wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Vansh Dedhia
Aug 13, 2024
0 Likes
0 Discussions
106 Reads

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.

 

Deadlock Recovery:

When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:

 

1. Process Termination:

   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.

   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.

 

2. Resource Preemption:

   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.

   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.

 

3. Process Migration:

   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.

 

4. Combination Methods:

   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.

 

The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.


Comments ()


Sign in

Read Next

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

RAID

Blog banner

What your Favorite colour says about You?

Blog banner

My favourite food

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Bit Coins

Blog banner

What is thread and multithreading ?

Blog banner

Virtual memory

Blog banner

Virtual machine

Blog banner

Telegram and it's features

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

FIREWALL

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Virtual memory

Blog banner

File management

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Boxing

Blog banner

LIMITED EDITION

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

10 Reasons to date your best friend

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

semaphores

Blog banner

Modern OS

Blog banner

I Personally

Blog banner

Apple

Blog banner

Google

Blog banner

Modern Operating System

Blog banner

Excel records

Blog banner

Importance of Website

Blog banner

Process Creation

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Network Forensics

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

PPT methodology

Blog banner

Different types of scam frauds

Blog banner

THREADS (assignment 1)

Blog banner

Python as a tool for data analysis

Blog banner