wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Prachiti Borle
Aug 13, 2024
0 Likes
0 Discussions
45 Reads

What Is a Deadlock?
In computing, a deadlock is a situation wherein two or more processes are in a difficult or embarrassing predicament. Think of this: Each process is holding on to one resource (like a stubborn squirrel clutching its acorn), and they are all waiting for another resource that happens to be held by someone else. It is like a cosmic game of "I will wait if you will wait." ????

The basic concepts underlying deadlocks are

1 Mutual Exclusion: Resources are possessive little creatures. Take a printer, for example. It insists on serving just one set of print jobs at any time. That is mutual exclusion—no more than one process is allowed to use a resource at any given time.
2 Hold and Wait: Processes can be pretty demanding. They hold on to one resource (like a toddler clings to their favorite toy) while simultaneously holding on and waiting on another resource. It is like saying, "I'm not letting go of this crayon until I get that cookie!"
3 No Preemption: Resources are pretty stubborn. Once a process gets its mitts on something, it won't let it go unless it decides to release it voluntarily. No snatching is allowed!
4 Circular Wait: Imagine a circle of processes each of which is waiting for the process on the left to pass a talking stick. If the stick is never passed, they are in a circular wait. In more detail, with deadlock, it's musical chairs when the music stops, but all are too polite to take a chair.

There are three ways to handle deadlock

  • Deadlock Prevention or Avoidance
  • Deadlock Recovery
  • Deadlock Ignorance

Necessary Conditions of Deadlock

* Mutual Exclusion: Resources are loved.
* Hold and Wait: Each process holds resources.
* No Preemption: Resources can't be forcibly taken away.
* Circular Wait: The waiting game is circular.


Comments ()


Sign in

Read Next

Instagram

Blog banner

Trello ( management software)

Blog banner

Types Of Interrupt

Blog banner

Interrupts in OS

Blog banner

Memory

Blog banner

What are Tenders its various types

Blog banner

Deadlock

Blog banner

Article on Fresh Book

Blog banner

Fault Tolerance

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Emailing the merger document

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Synchronization

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Memory management

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Types of Malware in Cyber Security

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Threat management

Blog banner

Apple

Blog banner

Uber

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Open Source Project By Google

Blog banner

Security in Operating Systems

Blog banner

Use case of K-means clustering

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Install Ubuntu Easily

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Deadlock

Blog banner

Microsoft Windows Overview

Blog banner

Security issues

Blog banner

Memory Management

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Security issues

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Characteristics of Etherum

Blog banner

10 Interesting Facts about Death Note

Blog banner

I/O Management and Disk Scheduling

Blog banner

Deadlock and Starvation

Blog banner

History of Money

Blog banner

What are Virtual Machines

Blog banner