wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Meet Kothari
Aug 15, 2024
0 Likes
0 Discussions
61 Reads

A deadlock is a situation where a set of processes is blocked because each process is holding a resource and waiting for another resource acquired by some other process. In this article, we will discuss deadlock, its necessary conditions, etc. in detail.

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.


Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

A situation occurs in operating systems when there are two or more processes that hold some resources and wait for resources held by other(s). For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1.


Comments ()


Sign in

Read Next

MORDERN UNIX SYSTEM

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Types of Viruses

Blog banner

Inventory management software system

Blog banner

The Role of cryptography in cyber security

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Why we fail after giving 100% ?

Blog banner

Operating System Objectives and Functions

Blog banner

Raid and levels of raid.

Blog banner

AI and cyber Security

Blog banner

RAID

Blog banner

Retiring ISS

Blog banner

Studying ProRat

Blog banner

Rain bow

Blog banner

DISK SCHEDULING

Blog banner

Deadlock

Blog banner

Outlook.com

Blog banner

KAHAWA TEA

Blog banner

Self Confidence

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Direct memory access

Blog banner

c

Blog banner

Understanding Regression Analysis

Blog banner

Virtual memory in os

Blog banner

Big Data

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Operating system

Blog banner

Microsoft Windows Overview

Blog banner

Junk food vs healthy food

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Cyber Security Control

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Intrusion Detection Systems - Anushka Linge

Blog banner

Yahoo! mail

Blog banner

Access management

Blog banner

RAID

Blog banner

Social Media Sentiment Analysis

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

12 Principles of Animation

Blog banner

Hacking

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner