wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Concurrency and Deadlocks

profile
Akshat Gohil
Aug 12, 2024
0 Likes
0 Discussions
150 Reads

Concurrency:

Concurrency refers to the ability of the Operating Systems to execute multiple of processes or threads simultaneously for making efficient usage of CPU time/resources.

Processes are nothing but an instance of a program that is running with its own memory space.

 

OSes uses Context Switching mechanism to implement concurrency. It is the process of saving the current state of a currently executing process or thread and restoring other process or thread. This allows OS to switch between tasks giving an illusion of simultaneous execution.

Concurrency in OS leads to problems like Deadlock and Starvation.

 

Deadlock:

A deadlock is a situation when two are more processes are unable to proceed because each process is waiting for other to release a resource. This leads to a state where none of the processes can continue and they’re stuck indefinitely.

Deadlocks occur when several conditions are met simultaneously:

Mutual Exclusion: Resources are not shared and can be allocated to only one process at a time.

Hold and Wait: A process holding particular resources can request additional resources without releasing currently held.

No Preemption: Resources cannot be taken forcibly from resources and they must be freed simultaneously.

Circular Chain: A circular chain of process where processes wait for other to release resources held by them.

 

Deadlock Prevention:

Deadlock prevention ensures that at least one of the four conditions will not come true and will not lead to a deadlock from occurring.

Prevent Mutual Exclusion: Design systems where minimum number of resources are non-shareable, or convert non-shareable resources to shareable ones if possible reducing the probability of having deadlock.

Prevent Hold and Wait: Processes should request all the necessary resources before execution. If all resources not available it waits for them.

 

Prevent No Preemption: Allow pre-emption of resources where necessary to break deadlock conditions. If P2 needs a resource that P1 holds, P1 is forced to release its resource and wait until both resources are available. The system preempts P1, breaking the deadlock condition.

 

Prevent Circular Wait: Give each resource a unique priority. A process can only request resources in increasing order of their priority. This ensures there is always a linear dependency preventing circular wait.

 

Deadlock Avoidance:

Deadlock Avoidance dynamically decisions are made whether the granting the resource will potentially lead a deadlock.

A process is not granted a resource if it might lead to a deadlock.

Deadlock avoidance allows processes to request resources that prevents the system from entering a deadlock.

 

 

 

 

 

­­­­­­­

 


Comments ()


Sign in

Read Next

Cyber Security Standards

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

BUFFER OVERFLOW_142

Blog banner

Smitten Kitchen Keepers

Blog banner

What is Vishing?

Blog banner

Teenagers of Today

Blog banner

What are Virtual Machines

Blog banner

Microsoft Windows Overview

Blog banner

Operating system

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Virtual memory

Blog banner

Yahoo! mail

Blog banner

IT Service Continuity Management

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Importance of Network Security Risk

Blog banner

operating system

Blog banner

Operating Systems

Blog banner

38_Exploring The Honeynet Project

Blog banner

Mariana Trench: The deepest depths

Blog banner

objectives and function of operating system

Blog banner

Street foods

Blog banner

Virtual memory in Operating System

Blog banner

Security requirements for Safe E-Payments

Blog banner

Deadlock Prevention

Blog banner

Memory management

Blog banner

GIS in Disaster Management

Blog banner

MailChimp

Blog banner

Memory Management

Blog banner

What are NFT s?

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Operating system

Blog banner

Big Data

Blog banner

Service stratergy principles

Blog banner

Virtual memory

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Answer

Blog banner

What is Spyware?

Blog banner

Traditional Unix System

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner