International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Monthly Hits: ⮙1

Masters Thesis | Computer Science | Nigeria | Volume 10 Issue 10, October 2021


Illustration of Safe and Unsafe State Using Transition Table and Java Simulation

October Lambert Kekebou Erefaghe


Abstract: The burden of allocation and utilization when it comes to system resources lies completely in the domain of the operating system. Giving resources to processes as they require them for execution is a necessary task that demands all conscientiousness as it pushes the system to different states because the limitedness of system resources don?t leave processes or programs with ample supply of their desired demand of resources to be allocated when needed, this implies that there is always a wait pull or queue for system resources as long as processes keep requesting for resource. The crucial aspect in allocating or de - allocating resources is the technicalities involved that pertains to ensuring that processes are not holding resources other processes will need without making use of them. When this two task allocation and de - allocation is not sufficiently managed many processes can be resource deficient waiting on the system for resources to be allocated that are kept by processes which are waiting for more resources which leads to concept starving, and the resultant effect of this is called unsafe state in which processes cannot execute to completion for not getting more resources, and it can be worsen a deadlock state which no execution of process is possible. However, with efficient algorithms and techniques a system can allocate its resources to all request and all waiting processes can run to completion. There is always a sequence or order to follow to successfully allocate resources to processes for to avoid unsafe state leading to deadlock state, this sequence is known as safe sequence. This research work is to illustrate safe and unsafe state using transition table, and simulate how a system can be in safe state using the deadlock avoidance algorithm implemented in java programming language.


Keywords: safe state, unsafe state, deadlock avoidance, processes, resources, transition table


Edition: Volume 10 Issue 10, October 2021,


Pages: 29 - 32


How to Cite this Article?

October Lambert Kekebou Erefaghe, "Illustration of Safe and Unsafe State Using Transition Table and Java Simulation", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR201211165245, Volume 10 Issue 10, October 2021, 29 - 32

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'processes'

Downloads: 2

Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021

Pages: 271 - 274

The Deadlock Problem - A Review

Naveen Dubey

Share this Article

Downloads: 64

Research Paper, Computer Science, Saudi Arabia, Volume 9 Issue 12, December 2020

Pages: 924 - 927

Comprehensive Study of Current Reverse Engineering Tools and Techniques

Ohoud S. Al-Harthi, Emad S Al-Suwat

Share this Article

Similar Articles with Keyword 'resources'

Downloads: 0

Research Paper, Computer Science, India, Volume 10 Issue 7, July 2021

Pages: 1051 - 1054

Theory of Computation and its Key Consideration

Saranga Varma

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science, India, Volume 10 Issue 7, July 2021

Pages: 231 - 239

Enhanced Ant Colony Optimization Based Secured Routing in Cloud Computing

Vatchala B, G. Preethi

Share this Article

Similar Articles with Keyword 'safe'

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙5

Research Paper, Computer Science, Morocco, Volume 10 Issue 9, September 2021

Pages: 1539 - 1542

The Application of Machine Learning Techniques for Public Security: An Intelligent Monitoring System to Identify the Faces of Wanted and Sought - After People by Studying the Facial Features through Neural Network Mechanisms

Imane Rahil, Walid Bouarifi, Mustapha Oujaoura

Share this Article

Downloads: 117

Research Paper, Computer Science, India, Volume 2 Issue 9, September 2013

Pages: 115 - 118

Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy

S. Kavitha, M. Parveentaj

Share this Article

Similar Articles with Keyword 'state'

Downloads: 1

Masters Thesis, Computer Science, Mexico, Volume 10 Issue 8, August 2021

Pages: 1164 - 1166

Implementation of a Progressive Web Application to Access the Backend Developed in Django: Experience in his Development for File System Information in Legal Matters

Lic. Jose NestorMeneses Garcia, M.C. Juan Ramos Ramos, M.C. Elizabeth Cuatecontzi Cuahutle, Dr. Jose Juan Hernandez Mora

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 10 Issue 9, September 2021

Pages: 656 - 661

Social Media Sentiment Analysis Using CNN-BiLSTM

Rhea Bharal, O. V. Vamsi Krishna

Share this Article

Similar Articles with Keyword 'avoidance'

Downloads: 2

Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021

Pages: 271 - 274

The Deadlock Problem - A Review

Naveen Dubey

Share this Article

Downloads: 54

Research Paper, Computer Science, India, Volume 10 Issue 2, February 2021

Pages: 199 - 201

Identification of Hidden Exposed Nodes and Solving Hidden Exposed Problem Using MAC Protocols in AD-HOC Networks

Ch. Srilatha, T. Mohana Kumari

Share this Article
Top