interprocess communication
play

Interprocess Communication Chester Rebeiro IIT Madras 1 Virtual - PowerPoint PPT Presentation

Interprocess Communication Chester Rebeiro IIT Madras 1 Virtual Memory View During execution, each process can only view its virtual addresses, It cannot RAM 5 View another processes virtual address space 14 2 13 Determine


  1. Attempt 3: No Progress CPU p1_inside p2_inside p1_wants_to_enter = True False False context switch time p2_wants_to_enter = True False False while(1){ p2_wants_to_enter = True while(p1_wants_to_enter = True); There is a tie!!! critical section p2_wants_to_enter = False Both p1 and p2 will loop infinitely other code } Progress not achieved Each process is waiting for the other this is a deadlock 31

  2. Deadlock CPU p1_inside p2_inside p1_wants_to_enter = True False False context switch time p2_wants_to_enter = True False False P2_wants_to_enter There is a tie!!! Waiting assign for FALSE Both p1 and p2 will loop infinitely Process 1 Process 2 Progress not achieved assign Each process is waiting for the other Waiting for FALSE this is a deadlock P1_wants_to_enter 32

  3. Problem with Attempt 3 globally defined p2_wants_to_enter, p1_wants_to_enter Process 1 Process 2 while(1){ while(1){ p1_wants_to_enter = True p2_wants_to_enter = True lock while(p2_wants_to_enter = True); while(p1_wants_to_enter = True); critical section critical section unlock p1_wants_to_enter = False p2_wants_to_enter = False other code other code } } • Deadlock Have a way to break the deadlock 33

  4. Peterson ’ s Solution globally defined p2_wants_to_enter, p1_wants_to_enter, favored Process 1 while(1){ If the second process wants to enter. favor p1_wants_to_enter = True it. (be nice !!!) lock favored = 2 favored is used to break the tie when while (p2_wants_to_enter AND both p1 and p2 want to enter the critical favored = 2); section. critical section p1_wants_to_enter = False favored can take only two values : 1 or 2 other code unlock } (* the process which sets favored last looses the tie *) Break the deadlock with a ‘ favored ’ process 34

  5. Peterson ’ s Solution globally defined p2_wants_to_enter, p1_wants_to_enter, favored Process 1 Process 2 while(1){ while(1){ p1_wants_to_enter = True p2_wants_to_enter = True favored = 2 favored = 1 while (p2_wants_to_enter AND while (p1_wants_to_enter AND favored = 2); favored = 1); critical section critical section p1_wants_to_enter = False p2_wants_to_enter = False other code other code } } • Deadlock broken because favored can only be 1 or 2. – Therefore, tie is broken. Only one process will enter the critical section • Solves Critical Section problem for two processes 35

  6. Bakery Algorithm • Synchronization between N > 2 processes • By Leslie Lamport Eat when 196 displayed wait your turn!! http://research.microsoft.com/en-us/um/people/lamport/pubs/bakery.pdf 36

  7. Simplified Bakery Algorithm • Processes numbered 0 to N-1 • num is an array N integers (initially 0). – Each entry corresponds to a process lock(i){ num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 for(p = 0; p < N; ++p){ while (num[p] != 0 and num[p] < num[i]); } } This is at the doorway!!! It has to be atomic critical section to ensure two processes do not get the same token unlock(i){ num[i] = 0; } 37

  8. Simplified Bakery Algorithm (example) • Processes numbered 0 to N-1 • num is an array N integers (initially 0). – Each entry corresponds to a process lock(i){ num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 for(p = 0; p < N; ++p){ while (num[p] != 0 and num[p] < num[i]); } } P1 P2 P3 P4 P5 critical section 0 4 1 2 3 0 0 0 0 0 0 0 1 0 0 0 0 1 2 0 unlock(i){ num[i] = 0; } 38

  9. Simplified Bakery Algorithm (example) Processes numbered 0 to N-1 num is an array N integers (initially 0). Each entry corresponds to a process lock(i){ num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 for(p = 0; p < N; ++p){ while (num[p] != 0 and num[p] < num[i]); } } P1 P2 P3 P4 P5 critical section 0 4 1 2 3 0 4 0 2 3 0 4 0 0 3 0 4 0 0 0 0 0 0 0 0 unlock(i){ num[i] = 0; } 39

