wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

What is HTML?

Blog banner

Technical SEO : Total Guide

Blog banner

Dudhasagar waterfall ?

Blog banner

A BLOG ON MYSQL

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

child Labour

Blog banner

Artificial Intelligence and I

Blog banner

Scala - a programming tool

Blog banner

File sharing

Blog banner

Evolution of the Microprocesor

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

AOL Mail

Blog banner

Race Condition

Blog banner

Why is ITSM important in IT organization?

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

File Systems in OS.

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Deadlock and starvation

Blog banner

Deadlock and starvation in operating system

Blog banner

File management in os

Blog banner

SMARTSHEET

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Puri Jagannath temple

Blog banner

Service Transition Process in ITSM

Blog banner

Memory Management in Operating System

Blog banner

Memory management

Blog banner

Fitness

Blog banner

american greatines

Blog banner

Processes : Process description and control

Blog banner

Components of GIS

Blog banner

What is Packet Filtering?

Blog banner

MENDELEY

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

10 Reasons to date your best friend

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

What is Spyware? and examples of them.

Blog banner

Operating System Objectives and Functions

Blog banner

geographic information system (GIS)

Blog banner

NIKE

Blog banner

Disk scheduling

Blog banner

MEMORY HIERARCHY

Blog banner

MODERN OPERATING SYSTEM

Blog banner