wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Tanisha Shetty
Aug 14, 2024
0 Likes
0 Discussions
71 Reads

Definition:

A deadlock is a situation in computing where two or more processes or threads are unable to proceed because each is waiting for the other to release a resource. For example: if there are two processes, Process 1 and Process 2 and two resources, resource 1 and resource 2 . To complete a certain task both processor need both resources. Suppose if process 1 acquires resource 1 and process 2 acquires resource 2, after that process 1 requires resource 2 and tries to acquire resource 2 but it is held by process 2 so process 1 has to wait similarly process 2 has to wait for acquiring resource1 which is held by process 1.

Conditions for Deadlock

a) Mutual Exclusion: This means that at least one resource must be used by only one process at a time.

b) Hold and Wait: This means that a process is holding at least one resource while simultaneously requesting additional resources that are currently held by other processes.

c) No Preemption: This means that resources cannot be forcibly taken away from a process and should be released voluntarily by the process.

d) Circular Wait: This occurs when there is a circular chain of two or more processes, each waiting for a resource held by the next process in the chain.

Deadlock Prevention :

Deadlock prevention aims to eliminate at least one of the four necessary conditions for deadlock ,mutual Exclusion ,Hold and Wait ,No Preemption and Circular Wait.

- For eliminating mutual exclusion : using shareable resouces like read-only files

- For Eliminate Hold and Wait: Require all resource requests at the starting of execution or release all resources before new requests.

- For Allowing Preemption: The system can force a process to release resources if needed by another process.

- For Eliminate Circular Wait: Total ordering of resource types should be imposed.

Deadlock avoidance:

Deadlock avoidance refers to strategies used to prevent deadlocks from occurring.

- Resource Allocation State: The system constantly monitors the resource allocation state, which includes the available resources, allocated resources, and maximum needs of processes.

- Safe State: The system ensures it always remains in a safe state, where there's at least one sequence in which all processes can complete without causing a deadlock.

- Resource Request Analysis: Before granting any resource request, the system analyzes whether doing so would lead to a safe state or not.

- Advance Information: The system requires advance knowledge about the maximum number of resources each process might request during its lifetime.

Deadlock Detection:

Deadlock detection is a method where the system allows deadlocks to occur but has mechanisms in place to identify when they have happened.

Detection methods:

- Resource Allocation Graph : It is a visual representation that uses vertices for processes and resources, with edges indicating requests and assignments. 

- Wait-For Graph: This simplifies the concept by focusing solely on processes, where edges represent one process waiting for a resource held by another.

- State Detection Algorithm: The state detection Algorithm , sometimes adapted from the Banker's Algorithm, takes a different approach by checking if the system is in a safe state. It calculates available resources, simulates allocations, and determines if all processes can complete without causing a deadlock. 





Comments ()


Sign in

Read Next

What is semaphore in operating system?

Blog banner

Buffering

Blog banner

NETWORK SECURITY RISKS

Blog banner

Music

Blog banner

MEMORY MANAGEMENT

Blog banner

Reconnaissance

Blog banner

Modern Operating System - Khush bagaria

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Sweet Mango Murabba

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

AI and Cyber Security

Blog banner

Social Engineering Attacks

Blog banner

Memory Management

Blog banner

Cyber Forensics

Blog banner

GIS

Blog banner

Satellite Based Positioning

Blog banner

Race Condition in Operating Theatre

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Proton mail

Blog banner

Paging

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

How I use google in my daily life

Blog banner

Social media

Blog banner

How to Run your First android App

Blog banner

EMAIL INVESTIGATION

Blog banner

UniProcessor Scheduling

Blog banner

Google

Blog banner

OPERATING SYSTEM

Blog banner

Multiple processor scheduling

Blog banner

Social Media Marketing Trends 2022

Blog banner

Android Flashlight Application

Blog banner

Article on Fresh Book

Blog banner

Computer Security

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Secure Hypertext transfer protocol

Blog banner

PYTHON

Blog banner

What is Internet

Blog banner

How to kiss

Blog banner

Memory management

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

security controls

Blog banner