wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

PROCESS STATE:

Blog banner

File management In Operating System

Blog banner

OLA

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Data Visualization

Blog banner

Oracle Corporation

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Virtual memory

Blog banner

Disk Management

Blog banner

BITCOIN WALLET

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

UniProcessor Scheduling

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

MY FIRST BLOG?

Blog banner

RAID

Blog banner

Hacking of web server and application

Blog banner

Memory Hierarchy

Blog banner

Deadlock and Starvation

Blog banner

Technical SEO : Total Guide

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Cloud Computing

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Virtual memory

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Memory management

Blog banner

Importance of self defence for girls

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

semaphores in os

Blog banner

Study of Sniffing Tools

Blog banner

Deadlock

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Short note on Microsoft office

Blog banner

Google App Engine

Blog banner

(Input/Output) in os

Blog banner

Modern OS

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Rain

Blog banner

Message Passing in OS

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Gis in agriculture and farming

Blog banner

Who decides your overthinking, anyway?

Blog banner

security requirements for safe e-payment

Blog banner