wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

10 Interesting Facts about Attack on Titan

Blog banner

VIRUS

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

security controls

Blog banner

Ola

Blog banner

Apple

Blog banner

Hubspot

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

What are Tenders its various types

Blog banner

Os(Computer security threats)

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

EMAIL INVESTIGATION

Blog banner

SPAM

Blog banner

URL vs Domain

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Segmentation and paging concept

Blog banner

Water Resources are about to exhaust...

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

semaphores

Blog banner

Yoga in INDIA and ABROAD

Blog banner

A Deep Dive

Blog banner

SQL Injection

Blog banner

Modern Operating System

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Importance of modern technology era

Blog banner

WINDOWS I/ O

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Smartsheet

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Multicore CPUs

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Memory heirchy

Blog banner

About myself

Blog banner

Operating System

Blog banner

Multiple processor scheduling

Blog banner

What is Virtual Memory

Blog banner

Interrupts in operating system.

Blog banner

MAILFENCE

Blog banner

Data Exfiltration

Blog banner

Deadlock and Starvation

Blog banner