wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Khau Galli – Vile Parle

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Uniprocessor scheduling

Blog banner

Deadlock

Blog banner

Deadlock and Starvation

Blog banner

10 Reasons to date your best friend

Blog banner

Security in Operating Systems

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Hello World

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Multicore CPUs

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Windows Operating System

Blog banner

The launch of UniMap by HERE

Blog banner

Microsoft powerpoint presentation

Blog banner

Study of Sniffing Tools

Blog banner

OS Assignment 3

Blog banner

Goa Trip With Friends

Blog banner

Hey Aryan here

Blog banner

What is Network Security?

Blog banner

Business-to-Business

Blog banner

(Input/Output) in os

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

GIS Mapping

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Security Issues and Countermeasures

Blog banner

15 Interesting Facts about India

Blog banner

EFT

Blog banner

A small world of Sockets

Blog banner

Some facts about Technology

Blog banner

Online Education

Blog banner

Memory Management

Blog banner

TRIGGERS IN DATABASE

Blog banner

Impact of social media on the human life

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

What is semaphore in operating system?

Blog banner