wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Diya Singh
Aug 13, 2024
0 Likes
0 Discussions
111 Reads

What is Deadlock?

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. 

Disadvantages of Deadlock:

Deadlock is an infinite process it means that once a process goes into deadlock it will never come out of the loop and the process will enter for an indefinite amount of time. There are only detection, resolution, and prevention techniques. But, there are no Deadlock-stopping techniques.

How Deadlock can occur?

Lets consider following situation:

  • Process1 obtains Resource1
  • Process2 obtains Resource2

Process 1 requires Resource 2 to continue execution but is unable to do so because Process 2 is currently holding Resource 2. Similarly, Process 2 requires Resource 1 to continue execution but is unable to do so because Process 1 is currently holding Resource 1. Both processes are now stuck in a loop:

  • Process 1 is awaiting Resource 2 from Process 2.
  • Process 2 is awaiting Resource 1 from Process 1.

We have a deadlock because neither process can release the resource it is holding until it completes its task, and neither can proceed without the resource the other process is holding. Both processes are effectively “deadlocked,” unable to move forward. To break the deadlock and free up resources for other processes in this situation, an external intervention, such as the operating system killing one or both processes, would be required.

Necessary conditions for the occurrence of deadlock:

1) Mutual Exclusion:

Mutual Exclusion condition requires that at least one resource be held in a non-shareable mode, which means that only one process can use the resource at any given time. 

As an example:

  • Process 1 obtains Resource 1
  • Process 2 acquires Resource 2

2) Hold and Wait:

The hold and wait condition specifies that a process must be holding at least one resource while waiting for other processes to release resources that are currently held by other processes. In our example,

  • Process 1 has Resource 1 and is awaiting Resource 2.
  • Process 2 currently has Resource 2 and is awaiting Resource 1.
  • Both processes hold one resource while waiting for the other, satisfying the hold and wait condition.

3) No Preemption:

Preemption is the act of taking a resource from a process before it has finished its task. According to the no preemption condition, resources cannot be taken forcibly from a process a process can only release resources voluntarily after completing its task. 

For example – Process1 have resource1 and requesting for resource2 that is hold by process2. then process1 preempt resource1 and after some time it try to restart by requesting both resource1 and resource2.

4) Circular Wait:

This condition implies that circular processes must exist, with each process waiting for a resource held by the next process in the chain. In our scenario, Process 1 is waiting for Resource 2, which is being held by Process 2. Process 2 is awaiting Resource 1 from Process 1. This circular chain of dependencies causes a deadlock because neither process can proceed, resulting in a system shutdown.

Conclusion:

Deadlocks are major problems in computers in which two or more processes remain blocked forever, each waiting for the other to release resources. A deadlock requires four conditions: mutual exclusion, hold and wait, no preemption, and circular wait. Deadlocks consume resources and reduce system performance, hence their avoidance, detection, and resolution are critical in operating systems.


Comments ()


Sign in

Read Next

MACHINE LEARNING

Blog banner

The Five Steps of Data Science

Blog banner

Visualization in Data Science

Blog banner

What is metaverse?

Blog banner

Business-to-Business

Blog banner

Microsoft Windows Overview

Blog banner

Memory Management in Operating System

Blog banner

Memory Management

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Electronic data interchange

Blog banner

virtual machine

Blog banner

Smitten Kitchen Keepers

Blog banner

USPS mail

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

security requirements for safe e-payment

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Technological Advancement

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Music helps reduce stress

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Development Of Modern Operating System

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

I/O Management and Disk Scheduling

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Bulk E-mail software

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Indian Culture and Tradition

Blog banner

Importance of education

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Service Operations in ITSM

Blog banner

MOVEMBER

Blog banner

child Labour

Blog banner

Concurrency and Deadlocks

Blog banner

Excel records

Blog banner

Jira Software

Blog banner

Gamer life

Blog banner

Topic: Sessions in Operating system

Blog banner

10 Survival Tips that might save your life

Blog banner

All you need to know about “On-page SEO”

Blog banner