wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
100 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

Importance Of Yoga.

Blog banner

Women Empowerment

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Social Media Sentiment Analysis

Blog banner

"Games and the future"

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Trello ( management software)

Blog banner

What is a Malware ?

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Operating System

Blog banner

WORKFRONT SOFTWARE

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Place to visit in pune

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

clock

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Apple

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Caching windows

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

IoT Evolution

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Self managing devices

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Threat management

Blog banner

Security Breaches in Stock market trading

Blog banner

geographic information system (GIS)

Blog banner

Virtual memory

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

DBMS and various career options related to it.

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

The Role of cryptography in cyber security

Blog banner

Cache Memory in Operating Systems

Blog banner

Virtual memory

Blog banner

Memory Partitioning

Blog banner

How to grow followers on Instagram business account?

Blog banner

Data Mining

Blog banner