wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
96 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Video games

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Subnet Masking

Blog banner

Deadlock and Starvation

Blog banner

Virtual Machine

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Chicken Dum Biryani

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Service transition principles

Blog banner

Data Warehouse Bus Matrix

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Trends that began during the pandemic

Blog banner

security controls

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Processes: Process Description and Control.

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Child labour

Blog banner

USPS mail

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Honeypot in cyber security

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

Race Condition in Operating Theatre

Blog banner

Animal’s have my heart

Blog banner

Quality check in IT services

Blog banner

How Does SSO Works

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Virtual machine.

Blog banner

GIS Bharat Maps

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

I Personally

Blog banner

Use case of K-means clustering

Blog banner

The Evolution of Operating Systems

Blog banner

Virtual memory

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner