wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

How to Find the Right Therapist For Me?

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Processing Crime and Incident Scenes

Blog banner

Banaras

Blog banner

Data Mapping

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Threads

Blog banner

Modern Operating System

Blog banner

What are NFT s?

Blog banner

Balance

Blog banner

Social Media Sentiment Analysis

Blog banner

Interrupts - Types, Working & Importance

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Fault Tolerance

Blog banner

Uber

Blog banner

Big Data Architecture

Blog banner

How to tie a Tie

Blog banner

HTML vs HTML5

Blog banner

Expert System In AI

Blog banner

Modern operating system

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

"Games and the future"

Blog banner

Deming’s Process

Blog banner

Uniprocessor scheduling

Blog banner

Modern operating systems (OS)

Blog banner

A book review

Blog banner

The Right way of cooking

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Full Disk Encryption

Blog banner

Man VS Nature

Blog banner

Jira service Management

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Delhi city

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

INSTAGRAM

Blog banner

Kernel in Operating System

Blog banner

Education?

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Software

Blog banner