wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

JIRA SOFTWARE

Blog banner

Process and Threading

Blog banner

Video games

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Memory management

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Memory managment

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Veg Mix Pickle

Blog banner

Components of GIS

Blog banner

All you need to know about “On-page SEO”

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Types of Viruses

Blog banner

What are Tenders its various types

Blog banner

Memory Management

Blog banner

RAID and It's Levels

Blog banner

Security issues

Blog banner

Different Types of Data

Blog banner

Difference Between Classification And Clustering

Blog banner

Operating System Objectives and Functions

Blog banner

How can parents support a child’s mental health?

Blog banner

LinkedIn

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

IOT Hacking Techniques

Blog banner

Types Of scheduling

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Operating System

Blog banner

IT security management

Blog banner

Memory management

Blog banner

What is Minting & Mining

Blog banner

Photography

Blog banner

The Features of Blockchain

Blog banner

Memory heirchy

Blog banner

M commerce

Blog banner

What is Virtual Memory

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

10 Interesting facts you should know!!!

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

LiquidPlanner

Blog banner