wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
95 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Cryptanalysis tool

Blog banner

Broken Authentication Attacks

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

From Model Mistakes to Metrics

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Oracle Corporation

Blog banner

Worms, viruses and Bots

Blog banner

Traditional Unix System

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Ethical Hacking

Blog banner

Senseless Teeths

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Wrike

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

AOL Mail

Blog banner

Memory Management of Operating System(OS)

Blog banner

Drawing tips for a beginner

Blog banner

10 Interesting Facts about Death Note

Blog banner

How Does SSO Works

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Social engineering in cyber security

Blog banner

Segmentation and paging concept

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Service Design Model

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Decoding Confusion Matrix

Blog banner

"Games and the future"

Blog banner

Sage

Blog banner

Deadlock in Operating System

Blog banner

Travelling blog

Blog banner

Deadlock and starvation

Blog banner