wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Amrita Mishra
Aug 14, 2024
0 Likes
1 Discussions
151 Reads

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.

 

Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

How Does Deadlock occur in the Operating System?

Before going into detail about how deadlock occurs in the Operating System, let’s first discuss how the Operating System uses the resources present. A process in an operating system uses resources in the following way. 

Requests a resource 

Use the resource 

Releases the resource 


Comments ()


Sign in

Read Next

RAID

Blog banner

Ransomware

Blog banner

Health and fitness in technology

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Career v/s Job : Choose your passion

Blog banner

MENDELEY

Blog banner

Socket Programming in Java

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

The seven-step improvement process

Blog banner

Deadlock and Starvation

Blog banner

Security Breaches in Stock market trading

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

OLA

Blog banner

Advantage of freedom

Blog banner

VIRTUAL MACHINES

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Importance of education

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

VIRTUAL MACHINE

Blog banner

Types Of Interrupt

Blog banner

A Deep Dive

Blog banner

What is Data, Information and Knowledge?

Blog banner

An Overivew Of Cache Memory

Blog banner

Memory Management in Operating System

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

10 Unknown facts about India's Independence

Blog banner

Shoulders

Blog banner

Raid

Blog banner

Disk Management

Blog banner

Principles of Service Operation

Blog banner

Teenagers of Today

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Financial Fraud Detection

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Electronic data interchange

Blog banner