CFP last date
20 January 2025
Reseach Article

Deadlock Prevention in Process Control Computer System

Published on January 2013 by Manisha Mohanty, Prerna Kumara
International Conference in Distributed Computing and Internet Technology 2013
Foundation of Computer Science USA
ICDCIT - Number 1
January 2013
Authors: Manisha Mohanty, Prerna Kumara
8a28a791-0c23-4658-8a56-d8a55a9ce421

Manisha Mohanty, Prerna Kumara . Deadlock Prevention in Process Control Computer System. International Conference in Distributed Computing and Internet Technology 2013. ICDCIT, 1 (January 2013), 12-16.

@article{
author = { Manisha Mohanty, Prerna Kumara },
title = { Deadlock Prevention in Process Control Computer System },
journal = { International Conference in Distributed Computing and Internet Technology 2013 },
issue_date = { January 2013 },
volume = { ICDCIT },
number = { 1 },
month = { January },
year = { 2013 },
issn = 0975-8887,
pages = { 12-16 },
numpages = 5,
url = { /proceedings/icdcit/number1/10236-1003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Distributed Computing and Internet Technology 2013
%A Manisha Mohanty
%A Prerna Kumara
%T Deadlock Prevention in Process Control Computer System
%J International Conference in Distributed Computing and Internet Technology 2013
%@ 0975-8887
%V ICDCIT
%N 1
%P 12-16
%D 2013
%I International Journal of Computer Applications
Abstract

Deadlock can occur wherever multiple processes interact. System deadlock is a serious problem in a multiprogramming environment. The approaches to this problem can be divided into three categories: (1) prevention, (2) detection and recovery, and (3) avoidance. This paper proposes a variation of the first approach, partially applying ideas developed in the second and third approaches. This is an approach that is especially effective in process control computer systems, in which the application programs are usually fixed once designed. Using four predetermined application program parameters obtained in the program development stage, a directed graph model and a 'restriction' matrix model are introduced representing the usage of common resources. Conditions sufficient for system deadlock prevention are presented along with algorithms for checking to see that the models meet these conditions. By using this approach, if a deadlock possibility is detected the causes can also be detected. The deadlock can thus be prevented during the program development stage. As the algorithms are not used in the real-time mode, there is no negative effect on the responsiveness of the system. A higher utilization rate of common resources is also ensured because the usage of resources is restricted only when the possibility of a deadlock is detected.

References
  1. E. G. Coffman, M. J. Elphick . System deadlock and computing surveys.
  2. Operating system concepts ,Greg Gagne, Peter B. Galvin.
  3. J. W. Murphy, Resource allocation with interlock detection in a multitasking system.
  4. Dijkstra N. W, and Scholten C. S. , Termination detection for diffusing computations, Inf. Process. Lett. , 11(1), 1-4 (1980)
  5. Goldman B. , Deadlock detection in computer networks. Tech. Rep. MIT-LCS-TR185, Massachusetts Institute of Technology, Cambridge, Mass. , (1977)
  6. Gray J. N. , Notes on database operating systems. In Operating Systems: An Advanced Course, Lecture Notes in Computer Science, Springer-Verlag, New York, 60, 393-481 (1978), Science Dept. , Univ. of Texas at Austin, July (1981).
  7. HOARE, C. A. R. Communicating sequential processes Commun. ACM21, 8, 666-677 (1978)
  8. B. Abdallah and H. A. ElMaraghy, "Deadlock Prevention and Avoidance in FMS: a Petri net based approach", Int. J Manuf. Tech. ,
  9. Li, Z. W. , Uzam, M. , and Zhou, M. C. , "Comments on 'Deadlock prevention policy based on Petri nets and siphons' ", Int. J. Prod. Res. , Vol. 42, No. 24, 2004, pp. 5253–5254.
  10. Murata, T. , "Petri nets: properties, analysis, and applications".
Index Terms

Computer Science
Information Sciences

Keywords

Deadlock Prevention Recovery Detection Avoidance