Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is mutex precisely used for?

Answer Posted / achal

The above is correct. To be more specific, a CPU might need
to access some hardware device say I2c interface. Now if 2
processes in running state try to acquire and use I2c for
some data transfer, it might create problems, when one of
them hasn't finished its operations with the device. So
whenever some process has to make use of I2C it should lock
upon the mutex object for I2c device. And after the
operation gets finished it unlocks the mutex. Now some
other process can use I2c by mutex lock.
Similarly mutex object can be used to safegaurd some other
device resources.

Is This Answer Correct ?    22 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Tell me what is the need for having multibyte data input and output buffers in case of device ports?

816


How can you reduce memory requirements in embedded systems?

946


Tell me what is difference between binary semaphore and mutex?

948


Explain me can we use printf inside isr?

1012


Scope of static variables?

958


Tell me what is null pointer and what is its use?

899


What is a 'volatile' variable?

879


Why is it better to use multi-threading polling then single threading model?

932


What are the essential components of embedded system?

953


Describe to me some bad code you've read or inherited lately.

850


What elements of oo design are most prone to abuse? How would you mitigate that?

1033


Describe a software development life cycle that you've managed.

880


How does combination of functions reduce memory reuirement in embedded system?

845


What source control systems have you worked with?

1063


Can you have constant volatile variables?

827