wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

PYTHON

Blog banner

Smitten Kitchen Keepers

Blog banner

Virtual Machine

Blog banner

Logical and physical address

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Google App Engine

Blog banner

Honeypot in cyber security

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Tracking Emails & Email Crimes

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Precision-Recall in Data Science

Blog banner

OPERATING SYSTEM

Blog banner

Data Exfiltration

Blog banner

Deadlock

Blog banner

Article on Fresh Book

Blog banner

Social Media.

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Memory input output management

Blog banner

Concurrency management in operating systems

Blog banner

What are Tenders its various types

Blog banner

Dekkers Algorithm

Blog banner

Functions of Operating System

Blog banner

Zomato (Income Sources)

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Linker

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Operating system

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

MENDELEY

Blog banner

The evolution of OS

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

What is Email? Uses of Emails

Blog banner

VIRTUAL MACHINES

Blog banner

From Model Mistakes to Metrics

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

The seven-step improvement process

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

VIRTUAL MACHINES

Blog banner