wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
94 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Service Catalogue Management

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Social Media Sentiment Analysis

Blog banner

Virtual memory

Blog banner

Latest Email Marketing Techniques

Blog banner

Virtual Memory

Blog banner

Health and fitness

Blog banner

Layers Of Blockchain

Blog banner

Clarizen

Blog banner

VIRTUAL MACHINE

Blog banner

Junk food vs healthy food

Blog banner

The Features of Blockchain

Blog banner

URL vs Domain

Blog banner

Uniprocessor Scheduling

Blog banner

"Audit" In Data Science

Blog banner

INTERNET SECURITY

Blog banner

Be you

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Cache memory

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Multithreading in Operating System

Blog banner

RAID and It's Levels

Blog banner

Why am I never satisfied with my Life?

Blog banner

Women empowerment

Blog banner

Memory Management

Blog banner

File Systems in OS.

Blog banner

Session Hijacking Techniques

Blog banner

RAID

Blog banner

Deadlock in operating system

Blog banner

NodeJs

Blog banner

An Overview of Virtual Machines

Blog banner

bulk email software

Blog banner

History of Money

Blog banner

Steganography and Steganalysis

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Session Hijacking

Blog banner

Article on different management system

Blog banner

Deadlock and Starvation

Blog banner

Threading

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner