wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
adi undefined
Aug 14, 2024
0 Likes
0 Discussions
69 Reads

Deadlock :

1)  Dead lock is a situation where a group of processes get stuck because each one is wait for another task to complete .

 

2)  Imagine two students, Adi and Dia, sitting at a table in a classroom. Each of them needs both a pencil and an eraser to complete their homework. However, there’s only one pencil and one eraser available on the table.

 

How does deadlock happens ?

Dead lock happens when all the four condition are present

1)  Mutual Exclusion : It means that some resources in the system cannot be shared .

Eg :- If there is one printer , and process related to printer is two , here one process will wait for another to finish its process.

2)  Hold and Wait : Processes that already have some resources and they are requesting for additional ones .

Eg:- Imagine a person holding a pencil and then request for a piece of paper . They don’t let go pencil while waiting for paper.

3)  No Preemption : Its states that a resources cannot be taken away from a process until the process releases the resource.

Eg : If someone is using computer , someone else cannot take it unless it is free.

4)  Circular Wait :  In this the process is waiting from the resources that are held by the next process .

Eg :- Suppose process A is waiting for resource which is held by process B , B is waiting for resource which is held by C & process C is waiting for resource that is held by process A . This creates a circle , and no process can proceed because they’re all waiting on each other.

Real Life Example :

Imagine you and your three friends—Adi, Dia, Tanisha, and Aaron—are playing a game. In this game, there are four unique objects: a ball, a book, a key, and a coin. To win, each of you needs to collect two specific objects. The catch is that each of you already has one object, and you need another specific object that someone else has.

Here’s how the situation unfolds:

  • Adi has the ball and needs the book.
  • Dia has the book and needs the key.
  • Tanisha has the key and needs the coin.
  • Aaron has the coin and needs the ball.

How to deal with deadlock :

There are few ways to deal with deadlock :

1)  Deadlock Prevention: The system is designed so that at least one of the four conditions mentioned above cannot occur.

2)  Deadlock Avoidance: The system carefully manages resources and checks whether giving a resource will lead to a deadlock. If it leads to deadlock, it won’t grant the resource.

3)  Deadlock Detection and Recovery: The system regularly checks for deadlocks. If a deadlock is detected, it might take some actions, like terminating some processes or forcibly taking resources away, to break the deadlock.

4)  Ignoring Deadlock: Sometimes, systems ignores the problem, especially if deadlocks are rare. This is known as "ostrich algorithm" because the system "buries its head in the sand" and hopes deadlocks don’t happen.


Comments ()


Sign in

Read Next

What is HTML?

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

5 Interesting facts about Diwali

Blog banner

Health and fitness in technology

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Travelling blog

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Have You Explored India Yet?

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Computer Security

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Virtualisation

Blog banner

Virtual Machine

Blog banner

Evolution of the Microprocesor

Blog banner

AOL Mail

Blog banner

Decision Tree: A Diagram Model

Blog banner

GraphX:- A graph processing tool

Blog banner

LIMITED EDITION

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

THE DESIRE OF MANY

Blog banner

CONCURRENCY

Blog banner

10 Types of Friends in every friend group

Blog banner

Short note on expert system

Blog banner

First love

Blog banner

 " Healing of Yoga "

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Corporate Discipline.

Blog banner

Virtual Machine's

Blog banner

Process states

Blog banner

GIS Mapping

Blog banner

Every body is beautiful

Blog banner

Animal’s have my heart

Blog banner

Multiprocessor scheduling

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

What is OS Fingerprinting?

Blog banner

Puri Jagannath temple

Blog banner

OPERATING SYSTEM

Blog banner

10 Unknown facts about India's Independence

Blog banner

Lucidchart

Blog banner