wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Why You Should Not Use Free VPNs

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

TAILS OS

Blog banner

Ola

Blog banner

VIRTUAL MACHINE

Blog banner

Cyber Security Control

Blog banner

1.1 basic elements

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Memory Management

Blog banner

HubSpot

Blog banner

DURGA POOJA

Blog banner

Session Vulnerabilities

Blog banner

Embedded Operating System

Blog banner

AOL Mail

Blog banner

Theads

Blog banner

Starvation

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Direct Memory Access

Blog banner

Paginng In OS

Blog banner

Jira Software

Blog banner

Synchronization

Blog banner

Diwali

Blog banner

Buffering

Blog banner

Message Passing in OS

Blog banner

About myself

Blog banner

Raid

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

LiquidPlanner

Blog banner

Risk mitigation and management

Blog banner

Virtual Memory

Blog banner

Gis in agriculture and farming

Blog banner

Critical success factors

Blog banner

File management In Operating System

Blog banner

Time Series Analysis

Blog banner

DATA VAULT

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Principles of Service Operation

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Buffering

Blog banner

Mumbai

Blog banner

Virtual memory

Blog banner