wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Meet Kothari
Aug 15, 2024
0 Likes
0 Discussions
61 Reads

A deadlock is a situation where a set of processes is blocked because each process is holding a resource and waiting for another resource acquired by some other process. In this article, we will discuss deadlock, its necessary conditions, etc. in detail.

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.


Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

A situation occurs in operating systems when there are two or more processes that hold some resources and wait for resources held by other(s). For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1.


Comments ()


Sign in

Read Next

Metasploit

Blog banner

Threads

Blog banner

The War With Cold On Earth

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

R Programming

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Disk cache

Blog banner

Electronic Funds Transfer

Blog banner

1.1 basic elements

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Balance

Blog banner

Subnet Masking

Blog banner

DURGA POOJA

Blog banner

Evolution of Operating System

Blog banner

'Positivity in life'

Blog banner

Virtual Memory

Blog banner

How Does SSO Works

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Pandas Matrix Applications

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

File Organization and Access

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

What are Virtual Machines

Blog banner

Big Data Architecture

Blog banner

Understanding Regression Analysis

Blog banner

Stop Racism

Blog banner

Veg Mix Pickle

Blog banner

Memory Management in Operating System

Blog banner

internet email and it's applications

Blog banner

Oracle Corporation

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Memory Management

Blog banner

To-Do List In LISP

Blog banner

Session Hijacking Techniques

Blog banner

Virtual machine

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

How to Find the Right Therapist For Me?

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Scala - a programming tool

Blog banner

Data Lake

Blog banner