wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
adi undefined
Aug 14, 2024
0 Likes
0 Discussions
69 Reads

Deadlock :

1)  Dead lock is a situation where a group of processes get stuck because each one is wait for another task to complete .

 

2)  Imagine two students, Adi and Dia, sitting at a table in a classroom. Each of them needs both a pencil and an eraser to complete their homework. However, there’s only one pencil and one eraser available on the table.

 

How does deadlock happens ?

Dead lock happens when all the four condition are present

1)  Mutual Exclusion : It means that some resources in the system cannot be shared .

Eg :- If there is one printer , and process related to printer is two , here one process will wait for another to finish its process.

2)  Hold and Wait : Processes that already have some resources and they are requesting for additional ones .

Eg:- Imagine a person holding a pencil and then request for a piece of paper . They don’t let go pencil while waiting for paper.

3)  No Preemption : Its states that a resources cannot be taken away from a process until the process releases the resource.

Eg : If someone is using computer , someone else cannot take it unless it is free.

4)  Circular Wait :  In this the process is waiting from the resources that are held by the next process .

Eg :- Suppose process A is waiting for resource which is held by process B , B is waiting for resource which is held by C & process C is waiting for resource that is held by process A . This creates a circle , and no process can proceed because they’re all waiting on each other.

Real Life Example :

Imagine you and your three friends—Adi, Dia, Tanisha, and Aaron—are playing a game. In this game, there are four unique objects: a ball, a book, a key, and a coin. To win, each of you needs to collect two specific objects. The catch is that each of you already has one object, and you need another specific object that someone else has.

Here’s how the situation unfolds:

  • Adi has the ball and needs the book.
  • Dia has the book and needs the key.
  • Tanisha has the key and needs the coin.
  • Aaron has the coin and needs the ball.

How to deal with deadlock :

There are few ways to deal with deadlock :

1)  Deadlock Prevention: The system is designed so that at least one of the four conditions mentioned above cannot occur.

2)  Deadlock Avoidance: The system carefully manages resources and checks whether giving a resource will lead to a deadlock. If it leads to deadlock, it won’t grant the resource.

3)  Deadlock Detection and Recovery: The system regularly checks for deadlocks. If a deadlock is detected, it might take some actions, like terminating some processes or forcibly taking resources away, to break the deadlock.

4)  Ignoring Deadlock: Sometimes, systems ignores the problem, especially if deadlocks are rare. This is known as "ostrich algorithm" because the system "buries its head in the sand" and hopes deadlocks don’t happen.


Comments ()


Sign in

Read Next

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Street foods

Blog banner

Buffering

Blog banner

BUFFER OVERFLOW_142

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Telegram and it's features

Blog banner

Concurrency management in operating systems

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Importance Of Education.

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Fault Tolerance

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Deadlock in Operating System

Blog banner

Man VS Nature

Blog banner

Elements and Principles of Photography

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Blockchain Transactions

Blog banner

operating system

Blog banner

Memory Management of Operating System(OS)

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Game Theory in Blockchain

Blog banner

Caching windows

Blog banner

Memory Management

Blog banner

Interesting fact about kangaroo.

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

What is Spyware? and examples of them.

Blog banner

ahh wait a min

Blog banner

Hacking of web server and application

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Deadlocks in Operating Systems

Blog banner

Race condition

Blog banner

Virtual Memory

Blog banner

Wedding photographer

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

The War With Cold On Earth

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

(Input/Output) in os

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner