What are the methods for handling deadlocks?, Operating System

Assignment Help:

What are the methods for handling deadlocks?

The technique for handling the deadlocks are:

  • We are able to use protocol to prevent or avoid the deadlock, make sure that the system will never enter the deadlock state.
  • Recover and Detect if there is deadlock or not.

To make sure that deadlocks never occur, the system is able to use a deadlock prevention or deadlock prevention scheme. Deadlock prevention supplies a set of methods for ensuring that at least one of the necessary conditions cannot hold. Deadlock avoidance needs that the operating should be given advance information concerning with resources a process will request and use during its lifetime. If a system makes sure that a deadlock will never occur nor provides a mechanism for deadlock recovery and detection then we will reach a situation of deadlock but won't recognize what happened. To hold off the deadlock condition away from the system we must keep track of the resources each time, thus we will get the number of resources that are free and the resources that are being used and being requested.

 


Related Discussions:- What are the methods for handling deadlocks?

Implementation of lru, 1. On every access, mark the page with a timestamp. ...

1. On every access, mark the page with a timestamp. Whenever we need to evict a page, we search through memory for the oldest page, the least-recently used page. But we need memory

What are the operations of a directory, Operations that are to be performed...

Operations that are to be performed on a directory are Search for a file: We are able to find all files whose names match a exact pattern. Create a file: New files requi

Explai basic concepts of demand paging, Basic concepts When a process i...

Basic concepts When a process is to be changed in, the pager guesses which pages will be used before the process is changed out again. Instead of swapping in a entire process,

Explain what type of group scope you will use, Question: (a) The actual...

Question: (a) The actual use and scope groups depend on the mode in which a domain is running. There are two domain modes in which you can run a Windows 2000 domain. List and d

Request or response interface - interaction using message, Explain the Requ...

Explain the Request or Response interface The Request/Response interface is ideal for a message based client-server interaction. By modeling components to interact via a reque

How are file sharing and protection implemented?, How are file sharing and ...

How are file sharing and protection implemented? To implement file protection and sharing, the system ought to maintain more file and directory attributes than are needed on a

Difference between two tier and three tier architectures, Question: a) ...

Question: a) Illustrate with the help of a diagram, the difference between two tier and three tier architectures. b) Explain in what kind of environment, a peer to peer envi

Write a note on multithreading, Write a note on multithreading. Multith...

Write a note on multithreading. Multithreading is the capability of an operating system to execute different parts of a program called as threads, at the same time. The program

What does verification represent, What does Verification represent? Ver...

What does Verification represent? Verification shows the set of activities that are carried out to confirm that the software correctly executes the specific functionality.

Define projected allocation state is safe - banker algorithm, A system cons...

A system consists of 10 units of resource class Ru. The resource needs of three user processes P1, P2 and P3 are like this                     Using Banker's algorithm, de

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd