wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3

profile
Sheetal Mehta
Jul 23, 2024
0 Likes
0 Discussions
93 Reads

A deadlock occurs when every member of a set of processes is waiting for an event that can only be caused by a member of the set. Often the event waited for is the release of a resource. In the automotive world deadlocks are called gridlocks.

All deadlocks involve conflicting needs for resources by two or more processes. A common example is the traffic deadlock. The following figure shows a situation in which four cars have arrived at a four-way stop intersection at approximately the same time. The four quadrants of the intersection are the resources over which control is needed. In particular, if all four cars wish to go straight through the intersection, the resource requirements are as follows:

 • Car 1, traveling north, needs quadrants a and b.

 • Car 2 needs quadrants b and c.

 • Car 3 needs quadrants c and d.

 • Car 4 needs quadrants d and a

Following are the four strategies used for dealing with deadlocks:-

1. Ignore the problem.

2. Detect deadlocks and recover from them.

3. Avoid deadlocks by carefully deciding when to allocate resources.

4. Prevent deadlocks by violating one of the 4 necessary conditions.


Comments ()


Sign in

Read Next

Uniprocessor Scheduling

Blog banner

RAID - LEVELS OF RAID

Blog banner

Health and fitness in technology

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

R Programming

Blog banner

c

Blog banner

Clustering Techniques

Blog banner

OS assignment 3

Blog banner

Memory heirachy (Operating system)

Blog banner

Health and fitness

Blog banner

Getting into anime My anime suggestions

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Memory management

Blog banner

Cyber Forensic in the Banking sector

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

CyberSecurity Color Wheel

Blog banner

Process State

Blog banner

computer security

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

ProofHub

Blog banner

Cache memory

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Rain bow

Blog banner

Hacking Mobile Platforms

Blog banner

The art of being alone

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

OS Assignment-3

Blog banner

1.1 basic elements

Blog banner

A True Friendship

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

E-learning in today's world

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Decoding Confusion Matrix

Blog banner

Memory Management in an Operating System

Blog banner

Heart Fulness Meditation

Blog banner

HR Automation : Need of the hour

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Microsoft Windows Overview

Blog banner