wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

38_Network Sniffing Techniques_SBC

Blog banner

Tracking Emails & Email Crimes

Blog banner

How to grow followers on Instagram business account?

Blog banner

Development Of Modern Operating System

Blog banner

Rain bow

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

File management

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

A Heartfelt Act of Kindness

Blog banner

Computer Security

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

An Overivew Of Cache Memory

Blog banner

Why Data Security Is Important

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Go Daddy

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Zomato (Income Sources)

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Security in Cloud Computing

Blog banner

APACHE KAFKA

Blog banner

Best password managers: Reviews of the top products

Blog banner

Virtual Memory

Blog banner

Latest Email Marketing Techniques

Blog banner

MUTUAL EXCLUSION

Blog banner

Technical SEO : Total Guide

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Drawing tips for a beginner

Blog banner

Types of Malware in Cyber Security

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Threat management

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Modern operating system

Blog banner

Embaded operating system

Blog banner

Uniprocessor Scheduling

Blog banner

Os Virtual Memory

Blog banner

Decision Tree: A Diagram Model

Blog banner

INTRODUCTION TO C#

Blog banner

VIRTUAL MACHINES

Blog banner

Bharat Maps

Blog banner

Understanding E-mail Servers

Blog banner