wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
adi undefined
Aug 14, 2024
0 Likes
0 Discussions
69 Reads

Deadlock :

1)  Dead lock is a situation where a group of processes get stuck because each one is wait for another task to complete .

 

2)  Imagine two students, Adi and Dia, sitting at a table in a classroom. Each of them needs both a pencil and an eraser to complete their homework. However, there’s only one pencil and one eraser available on the table.

 

How does deadlock happens ?

Dead lock happens when all the four condition are present

1)  Mutual Exclusion : It means that some resources in the system cannot be shared .

Eg :- If there is one printer , and process related to printer is two , here one process will wait for another to finish its process.

2)  Hold and Wait : Processes that already have some resources and they are requesting for additional ones .

Eg:- Imagine a person holding a pencil and then request for a piece of paper . They don’t let go pencil while waiting for paper.

3)  No Preemption : Its states that a resources cannot be taken away from a process until the process releases the resource.

Eg : If someone is using computer , someone else cannot take it unless it is free.

4)  Circular Wait :  In this the process is waiting from the resources that are held by the next process .

Eg :- Suppose process A is waiting for resource which is held by process B , B is waiting for resource which is held by C & process C is waiting for resource that is held by process A . This creates a circle , and no process can proceed because they’re all waiting on each other.

Real Life Example :

Imagine you and your three friends—Adi, Dia, Tanisha, and Aaron—are playing a game. In this game, there are four unique objects: a ball, a book, a key, and a coin. To win, each of you needs to collect two specific objects. The catch is that each of you already has one object, and you need another specific object that someone else has.

Here’s how the situation unfolds:

  • Adi has the ball and needs the book.
  • Dia has the book and needs the key.
  • Tanisha has the key and needs the coin.
  • Aaron has the coin and needs the ball.

How to deal with deadlock :

There are few ways to deal with deadlock :

1)  Deadlock Prevention: The system is designed so that at least one of the four conditions mentioned above cannot occur.

2)  Deadlock Avoidance: The system carefully manages resources and checks whether giving a resource will lead to a deadlock. If it leads to deadlock, it won’t grant the resource.

3)  Deadlock Detection and Recovery: The system regularly checks for deadlocks. If a deadlock is detected, it might take some actions, like terminating some processes or forcibly taking resources away, to break the deadlock.

4)  Ignoring Deadlock: Sometimes, systems ignores the problem, especially if deadlocks are rare. This is known as "ostrich algorithm" because the system "buries its head in the sand" and hopes deadlocks don’t happen.


Comments ()


Sign in

Read Next

Compromising Mobile Platforms

Blog banner

Data Visualization in Decision-Making

Blog banner

Difference Between Classification And Clustering

Blog banner

Service Operations in ITSM

Blog banner

File Systems in OS.

Blog banner

Security Issues

Blog banner

What is Vishing?

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Platonic Solids

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Memory Management

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Memory Management

Blog banner

Different types of scam Fraud

Blog banner

IP Address

Blog banner

K-means use cases

Blog banner

What is Spyware?

Blog banner

Man In The Middle Attack

Blog banner

RAID

Blog banner

DIGITAL TECHNOLOGY

Blog banner

KASHMIR TRIPS

Blog banner

Google classroom

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Segmentation and paging concept

Blog banner

Threads

Blog banner

Broken Authentication Attacks

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

VIRTUAL MACHINE

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

The Role of cryptography in cyber security

Blog banner

Risk mitigation and management

Blog banner

Hacking

Blog banner

Virtual memory in os

Blog banner

Khau Galli – Vile Parle

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Disk Management

Blog banner

Access management

Blog banner

Modern Operating Systems

Blog banner