wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Service Design Principles

Blog banner

(Input/Output) in os

Blog banner

Memory Management

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Virtual Machine

Blog banner

Deadlock in Operating systems

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

From Model Mistakes to Metrics

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Emailing the merger document

Blog banner

Royal enfield

Blog banner

Modern operating system

Blog banner

Evolution of Operating Systems

Blog banner

Social engineering in cyber security

Blog banner

Fault Tolerance

Blog banner

Memory Management

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Memory input output management

Blog banner

DATA VAULT

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

All you need to know about “On-page SEO”

Blog banner

ADIDAS

Blog banner

I/O Buffering

Blog banner

Operating system

Blog banner

Evolution of Operating system.

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Memory Management

Blog banner

Full Disk Encryption

Blog banner

Policies for Service Transition

Blog banner

Threads

Blog banner

SAVE TREES

Blog banner

Operating system evolution

Blog banner

OS Evolution Achievements

Blog banner

Processes: Process Description and Control.

Blog banner

Concurrency and Deadlocks

Blog banner

Operating system

Blog banner