wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Business Intelligence v/s Big Data

Blog banner

Worms, viruses and Bots

Blog banner

I/O Management and Disk Scheduling

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Types of Threads

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

The Features of Blockchain

Blog banner

Game via listing method

Blog banner

Operating System

Blog banner

Importance of Website

Blog banner

Game Theory in Blockchain

Blog banner

Memory Management

Blog banner

Spotify

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Deadlocks

Blog banner

HACKING MOBILE PLATFORM

Blog banner

S-Tool : Steganography

Blog banner

1.1 basic elements

Blog banner

SPAM

Blog banner

Race Condition in Operating Theatre

Blog banner

 " Healing of Yoga "

Blog banner

Characteristics of Etherum

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

WINDOWS I/ O

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

LIMITED EDITION

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Virtual memory in Operating System

Blog banner

Article on IT development trends

Blog banner

E-security systems | CCTV

Blog banner

The Right way of cooking

Blog banner

Social Media Sentiment Analysis

Blog banner

note taker app

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

LIFEHACKER

Blog banner

Fitness regime by Deepesh

Blog banner