wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS Assignment 3 Deadlock

profile
Amit Dubey
Aug 14, 2024
0 Likes
0 Discussions
100 Reads

NAME= DUBEY AMIT KUMAR

SAP ID =53003230143


Deadlock

A deadlock in an operating system occurs when a set of processes become stuck in a state where each process is waiting for a resource that another process in the set is holding. As a result, none of the processes can proceed, and they all remain in a state of perpetual waiting.


 


Deadlock Recovery:


When a deadlock occurs, the system must recover from it to ensure that the processes can eventually complete. There are several methods for deadlock recovery:


 


1. Process Termination:


   - Abort All Deadlocked Processes: The simplest solution is to terminate all the processes involved in the deadlock. This guarantees recovery but can result in significant work being lost.


   - Abort One Process at a Time: A more refined approach is to abort processes one by one until the deadlock is resolved. The choice of which process to terminate can be based on factors such as the process's priority, the amount of work it has done, or the resources it holds.


 


2. Resource Preemption:


   - Preempt Resources: Temporarily take resources away from some processes and give them to others. This can break the circular wait condition.


   - Rollback: Roll back one or more processes to an earlier safe state and restart them, allowing the system to avoid deadlock. This method requires the system to maintain sufficient information about the states of processes.


 


3. Process Migration:


   - Move Processes to Different Systems: In distributed systems, processes can be moved to other systems where the required resources are available. This approach can help avoid deadlock but requires advanced system capabilities.


 


4. Combination Methods:


   - Sometimes, a combination of process termination and resource preemption might be used to resolve deadlocks more effectively.


 


The choice of deadlock recovery method depends on the specific system and the criticality of the processes involved.




Comments ()


Sign in

Read Next

Major achievement

Blog banner

Install Ubuntu Easily

Blog banner

Virtual memory

Blog banner

Memory Management

Blog banner

Water Resources are about to exhaust...

Blog banner

'Positivity in life'

Blog banner

Operating system

Blog banner

Article on IT development trends

Blog banner

MAILFENCE

Blog banner

MUTUAL EXCLUSION

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

What is service level Agreement?

Blog banner

What is Internet

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Record Blocking

Blog banner

Flipkart

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

SQL Injection

Blog banner

(Input/Output) in os

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Hacking Mobile Platforms

Blog banner

Music helps reduce stress

Blog banner

Deadlocks in operating system

Blog banner

SAVE TREES

Blog banner

Diwali

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Blog on health and fitness

Blog banner

Principles of Concurrency

Blog banner

IT service level agreement

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Be you

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

E-mail security

Blog banner

E-learning

Blog banner

IT Service Continuity Management

Blog banner

Importance Of Yoga.

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Kafka - A Framework

Blog banner

Types of threads

Blog banner

HR Automation : Need of the hour

Blog banner