  10. Simplified Bakery Algorithm (why atomic doorway?) • Processes numbered 0 to N-1 • num is an array N integers (initially 0). – Each entry corresponds to a process This is at the doorway!!! Assume it is not atomic lock(i){ num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 for(p = 0; p < N; ++p){ while (num[p] != 0 and num[p] < num[i]); } } P1 P2 P3 P4 P5 critical section 0 3 1 2 2 0 3 0 2 2 0 0 1 2 2 0 0 0 0 0 0 0 1 0 0 unlock(i){ num[i] = 0; P4 and P5 can enter the critical section } at the same time. 40

  11. Original Bakery Algorithm (making MAX atomic) • Without atomic operation assumptions • Introduce an array of N Booleans: choosing , initially all values False. lock(i){ choosing[i] = True doorway num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 choosing[i] = False for(p = 0; p < N; ++p){ while (choosing[p]); while (num[p] != 0 and (num[p],p)<(num[i],i)); } } critical section Choosing ensures that a process unlock(i){ Is not at the doorway num[i] = 0; i.e., the process is not ‘choosing’ } a value for num (a, b) < (c, d) which is equivalent to: (a < c) or ((a == c) and (b < d)) 41

  12. Original Bakery Algorithm (making MAX atomic) • Without atomic operation assumptions • Introduce an array of N Booleans: choosing , initially all values False. lock(i){ choosing[i] = True doorway num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 choosing[i] = False for(p = 0; p < N; ++p){ while (choosing[p]); while (num[p] != 0 and (num[p],p)<(num[i],i)); } } critical section Favor one process when there is a unlock(i){ conflict. num[i] = 0; If there are two processes, with the same num value, favor the process } with the smaller id (i) (a, b) < (c, d) which is equivalent to: (a < c) or ((a == c) and (b < d)) 42

  13. Original Bakery Algorithm (example) • Without atomic operation assumptions • Introduce an array of N Booleans: choosing , initially all values False. lock(i){ choosing[i] = True doorway num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 choosing[i] = False for(p = 0; p < N; ++p){ while (choosing[p]); while (num[p] != 0 and (num[p],p)<(num[i],i)); } } critical section P1 P2 P3 P4 P5 unlock(i){ num[i] = 0; 0 3 1 2 2 0 0 1 2 2 0 3 0 2 2 0 0 0 0 0 0 0 1 0 0 } (a, b) < (c, d) which is equivalent to: (a < c) or ((a == c) and (b < d)) 43

  14. Original Bakery Algorithm (example) • Without atomic operation assumptions • Introduce an array of N Booleans: choosing , initially all values False. lock(i){ choosing[i] = True doorway num[i] = MAX(num[0], num[1], … ., num[N-1]) + 1 choosing[i] = False for(p = 0; p < N; ++p){ while (choosing[p]); while (num[p] != 0 and (num[p],p)<(num[i],i)); } } critical section P1 P2 P3 P4 P5 unlock(i){ 0 3 0 2 2 0 3 0 0 2 0 0 0 0 0 0 3 0 0 0 0 3 1 2 2 num[i] = 0; } (a, b) < (c, d) which is equivalent to: (a < c) or ((a == c) and (b < d)) 44

  15. How to Implement Locking (Hardware Solutions and Usage) 45

  16. Analyze this • Does this scheme provide mutual exclusion? lock=0 Process 2 Process 1 while(1){ while(1){ while(lock != 0); while(lock != 0); lock= 1; // lock lock = 1; // lock critical section critical section lock = 0; // unlock lock = 0; // unlock other code other code } } lock = 0 No context switch P1: while(lock != 0); P2: while(lock != 0); P2: lock = 1; P1: lock = 1; … . Both processes in critical section 46

  17. If only … • We could make this operation atomic Process 1 while(1){ Make atomic while(lock != 0); lock= 1; // lock critical section lock = 0; // unlock other code } Hardware to the rescue … . 47

  18. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value int test_and_set(int *L){ Memory int prev = *L; Processor *L = 1; return prev; } equivalent software representation (the entire function is executed atomically) 48

