wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
94 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

1.1 basic elements

Blog banner

Depression

Blog banner

Disk Management

Blog banner

Deadlock in operating system

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Banaras

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Operating system

Blog banner

INTERNET SECURITY

Blog banner

SAVE TREES

Blog banner

Process Creation

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

The Laws of Karma

Blog banner

semaphores

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

THE DESIRE OF MANY

Blog banner

Life lesson

Blog banner

Uniprocessor Scheduling

Blog banner

Deadlock and Starvation

Blog banner

Bulk E-mail software

Blog banner

Stop Racism

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

5 Stages of Digital Marketing

Blog banner

Deadlocks

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Direct Memory Access

Blog banner

Deadlock in operating system

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Paid Email

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

RAID

Blog banner

How Cyber Forensics use in AI

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Hubspot

Blog banner

Operating Systems

Blog banner