Resource and Resource Access Control: Prepared By-Gajendra Shrimal Mtech I Sem Computer Engineering
Resource and Resource Access Control: Prepared By-Gajendra Shrimal Mtech I Sem Computer Engineering
Access Control
Prepared By-
Gajendra Shrimal
MTech Ist Sem
Introduction to Resources
Motivation:
Suppose there are resource A and B.
Both A and B are available. T1 requests A.
T2 requests B after A is allocated.
If p2 > PA : T1 can never preempt T2 B should be allocated to T2.
If p2 PA : T1 can preempt T2 (and also request B) at some later time. B should not be allocated to
T2, to avoid deadlock.
ECA Govt. Engineering College, Ajmer
Priority Ceiling Protocol..
Same as the basic Priority Inheritance Protocol, except for the following:
The priority of T is not higher than all priority ceilings fo resources allocated to
tasks other than T at the time. (These tasks block T.)
Otherwise, R is allocated to T.
When a task blocks other tasks, it inherits the highest of their priorities.
Whenever a job is preempted, all the resources needed by the preempting job
are free.
The preempting job can complete, and the preempted job can resume.