Question: 2). For a MUTEX m, we use Lock(m) and Unlock(m) to interact. This is frequently used to implement a critical section: Lock(m). Critical Code. Unlock(m).

2). For a MUTEX m, we use Lock(m) and Unlock(m) to interact.

This is frequently used to implement a critical section: Lock(m). Critical Code. Unlock(m).

We believe this solution to be sufficient. But, what happen in the extremely unlucky case that two processes arrive at exactly & precisely the same moment. This is not likely, but probabilistically can happen from time to time. Even more coincidentally, lets assume the lock is OPEN so that both processes would find the lock available. What happens?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!