wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Key to success in Sports

Blog banner

What is Packet Filtering?

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Threads

Blog banner

Deadlock and starvation in operating system

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

A Heartfelt Act of Kindness

Blog banner

Memory Management - operating system

Blog banner

Teamwork

Blog banner

Digital Marketing

Blog banner

Raid and levels of raid.

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Art and Culture of Rajasthan

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Starvation

Blog banner

VIRTUAL MACHINES

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

How return on investment is defined in IT services

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Business Intelligence v/s Big Data

Blog banner

IP Address

Blog banner

IoT Evolution

Blog banner

Modern operating system

Blog banner

Operation system

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Evolution of Operating system.

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

E-security systems | CCTV

Blog banner

The application udemy

Blog banner

Guidelines for a low sodium diet.

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

File Sharing

Blog banner

Functions of Operating System

Blog banner

How social media affect

Blog banner

AOL Mail

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner