wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

Threads

Blog banner

Atlantis - The Lost Island.........

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Sweet Mango Murabba

Blog banner

Power of words

Blog banner

Memory Management

Blog banner

Google App Engine

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Memory Management

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Define Instagram.

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

LinkedIn

Blog banner

Deadlock

Blog banner

Jira service Management

Blog banner

MAILFENCE

Blog banner

Delhi city

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

child Labour

Blog banner

ONLINE NEWSROOMS

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Electronic Funds Transfer

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

To travel is to live

Blog banner

Understanding Mobile Device Forensics

Blog banner

Different Types of Data

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Types of Threads

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Concept and definition of m-commerce

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Importance of business process documentation

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Health and fitness

Blog banner

Service transistion under difficult conditions

Blog banner

EMAIL INVESTIGATION

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner