wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Types Of Interrupt

Blog banner

In the world of Technology...

Blog banner

Predicting Student Performance with Data Science

Blog banner

Importance of modern technology era

Blog banner

Why we should do reading

Blog banner

CoWIN

Blog banner

Trends that began during the pandemic

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Explain Multiprocessors

Blog banner

Top 10 Logos and their meanings

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Deadlock

Blog banner

Be kind person

Blog banner

Uniprocessor and Types

Blog banner

Environmental Management using GIS

Blog banner

Cache Memory

Blog banner

What is M-commerce and how it's work

Blog banner

semaphores in os

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Uniprocessor scheduling

Blog banner

Malware

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

TRIGGERS IN DATABASE

Blog banner

Question

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

What is Vishing?

Blog banner

Modern operating system

Blog banner

Vulnerability Assessment

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Answer

Blog banner

Spyware

Blog banner

CREATE A DAILY SERIES

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Game Theory in Blockchain

Blog banner

Data Mining

Blog banner

ODOO

Blog banner

What is Spyware? and examples of them.

Blog banner

Computer security techniques

Blog banner