  19. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value int test_and_set(int *L){ Memory int prev = *L; Processor 0 1 *L = 1; return prev; } equivalent software representation (the entire function is executed atomically) 49

  20. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value int test_and_set(int *L){ Processor int prev = *L; Memory *L = 1; return prev; 0 1 0 } equivalent software representation Processor (the entire function is executed atomically) Why does this work? If two CPUs execute test_and_set at the same time, the hardware ensures that one test_and_set does both its steps before the other one starts. 50

  21. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value int test_and_set(int *L){ Processor int prev = *L; Memory *L = 1; return prev; 1 1 0 } equivalent software representation Processor (the entire function is executed atomically) Why does this work? If two CPUs execute test_and_set at the same time, the hardware ensures that one test_and_set does both its steps before the other one starts. 51

  22. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value int test_and_set(int *L){ Processor int prev = *L; Memory *L = 1; 0 return prev; 1 } equivalent software representation Processor (the entire function is executed 1 atomically) Why does this work? If two CPUs execute test_and_set at the same time, the hardware ensures that one test_and_set does both its steps before the other one starts. 52

  23. Hardware Support (Test & Set Instruction) • Write to a memory location, return its old value while(1){ int test_and_set(int *L){ while(test_and_set(&lock) == 1); int prev = *L; critical section *L = 1; lock = 0; // unlock return prev; other code } } equivalent software representation Usage for locking (the entire function is executed atomically) Why does this work? If two CPUs execute test_and_set at the same time, the hardware ensures that one test_and_set does both its steps before the other one starts. So the first invocation of test_and_set will read a 0 and set lock to 1 and return. The second test_and_set invocation will then see lock as 1, and will loop continuously until lock becomes 0 53

  24. Intel Hardware Support (xchg Instruction) • Write to a memory location, return its old value int xchg(int *L, int v){ Processor int prev = *L; *L = v; 20 Memory return prev; 10 } equivalent software representation Processor (the entire function is executed 30 atomically) Why does this work? If two CPUs execute xchg at the same time, the hardware ensures that one xchg completes, only then the second xchg starts. 54

  25. Intel Hardware Support (using xchg instruction) int xchg(addr, value){ Note. %eax is returned %eax = value typical usage : xchg %eax, (addr) } xchg reg, mem void acquire(int *locked){ while(1){ if(xchg(locked, 1) == 0) Processor break; } Memory } void release(int *locked){ Processor locked = 0; } 55

  26. Intel Hardware Support (using xchg instruction) int xchg(addr, value){ Note. %eax is returned %eax = value typical usage : xchg %eax, (addr) } xchg reg, mem void acquire(int *locked){ Got Lock while(1){ if(xchg(locked, 1) == 0) Processor break; } 0 Memory } 1 void release(int *locked){ Processor locked = 0; } 1 56

  27. Intel Hardware Support (using xchg instruction) int xchg(addr, value){ Note. %eax is returned %eax = value typical usage : xchg %eax, (addr) } xchg reg, mem void acquire(int *locked){ Release Lock while(1){ if(xchg(locked, 1) == 0) Processor break; } 0 Memory } 0 void release(int *locked){ Processor locked = 0; } 1 57

  28. Intel Hardware Support (using xchg instruction) int xchg(addr, value){ Note. %eax is returned %eax = value typical usage : xchg %eax, (addr) } xchg reg, mem void acquire(int *locked){ Release Lock while(1){ if(xchg(locked, 1) == 0) Processor break; } 0 Memory } 1 Got Lock void release(int *locked){ Processor locked = 0; } 1 58

  29. Intel Hardware Support (using xchg instruction) int xchg(addr, value){ Note. %eax is returned %eax = value typical usage : xchg %eax, (addr) } xchg reg, mem void acquire(int *locked){ Release Lock while(1){ if(xchg(locked, 1) == 0) Processor break; } 0 Memory } 0 Release Lock void release(int *locked){ Processor locked = 0; } 0 59

