wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Darshan Somaiya
Aug 16, 2024
1 Like
0 Discussions
149 Reads

DEADLOCK


Deadlock is a situation in an operating system where a set of processes become stuck because each process in the set is waiting for another process to release resources. This leads to a cascade of dependencies where nothing can really progress, thus halting everything.


Four Conditions for Deadlock 

A deadlock can only occur when the following four conditions are met simultaneously:


1. Mutual Exclusion: At least one resource must be held in a non-sharable mode, and only one process can use the resource at a time.


2. Hold and Wait: A process holding at least one resource is waiting to acquire additional resources that are currently held by other processes.


3. No Preemption: Resources cannot be preempted from the process holding them; they can only be released voluntarily by the process.


4. Circular Wait: There is a set of processes such that each process in the chain is waiting for another which is ahead, forming a circle.


Example Scenario:

Suppose there are two processes and two resources. P1 process requests R1, and P2 requests R1 & holds R2. Neither process will release the resources it currently holds, and neither can proceed until it is able to acquire a resource that both processes are waiting on for completion. Therefore, both stall simultaneously, giving rise to deadlock.


Deadlock Prevention and Avoidance 

Operating systems employ various strategies to prevent or avoid deadlock:


- Deadlock Prevention: This is a set of methods for ensuring that at least one of the necessary conditions cannot hold. It can be done by requiring all processes to ask for resources at once or by preventing circular wait, etc.


- Deadlock Avoidance: It employs algorithms like the Banker’s Algorithm, which dynamically check the state of resource allocation to make sure a system will never enter an unsafe state where deadlock can happen.


Some systems may allow deadlocks to occur but have standby algorithms in place for detection and recovery, such as terminating one or more processes involved to free up resources.


Comments ()


Sign in

Read Next

Biometric Authentication Vulnerabilities

Blog banner

Uniprocessor scheduling

Blog banner

Mumbai

Blog banner

IT Service as as Value Creation

Blog banner

NIKE

Blog banner

virtual machines and virtualization

Blog banner

Objectives and functions of Operating System...

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Memory Partitioning

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

File management

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Virtual machine.

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Capacity management in ITSM

Blog banner

DBMS and various career options related to it.

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

VIRTUAL MACHINES

Blog banner

History of ITIL

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

CSI and Organizational Change

Blog banner

File management

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Self defence

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Spyware

Blog banner

Data Security must be your Priority!

Blog banner

Data Analytics in Data Science

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Service design process in ITSM

Blog banner

Internet of Things

Blog banner

USES OF WHATSAPP

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

MPL and how its effects?

Blog banner

Buffer overflow

Blog banner

15 Interesting Facts about India

Blog banner

Uniprocessor Scheduling

Blog banner

Semaphores

Blog banner