wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
93 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

OS Evolution Achievements

Blog banner

I/O Management and Disk Scheduling

Blog banner

CSI and Organizational Change

Blog banner

Data Lake

Blog banner

Multicore and multithreading 171

Blog banner

CRISP-DM Methodology

Blog banner

How to insert contacts in zoho crm using php

Blog banner

ProofHub

Blog banner

"Games and the future"

Blog banner

Disk scheduling

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Cycling

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Technical SEO : Total Guide

Blog banner

A Deep Dive

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Threats To Computer System

Blog banner

38_Exploring The Honeynet Project

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Fashion design

Blog banner

Digital Marketing

Blog banner

The art of being alone

Blog banner

Europe Through My Lens

Blog banner

OLA

Blog banner

How to use GIT & GITHUB

Blog banner

Importance of Education

Blog banner

LIFEHACKER

Blog banner

Disk cache

Blog banner

Kernel in Operating System

Blog banner

Functions Of Operating Systems

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

On-Page SEO

Blog banner

Network Forensics Tools and Techniques

Blog banner

SQL Injection Techniques

Blog banner

Memory Management in Operating System

Blog banner

Real Time Scheduling

Blog banner

IT security management

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Gamer life

Blog banner

Service Design Model

Blog banner