  30. High Level Constructs • Spinlock • Mutex • Semaphore 60

  31. Spinlocks Usage Process 1 acquire(&locked) int xchg(addr, value){ critical section %eax = value release(&locked) xchg %eax, (addr) } Process 2 acquire(&locked) void acquire(int *locked){ critical section while(1){ release(&locked) if(xchg(locked, 1) == 0) break; • One process will acquire the lock } • The other will wait in a loop } repeatedly checking if the lock is available void release(int *locked){ locked = 0; • The lock becomes available when } the former process releases it See spinlock.c and spinlock.h in xv6 [15] 61

  32. Issues with Spinlocks xchg %eax, X • No compiler optimizations should be allowed – Should not make X a register variable • Write the loop in assembly or use volatile • Should not reorder memory loads and stores • Use serialized instructions (which forces instructions not to be reordered) • Luckly xchg is already implements serialization 62

  33. More issues with Spinlocks xchg %eax, X CPU0 cache coherence CPU1 protocol L1 cache L1 cache #LOCK Memory X • No caching of (X) possible. All xchg operations are bus transactions. – CPU asserts the LOCK, to inform that there is a ‘locked ‘ memory access • acquire function in spinlock invokes xchg in a loop … each operation is a bus transaction … . huge performance hits 63

  34. int xchg(addr, value){ A better acquire %eax = value xchg %eax, (addr) } void acquire(int *locked){ void acquire(int *locked) { reg = 1 reg = 1; while(1) while (xchg(locked, reg) == 1) if(xchg(locked, reg) == 0) while (*locked == 1); break; } } Original. Better way Loop with xchg. Outer loop changes the value of locked Bus transactions. inner loop only reads the value of Huge overheads locked. This allows caching of locked. Access cache instead of memory. 64

  35. Spinlocks (when should it be used?) • Characteristic : busy waiting – Useful for short critical sections, where much CPU time is not wasted waiting • eg. To increment a counter, access an array element, etc. – Not useful, when the period of wait is unpredictable or will take a long time • eg. Not good to read page from disk. • Use mutex instead ( … mutex) 65

  36. Spinlock in pthreads lock unlock create spinlock destroy spinlock 66

  37. Mutexes int xchg(addr, value){ • Can we do better than busy %eax = value xchg %eax, (addr) waiting? } – If critical section is locked then yield CPU void lock(int *locked){ while(1){ • Go to a SLEEP state if(xchg(locked, 1) == 0) – While unlocking, wake up break; sleeping process else sleep(); } } void unlock(int *locked){ locked = 0; wakeup(); } Ref: wakeup(2864), sleep(2803) 67

  38. Thundering Herd Problem int xchg(addr, value){ • A large number of processes %eax = value xchg %eax, (addr) wake up (almost } simultaneously) when the event occurs. void lock(int *locked){ while(1){ – All waiting processes wake up if(xchg(locked, 1) == 0) – Leading to several context break; else switches sleep(); – All processes go back to sleep } except for one, which gets the } critical section void unlock(int *locked){ • Large number of context switches locked = 0; • Could lead to starvation wakeup(); } 68

  39. Thundering Herd Problem int xchg(addr, value){ %eax = value • The Solution xchg %eax, (addr) } – When entering critical void lock(int *locked){ section, push into a while(1){ if(xchg(locked, 1) == 0) queue before blocking break; – When exiting critical else{ // add this process to Queue section, wake up only sleep(); } the first process in the } queue } void unlock(int *locked){ locked = 0; // remove process P from queue wakeup(P) } 69

  40. pthread Mutex • pthread_mutex_lock • pthread_mutex_unlock 70

  41. Locks and Priorities • What happens when a high priority task requests a lock, while a low priority task is in the critical section – Priority Inversion – Possible solution • Priority Inheritance Interesting Read : Mass Pathfinder http://research.microsoft.com/en-us/um/people/mbj/mars_pathfinder/mars_pathfinder.html 71

  42. Semaphores 72

  43. Producer – Consumer Problems • Also known as Bounded buffer Problem • Producer produces and stores in buffer, Consumer consumes from buffer Buffer (of size N) Producer Consumer 73

  44. Producer – Consumer Problems • Also known as Bounded buffer Problem • Producer produces and stores in buffer, Consumer consumes from buffer • Trouble when – Producer produces, but buffer is full – Consumer consumes, but buffer is empty Buffer (of size N) Producer Consumer 74

