wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Virtual memory

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

What is Network Security?

Blog banner

The War With Cold On Earth

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Uniprocessor scheduling

Blog banner

File management

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

virtual machine

Blog banner

MENDELEY

Blog banner

(Input/Output) in os

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Cycling

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

IT security management

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Amazon

Blog banner

Direct Memory Access

Blog banner

What is a Malware ?

Blog banner

Types of Hackers

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

RAID

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Data Warehousing

Blog banner

THREADS (assignment 1)

Blog banner

Virtual memory in os

Blog banner

Some web vulnerabilities

Blog banner

Teamwork

Blog banner

Direct Memory Access

Blog banner

Video games

Blog banner

The Laws of Karma

Blog banner

LinkedIn

Blog banner

Deadlock and Starvation

Blog banner

Deadlock

Blog banner

My Favorite Country

Blog banner

Sage

Blog banner

Pink sauce pasta

Blog banner