wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
100 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Blog on Smartsheet.

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

The most common internet security threats

Blog banner

OS Assignment 3

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Electronic Funds Transfer

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

About my college life

Blog banner

Memory management and virtual memory

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Direct Memory Access

Blog banner

What is thread and alse multithreading

Blog banner

Game Theory in Blockchain

Blog banner

Stop Racism

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

SMARTSHEET

Blog banner

Memory Hierarchy

Blog banner

Delhi city

Blog banner

What is OS Fingerprinting?

Blog banner

Consumer to consumer Business model

Blog banner

Lifestyle of a photographer

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

World end

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Question

Blog banner

"Audit" In Data Science

Blog banner

Phishing

Blog banner

Google classroom

Blog banner

15 Interesting Facts about India

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Benefits of yoga and meditation

Blog banner

Tracking Emails & Email Crimes

Blog banner

What is Virtual Memory

Blog banner

Microsoft powerpoint presentation

Blog banner

Big O Notation

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Booting Process In Operating System

Blog banner

AI and Cyber Security

Blog banner