wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

PROCESS STATE:

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Multithreading in Operating System

Blog banner

virtual machine

Blog banner

Memory management

Blog banner

1.1 basic elements

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Understanding Mobile Device Forensics

Blog banner

Virtual memory

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Indian Food

Blog banner

Service stratergy principles

Blog banner

Social Media.

Blog banner

Metasploit

Blog banner

GIS Bharat Maps

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

The application udemy

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Odoo

Blog banner

Scheduling

Blog banner

Multiprocessor scheduling

Blog banner

Bots and Cyber Security

Blog banner

IoT Architecture Based Security

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Music

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Odoo

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

BrainGate Technology

Blog banner

Deadlock in operating system

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

SESSION HIJACKING

Blog banner

Optimization of operating system design

Blog banner

Self managing devices

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

NodeJs

Blog banner

Article on IT development trends

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

TRELLO

Blog banner