wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

Top 3 Places To Stay In Vienna

Blog banner

Note Taker App

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Teenagers of Today

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Go Daddy

Blog banner

INTERRUPTS

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Emailing the merger document

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

A Deep Dive

Blog banner

NodeJs

Blog banner

HTML vs HTML5

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Mental Health

Blog banner

social media issue

Blog banner

A Short History of GIS

Blog banner

Virtual memory

Blog banner

Why Data Security Is Important

Blog banner

Deadlock in operating system

Blog banner

15 Interesting Facts about India

Blog banner

Street foods

Blog banner

File Allocation Methods

Blog banner

Security in Cloud Computing

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

What is metaverse?

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Cycling

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Hypothesis Testing in Data Science

Blog banner

Buffers in Operating Systems

Blog banner

Expert System In AI

Blog banner

Banaras

Blog banner

LiquidPlanner

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

How to use GIT & GITHUB

Blog banner

Defining youtubr

Blog banner

Process Creation

Blog banner

Bit Coins

Blog banner

Uniprocessor Scheduling

Blog banner