wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Deadlocks

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Malware Defense

Blog banner

Loneliness

Blog banner

Understanding E-mail Servers

Blog banner

Deadlocks in Operating System

Blog banner

Security in Cloud Computing

Blog banner

(Input/Output) in os

Blog banner

Wrike

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Blog name

Blog banner

Semaphores

Blog banner

Process Creation

Blog banner

Memory Management

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Firewall in Computer Network

Blog banner

Process Description

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

THE ACTORS LIFE

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Big Data

Blog banner

Dal Bafla Recipe

Blog banner

What are Tenders its various types

Blog banner

Android Flashlight Application

Blog banner

RAID

Blog banner

Memory Management

Blog banner

A Heartfelt Act of Kindness

Blog banner

Hacking

Blog banner

Difference Between Classification And Clustering

Blog banner

Security Issues

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

I/O Management and Disk Scheduling

Blog banner

Deadlock and Starvation

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

File management

Blog banner

Types of Threads

Blog banner

Photography

Blog banner

Game Theory in Blockchain

Blog banner

Disk scheduling

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Mumbai Metro 3

Blog banner