  45. Producer-Consumer Code Buffer of size N int count=0; Mutex mutex, empty, full; 1 void producer() { void consumer() { 1 2 while(TRUE){ while(TRUE){ 2 3 item = produce_item(); if (count == 0) sleep(full); 3 4 if (count == N) sleep(empty); lock(mutex); 4 5 lock(mutex); item = remove_item(); // from buffer 5 6 insert_item(item); // into buffer count--; 6 7 count++; unlock(mutex); 7 8 unlock(mutex); if (count == N-1) wakeup(empty); 8 9 if (count == 1) wakeup(full); consume_item(item); 9 10 } } 10 } } 75

  46. Producer-Consumer Code Buffer of size N int count=0; Mutex mutex, empty, full; 1 void producer() { void consumer() { 1 2 while(TRUE){ while(TRUE){ 2 3 item = produce_item(); if (count == 0) sleep(full); 3 4 if (count == N) sleep(empty); lock(mutex); 4 5 lock(mutex); item = remove_item(); // from buffer 5 Read count value Test count = 0 6 insert_item(item); // into buffer count--; 6 7 count++; unlock(mutex); 7 8 unlock(mutex); if (count == N-1) wakeup(empty); 8 9 if (count == 1) wakeup(full); consume_item(item); 9 10 } } 10 } } 76

  47. Lost Wakeups • Consider the following 3 read count value // count ß 0 3 item = produce_item(); context of instructions 5 lock(mutex); • Assume buffer is initially 6 insert_item(item); // into buffer 7 count++; // count = 1 empty 8 unlock(mutex) 9 test (count == 1) // yes 9 signal(full); context switch 3 test (count == 0) // yes 3 wait(); Note, the wakeup is lost. Consumer waits even though buffer is not empty. Eventually producer and consumer will wait infinitely consumer still uses the old value of count (ie 0) 77

  48. Semaphores • Proposed by Dijkstra in 1965 void down(int *S){ while( *S <= 0); • Functions down and up must be *S--; atomic } • down also called P (Proberen Dutch for try) void up(int *S){ *S++; • up also called V (Verhogen, Dutch } form make higher) • Can have different variants – Such as blocking, non-blocking • If S is initially set to 1, – Blocking semaphore similar to a Mutex – Non-blocking semaphore similar to a spinlock 78

  49. Producer-Consumer with Semaphores Buffer of size N int count; full = 0, empty = N void producer() { void consumer() { while(TRUE){ while(TRUE){ item = produce_item(); down (full); down (empty); wait(mutex); wait(mutex); item = remove_item(); // from buffer insert_item(item); // into buffer signal(mutex); signal(mutex); up (empty); up (full); consume_item(item); } } } } 79

  50. POSIX semaphores • sem_init • sem_wait • sem_post • sem_getvalue • sem_destroy 80

  51. Dining Philosophers Problem 81

  52. Dining Philosophers Problem P5 • Philosophers either think or eat • To eat, a philosopher needs to hold 5 1 both forks (the one on his left and the P1 P4 one on his right) • If the philosopher is not eating, he is thinking. 2 4 • Problem Statement : Develop an algorithm where no philosopher 3 starves. P3 P2 82

  53. First Try P5 #define N 5 int forks = {1,2,3,4,5,1}; 5 1 P1 P4 void philosopher(int i){ while(TRUE){ think(); // for some_time 2 take_fork(i); 4 take_fork(i + 1); eat(); 3 put_fork(i); P3 P2 put_fork(i + 1); } } What happens if only philosophers P1 and P3 are always given the priority? P2, P4, and P5 starves … so scheme needs to be fair 83

  54. First Try P5 #define N 5 int forks = {1,2,3,4,5,1}; 5 1 P1 P4 void philosopher(int i){ while(TRUE){ think(); // for some_time 2 take_fork(i); 4 take_fork(i + 1); eat(); 3 put_fork(i); P3 P2 put_fork(i + 1); } } What happens if all philosophers decide to pick up their left forks at the same time? Possible starvation due to deadlock 84

