SlideShare une entreprise Scribd logo
1  sur  13
DEADLOCK
IN OS
UNDERSTANDING
DEADLOCKS IN OPERATING
SYSTEMS Yashwanth Redddy Kondakind
Sanjeevlu Buggargani
Koushik Reddy Malle
CONTENTS
• WHAT IS DEADLOCK?
• EXAMPLE OF DEADLOCK
• NECESSARY CONDITIONS FOR DEADLOCK
• DEADLOCK PREVENTION
• DEADLOCK DETECTION AND RECOVERY
• DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS
• CONCLUSION
WHAT IS
DEADLOCK?
• DEADLOCK IS A SITUATION IN WHICH
TWO OR MORE PROCESSES ARE UNABLE
TO PROCEED BECAUSE EACH IS WAITING
FOR ONE OF THE OTHERS TO COMPLETE
SOME OPERATION.
EXAMPLE
LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY.
JOHN AND AMY ARE BROTHER-SISTER.
THEY BOTH ARE IN A DEADLOCK STATE AS
AMY WANTS A LAPTOP WHICH JOHN IS
HAVING AND IS NOT IN THE MOOD TO
GIVE IT TO HIS SISTER. AND AMY HAS A TV
REMOTE WHICH JOHN WANTS, BUT AMY IS
NOT GIVING IT TO HIM.
NECESSARY
CONDITIONS FOR
DEADLOCK
• MUTUAL EXCLUSION
• HOLD AND WAIT
• NO PREEMPTION
• CIRCULAR WAIT
NECESSARY CONDITIONS FOR DEADLOCK
MUTUAL EXCLUSION:
• AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE
MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE
AT A TIME.
• THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A
RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE
HOLDING PROCESS RELEASES IT.
HOLD AND WAIT:
• PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR
ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY
OTHER PROCESSES.
• EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS
WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY
OTHER PROCESSES.
NECESSARY CONDITIONS FOR DEADLOCK
NO PREEMPTION:
• RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT
HOLD THEM.
• IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES
THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE
THOSE RESOURCES.
CIRCULAR WAIT:
• THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS
WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD
BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A
CIRCULAR CHAIN OF DEPENDENCIES.
• EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY
THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE
NO PROCESS CAN PROCEED
DEADLOCK
PREVENTION
STRATEGIES FOR PREVENTING
DEADLOCKS:
1. RESOURCE ALLOCATION
GRAPH (RAG)
2. DEADLOCK AVOIDANCE
3. RESOURCE ORDERING
4. LIMITING HOLD AND WAIT
5. PREEMPTIVE RESOURCE
ALLOCATION
DEADLOCK DETECTION AND
RECOVERY
1. DEADLOCK DETECTION:
DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK.
TECHNIQUES:
• RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM
• WAIT-FOR GRAPH ALGORITHM
PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT
DEADLOCK SITUATIONS.
2. DEADLOCK RECOVERY:
DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED.
TECHNIQUES:
• PROCESS TERMINATION
• RESOURCE PREEMPTION
• ROLLBACK
PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE
SYSTEM FUNCTIONALITY.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
1. Windows:
Deadlock Detection:
•Windows employs a deadlock
detection mechanism to identify
and resolve deadlock situations.
Recovery Techniques:
•Once deadlock is detected,
Windows may terminate one or
more processes involved in the
deadlock to break it.
Resource Management:
•Windows uses mechanisms like
the Resource Allocation Graph
(RAG) to track resource allocation
and detect deadlock.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
2. LINUX:
DEADLOCK AVOIDANCE:
LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK
SITUATIONS.
RESOURCE PREEMPTION:
IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE
DEADLOCK.
KERNEL-LEVEL SUPPORT:
LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND
DETECTING DEADLOCK.
DEADLOCK HANDLING IN SPECIFIC
OPERATING SYSTEMS
3. MACOS:
DEADLOCK PREVENTION:
MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE
ALLOCATION.
RESOURCE ORDERING:
RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A
SPECIFIC ORDER TO PREVENT CIRCULAR WAITS.
SYSTEM STABILITY:
MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF
DEADLOCK SITUATIONS.
CONCLUSION
• DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT
WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION,
AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED.
• IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS
TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND
BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER
SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.

