wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

Multithreading in Operating System

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Functions Of Operating Systems

Blog banner

Old age lifestyle

Blog banner

OS ASSIGNMENT

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

GraphX:- A graph processing tool

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

PYTHON

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Big Data Architecture

Blog banner

File Management In OS

Blog banner

Traveling

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Virtual Memory

Blog banner

Indian Culture and Tradition

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Memory Management

Blog banner

INTERNET SECURITY

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Threads

Blog banner

Virtual Memory

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Deadlock in operating system

Blog banner

Developments in Modern Operating Systems

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Policies for Service Transition

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Risk management in IT

Blog banner

Data Exfiltration

Blog banner

Virtual memory

Blog banner

computer security

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Memory Management

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Article on IT development trends

Blog banner

Compromising Mobile Platforms

Blog banner

OPERATING SYSTEM

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Memory hierarchy

Blog banner