wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
101 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

Deadlock

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Deadlock and Starvation

Blog banner

Education: Key to your Prosperity

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory Management in an Operating System

Blog banner

OS Assignment 3

Blog banner

Race Conditions

Blog banner

10 Reasons to date your best friend

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Memory Management in Operating System

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

NETWORK SECURITY RISKS

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Virtual Machine

Blog banner

Deadlock Prevention

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

Ethical Hacking

Blog banner

Article on different management system

Blog banner

OS assignment 3

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Save Environment

Blog banner

What your Favorite colour says about You?

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Music is life

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

The Right way of cooking

Blog banner

Data Lake

Blog banner

Hypothesis Testing in Data Science

Blog banner

Virtual memory

Blog banner

RAID

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Virtual machine

Blog banner

Subnet Masking

Blog banner

Buffer overflow

Blog banner

Review on Recovering Deleted Files

Blog banner