wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

MAILFENCE

Blog banner

IOT Hacking Techniques

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Mumbaicha Dabbawalla

Blog banner

Theads

Blog banner

Virtual Memory

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

LINUX

Blog banner

Virtual Machine

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Assignment-3

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

I/O Management and Disk Scheduling

Blog banner

Social Engineering Attacks

Blog banner

Place to visit in pune

Blog banner

Explaining Buffer Overflow with Example

Blog banner

INTRODUCTION TO C#

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

IT Service as as Value Creation

Blog banner

Getting started with Android Studio

Blog banner

Virtual Machine

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Deadlock in Operating System

Blog banner

Article on Fresh Book

Blog banner

MUTUAL EXCLUSION

Blog banner

Health and fitness in technology

Blog banner

The Evolution of Operating Systems

Blog banner

File management

Blog banner

Virtual memory

Blog banner

TRELLO

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Operating Systems

Blog banner

Types of Viruses

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Open Source Project By Google

Blog banner

Clarizen

Blog banner

DIGITAL ECONOMY

Blog banner

Starvation

Blog banner

Types of threads

Blog banner

FIREWALL

Blog banner