SlideShare uma empresa Scribd logo
1 de 13
DEADLOCK
IN OS
UNDERSTANDING
DEADLOCKS IN OPERATING
SYSTEMS Yashwanth Redddy Kondakind
Sanjeevlu Buggargani
Koushik Reddy Malle
CONTENTS
• WHAT IS DEADLOCK?
• EXAMPLE OF DEADLOCK
• NECESSARY CONDITIONS FOR DEADLOCK
• DEADLOCK PREVENTION
• DEADLOCK DETECTION AND RECOVERY
• DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS
• CONCLUSION
WHAT IS
DEADLOCK?
• DEADLOCK IS A SITUATION IN WHICH
TWO OR MORE PROCESSES ARE UNABLE
TO PROCEED BECAUSE EACH IS WAITING
FOR ONE OF THE OTHERS TO COMPLETE
SOME OPERATION.
EXAMPLE
LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY.
JOHN AND AMY ARE BROTHER-SISTER.
THEY BOTH ARE IN A DEADLOCK STATE AS
AMY WANTS A LAPTOP WHICH JOHN IS
HAVING AND IS NOT IN THE MOOD TO
GIVE IT TO HIS SISTER. AND AMY HAS A TV
REMOTE WHICH JOHN WANTS, BUT AMY IS
NOT GIVING IT TO HIM.
NECESSARY
CONDITIONS FOR
DEADLOCK
• MUTUAL EXCLUSION
• HOLD AND WAIT
• NO PREEMPTION
• CIRCULAR WAIT
NECESSARY CONDITIONS FOR DEADLOCK
MUTUAL EXCLUSION:
• AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE
MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE
AT A TIME.
• THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A
RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE
HOLDING PROCESS RELEASES IT.
HOLD AND WAIT:
• PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR
ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY
OTHER PROCESSES.
• EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS
WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY
OTHER PROCESSES.
NECESSARY CONDITIONS FOR DEADLOCK
NO PREEMPTION:
• RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT
HOLD THEM.
• IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES
THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE
THOSE RESOURCES.
CIRCULAR WAIT:
• THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS
WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD
BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A
CIRCULAR CHAIN OF DEPENDENCIES.
• EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY
THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE
NO PROCESS CAN PROCEED
DEADLOCK
PREVENTION
STRATEGIES FOR PREVENTING
DEADLOCKS:
1. RESOURCE ALLOCATION
GRAPH (RAG)
2. DEADLOCK AVOIDANCE
3. RESOURCE ORDERING
4. LIMITING HOLD AND WAIT
5. PREEMPTIVE RESOURCE
ALLOCATION
DEADLOCK DETECTION AND
RECOVERY
1. DEADLOCK DETECTION:
DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK.
TECHNIQUES:
• RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM
• WAIT-FOR GRAPH ALGORITHM
PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT
DEADLOCK SITUATIONS.
2. DEADLOCK RECOVERY:
DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED.
TECHNIQUES:
• PROCESS TERMINATION
• RESOURCE PREEMPTION
• ROLLBACK
PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE
SYSTEM FUNCTIONALITY.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
1. Windows:
Deadlock Detection:
•Windows employs a deadlock
detection mechanism to identify
and resolve deadlock situations.
Recovery Techniques:
•Once deadlock is detected,
Windows may terminate one or
more processes involved in the
deadlock to break it.
Resource Management:
•Windows uses mechanisms like
the Resource Allocation Graph
(RAG) to track resource allocation
and detect deadlock.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
2. LINUX:
DEADLOCK AVOIDANCE:
LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK
SITUATIONS.
RESOURCE PREEMPTION:
IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE
DEADLOCK.
KERNEL-LEVEL SUPPORT:
LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND
DETECTING DEADLOCK.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
3. MACOS:
DEADLOCK PREVENTION:
MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE
ALLOCATION.
RESOURCE ORDERING:
RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A
SPECIFIC ORDER TO PREVENT CIRCULAR WAITS.
SYSTEM STABILITY:
MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF
DEADLOCK SITUATIONS.
CONCLUSION
• DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT
WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION,
AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED.
• IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS
TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND
BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER
SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.

Mais conteúdo relacionado

Semelhante a Understanding deadlocks in operating system

Semelhante a Understanding deadlocks in operating system (20)

chapter06-new.pptx
chapter06-new.pptxchapter06-new.pptx
chapter06-new.pptx
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlock Slides
Deadlock SlidesDeadlock Slides
Deadlock Slides
 
3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx
 
Deadlocks Part- I.pdf
Deadlocks Part- I.pdfDeadlocks Part- I.pdf
Deadlocks Part- I.pdf
 
OS 7.pptx
OS 7.pptxOS 7.pptx
OS 7.pptx
 
Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)
 
