wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Memory Management - operating system

Blog banner

Data Mining

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Bulk E-mail software

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Information Technology In E- Commerce

Blog banner

Virtual memory

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Record Blocking

Blog banner

A True Friendship

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

History of ITIL

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

The IT Service Lifecycle

Blog banner

Principles of Service Operation

Blog banner

Having passion in life

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Cyber Security Standards

Blog banner

File Management system

Blog banner

URL vs Domain

Blog banner

Trends that began during the pandemic

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Session Hijacking

Blog banner

A book review

Blog banner

Uniprocessor Scheduling

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Natural Language Processing(NLP)

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Power of words

Blog banner

Paid Email

Blog banner

File Organization and Access

Blog banner

Virtual Memory

Blog banner

Technical SEO : Total Guide

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Multiprocessor

Blog banner

Virtual memory

Blog banner

Artical on FreshBooks

Blog banner

Trello ( management software)

Blog banner