Contenu connexe

Similaire à Understanding deadlocks in operating system

Similaire à Understanding deadlocks in operating system (20)

chapter06-new.pptx
chapter06-new.pptxchapter06-new.pptx
chapter06-new.pptx
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlock Slides
Deadlock SlidesDeadlock Slides
Deadlock Slides
 
3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx3.6 Deadlock-operating system unit 3.pptx
3.6 Deadlock-operating system unit 3.pptx
 
Deadlocks Part- I.pdf
Deadlocks Part- I.pdfDeadlocks Part- I.pdf
Deadlocks Part- I.pdf
 
OS 7.pptx
OS 7.pptxOS 7.pptx
OS 7.pptx
 
Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)Unit 3 part 2(DEADLOCK)
Unit 3 part 2(DEADLOCK)
 
Ch 4 deadlock
Ch 4 deadlockCh 4 deadlock
Ch 4 deadlock
 
7 Deadlocks
7 Deadlocks7 Deadlocks
7 Deadlocks
 
OS Presentation 1 (1).pptx
OS Presentation 1 (1).pptxOS Presentation 1 (1).pptx
OS Presentation 1 (1).pptx
 
Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232Deadlocks 160928121516-160928183232
Deadlocks 160928121516-160928183232
 
4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx4.3 Deadlock [Autosaved].pptx
4.3 Deadlock [Autosaved].pptx
 
Deadlock in Operating Systems
Deadlock in Operating SystemsDeadlock in Operating Systems
Deadlock in Operating Systems
 
Chapter06.ppt
Chapter06.pptChapter06.ppt
Chapter06.ppt
 
24 to 25 deadlockprevention
24 to 25 deadlockprevention24 to 25 deadlockprevention
24 to 25 deadlockprevention
 
23 deadlock
23 deadlock23 deadlock
23 deadlock
 
OS deadlock.pptx
OS deadlock.pptxOS deadlock.pptx
OS deadlock.pptx
 
DEADLOCK
DEADLOCKDEADLOCK
DEADLOCK
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlocks prefinal
Deadlocks prefinalDeadlocks prefinal
Deadlocks prefinal
 

Dernier

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 

Dernier (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Understanding deadlocks in operating system

  • 1. DEADLOCK IN OS UNDERSTANDING DEADLOCKS IN OPERATING SYSTEMS Yashwanth Redddy Kondakind Sanjeevlu Buggargani Koushik Reddy Malle
  • 2. CONTENTS • WHAT IS DEADLOCK? • EXAMPLE OF DEADLOCK • NECESSARY CONDITIONS FOR DEADLOCK • DEADLOCK PREVENTION • DEADLOCK DETECTION AND RECOVERY • DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS • CONCLUSION
  • 3. WHAT IS DEADLOCK? • DEADLOCK IS A SITUATION IN WHICH TWO OR MORE PROCESSES ARE UNABLE TO PROCEED BECAUSE EACH IS WAITING FOR ONE OF THE OTHERS TO COMPLETE SOME OPERATION.
  • 4. EXAMPLE LET’S UNDERSTAND WITH A REAL-LIFE ANALOGY. JOHN AND AMY ARE BROTHER-SISTER. THEY BOTH ARE IN A DEADLOCK STATE AS AMY WANTS A LAPTOP WHICH JOHN IS HAVING AND IS NOT IN THE MOOD TO GIVE IT TO HIS SISTER. AND AMY HAS A TV REMOTE WHICH JOHN WANTS, BUT AMY IS NOT GIVING IT TO HIM.
  • 5. NECESSARY CONDITIONS FOR DEADLOCK • MUTUAL EXCLUSION • HOLD AND WAIT • NO PREEMPTION • CIRCULAR WAIT
  • 6. NECESSARY CONDITIONS FOR DEADLOCK MUTUAL EXCLUSION: • AT LEAST ONE RESOURCE MUST BE HELD IN A NON-SHAREABLE MODE, MEANING ONLY ONE PROCESS CAN USE THE RESOURCE AT A TIME. • THIS CONDITION ENSURES THAT ONCE A PROCESS HOLDS A RESOURCE, NO OTHER PROCESS CAN ACCESS IT UNTIL THE HOLDING PROCESS RELEASES IT. HOLD AND WAIT: • PROCESSES MUST HOLD RESOURCES WHILE WAITING FOR ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES. • EACH PROCESS RETAINS AT LEAST ONE RESOURCE AND IS WAITING TO ACQUIRE ADDITIONAL RESOURCES HELD BY OTHER PROCESSES.
  • 7. NECESSARY CONDITIONS FOR DEADLOCK NO PREEMPTION: • RESOURCES CANNOT BE FORCIBLY TAKEN AWAY FROM THE PROCESSES THAT HOLD THEM. • IF A PROCESS IS HOLDING A RESOURCE AND NEEDS ADDITIONAL RESOURCES THAT ARE CURRENTLY HELD BY OTHER PROCESSES, IT CANNOT FORCIBLY TAKE THOSE RESOURCES. CIRCULAR WAIT: • THERE MUST EXIST A SET OF WAITING PROCESSES {P1, P2, ..., PN}, WHERE P1 IS WAITING FOR A RESOURCE HELD BY P2, P2 IS WAITING FOR A RESOURCE HELD BY P3, ..., AND PN IS WAITING FOR A RESOURCE HELD BY P1, RESULTING IN A CIRCULAR CHAIN OF DEPENDENCIES. • EACH PROCESS IN THE CYCLE IS WAITING FOR A RESOURCE THAT IS HELD BY THE NEXT PROCESS IN THE CYCLE, LEADING TO A DEADLOCK SITUATION WHERE NO PROCESS CAN PROCEED
  • 8. DEADLOCK PREVENTION STRATEGIES FOR PREVENTING DEADLOCKS: 1. RESOURCE ALLOCATION GRAPH (RAG) 2. DEADLOCK AVOIDANCE 3. RESOURCE ORDERING 4. LIMITING HOLD AND WAIT 5. PREEMPTIVE RESOURCE ALLOCATION
  • 9. DEADLOCK DETECTION AND RECOVERY 1. DEADLOCK DETECTION: DEFINITION:: DEADLOCK DETECTION INVOLVES PERIODICALLY CHECKING THE SYSTEM FOR THE PRESENCE OF DEADLOCK. TECHNIQUES: • RESOURCE ALLOCATION GRAPH (RAG) ALGORITHM • WAIT-FOR GRAPH ALGORITHM PROCESS::ALGORITHMS ANALYZE RESOURCE ALLOCATION AND REQUEST PATTERNS TO IDENTIFY CIRCULAR WAITS AND DETECT DEADLOCK SITUATIONS. 2. DEADLOCK RECOVERY: DEFINITION: DEADLOCK RECOVERY STRATEGIES INVOLVE BREAKING THE DEADLOCK ONCE IT HAS BEEN DETECTED. TECHNIQUES: • PROCESS TERMINATION • RESOURCE PREEMPTION • ROLLBACK PROCESS: ONCE DEADLOCK IS DETECTED, RECOVERY MECHANISMS ARE INITIATED TO RESOLVE THE DEADLOCK AND RESTORE SYSTEM FUNCTIONALITY.
  • 10. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 1. Windows: Deadlock Detection: •Windows employs a deadlock detection mechanism to identify and resolve deadlock situations. Recovery Techniques: •Once deadlock is detected, Windows may terminate one or more processes involved in the deadlock to break it. Resource Management: •Windows uses mechanisms like the Resource Allocation Graph (RAG) to track resource allocation and detect deadlock.
  • 11. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 2. LINUX: DEADLOCK AVOIDANCE: LINUX UTILIZES DEADLOCK AVOIDANCE TECHNIQUES TO PREVENT DEADLOCK SITUATIONS. RESOURCE PREEMPTION: IN SOME CASES, LINUX MAY PREEMPT RESOURCES FROM PROCESSES TO RESOLVE DEADLOCK. KERNEL-LEVEL SUPPORT: LINUX KERNEL PROVIDES APIS AND SYSTEM CALLS FOR MANAGING RESOURCES AND DETECTING DEADLOCK.
  • 12. DEADLOCK HANDLING IN SPECIFIC OPERATING SYSTEMS 3. MACOS: DEADLOCK PREVENTION: MACOS FOCUSES ON PREVENTING DEADLOCK SITUATIONS BY CAREFULLY MANAGING RESOURCE ALLOCATION. RESOURCE ORDERING: RESOURCES ARE ASSIGNED A PARTIAL ORDERING, AND PROCESSES MUST REQUEST RESOURCES IN A SPECIFIC ORDER TO PREVENT CIRCULAR WAITS. SYSTEM STABILITY: MACOS PRIORITIZES SYSTEM STABILITY AND RELIABILITY BY MINIMIZING THE OCCURRENCE OF DEADLOCK SITUATIONS.
  • 13. CONCLUSION • DEADLOCKS POSE A SIGNIFICANT CHALLENGE IN OPERATING SYSTEMS, BUT WITH CAREFUL DESIGN AND IMPLEMENTATION OF PREVENTION, DETECTION, AND RECOVERY MECHANISMS, THEY CAN BE EFFECTIVELY MANAGED. • IT'S ESSENTIAL FOR SYSTEM ADMINISTRATORS, DEVELOPERS, AND RESEARCHERS TO STAY ABREAST OF THE LATEST DEADLOCK HANDLING TECHNIQUES AND BEST PRACTICES TO ENSURE THE STABILITY AND RELIABILITY OF COMPUTER SYSTEMS IN THE FACE OF DEADLOCK SCENARIOS.