wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Meshoo

Blog banner

Sessions In OS.

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

GIS in Disaster Management

Blog banner

Virtual Machine

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Culture Of Ladakh

Blog banner

PROCESS STATE:

Blog banner

Odoo

Blog banner

Deadlock in operating system

Blog banner

Big Data Architecture

Blog banner

OS ASSIGNMENT

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

How to feel Happy everyday day

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Cache Memory

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Junk food vs healthy food

Blog banner

Ransomware

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Uniprocessor scheduling

Blog banner

Memory heirachy (Operating system)

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Strengthening Active Directory Security

Blog banner

Music helps reduce stress

Blog banner

Virtual memory

Blog banner

Fault Tolerance

Blog banner

GIS Topography

Blog banner

Microsoft Windows Overview

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Incident management in ITSM

Blog banner

Email Privacy

Blog banner

Balance

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

E-Governance

Blog banner

Apache Kafka

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

INTRODUCTION TO C#

Blog banner

Importance Of Time

Blog banner

semaphores in os

Blog banner

Deadlock

Blog banner