wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

EFT

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Os(Computer security threats)

Blog banner

Lifestyle of a photographer

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Linux

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Sage

Blog banner

Hubspot

Blog banner

Memory input output management

Blog banner

Vikrant’s first blog

Blog banner

Coping with Diagnosis Shock

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

MENDELEY

Blog banner

What is Spyware? and examples of them.

Blog banner

Buffering

Blog banner

Process Creation

Blog banner

GIS REMOTE SENSING

Blog banner

Wrike

Blog banner

SAVE TREES

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

SQL Injection

Blog banner

Uniprocessor Scheduling

Blog banner

DATA WRANGLING

Blog banner

Types of Hackers.

Blog banner

What is OS and its overview

Blog banner

Threads and concurrency

Blog banner

Cache Memory in Operating Systems

Blog banner

What is Vishing?

Blog banner

Security Breaches in Stock market trading

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

EMAIL INVESTIGATION

Blog banner

What are Tenders its various types

Blog banner

Financial Stress and Mental Health

Blog banner

Starvation and Deadlock.

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner