wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

Operating Systems

Blog banner

FASHION

Blog banner

NodeJs

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Excel records

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

KAHAWA TEA

Blog banner

"Games and the future"

Blog banner

Multiprocessor

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

The Golden Temple , Amritsar

Blog banner

A buffer overflow

Blog banner

15 Interesting Facts about India

Blog banner

Modern Operating System

Blog banner

Malware Defense

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Concurrency management in operating systems

Blog banner

Virtual memory

Blog banner

Security in Cloud Computing

Blog banner

E-security systems | CCTV

Blog banner

Deadlock and Starvation

Blog banner

Steganography

Blog banner

Natural Language Processing(NLP)

Blog banner

Data Security must be your Priority!

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

MEMORY HIERARCHY

Blog banner

Uber

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

MEMORY MANAGEMENT

Blog banner

Modern Operating System

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

MPL and how its effects?

Blog banner

Expert System In AI

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

PERSONAL STORIES

Blog banner

Tracking Emails & Email Crimes

Blog banner

Network Footprinting in Cybersecurity

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Indian Culture and Tradition

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner