wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock Prevention

profile
Shreya Mantry
Aug 15, 2024
0 Likes
0 Discussions
90 Reads

DEADLOCK PREVENTION


Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Strategies used in computer systems in order to ensure that different processes can run smoothly without getting stuck waiting for each other forever is  Deadlock prevention.


The deadlock has the following characteristics:

  1. Mutual Exclusion
  2. Hold and Wait
  3. No Preemption
  4. Circular Wait


Deadlock can be prevented by ruling out any of the above four conditions:


  • Mutual Exclusion:

Make data read only, so that processes can use the data concurrently. We know that many write procedure cannot take place at same time. Thus allow only exclusive users to writee into the file. And let others have access to read only.


  • Hold and Wait:

The hold-and-wait condition can be prevented by requiring all processes to request for required access at a time. While doing so all other processes will be blocked until all requests are granted. This means that other non running processes will have to wait until their turn.


  • No preemption:

if a process requests for certain resources, it must release its original resources first. And if another process is using that resources it needs to release them


  • Circular wait

Each resource will have a numeric order. All processes must follow that order only while requesting resources. No process will be granted if they request for resources have higher priority than they have currently. 


Thus in these ways deadlock can be prevented.



Comments ()


Sign in

Read Next

Race condition

Blog banner

Fault tolerance

Blog banner

Concept and definition of m-commerce

Blog banner

Risk management in IT

Blog banner

Memory Management

Blog banner

Footprinting

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Uniprocessor and Types

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Ransomware

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

This is my first blog.

Blog banner

Components of GIS

Blog banner

operating system

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Functions of Operating System

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Disk cache

Blog banner

Fashion marketing in india

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

memory managment

Blog banner

Memory input output management

Blog banner

INSTAGRAM

Blog banner

Life of an army person

Blog banner

INTERNET

Blog banner

Social media

Blog banner

Virtual memory

Blog banner

Web Site

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Health is Wealth

Blog banner

AOL Mail

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Music helps reduce stress

Blog banner

Why is ITSM important in IT organization?

Blog banner

Crypto tax evasion

Blog banner

IT service level agreement

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Memory Management

Blog banner

Environmental Management using GIS

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner