wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
101 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

SQL Injection

Blog banner

File management -disha parekh

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Computer security techniques

Blog banner

PHISHING

Blog banner

Deadlock

Blog banner

RAID

Blog banner

Music

Blog banner

Game Theory in Blockchain

Blog banner

Deming’s Process

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Data Structures

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Getting started with Android Studio

Blog banner

Google

Blog banner

Types of email

Blog banner

Network Forensics

Blog banner

Operating system

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Virtual machine.

Blog banner

Deadlock and starvation

Blog banner

Evolution of Operating system.

Blog banner

Race Conditions

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Social engineering in cyber security

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Web Site

Blog banner

Service Strategy principles

Blog banner

How to use GIT & GITHUB

Blog banner

Operating system and overviews

Blog banner

Cache Memory in Operating Systems

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner