wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock in Operating System

profile
Ishita Thummar
Jul 11, 2023
0 Likes
0 Discussions
63 Reads

Deadlock in the Operating System 

Every process needs some resources to complete its execution. However, the resource is granted in a sequential order.

  1. The process requests some resources.
  2. OS grants the resource if it is available otherwise let the process waits.
  3. The process uses it and releases it on completion.

A Deadlock is a situation where each of the computer processes waits for a resource that is being assigned to another process. In this situation, none of the process gets executed since the resource it needs, is held by some other process that is also waiting for some other resource to be released.

  1. Mutual Exclusion

A resource can only be shared in a mutually exclusive manner. It implies that two processes cannot use the same resource at the same time.

  1. Hold and Wait

A process waits for some resources while holding another resource at the same time.

  1. No preemption

The process once scheduled will be executed till the completion. No other process can be scheduled by the scheduler meanwhile.

  1. Circular Wait

All the processes must be waiting for the resources in a cyclic manner so that the last process is waiting for the resource which is being held by the first process.

 


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Message Passing in OS

Blog banner

Linker

Blog banner

Penetration Testing

Blog banner

Hubspot

Blog banner

Raid

Blog banner

computer security

Blog banner

Virtual machine

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Risk management in IT

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

NIKE

Blog banner

Install Ubuntu in Vmware

Blog banner

Danger assessment in GIS

Blog banner

Virtual Memory

Blog banner

Process and Threading

Blog banner

GUIDE TO GIS

Blog banner

Blockchain Security Technique

Blog banner

ADIDAS

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Docker Framework

Blog banner

Animal’s have my heart

Blog banner

OPERATING SYSTEM

Blog banner

Operating Systems Overview

Blog banner

TEAMWORK

Blog banner

Outlook.com

Blog banner

Virtual Machine

Blog banner

The Right way of cooking

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Reconnaissance

Blog banner

"Audit" In Data Science

Blog banner

10 Signs your Computer has Virus

Blog banner

Fault Tolerance in an Operating System

Blog banner

Delhi city

Blog banner

Memory Management in Operating System

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Cloud Computing

Blog banner

Modern Operating System

Blog banner

Virtual machine and virtualizing

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Concurrency and Deadlocks

Blog banner

Compromising Mobile Platforms

Blog banner