wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
95 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Developments in Modern Operating Systems

Blog banner

Synchronization

Blog banner

Be you

Blog banner

Ubiquitous Computing

Blog banner

Operating system

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

VIRTUAL MEMORY

Blog banner

What is thread and alse multithreading

Blog banner

5 Stages of Digital Marketing

Blog banner

Regression Analysis

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Virtual memory

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Hacking Mobile Platforms

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Elegant fashion style

Blog banner

Man is free by the birth .

Blog banner

Puri Jagannath temple

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Starvation

Blog banner

What is Spyware?

Blog banner

Logical and physical address

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Raid and levels of raid.

Blog banner

Understanding Mobile Device Forensics

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Game Theory in Blockchain

Blog banner

Meshoo

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

Sagar Parikrama

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

EID UL FITR

Blog banner

Modern operating system

Blog banner

What is Segmentation?

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

DBMS and various career options related to it.

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Riddhi Miyani 53003220140

Blog banner

Scheduling

Blog banner

Cache memory

Blog banner

Consumer to consumer business mode

Blog banner