wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
94 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

10 Types of Friends in every friend group

Blog banner

Beatbox

Blog banner

Emailing the merger document

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Fashion marketing in india

Blog banner

Disk scheduling

Blog banner

Python as a tool for data analysis

Blog banner

Memory Management

Blog banner

Mumbai Metro 3

Blog banner

Importance of education

Blog banner

Depression

Blog banner

Interesting fact about kangaroo.

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

This too shall pass

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

IT Service Continuity Management

Blog banner

Service Operations Principles

Blog banner

Email Privacy

Blog banner

Virtual Memory

Blog banner

Love is in air.....

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Fitness

Blog banner

DURGA POOJA

Blog banner

Man VS Nature

Blog banner

Security requirements for Safe E-Payments

Blog banner

Student Grade Calculator in LISP

Blog banner

Boxing

Blog banner

Modern operating system

Blog banner

Zomato (Income Sources)

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

You'll get to know about Pankaj Negi

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Zoho

Blog banner

Some web vulnerabilities

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner