wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Advanced Persistent Threats (APTs)

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Risk mitigation and management

Blog banner

Bulk E-mail software

Blog banner

City of Mumbai (Bombay):

Blog banner

Multiprocessor scheduling

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Virtual Memory

Blog banner

Information of meesho company

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

A buffer overflow

Blog banner

Risk management in IT

Blog banner

12 Principles of Animation

Blog banner

Malware

Blog banner

IP Address

Blog banner

Direct Memory Access

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Raid and levels of raid.

Blog banner

Environmental Management using GIS

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Digital Marketing

Blog banner

Creating Digitally Signed Document

Blog banner

GIS Mapping

Blog banner

The Evolution of Operating Systems

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Best password managers: Reviews of the top products

Blog banner

All you need to know about “On-page SEO”

Blog banner

Privacy in Social Media and Online Services

Blog banner

Direct Memory Access

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Multicore and Multithreading

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

ZOHO

Blog banner

How to feel Happy everyday day

Blog banner

Windows Operating System

Blog banner

MYNTRA

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Some facts about Technology

Blog banner

Threat management

Blog banner

Social media

Blog banner

Culture Of Ladakh

Blog banner