  55. Deadlocks • A situation where programs continue to run indefinitely without making any progress • Each program is waiting for an event that another process can cause 85

  56. Second try • Take fork i, check if fork (i+1) is #define N 5 available int forks = {1,2,3,4,5,1}; • Imagine, void philosopher(int i){ – All philosophers start at the same time – Run simultaneously while(TRUE){ – And think for the same time think(); • This could lead to philosophers taking take_fork(i); fork and putting it down continuously. if (available((i+1)){ a deadlock. take_fork((i + 1)); eat(); • A better alternative }else{ – Philosophers wait a random time before put_fork(i); take_fork(i) } – Less likelihood of deadlock. } – Used in schemes such as Ethernet 86

  57. Solution using Mutex • Protect critical sections with a #define N 5 int forks = {1,2,3,4,5,1}; mutex • Prevents deadlock void philosopher(int i){ • But has performance issues while(TRUE){ think(); // for some_time – Only one philosopher can eat at a time wait(mutex); take_fork(i); take_fork((i + 1)); eat(); put_fork(i); put_fork((i + 1)); signal(mutex); } } 87

  58. Solution to Dining Philosophers Uses N semaphores (s[0], s[1], … ., s[N-1]) all initialized to 0, and a mutex Philosopher has 3 states: HUNGRY, EATING, THINKING A philosopher can only move to EATING state if neither neighbor is eating void philosopher(int i){ while(TRUE){ void take_forks(int i){ void put_forks(int i){ think(); lock(mutex); lock(mutex); take_forks(i); state[i] = HUNGRY; state[i] = THINKING; eat(); test(i); test(LEFT); put_forks(); unlock(mutex); test(RIGHT) } down(s[i]); unlock(mutex); } } } void test(int i){ if (state[i] = HUNGRY && state[LEFT] != EATING && state[RIGHT] != EATING){ state[i] = EATING; up(s[i]); } } 88

  59. Deadlocks 89

  60. Deadlocks R1 A B R2 Consider this situation: 90

  61. Deadlocks Resource Allocation Graph R1 A B R2 A Deadlock Arises: Deadlock : A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. 91

  62. Conditions for Resource Deadlocks 1. Mutual Exclusion – Each resource is either available or currently assigned to exactly one process 2. Hold and wait – A process holding a resource, can request another resource 3. No preemption – Resources previously granted cannot be forcibly taken away from a process 4. Circular wait – There must be a circular chain of two or more processes, each of which is waiting for a resouce held by the next member of the chain All four of these conditions must be present for a resource deadlock to occur!! 92

  63. Deadlocks : (A Chanced Event) • Ordering of resource requests and allocations are probabilistic, thus deadlock occurrence is also probabilistic Deadlock occurs 93

  64. No dead lock occurrence (B can be granted S after step q) 94

  65. Should Deadlocks be handled? • Preventing / detecting deadlocks could be tedious • Can we live without detecting / preventing deadlocks? – What is the probability of occurrence? – What are the consequences of a deadlock? (How critical is a deadlock?) 95

  66. Handling Deadlocks • Detection and Recovery • Avoidance • Prevention 96

  67. Deadlock detection • How can an OS detect when there is a deadlock? • OS needs to keep track of – Current resource allocation • Which process has which resource – Current request allocation • Which process is waiting for which resource • Use this informaiton to detect deadlocks 97

  68. Deadlock Detection • Deadlock detection with one resource of each type • Find cycles in resource graph 98

  69. Deadlock Detection • Deadlock detection with multiple resources of each type Existing Resource Vector Resources Available P 1 P 2 P 3 Current Allocation Matrix Request Matrix Who has what!! Who is waiting for what!! Process P i holds C i resources and requests R i resources, where i = 1 to 3 Goal is to check if there is any sequence of allocations by which all current requests can be met. If so, there is no deadlock. 99

  70. Deadlock Detection • Deadlock detection with multiple resources of each type Existing Resource Vector Resources Available P 1 cannot be satisfied P 1 P 2 P 2 cannot be satisfied P 3 P 3 can be satisfied Current Allocation Matrix Request Matrix Process P i holds C i resources and requests R i resources, where i = 1 to 3 100

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend