wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

Use case of K-means clustering

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Virtual memory

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Interesting fact about kangaroo.

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Article on Team Work

Blog banner

Traditional Unix System

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Social Media Sentiment Analysis

Blog banner

Rain bow

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

INTERNET SECURITY

Blog banner

Difference Between Classification And Clustering

Blog banner

Rapido

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Man VS Nature

Blog banner

Domain Name System

Blog banner

HubSpot

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Virtual Machine

Blog banner

Business Intelligence v/s Big Data

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Earth with no trees

Blog banner

Microsoft Word

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

A Journey By Train

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Clarizen

Blog banner

Operating System Objectives and Functions

Blog banner

Mail merge

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Paginng In OS

Blog banner

The IT Service Lifecycle

Blog banner

File Organization and Access

Blog banner

Retiring ISS

Blog banner

Modern Operating System

Blog banner

Study on cyber and network forensic in computer security management

Blog banner