wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Diya Singh
Aug 13, 2024
0 Likes
0 Discussions
112 Reads

What is Deadlock?

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. 

Disadvantages of Deadlock:

Deadlock is an infinite process it means that once a process goes into deadlock it will never come out of the loop and the process will enter for an indefinite amount of time. There are only detection, resolution, and prevention techniques. But, there are no Deadlock-stopping techniques.

How Deadlock can occur?

Lets consider following situation:

  • Process1 obtains Resource1
  • Process2 obtains Resource2

Process 1 requires Resource 2 to continue execution but is unable to do so because Process 2 is currently holding Resource 2. Similarly, Process 2 requires Resource 1 to continue execution but is unable to do so because Process 1 is currently holding Resource 1. Both processes are now stuck in a loop:

  • Process 1 is awaiting Resource 2 from Process 2.
  • Process 2 is awaiting Resource 1 from Process 1.

We have a deadlock because neither process can release the resource it is holding until it completes its task, and neither can proceed without the resource the other process is holding. Both processes are effectively “deadlocked,” unable to move forward. To break the deadlock and free up resources for other processes in this situation, an external intervention, such as the operating system killing one or both processes, would be required.

Necessary conditions for the occurrence of deadlock:

1) Mutual Exclusion:

Mutual Exclusion condition requires that at least one resource be held in a non-shareable mode, which means that only one process can use the resource at any given time. 

As an example:

  • Process 1 obtains Resource 1
  • Process 2 acquires Resource 2

2) Hold and Wait:

The hold and wait condition specifies that a process must be holding at least one resource while waiting for other processes to release resources that are currently held by other processes. In our example,

  • Process 1 has Resource 1 and is awaiting Resource 2.
  • Process 2 currently has Resource 2 and is awaiting Resource 1.
  • Both processes hold one resource while waiting for the other, satisfying the hold and wait condition.

3) No Preemption:

Preemption is the act of taking a resource from a process before it has finished its task. According to the no preemption condition, resources cannot be taken forcibly from a process a process can only release resources voluntarily after completing its task. 

For example – Process1 have resource1 and requesting for resource2 that is hold by process2. then process1 preempt resource1 and after some time it try to restart by requesting both resource1 and resource2.

4) Circular Wait:

This condition implies that circular processes must exist, with each process waiting for a resource held by the next process in the chain. In our scenario, Process 1 is waiting for Resource 2, which is being held by Process 2. Process 2 is awaiting Resource 1 from Process 1. This circular chain of dependencies causes a deadlock because neither process can proceed, resulting in a system shutdown.

Conclusion:

Deadlocks are major problems in computers in which two or more processes remain blocked forever, each waiting for the other to release resources. A deadlock requires four conditions: mutual exclusion, hold and wait, no preemption, and circular wait. Deadlocks consume resources and reduce system performance, hence their avoidance, detection, and resolution are critical in operating systems.


Comments ()


Sign in

Read Next

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Latest Email Marketing Techniques

Blog banner

Trello ( management software)

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Service transistion under difficult conditions

Blog banner

social media issue

Blog banner

Art and Culture of Rajasthan

Blog banner

LIFEHACKER

Blog banner

Models of Information Security.

Blog banner

Data Mapping

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

INTERNET

Blog banner

Cyber Security in Data Breaching

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Cache memory

Blog banner

Marvel Cinematic Universe

Blog banner

Photorec - media recovery tool

Blog banner

Functions of operating system

Blog banner

Memory Management in Operating System

Blog banner

Virtual machine.

Blog banner

Mobile Security

Blog banner

Instagram

Blog banner

Security issues

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Deadlock

Blog banner

Life lesson

Blog banner

Webmail

Blog banner

Why You Should Not Use Free VPNs

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Email Privacy

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Buffering

Blog banner

Jira service Management

Blog banner

Google App Engine

Blog banner

Booting Process In Operating System

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

"Games and the future"

Blog banner

VIRTUAL MACHINE

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Technological Advancement

Blog banner