wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

Supervised and unsupervised learning

Blog banner

Information of meesho company

Blog banner

HUBSPOT

Blog banner

Understanding - Proof of Work!

Blog banner

E-mail security

Blog banner

Ethical Hacking

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Modern operating system

Blog banner

Virtual Machine

Blog banner

File Systems in OS.

Blog banner

Malware Defense

Blog banner

Android Flashlight Application

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Review on Recovering Deleted Files

Blog banner

Importance of self defence for girls

Blog banner

Cache Memory

Blog banner

Texting is actually better than talking in person

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Record Blocking

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Pipedrive

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

DATA WRANGLING

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Reconnaissance

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

CSI and Organizational Change

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Deadlock in operating system

Blog banner

Article on Zoho Corporation

Blog banner

Mumbai famous street food

Blog banner

Inventory management software system

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

What your Favorite colour says about You?

Blog banner

Memory Management

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner