wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Monday. com App

Blog banner

BharatPe

Blog banner

CRISP-DM Methodology

Blog banner

Microsoft Word

Blog banner

Zomato (Income Sources)

Blog banner

"Audit" In Data Science

Blog banner

Processes : Process description and control

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Kernel in Operating System

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Best password managers: Reviews of the top products

Blog banner

Evolution of operating systems

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

computer security

Blog banner

SECURITY TOOLS

Blog banner

A True Friendship

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Modern operating system

Blog banner

Docker Framework

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

VIRTUAL MACHINES

Blog banner

Consumer to consumer business mode

Blog banner

HubSpot

Blog banner

Note Taker App

Blog banner

My favourite food

Blog banner

Riddhi Miyani 53003220140

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Firewall

Blog banner

E-Governance

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

How Does SSO Works

Blog banner

IoT Evolution

Blog banner

Dal Bafla Recipe

Blog banner

Install Ubuntu in Vmware

Blog banner

File management

Blog banner

Process Description

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Data Mapping

Blog banner