wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlocks in Operating System

profile
Heet Chothani
Aug 16, 2024
0 Likes
0 Discussions
93 Reads

A deadlock in an operating system is a situation where a group of processes becomes stuck because each process is waiting for a resource that another process in the group is holding. This creates a cycle where no process can continue because each one is dependent on another process in the set to release a resource.



[Deadlock OS mein tab hota hai jab ek group of processes ek doosre ka wait karte reh jaate hain, kyunki har process ko woh resource chahiye hota hai jo doosra process hold kar raha hai. Deadlock ke liye 4 conditions hoti hain: 


1. **Mutual Exclusion**: Ek resource ek time pe sirf ek process ke paas hota hai.

2. **Hold and Wait**: Process ek resource hold karte hue doosre resources ka wait karta hai.

3. **No Preemption**: Resources forcibly liye nahi ja sakte, bas voluntary release hote hain.

4. **Circular Wait**: Ek process doosre ka, doosra teesre ka, aur teesra pehle wale process ka wait kar raha hota hai.


Isko handle karne ke tareeke:


1. **Prevention**: Deadlock hone wali conditions ko avoid karna.

2. **Avoidance**: Aise resource allocate karna ki deadlock na ho.

3. **Detection and Recovery**: Deadlock ko detect karke usko theek karna.

4. **Ignoring**: Kabhi kabhi deadlock ignore bhi kar diya jata hai, agar woh rare ho.


Short mein, deadlocks ko avoid, detect ya recover karke manage kiya jata hai.]


Comments ()


Sign in

Read Next

Importance of Network Security Risk

Blog banner

How Does SSO Works

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Best password managers: Reviews of the top products

Blog banner

CyberSecurity Color Wheel

Blog banner

virtual memory

Blog banner

Modern operating system

Blog banner

Operating system

Blog banner

Culture Of Ladakh

Blog banner

Satellite Based Positioning

Blog banner

Service transistion under difficult conditions

Blog banner

Subnet Masking

Blog banner

The evolution of OS

Blog banner

SNAPCHAT

Blog banner

Threads

Blog banner

Explain Multiprocessors

Blog banner

Operation system

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Memory management

Blog banner

Deadlock

Blog banner

Mail merge

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Risk management in IT

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

The Five Steps of Data Science

Blog banner

Understanding Business Layer in Data Science

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Smartsheet

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Virtual Machine

Blog banner

TRAIN TRAVELING

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Photography

Blog banner

This too shall pass

Blog banner

Reconnaissance

Blog banner

Memory Management in an Operating System

Blog banner