança bíblica em elias 5
 
Hola soy un libro
Hola soy un libroHola soy un libro
Hola soy un libro
 
call outs thoughts style 2 powerpoint presentation templates
call outs thoughts style 2 powerpoint presentation templatescall outs thoughts style 2 powerpoint presentation templates
call outs thoughts style 2 powerpoint presentation templates
 

Semelhante a Deadlock (7)

Loops
LoopsLoops
Loops
 
7 multi threading
7 multi threading7 multi threading
7 multi threading
 
Loops
LoopsLoops
Loops
 
8 memory managment & pointers
8 memory managment & pointers8 memory managment & pointers
8 memory managment & pointers
 
Backup and restore sql server 2008
Backup and restore sql server 2008Backup and restore sql server 2008
Backup and restore sql server 2008
 
Deadlock Detection Algorithm.pptx
Deadlock Detection Algorithm.pptxDeadlock Detection Algorithm.pptx
Deadlock Detection Algorithm.pptx
 
9 networking
9 networking9 networking
9 networking
 

Deadlock

  • 1. CHAPTER 7 الفصل السابــــــــــــــــــع DEADLOCKS الجمــــــــــــــــــــــود
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Figure 7.1: Resource-allocation graph R 1 R 3 P 1 P 2 P 3 R 2 R 4
  • 19.
  • 20. Figure 7.2: Resource-allocation graph with a deadlock R 1 R 3 P 1 P 2 P 3 R 2 R 4
  • 21.
  • 22. Figure 7.3: Resource-allocation graph with a cycle but no deadlock P 1 P 2 P 3 P 4 R 1 R 2
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. تمت بحمد الله تعالى و فضله