Ch 4 deadlock
Ch 4 deadlockCh 4 deadlock
Ch 4 deadlock
 
7 Deadlocks
7 Deadlocks7 Deadlocks
7 Deadlocks
 
OS Presentation 1 (1).pptx
OS Presentation 1 (1).pptxOS Presentation 1 (1).pptx
OS Presentation 1 (1).pptx
 
Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232
 
4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx
 
Deadlock in Operating Systems
Deadlock in Operating SystemsDeadlock in Operating Systems
Deadlock in Operating Systems
 
Chapter06.ppt
Chapter06.pptChapter06.ppt
Chapter06.ppt
 
24 to 25 deadlockprevention
24 to 25 deadlockprevention24 to 25 deadlockprevention
24 to 25 deadlockprevention
 
23 deadlock
23 deadlock23 deadlock
23 deadlock
 
OS deadlock.pptx
OS deadlock.pptxOS deadlock.pptx
OS deadlock.pptx
 
DEADLOCK
DEADLOCKDEADLOCK
DEADLOCK
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlocks prefinal
Deadlocks prefinalDeadlocks prefinal
Deadlocks prefinal
 

Último

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Último (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Understanding deadlocks in operating system

  • 1. DEADLOCK IN OS UNDERSTANDING DEADLOCKS IN OPERATING SYSTEMS Yashwanth Redddy Kondakind Sanjeevlu Buggargani Koushik Reddy Malle
  • 2. CONTENTS • WHAT IS DEADLOCK? • EXAMPLE OF DEADLOCK • NECESSARY CONDITIONS FOR DEADLOCK • DEADLOCK PREVENTION • DEADLOCK DETECTION AND RECOVERY • DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS • CONCLUSION
  • 3. WHAT IS DEADLOCK? • DEADLOCK IS A SITUATION IN WHICH TWO OR MORE PROCESSES ARE UNABLE TO PROCEED BECAUSE EACH IS WAITING FOR ONE OF THE OTHERS TO COMPLETE SOME OPERATION.
  • 4. EXAMPLE LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY. JOHN AND AMY ARE BROTHER-SISTER. THEY BOTH ARE IN A DEADLOCK STATE AS AMY WANTS A LAPTOP WHICH JOHN IS HAVING AND IS NOT IN THE MOOD TO GIVE IT TO HIS SISTER. AND AMY HAS A TV REMOTE WHICH JOHN WANTS, BUT AMY IS NOT GIVING IT TO HIM.
  • 5. NECESSARY CONDITIONS FOR DEADLOCK • MUTUAL EXCLUSION • HOLD AND WAIT • NO PREEMPTION • CIRCULAR WAIT
  • 6. NECESSARY CONDITIONS FOR DEADLOCK MUTUAL EXCLUSION: • AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE AT A TIME. • THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE HOLDING PROCESS RELEASES IT. HOLD AND WAIT: • PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES. • EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY OTHER PROCESSES.
  • 7. NECESSARY CONDITIONS FOR DEADLOCK NO PREEMPTION: • RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT HOLD THEM. • IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE THOSE RESOURCES. CIRCULAR WAIT: • THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A CIRCULAR CHAIN OF DEPENDENCIES. • EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE NO PROCESS CAN PROCEED
  • 8. DEADLOCK PREVENTION STRATEGIES FOR PREVENTING DEADLOCKS: 1. RESOURCE ALLOCATION GRAPH (RAG) 2. DEADLOCK AVOIDANCE 3. RESOURCE ORDERING 4. LIMITING HOLD AND WAIT 5. PREEMPTIVE RESOURCE ALLOCATION
  • 9. DEADLOCK DETECTION AND RECOVERY 1. DEADLOCK DETECTION: DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK. TECHNIQUES: • RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM • WAIT-FOR GRAPH ALGORITHM PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT DEADLOCK SITUATIONS. 2. DEADLOCK RECOVERY: DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED. TECHNIQUES: • PROCESS TERMINATION • RESOURCE PREEMPTION • ROLLBACK PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE SYSTEM FUNCTIONALITY.
  • 10. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 1. Windows: Deadlock Detection: •Windows employs a deadlock detection mechanism to identify and resolve deadlock situations. Recovery Techniques: •Once deadlock is detected, Windows may terminate one or more processes involved in the deadlock to break it. Resource Management: •Windows uses mechanisms like the Resource Allocation Graph (RAG) to track resource allocation and detect deadlock.
  • 11. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 2. LINUX: DEADLOCK AVOIDANCE: LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK SITUATIONS. RESOURCE PREEMPTION: IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE DEADLOCK. KERNEL-LEVEL SUPPORT: LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND DETECTING DEADLOCK.
  • 12. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 3. MACOS: DEADLOCK PREVENTION: MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE ALLOCATION. RESOURCE ORDERING: RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A SPECIFIC ORDER TO PREVENT CIRCULAR WAITS. SYSTEM STABILITY: MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF DEADLOCK SITUATIONS.
  • 13. CONCLUSION • DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION, AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED. • IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.