What are the methods for handling deadlocks?, Operating System

Assignment Help:

What are the methods for handling deadlocks?

The technique for handling the deadlocks are:

  • We are able to use protocol to prevent or avoid the deadlock, make sure that the system will never enter the deadlock state.
  • Recover and Detect if there is deadlock or not.

To make sure that deadlocks never occur, the system is able to use a deadlock prevention or deadlock prevention scheme. Deadlock prevention supplies a set of methods for ensuring that at least one of the necessary conditions cannot hold. Deadlock avoidance needs that the operating should be given advance information concerning with resources a process will request and use during its lifetime. If a system makes sure that a deadlock will never occur nor provides a mechanism for deadlock recovery and detection then we will reach a situation of deadlock but won't recognize what happened. To hold off the deadlock condition away from the system we must keep track of the resources each time, thus we will get the number of resources that are free and the resources that are being used and being requested.

 


Related Discussions:- What are the methods for handling deadlocks?

Analysis of Pseudocode Sempahore Solution, Gopher Gallery consists of a sho...

Gopher Gallery consists of a shopping mall and a cart ride that covers the 150 acre habitat. There are m visitors and n single-person vehicles. Visitors stroll around the mall at

Networking tidbits, There is a very small amount of networking background r...

There is a very small amount of networking background required for Project 2. In Project 2, we want our computer (or our "host") to request information over the Internet from a rem

Dual mode operation, WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF DUAL MODE...

WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF DUAL MODE OPERATION OF OPERATING SYSTEM>?

Naming scheme for servers in an enterprise, Problem: Within a corporate...

Problem: Within a corporate environment, there are usually many servers located across various departments. Naming of servers is often a tedious task. In many circumstances, w

Macro, What is macro expansion

What is macro expansion

Major advantage of the layered approach to system design, Q. What is the ma...

Q. What is the major advantage of the layered approach to system design? What are the de-merits of using the layered approach? Answer: As in all cases of modular design as well

Explain the threadswitchwithdelay function used in netware, Explain the Thr...

Explain the ThreadSwitchWithDelay Function used in Netware ThreadSwitchWithDelay( )   This command is used when threads are waiting for an event or resource but don't want t

Estimation the number of input - output per second, Q. Remapping of bad bl...

Q. Remapping of bad blocks by sector sparing or else sector slipping could influence performance. Presume that the drive in Subsequent Exercise has a total of 100 bad sectors at r

Graph - plotting job, This exercise uses a graph-plotting program ( gnuplot...

This exercise uses a graph-plotting program ( gnuplot ) to convert tabular data into an image. This is a technique that is very widely used to visualize scientific data; with app

What is spooling, What is spooling? Spooling overlaps the I/O of single...

What is spooling? Spooling overlaps the I/O of single job with the computation of other jobs.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd