wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Vansh Dedhia
Aug 13, 2024
0 Likes
0 Discussions
106 Reads

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.

 

Deadlock Recovery:

When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:

 

1. Process Termination:

   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.

   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.

 

2. Resource Preemption:

   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.

   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.

 

3. Process Migration:

   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.

 

4. Combination Methods:

   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.

 

The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.


Comments ()


Sign in

Read Next

Memory Management in Operating System

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Data Mapping

Blog banner

Starvation and Deadlock.

Blog banner

VIRTUAL MACHINE

Blog banner

IT GOVERNANCE

Blog banner

Natural Language Processing(NLP)

Blog banner

IT RISK

Blog banner

JIRA SOFTWARE

Blog banner

Some web vulnerabilities

Blog banner

Fault Tolerance in an Operating System

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Caching windows

Blog banner

Paging

Blog banner

Virtual Machine

Blog banner

A book review

Blog banner

IOT Hacking Techniques

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Deadlock in operating system

Blog banner

Pandas Matrix Applications

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Music

Blog banner

Mumbaicha Dabbawalla

Blog banner

Race Condition

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

IT service level agreement

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

SQL Injection practice on DVWA

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Synchronization

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

CoWIN

Blog banner

Health and fitness in technology

Blog banner

Interrupts

Blog banner