wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Meet Kothari
Aug 15, 2024
0 Likes
0 Discussions
61 Reads

A deadlock is a situation where a set of processes is blocked because each process is holding a resource and waiting for another resource acquired by some other process. In this article, we will discuss deadlock, its necessary conditions, etc. in detail.

Deadlock is a situation in computing where two or more processes are unable to proceed because each is waiting for the other to release resources. Key concepts include mutual exclusion, resource holding, circular wait, and no preemption.


Consider an example when two trains are coming toward each other on the same track and there is only one track, none of the trains can move once they are in front of each other. This is a practical example of deadlock.

A situation occurs in operating systems when there are two or more processes that hold some resources and wait for resources held by other(s). For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1.


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Trello ( management software)

Blog banner

Embaded operating system

Blog banner

What is HTML?

Blog banner

Save Girl Child

Blog banner

Starvation and Deadlock.

Blog banner

Theads

Blog banner

Mumbai local ......

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

How to lose belly fat

Blog banner

E-mail security

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Virtual memory

Blog banner

Business Intelligence v/s Big Data

Blog banner

IO Buffers

Blog banner

Types of Threads

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Hacking Mobile Platforms

Blog banner

A BLOG ON MYSQL

Blog banner

Types of threads

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

A buffer overflow

Blog banner

Metasploit

Blog banner

Lucidchart

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Threads

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Mutual exclusion

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Harsh Rathod

Blog banner

Virtual Memory

Blog banner

Use case of K-means clustering

Blog banner

Understanding Regression Analysis

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

In the world of Technology...

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Environmental Management using GIS

Blog banner

What is Network Security?

Blog banner

What is Email? Uses of Emails

Blog banner