Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
ISSN: 2249-2593
http://www.ijcotjournal.org
Page 154
International Journal of Computer & Organization Trends Volume3 Issue4 May 2013
III. ARCHITECTURE OF CLOUD COMPUTING
Cloud Computing refers to both the applications delivered as
services over the Internet and the hardware and systems
software in the data centres that provide those services. The
services themselves have long been referred to as Software as
a Service (SaaS), so we use that term. The data centre
hardware and software is what we will call a Cloud.
The advantages of SaaS to both end users and service
providers are well understood. Service providers enjoy greatly
simplified software installation and maintenance and
centralized control over versioning; end users can access the
service anytime, anywhere, share data and collaborate more
easily, and keep their data stored safely in the infrastructure.
Cloud Computing does not change these arguments, but it
does give more application providers thechoice of deploying
their product as SaaS without provisioning a datacenter. just
as the emergence of semiconductor foundries gave chip
companies the opportunity to design and sell chips without
owning a fab, Cloud Computing allows deploying SaaSand
scaling on demandwithout building or provisioning a
datacenter.
Figure.................................... (1)
IV. BANKERS ALGORITHM
(Deadlock Avoidance Scheme)
Data Structures
Available:
Vector of length m
# instances of each resource type available in system
If available [j] = k, there are k instances of resource
type Rj available.
Max:
n x m matrix.
ISSN: 2249-2593
Safety Algorithm:
1. Let Work and Finish be vectors of length m and n,
respectively. Initialize:
Work = Available
Finish [i] = false for i = 0, 1,2, , n-1.
2. Find an i such that both:
(a) Finish [i] = false
(b) Needi Work
If no such i exists, go to step 4.
3. Work = Work + Allocationi
Finish[i] = true
go to step 2.
4. If Finish [i] == true for all i, then the system is in a
safe state.
Resource-Request Algorithm for Process Pi :
Requesti = request vector for process Pi.
If Requesti [j] = k then process Pi wants k instances of
resource type Rj.
When resource request made by Pi, the following occurs:
1. If Requesti Needi go to step 2. Otherwise, raise
error condition, since process has
exceeded its maximum claim.
2. If Requesti Available, go to step 3. Otherwise Pi
must wait, since resources are not
available.
3. Pretend to allocate requested resources to Pi by
modifying the state as follows:
Available = Available - Requesti;
Allocationi= Allocationi + Requesti;
Needi = Needi Requesti;;
http://www.ijcotjournal.org
Page 155
International Journal of Computer & Organization Trends Volume3 Issue4 May 2013
If safe _ the resources are allocated to Pi.
If unsafe _ Pi must wait, and the old resourceallocation state is restored
P0
P1
P2
P3
P4
Allocation
ABC
010
200
302
211
002
Max
ABC
753
322
902
222
433
Available
ABC
332
REFERENCES
1.
2.
The system is in a safe state since the sequence < P1, P3, P0,
P2, P4> satisfies safety criteria.
Example (cont.):
Now P1 requests 1 instance of A and 2 instances of C:
Request1 (1, 0, 2)
1.) Check that Request1 Available
(1,0,2) (3,3,2) _ true (can immediately grant request)
2.) Now see if system is in safe state:
Allocation Need Available
ABC
ABC
ABC
P0
010
743
230
P1
302
020
P2
301
600
P3
211
011
P4
002
431
ISSN: 2249-2593
3.
4.
5.
http://www.ijcotjournal.org
Page 156