wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Concurrency and Deadlocks

profile
Akshat Gohil
Aug 12, 2024
0 Likes
0 Discussions
150 Reads

Concurrency:

Concurrency refers to the ability of the Operating Systems to execute multiple of processes or threads simultaneously for making efficient usage of CPU time/resources.

Processes are nothing but an instance of a program that is running with its own memory space.

 

OSes uses Context Switching mechanism to implement concurrency. It is the process of saving the current state of a currently executing process or thread and restoring other process or thread. This allows OS to switch between tasks giving an illusion of simultaneous execution.

Concurrency in OS leads to problems like Deadlock and Starvation.

 

Deadlock:

A deadlock is a situation when two are more processes are unable to proceed because each process is waiting for other to release a resource. This leads to a state where none of the processes can continue and they’re stuck indefinitely.

Deadlocks occur when several conditions are met simultaneously:

Mutual Exclusion: Resources are not shared and can be allocated to only one process at a time.

Hold and Wait: A process holding particular resources can request additional resources without releasing currently held.

No Preemption: Resources cannot be taken forcibly from resources and they must be freed simultaneously.

Circular Chain: A circular chain of process where processes wait for other to release resources held by them.

 

Deadlock Prevention:

Deadlock prevention ensures that at least one of the four conditions will not come true and will not lead to a deadlock from occurring.

Prevent Mutual Exclusion: Design systems where minimum number of resources are non-shareable, or convert non-shareable resources to shareable ones if possible reducing the probability of having deadlock.

Prevent Hold and Wait: Processes should request all the necessary resources before execution. If all resources not available it waits for them.

 

Prevent No Preemption: Allow pre-emption of resources where necessary to break deadlock conditions. If P2 needs a resource that P1 holds, P1 is forced to release its resource and wait until both resources are available. The system preempts P1, breaking the deadlock condition.

 

Prevent Circular Wait: Give each resource a unique priority. A process can only request resources in increasing order of their priority. This ensures there is always a linear dependency preventing circular wait.

 

Deadlock Avoidance:

Deadlock Avoidance dynamically decisions are made whether the granting the resource will potentially lead a deadlock.

A process is not granted a resource if it might lead to a deadlock.

Deadlock avoidance allows processes to request resources that prevents the system from entering a deadlock.

 

 

 

 

 

­­­­­­­

 


Comments ()


Sign in

Read Next

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Instagram

Blog banner

Virtual Memory

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

THE DESIRE OF MANY

Blog banner

Deadlock and starvation in operating system

Blog banner

File system

Blog banner

Virtual Memory

Blog banner

Not anti-social, but pro-solitude

Blog banner

Memory Management

Blog banner

Deadlocks

Blog banner

What if COVID does not exist!

Blog banner

Article on team management software

Blog banner

Types of Big Data

Blog banner

Deadlocks in Operating System

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Lucidchart

Blog banner

The launch of UniMap by HERE

Blog banner

Network Security Risks

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Modern Operating System

Blog banner

Satellite Based Positioning

Blog banner

memory management

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Memory

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

IoT Architecture Based Security

Blog banner

Developments in Modern Operating Systems

Blog banner

I/O buffer and its techniques

Blog banner

Facebook marketing

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Functions of operating system

Blog banner

Explain Multiprocessors

Blog banner

Types of threads

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

social media issue

Blog banner

Buffer overflow

Blog banner

OS Evolution Achievements

Blog banner

Interrupts in operating system.

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Memory Management

Blog banner