wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
101 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

10 Reasons to date your best friend

Blog banner

Processes : Process description and control

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Threads and concurrency

Blog banner

CRISP-DM Methodology

Blog banner

Virtual Machine

Blog banner

Deadlock and Starvation

Blog banner

Child labour

Blog banner

Linux Threads:

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Security issues

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Blockchain uses and use cases

Blog banner

Modern Operating system

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

PERT Overview

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Disk Management

Blog banner

OS ASSIGNMENT

Blog banner

OPERATING SYSTEM

Blog banner

DATA WRANGLING

Blog banner

Service Design Principles

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Service stratergy principles

Blog banner

Microsoft Word

Blog banner

Threat management

Blog banner

RAID

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Firewall

Blog banner

Virtual machine.

Blog banner

What is thread and alse multithreading

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Deadlock

Blog banner

Types of threads

Blog banner

Meshoo

Blog banner

Life of a 2020-2021 student

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner