wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

MODERN OPERATING SYSTEM

Blog banner

What is OS and its overview

Blog banner

What is Packet Filtering?

Blog banner

What is process

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Deadlock

Blog banner

MY FIRST BLOG?

Blog banner

File management -disha parekh

Blog banner

RAID

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Life lesson

Blog banner

File management in os

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Memory hierarchy

Blog banner

RAID

Blog banner

Is Your Password Complex Enough?

Blog banner

The Evolution of Operating Systems

Blog banner

Getting started with Android Studio

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

History of Money

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Modern Operating System - Khush bagaria

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Study of Sniffing Tools

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

HTML vs HTML5

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Virtual memory

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Modern Operating System

Blog banner

Fitness regime by Deepesh

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Memory management

Blog banner

How to write a cover letter

Blog banner

Latest Email Marketing Techniques

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

DIGITAL ECONOMY

Blog banner

Memory management

Blog banner

Disk cache

Blog banner